Email Security White Papers

Results 101 - 125 of 381Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Feb 06, 2013

This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.

Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam
    
By: Symantec     Published Date: Jan 31, 2013

Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.

Tags : endpoint protection, security, best practices, survey, anti spam, anti spyware, anti virus, application security
    
By: Symantec     Published Date: Jan 31, 2013

PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.

Tags : endpoint protection, security, performance test, comparison, windows 8, anti spam, anti spyware, anti virus
    
By: HP - Enterprise     Published Date: Jan 24, 2013

The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.

Tags : mobile, vulnerability, byod, dast, sast, testing, risk management, security management
    
By: HP - Enterprise     Published Date: Jan 24, 2013

Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world thatís evolving faster than ever before. Read this dossier to find out more.

Tags : consumerization, byod, risk management, security, anti spam, anti spyware, anti virus, authentication
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This eBook will help you to assess where you currently are in the security landscape, where youíre still unprotected and what you need to do complete your security portfolio.

Tags : security, network security, enterprise, infrastructure, best practices, vulnerability, access control, anti spam
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This eBook will help you to assess where you currently are in the security landscape, where youíre still unprotected and what you need to do complete your security portfolio.

Tags : security, compliance, mobile, tablets, byod, cloud, access control, anti spyware
    
By: HP - Enterprise     Published Date: Jan 24, 2013

This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.

Tags : cloud, security, attacks, risk, virtualization, encryption, access control, anti spam
    
By: McAfee     Published Date: Jan 23, 2013

Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.

Tags : dos, ddos, attacks, threats, layered security, advanced threats, advanced attacks, malware
    
By: McAfee     Published Date: Jan 23, 2013

A criminal industry develops. This paper explores bot evolution, itís global prevalence, whoís at risk, a look forward and combating bots using Global Threat Intelligence.

Tags : botnets, bots, defense in depth, threat prevention, advanced attacks, malware, access control, anti spam
    
By: Lumension     Published Date: Jan 22, 2013

In this fast-paced webinar, Iíll look at everything thatís new as far as security in Windows 8, with a special focus on mobility.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile
    
By: Lumension     Published Date: Jan 22, 2013

In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.

Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks
    
By: Symantec     Published Date: Jan 11, 2013

Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.

Tags : symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft
    
By: Websense     Published Date: Aug 23, 2012

"Is this email a phish or is it legitimate?" That's the question that employees - and executives in particular - are asking with greater frequency.

Tags : phishing, web security, email security, phishing attacks, internet security, web service security
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: NetApp and VMware     Published Date: Jan 09, 2012

Paula Fortin of Green Mountain Power explains how their strategy for disaster recovery of their virtual infrastructure was readily possible during Hurricane Irene.

Tags : netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility, storage efficiency, integrated data protection, green mountain
    
By: Okta     Published Date: Jan 06, 2012

In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: Okta     Published Date: Jan 06, 2012

These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.

Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
By: Symantec     Published Date: Jan 04, 2012

Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: NetIQ     Published Date: Dec 08, 2011

Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.

Tags : automating, webcast, security, vulnerabilities, resources, productivity, access control, application security
    
By: VMware Dell     Published Date: Dec 07, 2011

This white paper outlines the ways virtualization can address the challenges of traditional disaster recovery and create a viable recovery plan.

Tags : disaster recovery, disaster, security, risk, plan, continuity, architecture, dell
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End