messaging security

Results 1 - 25 of 47Sort Results By: Published Date | Title | Company Name
By: Group M_IBM Q418     Published Date: Oct 28, 2018
Messaging middleware can help enterprises meet requirements of complexity, speed, reliability, and security to connect the digital world.
Tags : 
     Group M_IBM Q418
By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
     Tripp Lite
By: Intel     Published Date: May 22, 2017
While holding the promise of HD quality, enriched services, and the benefits of a common packet switched access infrastructure, the adoption of infrastructure-based voice over LTE (VoLTE), along with rich communications such as video and real-time messaging, has stalled over the last few years with concerns around quality, security, and cost. During that time, the value of the phone number as a globally significant user ID and key services such as SMS and MMS have been relegated by phone manufacturers, over the top (OTT) services, and even the subscribers themselves as “technologies of last resort.” Finally, the proliferation of 4G, together with the emergence of network functions virtualization (NFV), powered by Intel®, Hewlett Packard Enterprise* (HPE), and Metaswitch*, is allowing network operators to take charge of the consumer’s communications experience, once more.
Tags : 
     Intel
By: Lookout     Published Date: Mar 28, 2017
Enterprise mobility started with the Blackberry, a revolutionary messaging device that solved security concerns by giving IT managers the ability to set many restrictions on its functionality. In the following years, employees started using fully-functional, internet-capable smartphones in their personal lives and demanded the same capabilities at work.
Tags : enterprise, mobile, security, lookout, revolutionary
     Lookout
By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving, enterprise applications, data management, business technology, data center
     Smarsh
By: Imprivata     Published Date: Dec 06, 2013
The vital information CIOs need to ensure that their text messaging is both secure and in compliance with the current regulations.
Tags : secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications
     Imprivata
By: Imprivata     Published Date: Dec 06, 2013
This whitepaper explores a HIPAA compliant text messaging application that supports encrypted protected health information, and best practices for implementation.
Tags : secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications
     Imprivata
By: SilverSky     Published Date: Apr 16, 2013
SilverSky operates a major hosted infrastructure dedicated to providing world-class enterprise messaging solutions. This whitepaper is an in-depth overview of our Hosted Microsoft Exchange architecture and how we implement best practices across systems management, testing, application deployment, infrastructure and security to provide increased productivity and reduced costs.
Tags : microsoft exchange, architecture, silversky, hosted infrastructure, enterprise messaging, best practices, application deployment
     SilverSky
By: EdgeWave     Published Date: Oct 15, 2011
In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.
Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email, cyber crime, criminals, threats
     EdgeWave
By: EdgeWave     Published Date: Oct 15, 2011
Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.
Tags : edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation, filtering, filter, demands, short-term, long term security
     EdgeWave
By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave, human resources, p2p, social media, blogging, blog, instant message, instant messaging, peer-to-peer, peer-2-peer, policies, filtering, security
     EdgeWave
By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories, spam, archive, archiving, instant, backup, mail, white, paper, whitepaper, migration, disaster, recovery
     Osterman Research, Inc.
By: Symantec.cloud     Published Date: Apr 14, 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.
Tags : symantec cloud, messaging, web security best practices, malware
     Symantec.cloud
By: GFI Software     Published Date: Mar 31, 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.
Tags : gfi, sunbelt, messaging, web security best practices, threats
     GFI Software
By: Symantec.cloud     Published Date: Aug 10, 2010
Off-the-shelf instant messaging (IM) lets malware into the Enterprise, and compromises regulatory compliance and copyright protection. Find out how a secure IM service can keep you covered.
Tags : messagelabs us, instant messaging, malware, information mobile worker, saas, security risk
     Symantec.cloud
By: Symantec.cloud     Published Date: Jul 08, 2010
Keep email flowing in your business with email continuity.
Tags : messagelabs symantec, hosted email service, hosted messaging, web security services, email continuity
     Symantec.cloud
By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper explains how Proofpoint MLX technology provides unrivalled defense against spam.
Tags : proofpoint mlx, spam detection, email security, phishing attack, saas, messaging security
     Proofpoint
By: Microsoft Windows Phone     Published Date: Feb 05, 2010
This paper compares the Research In Motion BlackBerry solution (BlackBerry mobile devices and BlackBerry Enterprise Server) with the Microsoft® mobile solution (Microsoft Windows Mobile® and Microsoft Exchange Server 2007 SP1 with Microsoft ActiveSync® technology) by analyzing features of the user experience and the administrator experience.
Tags : microsoft windows mobile, mobile work, blackberry, smartphone, exchange server 2007 sp1, activesync, secure mobile messaging, security, tco
     Microsoft Windows Phone
By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager
     Trend Micro SaaS
By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus, antivirus, worms, vulnerability management, internet security systems, it management
     Internet Security Systems
By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
     Sigaba
By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
     SPSS
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com