Messaging Security Research
-
Symantec Protection Suite Challenge
Sponsored by: Symantec CorporationCheck out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
-
Exchange Insider E-Zine - Volume 2: Best and Worst Practices for Email Archiving
Sponsored by: TechTarget Search Windows ServerMeeting regulatory requirements means that administrators must carve out a sound email-archiving policy; making the wrong move can be costly. In this issue, you'll learn what to do and what not to do when planning your email-archiving strategy.
-
eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap
Sponsored by: TechTarget Search Windows ServerGet the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
VeriSign Mobile Enterprise Services: Enabling Next-Generation Mobile Messaging for Enterprises
Sponsored by: VeriSign, IncThis Solution Paper provides an overview of the rapidly growing mobile messaging and alerts market, and introduces a solution that addresses that market: VeriSign Mobile Messaging, an offering of VeriSign Mobile Enterprise Services (VMES).
-
Getting Started With E-mail Archiving for Exchange
Sponsored by: Sherpa SoftwareThis document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
-
Collaboration Without Boundaries: IBM Lotus Domino 8 and Open Collaboration Client Solution Powered by Red Hat Enterprise Linux
Sponsored by: Red Hat and JBossThe cost of downtime can be enormous, even catastrophic. IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness.
-
Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives
Sponsored by: TechTarget Search Windows ServerIn this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.
-
Application Discovery Tool
Sponsored by: SophosWith the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
-
Email Management in Today's Regulatory Environment
Sponsored by: Ontrack® PowerControls by Kroll OntrackMany businesses use the Exchange email server because of its full feature set and integration with Microsoft Office via the Outlook email client. But Exchange has one glaring drawback - it is very difficult to restore messages, mailboxes, and other data. Ontrack® PowerControls for Microsoft® Exchange Server solves the problem..
-
Email Recovery: Doing More with Less- How to save Time and Money When Recovering Email
Sponsored by: Kroll Ontrack, Inc.This paper shows how the costs associated with recovering email messages from Microsoft® Exchange Server backups can be significant and also provides us with the practical information on how to minimize those costs.
-
Blackberry Enterprise Solution: Security Technical Overview
Sponsored by: BlackBerryThis document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
-
Special Reports on Modernizing Messaging Infrastructure
Sponsored by: Sendmail, Inc.In this research note, Gartner outlines the top indicators of a potential IT train wreck in regards to messaging solutions.
-
e-Book: Chapter 5 - Understanding the Data Collection Process
Sponsored by: Symantec CorporationImproper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
-
The Impact of Messaging and Web Threats
Sponsored by: Trend Micro, Inc.This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
-
Unified Threat Management: The Best Defense against Blended Threats
Sponsored by: SonicWALLThe SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
-
Collaboration without Boundaries
Sponsored by: Red Hat and JBossIBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness. It is much more than a Microsoft Exchange/desktop alternative.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
Sponsored by: MicrosoftAttend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach
Sponsored by: MicrosoftAttend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.