Web Messaging Security Reports

e-Book: Chapter 5 - Understanding the Data Collection Process
sponsored by Symantec Corporation
WHITE PAPER: Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
Posted: 06 Aug 2008 | Published: 01 Aug 2008

Symantec Corporation

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation.
Posted: 06 Nov 2013 | Published: 31 Dec 2012

Imprivata

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

TechTarget Security

Citrix ShareFile updates let businesses ditch paper processes
sponsored by Citrix
EGUIDE: Enterprise file sync-and-share (EFSS) platforms have seen widespread use in recent years. EFSS services have been optimizing features to help businesses more efficiently streamline workflows. In this e-guide learn about new features one platform has added and how they can help your organization digitize processes that are often paper-based.
Posted: 12 Dec 2016 | Published: 08 Dec 2016

Citrix

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Trend Micro, Inc.

Getting Started With E-mail Archiving for Exchange
sponsored by Sherpa Software
WHITE PAPER: This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 19 May 2009 | Published: 01 May 2008

Sherpa Software

Fortune 200 Firm Achieves Global Email Protection
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

WatchGuard Technologies, Inc.

eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap
sponsored by TechTarget Search Windows Server
EBOOK: Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.
Posted: 19 Jun 2009 | Published: 19 Jun 2009

TechTarget Search Windows Server

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos