Email Security White Papers

Results 1 - 25 of 389Sort Results By: Published Date | Title | Company Name
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: Brainloop     Published Date: Oct 25, 2011

External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.

Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
    
By: Mimecast     Published Date: Feb 05, 2010

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security
    
By: Mimecast     Published Date: Feb 05, 2010

Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, storage area networks
    
By: Mimecast     Published Date: Apr 16, 2009

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.

Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
By: Mimecast     Published Date: Sep 25, 2008

Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.

Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving
    
By: RSA     Published Date: Sep 19, 2017

This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.

Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security
    
By: Kaspersky     Published Date: Feb 06, 2017

Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.

Tags : kaspersky, cyber crime, data loss, business security, network security, email security, hacker detection, internet security
    
By: Kaspersky     Published Date: Jul 22, 2016

Learn how you can maximize the performance and security of your virtualized machines.

Tags : kaspersky, virtual security, virtual environment, data breach, data protection, network security, email security, intrusion prevention
    
By: Cisco     Published Date: Jun 16, 2016

Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.

Tags : security, application security, access control, security policies, anti spyware, email security, internet security
    
By: Kaspersky     Published Date: May 11, 2016

You don't have to be a victim of ransomware. Get the facts you need to protect your company.

Tags : kaspersky, ransomware, encyyption, data access, email security, company security, network security, access control
    
By: Kaspersky     Published Date: May 11, 2016

As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.

Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall
    
By: Code42     Published Date: Apr 22, 2016

The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.

Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication
    
By: Forcepoint     Published Date: Apr 20, 2016

Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.

Tags : cyber security, security application, security, cybersecurity, data prevention, anti spam, anti spyware, anti virus
    
By: OpenText     Published Date: Apr 11, 2016

Read the Digital Clarity Group report for advice on how to initiate conversations internally about GDPR and questions you should ask your vendors to determine compliance levels.

Tags : opentext, gdpr, general data protection regulation, data. data inventory, network security, compliance, email security, security policies
    
By: CarbonBlack     Published Date: Mar 16, 2016

It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.

Tags : application control, advanced threats, security, proactivity approaches, security, application security, email security, encryption
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Citrix XenMobile and Citrix ShareFile meet the complex needs of your mobile workforce with a complete, integrated and secure enterprise mobility solution—with a consumer-like experience people love. Both products are included in XenMobile Enterprise.

Tags : citrix, mobile, . mdm, secure, file sharing, email security, mobile workers, wireless communications
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.

Tags : citrix, mobile, deployment, app, email security, firewalls, mobile computing, best practices
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.

Tags : citrix, sharefile, enterprise, security, email security, internet security, mobile computing, smart phones
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.

Tags : citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.

Tags : citrix, cyberthreat, report, defense, network security, email security, firewalls, network security appliance
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn how NetScaler with Unified Gateway provides One URL for secure remote access and helps reduce TCO, simplifies IT, strengthens security and ensures a high-definition experience for both mobile and traditional application users.

Tags : citrix, security, remote access, delivery, infrastructure, access control, email security, firewalls
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.

Tags : security, security application, pki, authentication, internet security, security access, access control, application security
    
By: Sophos     Published Date: Oct 07, 2015

This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.

Tags : unified threat management, firewalls, utm, firewall solutions, security, security technology, protection, utm systems
    
By: Sophos     Published Date: Oct 07, 2015

This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

Tags : endpoint buyers, vendors, endpoint security solution, antivirus, security solutions, security, security threats, endpoint buyers guide
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End