Email Security White Papers

Results 101 - 125 of 363Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: NetApp and VMware     Published Date: Jan 09, 2012

Paula Fortin of Green Mountain Power explains how their strategy for disaster recovery of their virtual infrastructure was readily possible during Hurricane Irene.

Tags : netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility, storage efficiency, integrated data protection, green mountain
    
By: Okta     Published Date: Jan 06, 2012

In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: Okta     Published Date: Jan 06, 2012

These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: Symantec     Published Date: Jan 04, 2012

Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: NetIQ     Published Date: Dec 08, 2011

Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.

Tags : automating, webcast, security, vulnerabilities, resources, productivity, access control, application security
    
By: VMware Dell     Published Date: Dec 07, 2011

This white paper outlines the ways virtualization can address the challenges of traditional disaster recovery and create a viable recovery plan.

Tags : disaster recovery, disaster, security, risk, plan, continuity, architecture, dell
    
By: Webroot     Published Date: Dec 06, 2011

In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security

Tags : security, facilities, evolve, communication, collaboration, access control, anti spam, anti spyware
    
By: Webroot     Published Date: Dec 06, 2011

Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.

Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
By: CenturyLink     Published Date: Nov 18, 2011

Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
By: LogRhythm     Published Date: Nov 16, 2011

This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.

Tags : security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, access control
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, anti spam
    
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.

Tags : malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!

Tags : webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.

Tags : malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
By: Brainloop     Published Date: Oct 25, 2011

External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.

Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
    
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
    
By: EdgeWave     Published Date: Oct 15, 2011

Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.

Tags : edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation
    
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
By: Secunia     Published Date: Oct 12, 2011

This study identifies the 3rd party program vulnerabilities and the threat they represent.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: Secunia     Published Date: Oct 12, 2011

This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.

Tags : application security, authentication, email security, high availability, identity management, internet security, intrusion detection, intrusion prevention
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End