Email Security White Papers

Results 1 - 25 of 388Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Jun 22, 2015

So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:

Tags : microsoft office 365, offline emails, cloud backup, email security, data in the cloud, cyber attacks, networking, disaster recovery
    
By: Mimecast     Published Date: Jun 22, 2015

To find out if your data is being put at risk, get practical advice on how to eliminate this risk, and find out which vendor hits the ‘Bloor Bullseye’.

Tags : file sharing security, file sharing services, best practices, storage services, email security, security management, business intelligence, collaboration
    
By: Mimecast     Published Date: Jun 22, 2015

Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, data management
    
By: Mimecast     Published Date: Jun 22, 2015

Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?

Tags : email continuity, microsoft office 365, mimecast, continuity plans, email downtime, email security, email archiving, data loss prevention
    
By: Mimecast     Published Date: Jun 22, 2015

Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying its Unified Email Management solution.

Tags : unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
By: Mimecast     Published Date: Jun 22, 2015

Download this whitepaper today and take a good hard look at one of the biggest threats companies are facing – without preparation your company could be next.

Tags : spear-phising, cyber attacks, cyber threats, network security, company security, application security, business continuity, disaster recovery
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Riverbed     Published Date: Jun 02, 2015

Software as a service (SaaS) offerings such as Salesforce. com and Microsoft Office 365 are among the more popular cloud-based services. Learn how these services can help accelerate your delivery through this whitepaper.

Tags : microsoft office, saas, the cloud, cloud based mail, collaboration, remote offices, infrastructure, data streamlining
    
By: IBM     Published Date: May 12, 2015

whitepaper describing how Universal document and image viewers can reduce costs, time and headaches.

Tags : ibm, big data, information lifecycle, email, document sharing, email security, document management, information management
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Nexsan by Imation     Published Date: Feb 26, 2015

Ballooning data growth and ever-shrinking IT budgets have combined to push higher-density disk arrays to the forefront for almost any organization contemplating investment in new backup solutions. That’s not surprising; after all, the promise of more backup capacity and performance in less data center real estate sounds irresistible to anyone seeking greater efficiency and cost-effectiveness from their existing IT infrastructure.

Tags : imation, nexsan, storage, backup, backup and recovery, backup costs, network performance, storage management
    
By: Juniper Networks     Published Date: Feb 18, 2015

The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.

Tags : firewall planning, network firewall, security policy, http, terminal server, network, email security, firewalls
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and running multiple applications from both company and personal devices, sensitive corporate data is more vulnerable than ever before. For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: F5 Networks     Published Date: Dec 10, 2014

Virtualization caused a major cultural shift in IT. By enabling physical assets to be better utilized, IT teams realized that they could deliver systems to their customers in a more timely manner, thereby delivering better value. In this webinar you will learn what is NetOps and how is it different from DevOps.

Tags : f5 networks, devops, agile, netops, data center, virtualization, sdn, infrastructure
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, email security
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 19, 2014

This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts.

Tags : internet security, istr, cybercrime, internet security trends, anti spam, anti spyware, anti virus, application security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End