Web Messaging Security Reports

Beaufort Memorial Case Study
sponsored by Imprivata
WHITE PAPER: This case study highlights Beaufort Memorial Hospital's success in implementing a secure communications platform that allowed a more efficient, secure, and cost-effective clinician workflow.
Posted: 07 Apr 2014 | Published: 28 Feb 2014

Imprivata

Collaboration without Boundaries
sponsored by Red Hat and JBoss
PRODUCT OVERVIEW: IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness. It is much more than a Microsoft Exchange/desktop alternative.
Posted: 20 Apr 2008 | Published: 01 Apr 2008

Red Hat and JBoss

The Impact of Messaging and Web Threats
sponsored by Trend Micro, Inc.
WHITE PAPER: This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
Posted: 09 May 2008 | Published: 01 Apr 2008

Trend Micro, Inc.

Citrix ShareFile updates let businesses ditch paper processes
sponsored by Citrix
EGUIDE: Enterprise file sync-and-share (EFSS) platforms have seen widespread use in recent years. EFSS services have been optimizing features to help businesses more efficiently streamline workflows. In this e-guide learn about new features one platform has added and how they can help your organization digitize processes that are often paper-based.
Posted: 12 Dec 2016 | Published: 08 Dec 2016

Citrix

Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO: Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009

Symantec Corporation

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine

Exchange Insider E-zine Volume 8: Prepping BlackBerry Enterprise Server for Exchange 2010 SP1
sponsored by TechTarget Search Windows Server
EZINE: Volume 8 of the Exchange Insider e-zine compares available Blackberry Enterprise Server (BES) editions and then gives instructions for deploying BES Express for Exchange 2010. You’ll also get an overview of configuring Exchange Server 2010 for BES and some device management best practices to make sure all your clients remain in peak condition.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

TechTarget Search Windows Server

Getting Started With E-mail Archiving for Exchange
sponsored by Sherpa Software
WHITE PAPER: This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 19 May 2009 | Published: 01 May 2008

Sherpa Software

eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap
sponsored by TechTarget Search Windows Server
EBOOK: Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.
Posted: 19 Jun 2009 | Published: 19 Jun 2009

TechTarget Search Windows Server

Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

TechTarget Security