CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

mail security

Results 101 - 125 of 335Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Jun 03, 2019
Knowing where to look and what to watch out for is half the battle. Download this report to understand the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them. Most importantly, you’ll walk away with actionable steps to improve your organization’s email security and cyber resilience. Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
Tags : 
    
Mimecast
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Five9     Published Date: Aug 01, 2019
It’s become abundantly clear that the cloud is no longer the future— but the new normal. Enterprises rely on cloud computing for web-based meetings, email, file sharing, and more every day to reduce costs and administrative burdens while enhancing productivity. With the wealth of benefits to be gained by moving to the cloud—including speed of deployment, cost-efficiencies, and easy scaling—it’s no wonder the shift toward all things virtual has been so pervasive and swift. What’s more, as the cloud has matured, the potential drawbacks that once made enterprises hesitant to make the move are disappearing. Security is now robust, application integration happens with ease, and reliability is a given, not a question mark. So now that the cloud has become not just viable, but essential, to stay competitive in a rapidly changing world, it’s time to explore how the cloud can significantly improve your contact center operations and guest experiences. This paper will provide one compelling r
Tags : 
    
Five9
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering, intrusion detection
    
Burton Group
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Microsoft® Exchange® Server is the undisputed industry leader in corporate messaging. With the release of Microsoft Exchange Server 2007, not only does Exchange continue to provide rich, effi cient access to e-mail, calendars, attachments, contacts, and more, but Exchange Server 2007 adds some exciting infrastructure and performance improvements as well. F5’s comprehensive Application Ready infrastructure for Exchange Server 2007 allows organizations to easily provide additional performance, security and availability, to ensure maximum ROI with the minimum amount of work.
Tags : 
microsoft exchange 2007, application ready network guide, microsoft exchange server, corporate messaging, roi, infrastructure optimization, application security, it management, infrastructure
    
F5 Networks Inc
Published By: Mimecast     Published Date: Nov 10, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, software as a service, saas, data loss prevention, risk and compliance, email, security, compliance, email security, intrusion prevention, security management
    
Mimecast
Published By: M86 Security     Published Date: Feb 09, 2011
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : 
m86 security, social media policy, web acceptable use policies, aups, email and web security
    
M86 Security
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci, anti spam, anti spyware, anti virus, application security, auditing, compliance
    
McAfee
Published By: McAfee     Published Date: Nov 19, 2013
This white paper discusses three common approaches to email encryption and explains their distinct advantages to help you determine which approach best fits the needs of your organization.
Tags : 
email encryption, email security, tls encryption, transport layer security, on premises, saas, application security, hacker detection, internet security
    
McAfee
Published By: McAfee     Published Date: Nov 19, 2013
This white paper focuses on key issues that organizations should address in the context of cybercrime delivered through email.
Tags : 
osterman research, cybercriminals, mcafee email protection, clickprotect; mcafee email security, monitoring, authentication, email security, hacker detection
    
McAfee
Published By: McAfee     Published Date: Nov 19, 2013
This technology blueprint discusses how implementing McAfee SaaS Email Protection and Continuity in a hybrid configuration with McAfee Email Gateway supports green initiatives through reduced on-premises email volume and equipment usage.
Tags : 
mcafee email gateway, mcafee email and security, security
    
McAfee
Published By: McAfee     Published Date: Nov 19, 2013
This technical brief outlines enterprise email sender identity technologies.
Tags : 
spear-phishing, dmarc, spf, dkim, mcafee email protection, saas, email security, security
    
McAfee
Published By: Microsoft Office 365     Published Date: May 10, 2016
We’ve pulled together the top five ways Office 365 helps provide the level of security your business needs. From Advanced Threat Protection to secure mobile devices, enterprise-level security from Office 365 is there each step of the way. We’ve made email security our priority, so you don’t have to make it yours. Learn how to secure your email — and your business — today.
Tags : 
    
Microsoft Office 365
Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware
Published By: Cisco     Published Date: Jun 12, 2014
A paper providing an overview of Cisco Email Security
Tags : 
email security, cisco, email security, threat detection network, internet security, intrusion detection
    
Cisco
Published By: Cisco     Published Date: Jun 12, 2014
A Cisco white paper on mitigating email virus attacks
Tags : 
email security, cisco, email virus, security, inbound and outbound risks, anti spam, anti spyware, anti virus, internet security
    
Cisco
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management, email security, web services, web service security
    
Aberdeen - youSENDit
Published By: MX Logic     Published Date: May 21, 2008
In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.
Tags : 
managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections, anti-botnet, denial-of-service, dha, dos, intrusion detection, security, network security, access control, anti virus, application security, hacker detection, internet security
    
MX Logic
Published By: Motorola     Published Date: Feb 06, 2008
In this report, Aberdeen takes an in-depth look at how best-in-class organizations are using mobile messaging to improve productivity and customer service. They also define the steps that can help your organization deploy a best-in-class enterprise mobile messaging solution.
Tags : 
mobile email, sms, mms, mobile im, mobile voip, enterprise mobile messaging, mobile security, unified mobile messaging, mobile roi, interoperability, mobile device platform, mobile device management, motorola, motorola good
    
Motorola
Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware, network security, anti spyware, anti virus, ddos, vulnerability management
    
Panda Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search