Email Security White Papers

Results 101 - 125 of 374Sort Results By: Published Date | Title | Company Name
By: HP - Enterprise     Published Date: Jan 24, 2013

This eBook will help you to assess where you currently are in the security landscape, where youíre still unprotected and what you need to do complete your security portfolio.

Tags : security, compliance, mobile, tablets, byod, cloud, access control, anti spyware
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.

Tags : cloud, security, attacks, risk, virtualization, encryption, access control, anti spam
    
By: McAfee     Published Date: Jan 23, 2013

Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.

Tags : dos, ddos, attacks, threats, layered security, advanced threats, advanced attacks, malware
    
By: McAfee     Published Date: Jan 23, 2013

A criminal industry develops. This paper explores bot evolution, itís global prevalence, whoís at risk, a look forward and combating bots using Global Threat Intelligence.

Tags : botnets, bots, defense in depth, threat prevention, advanced attacks, malware, access control, anti spam
    
By: Lumension     Published Date: Jan 22, 2013

In this fast-paced webinar, Iíll look at everything thatís new as far as security in Windows 8, with a special focus on mobility.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile
    
By: Lumension     Published Date: Jan 22, 2013

In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks
    
By: Symantec     Published Date: Jan 11, 2013

Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.

Tags : symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft
    
By: Websense     Published Date: Aug 23, 2012

"Is this email a phish or is it legitimate?" That's the question that employees - and executives in particular - are asking with greater frequency.

Tags : phishing, web security, email security, phishing attacks, internet security, web service security
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: NetApp and VMware     Published Date: Jan 09, 2012

Paula Fortin of Green Mountain Power explains how their strategy for disaster recovery of their virtual infrastructure was readily possible during Hurricane Irene.

Tags : netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility, storage efficiency, integrated data protection, green mountain
    
By: Okta     Published Date: Jan 06, 2012

In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: Okta     Published Date: Jan 06, 2012

These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: Symantec     Published Date: Jan 04, 2012

Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: NetIQ     Published Date: Dec 08, 2011

Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.

Tags : automating, webcast, security, vulnerabilities, resources, productivity, access control, application security
    
By: VMware Dell     Published Date: Dec 07, 2011

This white paper outlines the ways virtualization can address the challenges of traditional disaster recovery and create a viable recovery plan.

Tags : disaster recovery, disaster, security, risk, plan, continuity, architecture, dell
    
By: Webroot     Published Date: Dec 06, 2011

In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security

Tags : security, facilities, evolve, communication, collaboration, access control, anti spam, anti spyware
    
By: Webroot     Published Date: Dec 06, 2011

Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.

Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
By: CenturyLink     Published Date: Nov 18, 2011

Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
By: LogRhythm     Published Date: Nov 16, 2011

This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.

Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, access control
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, anti spam
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End