Email Security Case StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Email Security Case Study returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   E-Mail Management
 •   Email Archiving
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Enterprise Systems Management
 •   Disaster Recovery

Related Searches
 •   Email Security Case Computerized
 •   Email Security Web
 •   Email Services
 •   Email Skills
 •   Improvement Email
 •   Manage Email Security Case
 •   Needs Email Security
 •   Own Email Security Case
 •   Programs Email Security
 •   Support Email Security
Advertisement

ALL RESULTS
1 - 25 of 444 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Email Security – Virtual Appliance by Cisco Systems, Inc.

April 22, 2014 - (Free Research)
This webcast features an email security virtual appliance that helps you better detect, predict, and prevent today's more targeted attacks. 
(WEBCAST) READ ABSTRACT |

Advanced Malware Protection for your Web and Email Gateways by Cisco Systems, Inc.

February 25, 2014 - (Free Research)
This article explores the recent merger between one company's advanced malware protection and their web and email gateways. 
(PRESS RELEASE) READ ABSTRACT |

Cisco adds Sourcefire AMP to email, Web security by Cisco Systems, Inc.

February 25, 2014 - (Free Research)
This informative resource discusses a recent merger that brought together advanced malware protection for your email and web gateways. 
(PRESS RELEASE) READ ABSTRACT |

Ensuring Security for your E-Mail Applications by Cisco Systems, Inc.

February 27, 2014 - (Free Research)
This informative article explores a top-tier email security strategy and how it utilizes advanced malware protection to prevent devastating security breaches. 
(WHITE PAPER) READ ABSTRACT |

Thawte in Education by Thawte Inc.

September 30, 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam by Panda Security

November 20, 2009 - (Free Research)
Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam. 
(CASE STUDY) READ ABSTRACT |

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses by Cisco Systems, Inc.

February 13, 2009 - (Free Research)
Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software. 
(CASE STUDY) READ ABSTRACT |

HKMP Case Study: BlackBerry Solution is on the Money for Accounting Firm by BlackBerry

September 16, 2011 - (Free Research)
Access this case study to learn how an accounting firm used BlackBerry® smartphones to meet their needs for almost immediate communications, collaboration, document access and security. 
(CASE STUDY) READ ABSTRACT |

Prince George’s County School District Streamlines Email Investigations and Boosts IT Productivity with Google Apps and Google Message Discovery by Google Postini

December 03, 2009 - (Free Research)
In March 2008, Prince George's County Public Schools ran a pilot of Google Apps Education Edition. In this case study, you'll learn how they used it to dramatically reduce time searching for email records from weeks to minutes, and how it also helped reduce costs in their messaging and collection system. 
(CASE STUDY) READ ABSTRACT |

Case Study: Providing Top-Notch Customer Service With the Latest Communications Technologies by Cisco Systems, Inc.

July 15, 2013 - (Free Research)
This informative case study examines how a full-service financial institution utilized a collaboration platform to meet a broad set of requirements, including high availability and scalability, intelligent call routing and integration with email and existing solutions. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Hospital Sees BlackBerry Smartphones as a Way to Improve Patient Care and save Lives by BlackBerry

November 01, 2007 - (Free Research)
This case study describes why Trillium Health Centre gave 40 BlackBerry smartphones to all of the members of the ICU team making it the first hospital in North America to test push email as an essential part of how the health care team worked together. 
(CASE STUDY) READ ABSTRACT |

Sportif USA Transparently Automates the Archiving and Protection of Large Outlook Mailboxes with Metalogix by Metalogix

January 24, 2012 - (Free Research)
In this case study, explore how Sportif, a leading outdoors clothing innovator, reduced email management costs and increased data protection for their users with Metalogix Archive Manager for Exchange. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Reducing Backup and Recovery Costs by 80% by Iron Mountain

January 28, 2011 - (Free Research)
Read this Case Study to learn how the Eighteenth Judicial Circuit of Florida protected their data and prepared for unforeseen natural disasters. 
(CASE STUDY) READ ABSTRACT |

Great Things Happen on the Road to Disaster Recovery by AppAssure Software, Inc.

April 10, 2009 - (Free Research)
In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup. 
(CASE STUDY) READ ABSTRACT |

Defending Systems on a Wide-open Network with Symantec Endpoint Protection by Symantec Corporation

July 02, 2012 - (Free Research)
Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs. 
(CASE STUDY) READ ABSTRACT |

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions by AccessData Group

April 06, 2011 - (Free Research)
The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology. 
(WHITE PAPER) READ ABSTRACT |

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection by Trend Micro, Inc.

August 27, 2010 - (Free Research)
Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.   
(WHITE PAPER) READ ABSTRACT |

Goodman's LLP Case Study: Law Firm Plans for Contingencies with Indispensible BlackBerry Smartphones by BlackBerry

September 16, 2011 - (Free Research)
Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption. 
(CASE STUDY) READ ABSTRACT |

BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving by IBM

May 31, 2013 - (Free Research)
This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You by Dell Software

August 21, 2012 - (Free Research)
Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more. 
(WHITE PAPER) READ ABSTRACT |

NETGEAR Prosecure Security Threat Management by NETGEAR Inc.

October 20, 2010 - (Free Research)
An end-point solution for each threat was not a cost-effective solution, and paying for security on a per-user license basis was clearly out of the question. What’s more, a number of appliances only protected either web or email, but not both at the same time. Read this case study to learn more about an effective solution to these problems. 
(CASE STUDY) READ ABSTRACT |

SocialText Case Study: Boston College by Socialtext

February 2008 - (Free Research)
Boston College evaluated various options for increasing communication and collaboration in the classroom, including staying with Facebook, but in October 2006 ultimately decided to use the Socialtext hosted service for wikis. 
(CASE STUDY) READ ABSTRACT |

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye by FireEye

December 2013 - (Free Research)
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system. 
(WHITE PAPER) READ ABSTRACT |

UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by RSA, The Security Division of EMC

March 2012 - (Free Research)
Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more. 
(CASE STUDY) READ ABSTRACT |

Senior Vodafone Staff Access BlackBerry Service at all Times with Rapid Disaster Recovery by Neverfail

June 2013 - (Free Research)
This case study discusses how one company implemented a high availability solution that delivers 24/7 availability and allows for routine maintenance while their system is live. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 444 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts