Email Security White Papers

Results 26 - 50 of 373Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
By: Cisco     Published Date: Jun 16, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 16, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, anti spyware, anti virus, internet security
    
By: Cisco     Published Date: Jun 16, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : access control, anti spam, anti spyware, anti virus, email security, internet security, web service security
    
By: Cisco     Published Date: Jun 12, 2014

U.K. energy contractor reduces total cost of ownership while improving customer service and adopting new ways of working.

Tags : cisco, unified communications solutions, borderless network infrastructure, cisco ironport security, case study, access control, anti spam, anti spyware
    
By: Cisco     Published Date: Jun 12, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, cisco, email security, threat detection network, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 12, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, anti spam, anti spyware, anti virus
    
By: Cisco     Published Date: Jun 12, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : cisco web security, malware, high risk sites, anti spam, anti spyware, anti virus, email security, internet security
    
By: McAfee     Published Date: May 22, 2014

FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.

Tags : security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Mimecast     Published Date: May 15, 2014

Best practices for the safe and secure use of file sharing services for organisations.

Tags : file sharing security, file sharing services, best practices, storage services, backup and recovery, storage management, business continuity, email security
    
By: Mimecast     Published Date: May 15, 2014

This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, access control
    
By: Mimecast     Published Date: May 15, 2014

A report into the downtime in email systems, its impacts and the relevant solutions.

Tags : email continuity, microsoft office 365, mimecast, continuity plans, email downtime, business continuity, email security, email archiving
    
By: Mimecast     Published Date: May 15, 2014

A Forrester total economic impact study of Mimecast's UEM solution.

Tags : unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Absolute Software     Published Date: May 14, 2014

Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.

Tags : endpoint protection stategy, byod, workforce mobility, absolute software, own device, access control, application security, email security
    
By: Dyn     Published Date: Apr 02, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Dyn     Published Date: Apr 02, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: Dyn     Published Date: Mar 27, 2014

It’s well known that transactional email is used to send out shipping notices or password resets, but did you know that due to its high click-through rates, it can be a great way to communicate with your customers? With this guide, find out what you might be missing in your transactional emails.

Tags : dyn, dns, email, transactional email, email security, click through rates, consumer interaction, email delivery
    
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: SilverSky     Published Date: Mar 26, 2014

The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.

Tags : silversky, ibm, cloud, cloud business, email, cloud business email, market quadrant, cloud based services
    
By: SilverSky     Published Date: Mar 26, 2014

The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.

Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security
    
By: SilverSky     Published Date: Mar 26, 2014

In this white paper, authored by technology market research firm The Radicati Group, the paper covers the ten reasons you should outsource your archiving solution, the seven unique benefits of archiving in the cloud and the how the SilverSky solution, powered by IBM compares.

Tags : silversky, ibm, radicati group, technology market research, cloud mailbox, email archiving, cloud based email archiving, archiving solution
    
By: SilverSky     Published Date: Mar 26, 2014

This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.

Tags : silversky, cloud based email, cloud, email solutions, security, archiving, data protection, collaboration
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End