Enterprise Email Security White PapersWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Enterprise Email Security White Papers returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Email Archiving
 •   Enterprise Data Protection and Privacy
 •   E-Mail Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Anti-Spam
 •   Anti-Virus Solutions
 •   Security Monitoring
 •   Security Policies

Related Searches
 •   Enterprise Email Decision
 •   Enterprise Email Requirement
 •   Enterprise Email Security Proposal
 •   Enterprise Email Security Schemas
 •   Enterprise Statements
 •   Enterprise Texas
 •   Enterprise Top
 •   Imports Enterprise Email Security
 •   Types Enterprise
 •   Version Enterprise
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Thawte in Education by Thawte Inc.

September 30, 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow by Sendmail, Inc.

October 2008 - (Free Research)
This white paper examines the architecture limitations prevalent in today's large-enterprise email networks. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Understanding Hosted and Managed Messaging - An Osterman Research White Paper by ZANTAZ

January 2008 - (Free Research)
Email messaging is a mission-critical function for virtually all organizations and it is becoming more so. Learn how you can manage email to meet regulation requirements, increase messaging security and reliability, and streamline storage... 
(WHITE PAPER) READ ABSTRACT |

10 Steps to Email Security by Clearswift

August 2013 - (Free Research)
This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure. 
(WHITE PAPER) READ ABSTRACT |

Using Classification to Manage Email Policy for the Enterprise by TITUS

May 2008 - (Free Research)
Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email. 
(WHITE PAPER) READ ABSTRACT |

Customer Satisfaction with Email Archiving Systems by Sunbelt Software

January 2010 - (Free Research)
Email archiving is rapidly becoming a critical best practice for organizations of all sizes and across all industries. This white paper compares Sunbelt Exchange Archiver (SEA) with a cross-section of other email archiving offerings, to help decision makers in the evaluation process. 
(WHITE PAPER) READ ABSTRACT |

Gone in 30 Days: Exchange, Retention, and Regulatory Compliance by Sherpa Software

September 2009 - (Free Research)
In this white paper, we will discuss how to discover, manage, and archive information within your Exchange enterprise to successfully limit your legal exposure and protect your corporate information. 
(WHITE PAPER) READ ABSTRACT |

Secure Enterprise e-mail Solutions with Microsoft® Exchange by Agilysys-Sun Technology Solutions

July 1967 - (Free Research)
This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies. 
(WHITE PAPER) READ ABSTRACT |

The Future of email and applications is social by IBM

April 2013 - (Free Research)
While it's difficult to imagine a workplace without email, today many businesses are coping with information overload. Email is a key factor of business collaboration tools, so businesses need to find a way to modify information management. View this white paper to learn more about what the future of email application entails. 
(WHITE PAPER) READ ABSTRACT |

What Are Your Obligations to Retain Email and Other Electronic Content? by Proofpoint, Inc.

October 2010 - (Free Research)
This paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands. 
(WHITE PAPER) READ ABSTRACT |

The Advantages of a Hosted Security Model by Websense, Inc.

June 2008 - (Free Research)
Learn how organizations today are responding to new types of email threats. This white paper discusses how a hosted security is now a viable solution for organizations and is increasingly deployed to ensure better security and reduced costs. 
(WHITE PAPER) READ ABSTRACT |

Top 5 Strategies for Getting an Email Archiving Project off the Ground by Symantec Corporation

December 2011 - (Free Research)
This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Email Archiving: Common Myths and Misconceptions by Dell India

January 2009 - (Free Research)
This white paper explores 5 common myths about email archiving, and provides guidance and solutions to solving email management and archiving issues. 
(WHITE PAPER) READ ABSTRACT |

Spam, Spammers, and Spam Control by Trend Micro GmbH

March 2009 - (Free Research)
This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam. 
(WHITE PAPER) READ ABSTRACT |

Should You Install Messaging Security Software on Your Exchange Server? by Sunbelt Software

August 2008 - (Free Research)
This white paper discusses the pros and cons of installing third-party software on the Exchange Server, and information on Sunbelt Software's Ninja Email Security. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

November 2010 - (Free Research)
This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk. 
(WHITE PAPER) READ ABSTRACT |

Why Content Filters Can't Eradicate Spam by Mimecast

August 2010 - (Free Research)
The vanguard of current spam management systems has been the content filter. These spam filters use various techniques applied to the words and content of email in order to determine whether the email should be allowed to the recipient or not. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Case for Third-Party Archiving in Exchange 2010 by Sunbelt Software

January 2010 - (Free Research)
This white paper will give you a brief overview of Sunbelt Software, while educating decision makers about the important role that email and other content archiving plays in minimizing risk and lowering the cost of doing business, the capabilities of archiving in Exchange 2020, and more. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention: Email and Web Gateway Best Practices by M86 Security

October 2010 - (Free Research)
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them. Read this paper to learn more about single-channel DLP at the email and Web gateways. 
(WHITE PAPER) READ ABSTRACT |

Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email by Coviant Software Corporation

December 2010 - (Free Research)
Read this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers. 
(WHITE PAPER) READ ABSTRACT |

How to Avoid Targeted Web and Email Attacks by M86 Security

July 2011 - (Free Research)
This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack. 
(WHITE PAPER) READ ABSTRACT |

Solving Four Primary Security Challenges of Microsoft SharePoint by Sophos UK

November 2009 - (Free Research)
This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets. 
(WHITE PAPER) READ ABSTRACT |

The Growing Importance of E-Discovery on Your Business by Google Apps

November 2008 - (Free Research)
The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process. 
(WHITE PAPER) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts