Email Security White Papers

Results 1 - 25 of 370Sort Results By: Published Date | Title | Company Name
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, website development, networking, it management, knowledge management
    
By: Brainloop     Published Date: Oct 25, 2011

External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.

Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
    
By: Mimecast     Published Date: Feb 05, 2010

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security, web service security, enterprise software, email archiving
    
By: Mimecast     Published Date: Feb 05, 2010

Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, storage area networks, storage management, email security, enterprise software, email archiving
    
By: Mimecast     Published Date: Apr 16, 2009

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.

Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, backup and recovery, storage management, email security, security management, document management, records management, search and retrieval, email archiving
    
By: Mimecast     Published Date: Sep 25, 2008

Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.

Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, application security, email security, security management, mobile workers, business process automation, business process management, collaboration, collaborative commerce, messaging
    
By: iboss     Published Date: Jan 22, 2018

On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.

Tags : iboss, remote access, byod, cybersecurity, mobile workforce, network security, vpn, access control, email security, hacker detection, mobile workers, smart phones, wireless security, data protection, desktop management, cloud computing, business technology, mobile device management
    
By: RSA     Published Date: Sep 19, 2017

This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.

Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security, hacker detection, intrusion prevention, web service security, data loss prevention
    
By: Gigamon     Published Date: Jul 25, 2016

The purpose of this study is to provide readers with a framework to evaluate the potential financial benefit of Gigamon on their organizations.

Tags : security, roi, forrester report, network security, security deliver platform, threat and vulnerability management, cyber attacks, email security, firewalls, hacker detection, vulnerability management
    
By: Cisco     Published Date: Jun 16, 2016

Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.

Tags : security, application security, access control, security policies, anti spyware, email security, internet security
    
By: Code42     Published Date: Apr 22, 2016

The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.

Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication, email security, encryption, firewalls, hacker detection, internet security, intrusion detection, security management, data loss prevention
    
By: Forcepoint     Published Date: Apr 20, 2016

Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.

Tags : cyber security, security application, security, cybersecurity, data prevention, anti spam, anti spyware, anti virus, application security, email security, internet security, intrusion detection, intrusion prevention
    
By: CarbonBlack     Published Date: Mar 16, 2016

It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.

Tags : application control, advanced threats, security, proactivity approaches, security, application security, email security, encryption, security management, security policies
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Citrix XenMobile and Citrix ShareFile meet the complex needs of your mobile workforce with a complete, integrated and secure enterprise mobility solution—with a consumer-like experience people love. Both products are included in XenMobile Enterprise.

Tags : citrix, mobile, . mdm, secure, file sharing, email security, mobile workers, wireless communications, wireless infrastructure, customer satisfaction, messaging, secure content management
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.

Tags : citrix, mobile, deployment, app, email security, firewalls, mobile computing, best practices, customer satisfaction, windows, data protection, collaboration, content delivery, customer experience management, messaging, secure content management, mobile device management, data loss prevention
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.

Tags : citrix, sharefile, enterprise, security, email security, internet security, mobile computing, smart phones, wireless communications, wireless messaging, wireless phones, wireless security, data protection, collaboration, content delivery, content integration, secure content management, mobile device management, data loss prevention
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.

Tags : citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security, email security, hacker detection, mobile computing, smart phones, wifi, wireless phones, wireless security, data protection, collaboration, secure content management, mobile device management
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.

Tags : citrix, cyberthreat, report, defense, network security, email security, firewalls, network security appliance
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn how NetScaler with Unified Gateway provides One URL for secure remote access and helps reduce TCO, simplifies IT, strengthens security and ensures a high-definition experience for both mobile and traditional application users.

Tags : citrix, security, remote access, delivery, infrastructure, access control, email security, firewalls, mobile computing, service management
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.

Tags : security, security application, pki, authentication, internet security, security access, access control, application security, email security, security management
    
By: Sophos     Published Date: Oct 07, 2015

This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.

Tags : unified threat management, firewalls, utm, firewall solutions, security, security technology, protection, utm systems, network security, application security, email security, encryption, internet security
    
By: Sophos     Published Date: Oct 07, 2015

This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

Tags : endpoint buyers, vendors, endpoint security solution, antivirus, security solutions, security, security threats, endpoint buyers guide, endpoint security solution, application security, disaster recovery, email security, encryption, firewalls, intrusion detection, intrusion prevention
    
By: Silanis     Published Date: Aug 30, 2015

Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.

Tags : silanis, esignlive, electronic signature, regulatory compliance, compliance, health records, digital signature, signature, paperwork, contracts, forms, paperwork, email security, smart phones, wireless security, business management, customer service, data protection, document management, records management
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.

Tags : cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security, compliance, disaster recovery, email security, internet security, intrusion prevention, security management, data loss prevention
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End