Email Security White Papers

Results 26 - 50 of 337Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Nov 13, 2013

Android and iOS-based consumer devices including smartphones and tablets play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with solutions from Citrix.

Tags : application security, email security, mobile computing, smart phones, wireless application software, mobile device management
    
By: ServiceNow     Published Date: Oct 18, 2013

Three IT transformations can help IT get its own house in order to become the proactive partner of the business. By applying these concepts, IT departments at major enterprises are changing the way they engage with their business peers.

Tags : technology, service automation, it workload, it infrastructure, service consolidation, it globalization, managing service relationships, consumerized service experience
    
By: Mimecast     Published Date: Oct 17, 2013

This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.

Tags : mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365
    
By: McAfee     Published Date: Oct 14, 2013

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, network security, email security
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn how Banca Intesa prepared themselves for future cyber attacks by teaming with HP and using their ArcSight security information and event management (SIEM) solution

Tags : banca intesa, threats, hp arcsight, cyber attacks, arcsight, security information, event mangement solutions, global cyber crime
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn how Obrela, an Enterprise information security service provider, leveraged HP ArcSight to improve and protect their complex work environment

Tags : obrela, hp arcsight, siem, security information, event management solution, security industries, anti virus, application security
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn why you need to embrace next-generation firewalls to stay ahead of the newest threats to IT with this whitepaper from HP

Tags : next generation firewall, firewall, next-gen, whitepaper, cloud computing, virtualization, mobility, application security
    
By: Blue Coat Systems     Published Date: Aug 12, 2013

There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.

Tags : av defense, blue coat, web environment, application security, business continuity, email security, ssl
    
By: Rapid7     Published Date: Jul 24, 2013

As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the user's confidential personal and financial information. In this Mobile Security Guide, we'll walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.

Tags : rapid7, malware, mobile malware, trojan, virus, app security, mobile device security, iphone security
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.

Tags : mobile, malware, security, scams, bluecoat, data loss, anti spam, anti virus
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”

Tags : security, business, cyber security, application security, email security, firewalls, internet security, network security appliance
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.

Tags : gateway, web, security, application security, email security, internet security, security management, vulnerability management
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.

Tags : web security, appliance, virtual, physical, saas, hybrid, access control, application security
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

From the Era Before security to this current era of empowerment this infographic from BlueCoat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security is able to empower businesses.

Tags : idc, security, bluecoat, web security, hackers, application security, email security, hacker detection
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view himself or herself as a business enabler. He or she must focus on continuously aligning with business objectives, improving delivery capability to support business processes that bring new products and services to market more quickly, fostering innovation, and reducing costs through improved performance. In this custom Technology Adoption Profile (TAP), the data confirms this trend.

Tags : security, technology, business technology, cio, application security, email security, internet security, network security appliance
    
By: Sophos     Published Date: Jul 15, 2013

This MDM buyers guide will walk you through the process of selecting the right mobile device management solution that fits your company’s BYOD objectives. It explains how an effective MDM system can support an organization's workforce mobility strategy, ensure compliance, and provide central management of devices and apps while supporting easy administration.

Tags : sophos, byod, buyers guide, mobile device management, mobile device, android, windows 8, mobile
    
By: SilverSky     Published Date: Apr 16, 2013

In Forrester's 15-criteria evaluation of the emerging managed security services provider (MSSP) market, SilverSky was identified as a leader. Forrester identified the 10 most significant providers in this category and researched, analyzed, and scored them. SilverSky was given high ranks for business and technical value, SLA adherence, security services, and threat intelligence and analytics. Download this industry research paper now to learn why SilverSky is the MSSP you should be working with today.

Tags : managed security, msp, managed service provider, sla adherance, threat intelligence, analytics, mssp, forrester
    
By: SilverSky     Published Date: Apr 16, 2013

Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.

Tags : vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus
    
By: Kaseya     Published Date: Apr 04, 2013

A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.

Tags : it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus
    
By: Symantec     Published Date: Apr 04, 2013

This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.

Tags : malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
    
By: SilverSky     Published Date: Mar 20, 2013

In this whitepaper, we highlight the important issues surrounding cloud email, such as cost, security, monitoring, uptime, and compliance.

Tags : email, cloud, uptime, compliance, data protection, security, email security, business continuity
    
By: McAfee     Published Date: Mar 11, 2013

McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: McAfee     Published Date: Mar 08, 2013

McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: McAfee     Published Date: Mar 07, 2013

McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.

Tags : securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba
    
By: McAfee     Published Date: Mar 07, 2013

HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.

Tags : best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases, anti spam
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End