ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Threats Research

  • About to Buy Guide: Spam/virus protection for Exchange

    Sponsored by: TechTarget Security

    This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.

  • Expert ways to maximize security in Exchange

    Sponsored by: TechTarget Data Center

    This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.

  • How to prevent phishing attacks: User awareness and training

    Sponsored by: TechTarget Security

    This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.

  • FireEye Advanced Threat Report - 2H 2011

    Sponsored by: FireEye

    This FireEye Advanced Threat report provides key insight into the current threat landscape, the evolution of advanced persistent threat (APT) tactics and the level of infiltration seen in networks today. View now to gain an in-depth look into key findings to help you build and improve your security strategies to tackle today's security issues.

  • Messaging and Web Security Best Practices for 2011 and Beyond

    Sponsored by: GFI Software

    This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.

  • TrendLabs: Global Threat Trends 1H 2010

    Sponsored by: Trend Micro, Inc.

    In this report covering January to June 2010, we examine various cybercrime incidents, the criminal’s use of multiple tools such as botnets, and look at threat trends and activity currently causing, and likely to continue to cause the most pain, cost and disruption to connected users across the world.

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • Trend Micro Hosted Email Security

    Sponsored by: Trend Micro

    Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.

  • Trend Micro Hosted Email Security

    Sponsored by: Trend Micro

    Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.

  • Panda’s Managed Email Protection Service

    Sponsored by: Panda Security

    This data sheet provides information on Panda's Managed Email Protection Service, a managed email cleaning service guaranteeing 100% malware-free email, as well a series of key features of a great value to any company.

  • Presentation Transcript: Iron Mountain - E-mail Management

    Sponsored by: Iron Mountain

    Read this presentation transcript and free yourself from the daily hassles of e-mail management and fighting the inherent risks of e-mail Spam, viruses and noncompliance. Trust Iron Mountain's enterprise-class, cloud-based e-mail management service for 100% e-mail uptime at a cost savings of up to 60% versus on-premises solutions.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap

    Sponsored by: TechTarget Search Windows Server

    Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.

  • Stopping data leakage: Exploiting your existing security investment

    Sponsored by: Sophos

    This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.

  • Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper

    Sponsored by: Symantec Corporation

    This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.

  • Mail Security for Microsoft Exchange Server

    Sponsored by: Symantec Corporation

    This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast

    Sponsored by: Microsoft

    Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Enterprise Messaging Security and Management

    Sponsored by: Symantec Corporation

    Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach

    Sponsored by: Microsoft

    Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Microsoft Forefront Security for Exchange Server Beta

    Sponsored by: Microsoft

    Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.

  • Why One Virus Engine Is Not Enough

    Sponsored by: GFI Software

    This white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time.

  • Sophos Email Security Appliances

    Sponsored by: Sophos

    The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.