email protection

Results 1 - 25 of 84Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
    
Cisco
Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats, fraud protection, email security, security threats, phishing
    
Mimecast
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : 
data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption, email encryption
    
Voltage Security
Published By: McAfee     Published Date: Nov 19, 2013
This demo video introduces ClickProtect, a feature of McAfee Email Protection.
Tags : 
mcafee email protection, clickprotect, click-time link scanning
    
McAfee
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : 
security solution, cyber attack, mobile devices, business security, user protection
    
CDW-Trend Micro
Published By: Concentric     Published Date: Mar 27, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Tags : 
concentric, hosted exchanged, email, calendaring, collaboration, mobility, corporate data centers, service provider networks, service providers, microsoft® exchange server 2007, sp1, microsoft outlook® 2007, total cost of ownership, tco, concentric hosted exchange, cli, command line interface, lower bandwidth cost, hmc, global address list
    
Concentric
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration
    
Intralinks
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: Mimecast     Published Date: Jan 19, 2018
Any digital device or application can be a vector for a cyberattack, but email is an especially acute problem for many organizations. As individuals or members of organizations, most people rely on email to communicate with colleagues, whether in the next cubicle or across the globe. For many in the business world, 24/7 access to email is routine, and often required. Instant, ubiquitous and inexpensive communication gives us quick access to others in our business and personal lives, but gives criminals easy and direct access to us as well.
Tags : 
phishing, email threats, cyberattack, email protection
    
Mimecast
Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : 
gdpr, risk mitigation, email resiliency, personal data protection
    
Mimecast
Published By: Mimecast     Published Date: Nov 28, 2017
Does your organization have a plan for complying with the European Union’s General Data Protection Regulation (GDPR)? If email isn’t a part of that plan, you could face significant challenges, including severe financial penalties. Download now to get the facts about: • Why you can’t compromise when it comes to protection of email data • The challenges presented by Subject Area Requests • How noncompliance could cost your organization more than just money
Tags : 
gdpr, email compliance, data protection, compliance
    
Mimecast
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, application protection, app security
    
MobileIron
Published By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : 
webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention, anti-virus, threat protection
    
Webroot UK
Published By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway
    
Cisco
Published By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : 
email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention, messaging, mailbox, find emails, e-mail, data protection, archiving, archive, outlook
    
MessageLabs
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365
    
Commvault
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: Mimecast     Published Date: Apr 21, 2016
Download the new E-book, Email Security Uncovered: The Five Faces of IT Preparedness, to learn the latest trends in email security and tips on how you can boost your security confidence.
Tags : 
email, security, trends, cyber attacks, threats, cyber threats, fraud protection, email security, security threats, phishing
    
Mimecast
Published By: Intermedia     Published Date: Nov 10, 2008
In this WebCast, 5 typical myths of Hosted Exchange will be debunked. This webcast covers the Exchange 2007: On-Premis vs. Hosted. It goes through pros and consfor On-Premis and Hosted Exchange 2007. To learn more, download now!
Tags : 
intermedia, exchange 2007, hosted vs. on-premise, security, email security, network security, data protection
    
Intermedia
Published By: SilverSky     Published Date: May 22, 2014
Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.
Tags : 
silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention, data loss prevention, dlp, encryption
    
SilverSky
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Start   Previous   1 2 3 4    Next    End
Search Resource Library