mail security

Results 51 - 75 of 342Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: May 31, 2018
Not all email security systems perform the same. Lots of false negatives get through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of email security systems to uncover the number, type and severity of threats getting into organizations. - TOTAL CAUGHT SPAM: 14,277,163 - TOTAL CAUGHT DANGEROUS FILE TYPES: 9,992 - TOTAL CAUGHT MALWARE ATTACHMENTS: 12,502 Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: May 31, 2018
Protect Your Office 365 Investment - Choose The Right Third-Party Email Security Solution Why should you consider additional security protection around Microsoft Office 365TM email? And, what should you look for in a third-party solution? TechTarget has the answers in this brief, Remedying the Email Security Gaps in Microsoft Office 365. Learn about the key features and functions that you need to protect your investment, how to choose the right email security solution, and how one organization successfully navigated its way to highly satisfactory, reliable third-party solutions for enhancing Office 365 email security.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod
    
BAE Systems
Published By: Symantec     Published Date: Dec 13, 2017
Enterprise’s are increasingly under threat from sophisticated attacks. In fact, research has found that threats dwell in a customer’s environment an average of 190 days1. These Advanced Persistent Threats use stealthy techniques to evade detection and bypass traditional security defenses. Once an advanced attack gains access to a customer environment the attacker has many tools to evade detection and begin to exploit valuable resources and data. Security teams face multiple challenges when attempting to detect and fully expose the extent of an advanced attack including manual searches through large and disparate data sources, lack of visibility into critical control points, alert fatigue from false positives, and difficulty identifying and fixing impacted endpoints.
Tags : 
investigation, exposure, attacks, endpoints, network, email, cloud, security
    
Symantec
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Symantec.cloud     Published Date: Aug 03, 2011
This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.
Tags : 
symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com, cta, converged threat analysis, email security
    
Symantec.cloud
Published By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : 
microsoft office 365, offline emails, cloud backup, email security, data in the cloud, cyber attacks
    
Mimecast
Published By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control
    
Mimecast
Published By: Mimecast     Published Date: Jun 22, 2015
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying its Unified Email Management solution.
Tags : 
unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
Mimecast
Published By: MessageLabs     Published Date: May 28, 2008
So-called "redirector" or "search engine" spam emerged in late 2007 and has now grown into a significant threat to businesses. In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
spam, anti-spam, anti spam, email security, trojan, hacker, messagelabs, message labs
    
MessageLabs
Published By: MessageLabs     Published Date: May 28, 2008
Whether its spyware hidden amidst a seemingly innocuous download, a “spoofed” social networking identity, or phishing emails that gain access to valuable information, web and email-based security threats are more advanced and more covert than ever before. Learn how MessageLabs integrated web and email security services protect your business.
Tags : 
    
MessageLabs
Published By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : 
botnet, bot, messagelabs, email security, malware, virus
    
MessageLabs
Published By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : 
e-mail security, guide, clearswift, clearswift
    
Clearswift
Published By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : 
data protection, clearswift, data management
    
Clearswift
Published By: GFI Software     Published Date: May 17, 2012
Download your FREE 30-Day Trial of GFI MailEssentials Today! GFI MailEssentials 2012 is an all-new version which enhances the anti-spam functionality and integrates email security functionality to provide one comprehensive on-premise email solution.
Tags : 
gfi software, mailessentials, mailarchiver, 64 bit, free trial, exchange, server email archiving, compliance
    
GFI Software
Published By: WatchGuard     Published Date: Oct 16, 2012
Email makes communication simple. Unencrypted email messages are sent in clear text or some other easily readable format regardless of the email program used. Read this white paper to learn more about how interoperability makes email vulnerable.
Tags : 
watchguard, email encryption, security, data management, internet security
    
WatchGuard
Published By: Mimecast     Published Date: Aug 30, 2016
Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
mimecast, email, email security, cyber security, whaling, email security strategy
    
Mimecast
Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security, malware
    
Mimecast
Published By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, we’ve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organization’s incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : 
mimecast, email. esra, email security, cloud security
    
Mimecast
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfähigkeit verschiedener E-Mail Security Lösungen. Der ESRA Report wird quartalsweise durchgeführt und auch der aktuelle Report stellt Lücken bei vielen Systemen im Schutz von Unternehmen gegen bösartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen über E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingänge der Benutzer übermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience für E-Mails erhöhen und mit einem mehrschichtigen Ansatz für Ihre Office 365 Umgebung deutlich die Sicherheit für Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.