messaging security

Results 26 - 47 of 47Sort Results By: Published Date | Title | Company Name
By: Sunbelt Software     Published Date: Mar 27, 2008
Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses.
Tags : messaging, security, web threats, email threats, email security, spam, trojan, sunbelt
     Sunbelt Software
By: Sunbelt Software     Published Date: Aug 04, 2008
Security is the most single critical task for any email administrator. Starting with a foundation of anti-spam and anti-virus capabilities, organizations should focus on other capabilities, as well, including policy management and a variety of other tasks designed to protect the network and the company from external and internal threats.
Tags : email security, secure messaging, secure im, exchange, exchange server, microsoft exchange, ms exchange, sunbelt, sunbelt software, security
     Sunbelt Software
By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : intermedia, email security, exchange 2007, archiving, encryption, content management, security
     Intermedia
By: Intermedia     Published Date: Nov 10, 2008
Microsoft Exchange is the leading business email and collaboration solution for the small,up to the large, business markets, and this whitepaper compares the security of Microsoft Exchange Services deployed in-house versus a hosted model with SaaS service providers. By choosing Intermedia as their Hosted Exchange SaaS Solution Provider, businesses can achieve email and total messaging security, as well as a piece of mind, by leveraging Intermedia’s infrastructure and experience with running a secured messaging platform.
Tags : intermedia, email security, logical server security, software as a service, saas, microsoft exchange services, security assessment testing, security
     Intermedia
By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
     SPSS Inc.
By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories, spam, archive, archiving, instant, backup, mail, white, paper, whitepaper, migration, disaster, recovery
     Osterman Research, Inc.
By: Group M_IBM Q418     Published Date: Oct 28, 2018
Messaging middleware can help enterprises meet requirements of complexity, speed, reliability, and security to connect the digital world.
Tags : 
     Group M_IBM Q418
By: SilverSky     Published Date: Apr 16, 2013
SilverSky operates a major hosted infrastructure dedicated to providing world-class enterprise messaging solutions. This whitepaper is an in-depth overview of our Hosted Microsoft Exchange architecture and how we implement best practices across systems management, testing, application deployment, infrastructure and security to provide increased productivity and reduced costs.
Tags : microsoft exchange, architecture, silversky, hosted infrastructure, enterprise messaging, best practices, application deployment
     SilverSky
By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
     SPSS
By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
     SPSS, Inc.
By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving, enterprise applications, data management, business technology, data center
     Smarsh
By: IBM     Published Date: Mar 04, 2009
As a small to midsize business owner, you understand that in order to grow, you need to be able to communicate and collaborate with people, quickly and easily. But you have limited budgets and IT resources. You want security-rich solutions that will extend your assets, improve operating efficiencies and grow as your company grows. IBM offers you reliable solutions that can help you compete with your larger counterparts.
Tags : ibm, lotus, lotus complete messaging, communication and collaboration, security-rich solutions, business-grade instant messaging, ibm lotus domino, web conferencing, voip, lotus sametime, security, enterprise applications
     IBM
By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus, antivirus, worms, vulnerability management, internet security systems, it management
     Internet Security Systems
By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
     Sigaba
By: ColdSpark     Published Date: Feb 23, 2007
Though legacy open-source email network applications like sendmail and postfix are widely used, the escalating demands of today's enterprise environments have outpaced their capabilities. Large organizations must now look to implement a true enterprise mail transport platform to support the standards of their current and growing business. Learn how to modernize your email system now.
Tags : email, email infrastructure, sendmail, postfix, email server, email servers, email routing, email platform, email marketing, email automation, mta, mail transport, mail transport agent, email delivery, email archiving, email gateway, email backbone, email management, open source email, ironport
     ColdSpark
By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : spam, bayesian, filter, filtering, block, blocking, spamming, phishing, total cost of ownership, tco, messaging, email, email security, mail server, mail servers, comdom, comdom software
     COMDOM Software
By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : copiatech, security
     CopiaTECH
By: Trend Micro SaaS     Published Date: Oct 07, 2007
Der umfassende Hosted-Service wehrt Bedrohungen ab, ehe sie das Netzwerk erreichen, und kombiniert dazu leistungsfähige Anti-Spam- und Anti-Phishing-Funktionen mit mehrfach ausgezeichnetemViren- und Spyware-Schutz. Trend Micro, einer der Marktführer im Bereich der Sicherheits-Software, aktualisiert und optimiert die Lösung, um das Netzwerk des Kunden zuverlässig zu schützen und gleichzeitig wertvolle IT-Ressourcen einzusparen.
Tags : trend, messaging hosted security, e-mail, netzwerk, mx-datensatzes, spyware-schutz
     Trend Micro SaaS
By: Symantec.cloud     Published Date: Apr 14, 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.
Tags : symantec cloud, messaging, web security best practices, malware
     Symantec.cloud
By: Imprivata     Published Date: Dec 06, 2013
This whitepaper explores a HIPAA compliant text messaging application that supports encrypted protected health information, and best practices for implementation.
Tags : secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications
     Imprivata
By: Lookout     Published Date: Mar 28, 2017
Enterprise mobility started with the Blackberry, a revolutionary messaging device that solved security concerns by giving IT managers the ability to set many restrictions on its functionality. In the following years, employees started using fully-functional, internet-capable smartphones in their personal lives and demanded the same capabilities at work.
Tags : enterprise, mobile, security, lookout, revolutionary
     Lookout
Previous    1 2     Next   
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com