Email Security White Papers

Results 101 - 125 of 337Sort Results By: Published Date | Title | Company Name
By: Secunia     Published Date: Oct 12, 2011

Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: Secunia     Published Date: Oct 12, 2011

This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
By: Trend Micro Inc.     Published Date: Sep 21, 2011

For cybercriminals, no business is too small to exploit. Albeit being under a relatively smaller spotlight than typical enterprises, small businesses can ill afford to take the threat cybercrimes pose for granted. Myths abound regarding small businesses' security but it's time to face the facts.

Tags : trend micro, security, small business, cybercrime, cloud security, email security, internet security, security management
    
By: Absolute Software     Published Date: Sep 06, 2011

Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.

Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
By: NetIQ     Published Date: Aug 05, 2011

In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.

Tags : novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management
    
By: Symantec.cloud     Published Date: Aug 03, 2011

Cloud-based archives offer the cost savings, ease of use, and scalability of the cloud coupled with best-of-breed security from a trusted provider for defensibly handling high-risk enterprise data. Download this whitepaper to find out more now!

Tags : messagelabs symantec hosted services, best practices, financial services compliance, archiving, security, saas, convergence, network management
    
By: Symantec.cloud     Published Date: Aug 03, 2011

This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.

Tags : symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com, cta, converged threat analysis, email security
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.

Tags : digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.

Tags : fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.

Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Blue Coat Systems     Published Date: Jun 30, 2011

This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

Tags : blue coat, wan optimization, secure web gateway, application performance monitoring, anti virus, application security, email security, hacker detection
    
By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011

When it comes to data protection and recovery, many businesses are not as safe as they believe. Read on to find out what you should consider when creating your backup and disaster recovery plan.

Tags : storagecraft, recovery, backup, cloud, strategies, smb, protection, security
    
By: Google Apps     Published Date: Jun 09, 2011

View this webcast to hear Conrad Cross, CIO, discuss his decision to move to Google Apps and learn why governments coast-to-coast are going Google.

Tags : google for government, microsoft exchange, email, applications, savings, lotus notes, domino, cloud computing
    
By: IBM Corporation     Published Date: Jun 09, 2011

Learn the 10 critical database activities & behaviors enterprises should audit now.

Tags : ibm, guardium, database, audit, security, risk, monitoring, anti spam
    
By: Google     Published Date: May 05, 2011

This data sheet will provide the information you need to know on Surround existing email servers with cloud computing solutions to help increase security and reliability.

Tags : google postini services, message security, discovery, continuity, anti-spam, anti-virus, email content filtering, reliability
    
By: Google     Published Date: May 05, 2011

In this case study, you'll learn how they used Google Apps Education Edition to help them dramatically reduce time searching for email records from weeks to minutes, and how it also helped reduce costs in their messaging and collection system.

Tags : google message discovery, postini, pgcps, google apps education edition, cloud computing solution, compliance, sharon thompson, tco
    
By: Google     Published Date: May 05, 2011

Read this case study to learn all the benefits that Standard Chartered Bank experienced by switching to Google Message Security and learn how you can experience the same benefits and results today.

Tags : postini, google message security, employee productivity, standard chartered bank, anti-spam, anti-virus, content filtering, bandwidth management
    
By: Google     Published Date: May 05, 2011

This report measures the Total Economic Impact of moving your messaging and collaboration application from traditional, on-premise products to Google Apps.

Tags : google apps, collaboration, roi, forrester, cloud-based messaging, total economic impact, on-premise products, npv
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End