Email Content Security Management Reports

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office
sponsored by TITUS
WHITE PAPER: Read this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft

How to Bolster Endpoint Security Protection
sponsored by Symantec
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec

E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
sponsored by TechTarget Security
EGUIDE: Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

TechTarget Security

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise
sponsored by Oracle Corporation
WHITE PAPER: IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access.
Posted: 17 Mar 2011 | Published: 03 Jan 2011

Oracle Corporation

Expert Guide to web 2.0 Threats: How to Prevent an Attack
sponsored by TechTarget Security
EGUIDE: A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

TechTarget Security

Mobile Presence and Instant Messaging:  Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 27 Jun 2011 | Published: 23 Jun 2011

Cisco Systems, Inc.

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by TechTarget Security
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

TechTarget Security