• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

email protection

Results 76 - 84 of 84Sort Results By: Published Date | Title | Company Name
By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : 
email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention
    
MessageLabs
By: Mimecast     Published Date: Apr 04, 2013
The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability, encryption and better protection from targeted phishing attacks.
Tags : 
email, security, dlp, data loss prevention, encryption, business continuity, access control, anti spam
    
Mimecast
By: McAfee     Published Date: Apr 10, 2013
In this white paper, IDC provides an overview of messaging security and its impact on enterprises.
Tags : 
idc, hybrid email messaging security, on premises, saas, mcafee saas email protection, mcafee saas email continuity, mcafee email gateway, mcafee host dlp protection
    
McAfee
By: McAfee     Published Date: Apr 10, 2013
McAfee Positioned in Leaders Quadrant of the Magic Quadrant for Secure Email Gateways.
Tags : 
quadrant, secure email gateways, mcafee, prevention capability, encryption, better protection, security
    
McAfee
By: McAfee     Published Date: Sep 17, 2013
How Cybercriminals Make Money With Your Email, An Osterman Research Whitepaper
Tags : 
email protection, security, mcafee, solution, technology, research, cyberprotection
    
McAfee
By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco
By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks
    
Cisco
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: • Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. • First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. • A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features.
Tags : 
mimecast, virtual event, email archiving, email solutions, cloud archiving
    
Mimecast
Start   Previous    1 2 3 4     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter