Email Security White Papers

Results 1 - 25 of 363Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Dyn     Published Date: Apr 02, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming exposed through unsecured transfers or lost devices is a frightening reality.

Tags : encypt, encryption, secure file transfer, cyber security, cybersecurity, security, it protection, kaspersky
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

Tags : threat management, cyberthreat, cybersecurity, kaspersky, it security, security management, network security, anti spyware
    
By: Kaspersky     Published Date: Feb 14, 2014

Read this white paper to learn just how increasingly complex technology is causing new security challenges, and how best to address them.

Tags : it security, security, cybersecurity, antivirus, virus, antispam, spam, email security
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, business continuity
    
By: Cisco     Published Date: Jun 16, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, cisco, email security, threat detection network, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 16, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, mitigating attacks, anti spam, anti spyware
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
By: Cisco     Published Date: Jun 16, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 16, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, anti spyware, anti virus, internet security
    
By: Cisco     Published Date: Jun 16, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : access control, anti spam, anti spyware, anti virus, email security, internet security, web service security
    
By: Cisco     Published Date: Jun 12, 2014

U.K. energy contractor reduces total cost of ownership while improving customer service and adopting new ways of working.

Tags : cisco, unified communications solutions, borderless network infrastructure, cisco ironport security, case study, access control, anti spam, anti spyware
    
By: Cisco     Published Date: Jun 12, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, cisco, email security, threat detection network, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 12, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, anti spam, anti spyware, anti virus
    
By: Cisco     Published Date: Jun 12, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : cisco web security, malware, high risk sites, anti spam, anti spyware, anti virus, email security, internet security
    
By: McAfee     Published Date: May 22, 2014

FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.

Tags : security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End