Email Policies Reports

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Archiving Lotus Domino for Storage Optimization and E-Discovery
sponsored by Symantec Corporation
WHITE PAPER: Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
Posted: 07 Aug 2007 | Published: 01 Jul 2007

Symantec Corporation

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007

Symantec Corporation

Reducing Archiving Costs by Implementing Email Labelling Technology
sponsored by Boldon James
WHITE PAPER: This paper offers an alternative approach to archive policy selection that uses email message labelling technology. View now to learn how labelling removes the need for end-users to understand archiving, and instead allow them to apply labels to each email message, ultimately reducing your email archiving costs.
Posted: 20 Jul 2011 | Published: 20 Jul 2011

All resources sponsored by Boldon James

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Secure File Transfer Tech Guide
sponsored by TechTarget Security
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

TechTarget Security

Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE: One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016

Check Point Software Technologies Ltd.

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Secure Enterprise e-mail Solutions with Microsoft® Exchange
sponsored by OnX USA LLC
PRODUCT LITERATURE: This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.
Posted: 20 Feb 2008 | Published: 01 Dec 2003

OnX USA LLC