Email Security

Results 1 - 25 of 380Sort Results By: Published Date | Title | Company Name
By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
     Adlib Software
By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
     Brainloop
By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security
     Mimecast
By: Mimecast     Published Date: Feb 05, 2010
Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, storage area networks
     Mimecast
By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
     Mimecast
By: Mimecast     Published Date: Sep 25, 2008
Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.
Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving
     Mimecast
By: RSA     Published Date: Sep 19, 2017
This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.
Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security
     RSA
By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : security, application security, access control, security policies, anti spyware, email security, internet security
     Cisco
By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication
     Code42
By: Forcepoint     Published Date: Apr 20, 2016
Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.
Tags : cyber security, security application, security, cybersecurity, data prevention, anti spam, anti spyware, anti virus
     Forcepoint
By: OpenText     Published Date: Apr 11, 2016
Read the Digital Clarity Group report for advice on how to initiate conversations internally about GDPR and questions you should ask your vendors to determine compliance levels.
Tags : opentext, gdpr, general data protection regulation, data. data inventory, network security, compliance, email security, security policies
     OpenText
By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : application control, advanced threats, security, proactivity approaches, security, application security, email security, encryption
     CarbonBlack
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Citrix XenMobile and Citrix ShareFile meet the complex needs of your mobile workforce with a complete, integrated and secure enterprise mobility solution—with a consumer-like experience people love. Both products are included in XenMobile Enterprise.
Tags : citrix, mobile, . mdm, secure, file sharing, email security, mobile workers, wireless communications
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : citrix, mobile, deployment, app, email security, firewalls, mobile computing, best practices
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.
Tags : citrix, sharefile, enterprise, security, email security, internet security, mobile computing, smart phones
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : citrix, cyberthreat, report, defense, network security, email security, firewalls, network security appliance
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how NetScaler with Unified Gateway provides One URL for secure remote access and helps reduce TCO, simplifies IT, strengthens security and ensures a high-definition experience for both mobile and traditional application users.
Tags : citrix, security, remote access, delivery, infrastructure, access control, email security, firewalls
     Citrix Systems, Inc.
By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : security, security application, pki, authentication, internet security, security access, access control, application security
     Entrust Datacard
By: Sophos     Published Date: Oct 07, 2015
This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.
Tags : unified threat management, firewalls, utm, firewall solutions, security, security technology, protection, utm systems
     Sophos
By: Sophos     Published Date: Oct 07, 2015
This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : endpoint buyers, vendors, endpoint security solution, antivirus, security solutions, security, security threats, endpoint buyers guide
     Sophos
By: Silanis     Published Date: Aug 30, 2015
Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.
Tags : silanis, esignlive, electronic signature, regulatory compliance, compliance, health records, digital signature, signature
     Silanis
By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
     Venafi
By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
     IBM
By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : microsoft office 365, offline emails, cloud backup, email security, data in the cloud, cyber attacks, networking, disaster recovery
     Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers