Enterprise Messaging Security Reports

Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives
sponsored by TechTarget Search Windows Server
EZINE: In this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.
Posted: 16 Apr 2009 | Published: 15 Apr 2009

TechTarget Search Windows Server

Should Your Email Live In The Cloud? A Comparative Cost Analysis
sponsored by Google
ANALYST REPORT: This analyst report presents a spreadsheet cost model to help you calculate your fully loaded on premise email costs and compare it against cloud-based alternatives.
Posted: 18 Oct 2010 | Published: 05 Jan 2009

Google

Citrix ShareFile updates let businesses ditch paper processes
sponsored by Citrix
EGUIDE: Enterprise file sync-and-share (EFSS) platforms have seen widespread use in recent years. EFSS services have been optimizing features to help businesses more efficiently streamline workflows. In this e-guide learn about new features one platform has added and how they can help your organization digitize processes that are often paper-based.
Posted: 12 Dec 2016 | Published: 08 Dec 2016

Citrix

Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE: In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Information Security Magazine

e-Book: Chapter 5 - Understanding the Data Collection Process
sponsored by Symantec Corporation
WHITE PAPER: Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
Posted: 06 Aug 2008 | Published: 01 Aug 2008

Symantec Corporation

Total Economic Impact™ of Trend Micro Enterprise Security
sponsored by Trend Micro, Inc.
ANALYST REPORT: The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Posted: 21 Jul 2010 | Published: 01 Jul 2009

Trend Micro, Inc.

Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

TechTarget Security

Collaboration without Boundaries
sponsored by Red Hat and JBoss
PRODUCT OVERVIEW: IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness. It is much more than a Microsoft Exchange/desktop alternative.
Posted: 20 Apr 2008 | Published: 01 Apr 2008

Red Hat and JBoss

Email Recovery: Doing More with Less- How to save Time and Money When Recovering Email
sponsored by Kroll Ontrack, Inc.
WHITE PAPER: This paper shows how the costs associated with recovering email messages from Microsoft® Exchange Server backups can be significant and also provides us with the practical information on how to minimize those costs.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Kroll Ontrack, Inc.

The Impact of Messaging and Web Threats
sponsored by Trend Micro, Inc.
WHITE PAPER: This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
Posted: 09 May 2008 | Published: 01 Apr 2008

Trend Micro, Inc.