Search the Library
 
Home >

Security

>

Email Security


Results 1 - 25 of 118 matches Sort Results By : Published Date | Title | Company name
Email Management Services: The Smart Way to Continue Communicating
By : Dell. Published Date: Jul 23, 2009
A well-run email management service can help your business—whatever its size—maintain continuity of your email service, archive your old email, reduce your email storage costs, and ensure the security of your communications. By hiring experts to handle these crucial tasks, you can focus your time and talents on what matters most: growing your business. To learn more, download this free white paper.
Download Now
Dell.
Outbound Email and Data Loss Prevention in Today's Enterprise 2009
By : Proofpoint Published Date: Aug 07, 2009
How concerned are companies about the content of email leaving their organizations? And how do companies manage the legal and financial risks associated with outbound email? To find out, Proofpoint and Osterman Research conducted an online survey of technology decision makers at 220 large US companies during June 2009.

Download Now
Proofpoint
Free Trial Download for GFI MailEssentials for Exchange/SMTP/Lotus
By : GFI Published Date: Jul 20, 2009
GFI MailEssentials for Exchange/SMTP/Lotus is a server based anti-spam, anti-phishing and email management solution, which is used by 80,000 customers worldwide. The latest version uses two anti-spam engines, along with advanced spam filtering techniques, to give administrators a high spam capture rate straight out-of-the-box, with minimal configuration. GFI MailEssentials also minimizes false positives, so you do not need to worry about important emails being marked as spam.
Download Now
GFI
Free Trial Download for GFI MailArchiver for Exchange Server
By : GFI Published Date: Jul 20, 2009
GFI MailArchiver is the #1 email archiving, management and compliance solution for Exchange Server. Perfect for the needs of SMBs, GFI MailArchiver is easily to install and requires minimal administrative effort.



Download Now
GFI
Next Generation Solutions for Spam: A Predictive Approach.
By : Proofpoint Published Date: Jul 01, 2009
Mounting an effective defense against spam requires detection techniques that can evolve as quickly as the attacks themselves. Without the ability to automatically adapt to detect new types of threats, an anti-spam solution will always be a step behind the spammers.
Download Now
Proofpoint
Cloud Computing for Maximum Email Security
By : Proofpoint Published Date: Jun 22, 2009
After a sharp drop in November 2008, spam volume has quickly returned to previous highs. Many organizations saw a 30% to 40% increase in spam during the first weeks of 2009. This rapid influx of unwanted email is once again making spam filter effectiveness, connection management and capacity planning issues "top of mind" for enterprise IT departments. Learn more today!

Download Now
Proofpoint
Maximize ROI with Email Security in the Cloud.
By : Proofpoint Published Date: Jun 22, 2009
Email: It’s your most important business communication tool, but also the most risky. Increasing mail volumes and larger attachments drive the need for more mail servers, more storage and more resources to manage them. And concerns about confidentiality, compliance and data privacy are putting increased focus on outbound email. Meanwhile, the time and costs required to manage email are chipping away at your IT budget. 
Download Now
Proofpoint
Protecting Sensitive Information in an Increasingly Leaky World
By : Trend Micro, Inc. Published Date: Mar 17, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Download Now
Trend Micro, Inc.
Addressing Compliance Requirements for Privacy, Data Retention, and e-Discovery
By : Trend Micro, Inc. Published Date: Mar 17, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Download Now
Trend Micro, Inc.
Using SaaS to Reduce the Costs of Email Security
By : Proofpoint Published Date: Feb 27, 2009
Because organizations of all sizes are facing the dual pressures of a difficult economy and greater security risks, many are seeking alternatives that provide at least the same level of security, but at significantly lower costs. Learn more today!

Download Now
Proofpoint
Global Best Practices in Email Security, Privacy and Compliance.
By : Proofpoint Published Date: Aug 08, 2008
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations worldwide. Securing inbound email - while challenging enough - is less difficult than maintaining compliance with the complex, overlapping and sometimes conflicting global regulations that govern data privacy, transactional ethics and corporate governance. Learn more today!

Download Now
Proofpoint
The Need for a Better Way to Send File Attachments
By : Proofpoint Published Date: Jul 15, 2008
The popularity and pervasiveness of email has created a very serious problem for organizations of all sizes: email was originally designed to send short, text-based messages. While that is still its basic purpose, email has also become the primary data and file transport system for most enterprises. Learn more today!

Download Now
Proofpoint
Email Archiving - Understanding the Reasons, Risks & Rewards
By : Proofpoint Published Date: Jun 23, 2008
Statistics show that as much as 60 percent of business-critical data now resides in email, making it the most important repository of data your company may own. This huge amount of data translates into a significant burden on corporate storage resources. These facts - combined with a recent onslaught of regulatory compliance rules - are forcing organizations to take a deeper look at email storage, retention, and archiving practices. Learn more today!
Download Now
Proofpoint
No More FTP: Eliminate FTP and Email Attachment Issues.
By : Proofpoint Published Date: May 14, 2008
Today's business environment requires ad hoc and instantaneous sharing of information. Systems for sending large files have not kept pace with the needs of today's enterprise, where increasingly large and sophisticated business documents, files and media need to be quickly transmitted and shared with coworkers, business partners and customers around the world. Learn more today!
Download Now
Proofpoint
Regulations Shift Focus on Outbound Email Security.
By : Proofpoint Published Date: Nov 02, 2007
In this paper, we discuss the impact data protection regulations and standards such as PCI and the Office of Management and Budget Personally Identifiable Information Guidelines which place new constraints on how data is stored, processed, and transmitted over email.
Download Now
Proofpoint
Next-generation Reputation Technology.
By : Proofpoint Published Date: Oct 08, 2007
Download this white paper to learn how reputation services can help reduce inbound email traffic without requiring additional hardware, and the advantaged of a hybrid global/local approach to email reputation. Learn more today!

Download Now
Proofpoint
Messaging Security Goes Virtual.
By : Proofpoint Published Date: Oct 08, 2007
It doesn't take a degree in accounting to understand that the ability to increase server and storage capacity without having to invest a dime in additional hardware translates into huge cost savings. Savings not only in terms of hardware costs, but also in the power consumption, heat dissipation and management costs associated with deploying additional hardware. One natural evolution of the virtualization trend is to combine the benefits of special-function appliances and mix them with the virtualization approach. Learn more today!

Download Now
Proofpoint
Encryption Made Easy: The Advantages of Identity Based Encryption.
By : Proofpoint Published Date: Oct 08, 2007
Download this white paper to learn why email encyrption is critical to an organization's overall security architecture and the advantages of identity-based encryption over traditional approaches to public key cryptography. Learn more today!

Download Now
Proofpoint
Red Condor: Image Based Spam
By : Red Condor Published Date: Oct 01, 2007
Your network is defenseless against image-based spam attacks. Red Condor reveals how a simple approach can result in a less than 0.01% false-positive rate while achieving long term spam block rates greater than 98%. Get this white paper to arm yourself against the latest malicious email threats. Follow the instructions below and you'll learn the secret to living in a spam-free world.
Download Now
Red Condor
How to Lower Email Costs While Increasing Reliability
By : Concentric Published Date: Mar 20, 2009
Email has become something of a critical utility, much like the electricity that powers our offices: it must be available 24 hours a day, it must provide reliable performance, and its cost must be reasonable. However, unlike electrical systems (at least from the user’s perspective), email systems require significant amounts of labor to manage well. Email systems must periodically be upgraded. New hardware must be introduced as organizations migrate to new systems. Security must be maintained and upgraded to protect the system from intrusions. Additional hardware must be deployed to protect against outages that could seriously harm user productivity. Plus, unexpected events, such as spam storms or natural disasters can drive up costs substantially in ways that were not anticipated.
Download Now
Concentric
Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses
By : Cisco Published Date: Feb 12, 2009
Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!
Download Now
Cisco
Network Security Checklist
By : Cisco Published Date: Jan 27, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Download Now
Cisco
10 Ways To Reduce Your Email Costs Using Mimecast
By : Mimecast Published Date: Jan 27, 2009
Thinking about cutting costs by switching to email archiving and management in the cloud, but not sure how it all adds up? Understand the different ways Mimecast saves you time and money and put figures on what your own cost savings will be.
Download Now
Mimecast
Concentric Hosted Exchange Whitepaper
By : Concentric Published Date: Jan 23, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Download Now
Concentric
Putting a Price Tag on Your Email Environment
By : Mimecast Published Date: Jan 19, 2009
You can’t afford to ignore email archiving, security, internal policy or regulatory requirements, but can you afford to keep paying for it as multiple systems on top of your email system?
Download Now
Mimecast
 
Results 1 - 25 of 118 matches Sort Results By : Published Date | Title | Company name
Home >

Security

>

Email Security

<< Start < Previous 1 2 3 4 5 Next > End >>

More Security Topics

Access Control

,

Anti Spam

,

Anti Spyware

,

Anti Virus

,

Application Security

,

Auditing

,

Authentication

,

Biometrics

,

Business Continuity

,

Compliance

,

DDoS

,

Disaster Recovery

,

Email Security

,

Encryption

,

Firewalls

,

Hacker Detection

,

High Availability

,

Identity Management

,

Internet Security

,

Intrusion Detection

,

Intrusion Prevention

,

IPSec

,

Network Security Appliance

,

Password Management

,

Patch Management

,

Phishing

,

PKI

,

Policy Based Management

,

Security Management

,

Security Policies

,

Single Sign On

,

SSL

,

Secure Instant Messaging

,

Web Service Security

,

Vulnerability Management

SUBSCRIBE FORM
Receive an email alert whenever new research is added into:
Email Security
Enter your email below:

RELATED TOPICS
Application Security
70 Documents
Authentication
77 Documents
Backup And Recovery
104 Documents
Data Protection
234 Documents
Desktop Management
39 Documents
Encryption
94 Documents
Firewalls
50 Documents
Hacker Detection
67 Documents
IT Management
388 Documents
Identity Management
118 Documents
Internet Security
149 Documents
Microsoft Exchange
55 Documents
Network Security
167 Documents
Password Management
58 Documents
Phishing
30 Documents
Security
478 Documents
Security Management
219 Documents
Windows Server
67 Documents

Search the Library
White Papers powered by
   Email Security White Papers
   Learn about White Paper Lead Generation opportunities
Quick Links
Ziff Davis Media