E Mail Security Reports

How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
sponsored by Infoblox
WHITE PAPER: Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Infoblox

SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER: Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012

Insight Public Sector and Symantec

Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

TechTarget Security

Data Protection for SharePoint and Exchange: A guide for MSPs
sponsored by Kroll Ontrack, Inc.
EGUIDE: This E-Guide explores the evolution of backup functionalities in Exchange Server 2010 and offers step-by-step instructions for performing item-level recovery of SharePoint content.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Kroll Ontrack, Inc.

Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint

Secure File Transfer Tech Guide
sponsored by TechTarget Security
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

TechTarget Security

Next-generation firewalls and your security strategy
sponsored by Cisco
WHITE PAPER: This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Cisco

What secure email gateways can do for your enterprise
sponsored by TechTarget Security
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

TechTarget Security

How to prevent phishing attacks: User awareness and training
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

TechTarget Security

The State of Cybersecurity and How It Will Evolve
sponsored by ALTR
EGUIDE: Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.
Posted: 19 Feb 2019 | Published: 15 Feb 2019

ALTR