ComputerWeekly.com Research Library

Powered by Bitpipe.com

Messaging Security Research

  • Spear Phishing: The Targeted Attacks that Aim for Your Business

    Sponsored by: Vade Secure

    Phishing and spear phishing are two of the most common types of cyberattacks. In a growing digital economy, technological assets are coming under greater threat from these two very similar attacks. How do you identify a phishing attack, and how can you take a proactive approach? Read this white paper to learn the answers.

  • Boys & Girls Clubs of Puerto Rico Protects Microsoft 365 Users from Targeted Attacks While Improving Performance

    Sponsored by: Vade Secure

    The Boys & Girls Clubs of Puerto Rico needed a way to secure their Microsoft 365 platforms while receiving quicker responses from their helpdesk. Confronted with a rise in phishing, spear phishing and malware attacks, they needed to act fast. Jump into the case study to look up-close at how they solved their problem.

  • Modern Collaboration and Productivity in Work-from-Anywhere World

    Sponsored by: Riverbed

    In this webcast, listen as Dante Malagrino from Riverbed and David Totten from Microsoft discuss the state of global enterprise collaboration and application delivery in a cloud-centric world.

  • Phishing Factories Exploit Trust to Attack Businesses

    Sponsored by: Akamai Technologies

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • This Is Your Last Line of Defense. Are They Ready?

    Sponsored by: Mimecast

    Your employees are your last line of defense against security threats. Are they ready? In this infographic, learn how to increase your employees’ knowledge of basic security issues with Mimecast Awareness Training.

  • AudioCodes Live for Microsoft Teams

    Sponsored by: AudioCodes

    In this short video, learn about a fully managed voice service for Microsoft Teams that enhances workplace productivity, without placing an additional burden on busy IT organizations.

  • Top 9 DDoS Threats Your Organization Must be Prepared For

    Sponsored by: Radware

    Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.

  • Secure Everywhere: The Power of Integrated Internet, Endpoint & Email Security

    Sponsored by: Cisco Umbrella

    Organizations today are struggling to find the resources needed to identify and address security gaps within their networks. This e-book is designed to help get you started by highlighting the challenges that lead to security gaps and overviewing the benefits of an integrated approach to security. Read on to learn more.

  • Endpoint Security Buyer’s Guide: Protect, Detect, Respond

    Sponsored by: Tanium

    Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.

  • Key Considerations when Making the Move to Office 365

    Sponsored by: Smarsh

    In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.

  • 10 Questions to Ask About Your Office 365 Deployment

    Sponsored by: Mimecast

    Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.

  • Mimecast Cyber Resilience For Email

    Sponsored by: Mimecast

    Listen as Joel Bedoford and Phillip Clark from Mimecast explore the current cyber resilience landscape for Australian businesses and unpack survey results from 257 IT decisions makers on the topic of Cyber Resilience for Email.

  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Sponsored by: Menlo Security

    Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • Why EDR Technologies are Essential for Endpoint Protection

    Sponsored by: SearchSecurity.com

    While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.

  • Phishing in the Age of SaaS

    Sponsored by: SonicWall

    Phishing attacks have become the primary hacking method used against organizations. While the roots of the attack trace back to the beginning of email adoption, the proliferation of SaaS has led to a resurgence in this hacking method. In this white paper, learn how SonicWall Cloud App Security can help you defend against SaaS phishing attacks.

  • Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%

    Sponsored by: Proofpoint

    Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.

  • Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes

    Sponsored by: Proofpoint

    When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.

  • Ransomware Galore: The Four You Shouldn't Ignore

    Sponsored by: Cisco Umbrella

    Ransomware is a growing issue that isn't going away anytime soon. Most organizations have already renewed their focus on data backup and recovery. But beyond that, do you know what your top defensive priorities should be? In this white paper, explore 4 things your organization must do to defend against ransomware.

  • Employees Behaving Badly? Why Awareness Training Matters

    Sponsored by: Mimecast

    Making awareness training part of your cyber-resilience planning is essential to keeping your organization secure. In general, employees are not doing bad things on purpose, but their actions can greatly impact the security of your organization and data. In this white paper, discover 6 ways to make security awareness a part of your culture.

  • Internal Threats Personified

    Sponsored by: Mimecast

    When it comes to securing email and protecting against cyberattacks, most organizations focus their attention on inbound emails. Although this is a great start, not all attacks are from incoming emails. In this white paper, explore 4 email-related activities that employees often engage in that contribute to the spread of these insider threats.

  • Best Practices for Implementing Security Awareness Training

    Sponsored by: Mimecast

    While technology-based solutions are critical for protecting an organization from attacks, a robust security awareness training program is also essential to provide a backstop. In this white paper, learn about the current state of security awareness training. Also learn about best practices to consider when developing a robust training program.

  • Conversational Office 365 Risk Mitigation

    Sponsored by: Mimecast

    Although Microsoft has more control over Office 365 because it's hosted in their cloud, there are still gaps. There are risks. And these reside primarily in the areas of security, data assurance, continuity and backup/recovery. In this e-book, learn more about these risks and discover ways to mitigate them.

  • Strengthen Your Defenses Against Cybercrime

    Sponsored by: Mimecast

    Email attacks are preventable – if you have the right strategy in place to protect your organization. But, the only way to protect every facet of your organization from email-borne threats is to have a holistic plan. In this white paper, explore 4 tips to help you get started on a cyber-resilience plan for email.

  • Business Case for Web Isolation

    Sponsored by: Menlo Security

    As cyberattacks increase in frequency and sophistication, customers feel forced to deploy an array of solutions in the hope that a best-of-breed mindset will protect their network. In this white paper, learn how Menlo Security's Isolation Platform can help companies reduce the financial risk of cyberattacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.