Electronic Messaging Security Reports

How To Achieve A 3X ROI With Slack
sponsored by Slack
WHITE PAPER: Today’s new remote reality makes collaboration tools more important than ever. In this white paper, learn about a study conducted by Forrester Consulting on behalf of Slack which zeroed in on the benefits teams saw after switching to Slack.
Posted: 08 Feb 2021 | Published: 02 Dec 2020

Slack

Exchange Insider E-zine Volume 8: Prepping BlackBerry Enterprise Server for Exchange 2010 SP1
sponsored by TechTarget Search Windows Server
EZINE: Volume 8 of the Exchange Insider e-zine compares available Blackberry Enterprise Server (BES) editions and then gives instructions for deploying BES Express for Exchange 2010. You’ll also get an overview of configuring Exchange Server 2010 for BES and some device management best practices to make sure all your clients remain in peak condition.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

TechTarget Search Windows Server

Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
sponsored by Microsoft
PODCAST: Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 03 Nov 2006 | Premiered: Oct 27, 2006, 09:00 EDT (13:00 GMT)

Microsoft

Email Archiving: Planning, Policies and Product Selection - Chapter 3
sponsored by TechTarget Search Windows Server
EBOOK: It's critical to identify the key features when selecting an email-archiving system for risk reduction. The most important part of the process is defining the company's email-retention goals and policies. This chapter will discuss several tips for choosing the proper email-archiving product features for your organization.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

TechTarget Search Windows Server

The State of Cybersecurity and How It Will Evolve
sponsored by ALTR
EGUIDE: Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
Posted: 19 Feb 2019 | Published: 15 Feb 2019

ALTR

Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

TechTarget Security

Messaging and Web Security Best Practices for 2011 and Beyond
sponsored by GFI Software
WHITE PAPER: This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011

GFI Software

IT Decision Checklist: Messaging Security
sponsored by TechTarget Security
EGUIDE: Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
Posted: 03 Mar 2010 | Published: 03 Mar 2010

TechTarget Security

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos

Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE: In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Information Security Magazine