Home >
> Email Security |
|
|
|
|
|
Results 1 - 25 of 118 matches |
Sort Results By : Published Date | Title | Company name |
|
Email Management Services: The Smart Way to Continue Communicating |
By : Dell. |
Published Date: Jul 23, 2009 |
|
A well-run email management service can help your business—whatever its size—maintain continuity of your email service, archive your old email, reduce your email storage costs, and ensure the security of your communications. By hiring experts to handle these crucial tasks, you can focus your time and talents on what matters most: growing your business. To learn more, download this free white paper.
Download Now
|
|
|
|
Outbound Email and Data Loss Prevention in Today's Enterprise 2009 |
|
How concerned are companies about the content of email leaving their organizations? And how do companies manage the legal and financial risks associated with outbound email? To find out, Proofpoint and Osterman Research conducted an online survey of technology decision makers at 220 large US companies during June 2009.
Download Now
|
|
|
|
Free Trial Download for GFI MailEssentials for Exchange/SMTP/Lotus |
By : GFI |
Published Date: Jul 20, 2009 |
|
GFI MailEssentials for Exchange/SMTP/Lotus is a server based anti-spam, anti-phishing and email management solution, which is used by 80,000 customers worldwide. The latest version uses two anti-spam engines, along with advanced spam filtering techniques, to give administrators a high spam capture rate straight out-of-the-box, with minimal configuration. GFI MailEssentials also minimizes false positives, so you do not need to worry about important emails being marked as spam.
Download Now
|
|
|
|
|
|
Cloud Computing for Maximum Email Security |
|
After a sharp drop in November 2008, spam volume has quickly returned to previous highs. Many organizations saw a 30% to 40% increase in spam during the first weeks of 2009. This rapid influx of unwanted email is once again making spam filter effectiveness, connection management and capacity planning issues "top of mind" for enterprise IT departments. Learn more today!
Download Now
|
|
|
|
Maximize ROI with Email Security in the Cloud. |
|
Email: It’s your most important business communication tool, but also the most risky. Increasing mail volumes and larger attachments drive the need for more mail servers, more storage and more resources to manage them. And concerns about confidentiality, compliance and data privacy are putting increased focus on outbound email. Meanwhile, the time and costs required to manage email are chipping away at your IT budget.
Download Now
|
|
|
|
Protecting Sensitive Information in an Increasingly Leaky World |
|
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Download Now
|
|
|
|
Addressing Compliance Requirements for Privacy, Data Retention, and e-Discovery |
|
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Download Now
|
|
|
|
Using SaaS to Reduce the Costs of Email Security |
|
Because organizations of all sizes are facing the dual pressures of a difficult economy and greater security risks, many are seeking alternatives that provide at least the same level of security, but at significantly lower costs. Learn more today!
Download Now
|
|
|
|
Global Best Practices in Email Security, Privacy and Compliance. |
|
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations worldwide. Securing inbound email - while challenging enough - is less difficult than maintaining compliance with the complex, overlapping and sometimes conflicting global regulations that govern data privacy, transactional ethics and corporate governance. Learn more today!
Download Now
|
|
|
|
The Need for a Better Way to Send File Attachments |
|
The popularity and pervasiveness of email has created a very serious problem for organizations of all sizes: email was originally designed to send short, text-based messages. While that is still its basic purpose, email has also become the primary data and file transport system for most enterprises. Learn more today!
Download Now
|
|
|
|
Email Archiving - Understanding the Reasons, Risks & Rewards |
|
Statistics show that as much as 60 percent of business-critical data now resides in email, making it the most important repository of data your company may own. This huge amount of data translates into a significant burden on corporate storage resources. These facts - combined with a recent onslaught of regulatory compliance rules - are forcing organizations to take a deeper look at email storage, retention, and archiving practices. Learn more today!
Download Now
|
|
|
|
No More FTP: Eliminate FTP and Email Attachment Issues. |
|
Today's business environment requires ad hoc and instantaneous sharing of information. Systems for sending large files have not kept pace with the needs of today's enterprise, where increasingly large and sophisticated business documents, files and media need to be quickly transmitted and shared with coworkers, business partners and customers around the world. Learn more today!
Download Now
|
|
|
|
Regulations Shift Focus on Outbound Email Security. |
|
In this paper, we discuss the impact data protection regulations and standards such as PCI and the Office of Management and Budget Personally Identifiable Information Guidelines which place new constraints on how data is stored, processed, and transmitted over email.
Download Now
|
|
|
|
Next-generation Reputation Technology. |
|
Download this white paper to learn how reputation services can help reduce inbound email traffic without requiring additional hardware, and the advantaged of a hybrid global/local approach to email reputation. Learn more today!
Download Now
|
|
|
|
Messaging Security Goes Virtual. |
|
It doesn't take a degree in accounting to understand that the ability to increase server and storage capacity without having to invest a dime in additional hardware translates into huge cost savings. Savings not only in terms of hardware costs, but also in the power consumption, heat dissipation and management costs associated with deploying additional hardware. One natural evolution of the virtualization trend is to combine the benefits of special-function appliances and mix them with the virtualization approach. Learn more today!
Download Now
|
|
|
|
|
Red Condor: Image Based Spam |
|
Your network is defenseless against image-based spam attacks. Red Condor reveals how a simple approach can result in a less than 0.01% false-positive rate while achieving long term spam block rates greater than 98%. Get this white paper to arm yourself against the latest malicious email threats. Follow the instructions below and you'll learn the secret to living in a spam-free world.
Download Now
|
|
|
|
How to Lower Email Costs While Increasing Reliability |
|
Email has become something of a critical utility, much like the electricity that powers our offices: it must be available 24 hours a day, it must provide reliable performance, and its cost must be reasonable. However, unlike electrical systems (at least from the user’s perspective), email systems require significant amounts of labor to manage well. Email systems must periodically be upgraded. New hardware must be introduced as organizations migrate to new systems. Security must be maintained and upgraded to protect the system from intrusions. Additional hardware must be deployed to protect against outages that could seriously harm user productivity. Plus, unexpected events, such as spam storms or natural disasters can drive up costs substantially in ways that were not anticipated.
Download Now
|
|
|
|
Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses |
By : Cisco |
Published Date: Feb 12, 2009 |
|
Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!
Download Now
|
|
|
|
Network Security Checklist |
By : Cisco |
Published Date: Jan 27, 2009 |
|
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Download Now
|
|
|
|
10 Ways To Reduce Your Email Costs Using Mimecast |
By : Mimecast |
Published Date: Jan 27, 2009 |
|
Thinking about cutting costs by switching to email archiving and management in the cloud, but not sure how it all adds up? Understand the different ways Mimecast saves you time and money and put figures on what your own cost savings will be.
Download Now
|
|
|
|
Concentric Hosted Exchange Whitepaper |
|
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Download Now
|
|
|
|
|
|
|
|
|
Results 1 - 25 of 118 matches |
Sort Results By : Published Date | Title | Company name |
|
<< Start < Previous 1 2 3 4 5 Next > End >>
|
More Security Topics |
Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, Phishing, PKI, Policy Based Management, Security Management, Security Policies, Single Sign On, SSL, Secure Instant Messaging, Web Service Security, Vulnerability Management |
|
|
|