> Research Library > Technology > Security > Email Security
 

Find Research


Add Research

Get your company's research in the hands of targeted business professionals.

Email Security

Results 1 - 25 of 388Sort Results By: Published Date | Title | Company Name
White Paper Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data
    
Adlib Software
Webinar Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection
    
Brainloop
White Paper Published By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business
    
Mimecast
White Paper Published By: Mimecast     Published Date: Feb 05, 2010
Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business
    
Mimecast
White Paper Published By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : 
mimecast, saas, email solutions, email managemeng, archiving
    
Mimecast
White Paper Published By: Mimecast     Published Date: Sep 25, 2008
Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.
Tags : 
mimecast, saas, malware, workflows, risk management
    
Mimecast
White Paper Published By: Kaspersky     Published Date: Feb 06, 2017
Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.
Tags : 
kaspersky, cyber crime, data loss, business security, network security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: Jul 22, 2016
Learn how you can maximize the performance and security of your virtualized machines.
Tags : 
kaspersky, virtual security, virtual environment, data breach, data protection
    
Kaspersky
White Paper Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies, anti spyware
    
Cisco
White Paper Published By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : 
kaspersky, ransomware, encyyption, data access, email security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers
    
Kaspersky
White Paper Published By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups, anti spyware
    
Code42
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.
Tags : 
cyber security, security application, security, cybersecurity, data prevention
    
Forcepoint
White Paper Published By: OpenText     Published Date: Apr 11, 2016
Read the Digital Clarity Group report for advice on how to initiate conversations internally about GDPR and questions you should ask your vendors to determine compliance levels.
Tags : 
opentext, gdpr, general data protection regulation, data. data inventory, network security
    
OpenText
White Paper Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Citrix XenMobile and Citrix ShareFile meet the complex needs of your mobile workforce with a complete, integrated and secure enterprise mobility solution—with a consumer-like experience people love. Both products are included in XenMobile Enterprise.
Tags : 
citrix, mobile, . mdm, secure, file sharing
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
citrix, mobile, deployment, app, email security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.
Tags : 
citrix, sharefile, enterprise, security, email security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how NetScaler with Unified Gateway provides One URL for secure remote access and helps reduce TCO, simplifies IT, strengthens security and ensures a high-definition experience for both mobile and traditional application users.
Tags : 
citrix, security, remote access, delivery, infrastructure
    
Citrix Systems, Inc.
Case Study Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security
    
Entrust Datacard
White Paper Published By: Sophos     Published Date: Oct 07, 2015
This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.
Tags : 
unified threat management, firewalls, utm, firewall solutions, security
    
Sophos
White Paper Published By: Sophos     Published Date: Oct 07, 2015
This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : 
endpoint buyers, vendors, endpoint security solution, antivirus, security solutions
    
Sophos
White Paper Published By: Silanis     Published Date: Aug 30, 2015
Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.
Tags : 
silanis, esignlive, electronic signature, regulatory compliance, compliance
    
Silanis
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library