Email Security White Papers

Results 26 - 50 of 363Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: May 15, 2014

A report into the downtime in email systems, its impacts and the relevant solutions.

Tags : email continuity, microsoft office 365, mimecast, continuity plans, email downtime, business continuity, email security, email archiving
    
By: Mimecast     Published Date: May 15, 2014

A Forrester total economic impact study of Mimecast's UEM solution.

Tags : unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Absolute Software     Published Date: May 14, 2014

Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.

Tags : endpoint protection stategy, byod, workforce mobility, absolute software, own device, access control, application security, email security
    
By: Dyn     Published Date: Apr 02, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Dyn     Published Date: Apr 02, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: Dyn     Published Date: Mar 27, 2014

It’s well known that transactional email is used to send out shipping notices or password resets, but did you know that due to its high click-through rates, it can be a great way to communicate with your customers? With this guide, find out what you might be missing in your transactional emails.

Tags : dyn, dns, email, transactional email, email security, click through rates, consumer interaction, email delivery
    
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: SilverSky     Published Date: Mar 26, 2014

The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.

Tags : silversky, ibm, cloud, cloud business, email, cloud business email, market quadrant, cloud based services
    
By: SilverSky     Published Date: Mar 26, 2014

The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.

Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security
    
By: SilverSky     Published Date: Mar 26, 2014

The Radicati Group, a technology market research firm, highlights its choices for Hosted Microsoft Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.

Tags : silversky, ibm, radicati group, technology market reserach, hosted microsoft exchange providers, hosted microsoft exchange, cloud mailbox, data center
    
By: SilverSky     Published Date: Mar 26, 2014

In this white paper, authored by technology market research firm The Radicati Group, the paper covers the ten reasons you should outsource your archiving solution, the seven unique benefits of archiving in the cloud and the how the SilverSky solution, powered by IBM compares.

Tags : silversky, ibm, radicati group, technology market research, cloud mailbox, email archiving, cloud based email archiving, archiving solution
    
By: SilverSky     Published Date: Mar 26, 2014

In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.

Tags : silversky, exchange, cloud exchange, cloud, security, scalability, flexibility, hosted exchange
    
By: SilverSky     Published Date: Mar 26, 2014

This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.

Tags : silversky, cloud based email, cloud, email solutions, security, archiving, data protection, collaboration
    
By: IBM     Published Date: Feb 27, 2014

Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.

Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
By: Nativeflow     Published Date: Feb 25, 2014

Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.

Tags : enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

Tags : threat management, cyberthreat, cybersecurity, kaspersky, it security, security management, network security, anti spyware
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: McAfee     Published Date: Jan 22, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : mcafee, gartner, endpoint protection, network security, application security, email security, hacker detection, intrusion prevention
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Unfortunately most large organizations aren't ready for this brave new world of digital content distribution remaining woefully unsearchable while languishing behind departmental silos. This whitepaper explores how your organization can leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Adobe     Published Date: Nov 25, 2013

For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.

Tags : mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets
    
By: Norse     Published Date: Nov 19, 2013

Learn how your current defenses against cyber-attacks are outdated and how intelligence-based strategies will protect your organization from advanced attacks.

Tags : cyber criminal, cyber-attacks, advanced attacks, hackers, network, infrastructure, anti spam, anti spyware
    
By: McAfee     Published Date: Nov 19, 2013

This white paper discusses three common approaches to email encryption and explains their distinct advantages to help you determine which approach best fits the needs of your organization.

Tags : email encryption, email security, tls encryption, transport layer security, on premises, saas, application security, hacker detection
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End