E Mail Security Reports

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Improve Enterprise Email Systems with HP Messaging Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.
Posted: 04 Sep 2014 | Published: 30 Apr 2013

Hewlett-Packard Enterprise

SMART Guidance for Notes Migrations Webinar
sponsored by BinaryTree
PRESENTATION: Watch this video to discover more about e-mail migration and what you can do in order to make your transition a success. Inside you’ll learn about managing migration, impacts of non-integration, and more.
Posted: 01 Aug 2013 | Published: 01 Aug 2013

BinaryTree

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Shore Up Your Office 365 Attack Surface
sponsored by Proofpoint
EBOOK: This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015

Proofpoint

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Best and worst practices for email archiving in Exchange Server
sponsored by Symantec Corporation
EGUIDE: Email administrators battle with Exchange Server maintenance and storage allocation while scurrying to meet stringent business plans and hunting down the CEO's lost email message. In this expert eguide from SearchExchange.com, learn how to store the right content in the right place for the right length of time.
Posted: 09 Sep 2011 | Published: 09 Sep 2011

Symantec Corporation

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg