Messaging Security Research
-
Are your remote workers sitting ducks?
Sponsored by: MimecastCOVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
-
Mitigations for Mobile Phishing Problems on the iOS Platform
Sponsored by: TechTarget SecurityAttackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
-
Managing Integrated Communications, Consumerization and Security: Best Practices
Sponsored by: TechTarget SecurityThis E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users.
-
IT Decision Checklist: Messaging Security
Sponsored by: TechTarget SecurityRead this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
-
eGuide: Information Security - Buyer's Guide to Messaging Security
Sponsored by: TechTarget SecurityProtecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
-
Why EDR Technologies are Essential for Endpoint Protection
Sponsored by: TechTarget SecurityWhile an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
-
The State of Cybersecurity and How It Will Evolve
Sponsored by: ALTRDownload this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
-
Citrix ShareFile updates let businesses ditch paper processes
Sponsored by: CitrixEnterprise file sync-and-share (EFSS) platforms have seen widespread use in recent years. EFSS services have been optimizing features to help businesses more efficiently streamline workflows. In this e-guide learn about new features one platform has added and how they can help your organization digitize processes that are often paper-based.
-
Squash Large Business Email Security Challenges
Sponsored by: Intermedia NetIf you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
HIPAA Compliance Statement
Sponsored by: TigerText, Inc.This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
-
Beaufort Memorial Case Study
Sponsored by: ImprivataThis case study highlights Beaufort Memorial Hospital's success in implementing a secure communications platform that allowed a more efficient, secure, and cost-effective clinician workflow.
-
Best Practices for Secure Email Policy and Compliance
Sponsored by: AxwayAccess this white paper today to learn best practices for secure email policy and compliance so you're properly prepared to combat fines, theft, or loss.
-
IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians
Sponsored by: ImprivataAccess this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation.
-
Domino Security Vulnerabilities to Watch For
Sponsored by: Symantec CorporationAccess this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.
-
Messaging and Web Security Best Practices for 2011 and Beyond
Sponsored by: GFI SoftwareThis paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
-
Fortune 200 Firm Achieves Global Email Protection
Sponsored by: WatchGuard Technologies, Inc.Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.
-
Exchange Insider E-zine Volume 8: Prepping BlackBerry Enterprise Server for Exchange 2010 SP1
Sponsored by: TechTarget Search Windows ServerVolume 8 of the Exchange Insider e-zine compares available Blackberry Enterprise Server (BES) editions and then gives instructions for deploying BES Express for Exchange 2010. You’ll also get an overview of configuring Exchange Server 2010 for BES and some device management best practices to make sure all your clients remain in peak condition.
-
Exchange Insider E-zine -- Volume 7: Five Things to Do Before Virtualizing Exchange Server 2010
Sponsored by: TechTarget Search Windows ServerThis issue demonstrates how to change default Outlook Web App settings and why you shouldn’t skip the tedious process of documenting a server migration project. Also learn the five critical elements you'll need to have in place before you plug in your first virtual machine.
-
Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
Sponsored by: GoogleVolume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
-
Should Your Email Live In The Cloud? A Comparative Cost Analysis
Sponsored by: GoogleThis analyst report presents a spreadsheet cost model to help you calculate your fully loaded on premise email costs and compare it against cloud-based alternatives.
-
Your September Issue of Information Security Magazine– Readers’ Choice Awards
Sponsored by: Information Security MagazineIn this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
-
Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection
Sponsored by: Trend Micro, Inc.Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.
-
Reduce Risks and Protect Critical Information with Ease - Presentation Transcript
Sponsored by: SymantecThe threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.
-
Total Economic Impact™ of Trend Micro Enterprise Security
Sponsored by: Trend Micro, Inc.The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.