3511 information technology white papers from 533 companies
Email encryption software is readily available and relatively inexpensive, and is of the utmost importance to any organization that is corresponding sensitive material via email. It works by encrypting and authenticating emails, meaning that they can only be read by intended users.
IThound.com has a list of analyst reports and product specs on the latest email encryption software on the market, as well as best practices white papers, case studies and web seminars detailing how you can improve the privacy emails within your organization.
File transfer solutions are often cheap to implement but dear to maintain. This is for three main reasons: maintenance and support, opportunity costs and potential security risks. This paper explains the impact these factors have on the total cost of ownership of homegrown file transfer solutions. VIEW SUMMARY
Category: Encryption | Published: March 2013 | Type: White Paper
This whitepaper highlights how your various pieces of Intellectual Property (IP) need to be treated as your most valuable assets. Focusing on email, this paper stresses the importance of encryption and helps dramatically reduce your exposure to IP theft and loss without increasing operational costs. VIEW SUMMARY
Category: Wireless Security | Published: March 2013 | Type: White Paper
Email communication at Southend-on-Sea has doubled each year since 2008, with current daily traffic of around 22,000 emails. This has put significant pressure on the borough council’s infrastructure and its I.T team VIEW SUMMARY
Category: Email Management | Published: October 2012 | Type: Case Study
Research undertaken by the Enterprise Strategy Group indicates that up to 75 per cent of intellectual property is sitting in email data stores. This paper explores the world of encryption and looks at how you can secure your email without compromising communications. VIEW SUMMARY
Category: Email Encryption | Published: June 2012 | Type: White Paper
Rating: + 2
This report offers a year in review, exploring the key threat trends and how they and emerging technologies are impacting security. View now to examine the breadth and depth of modern attacks, including a six-stage model of an attack and a malware adoption life-cycle VIEW SUMMARY
Category: Data Security | Published: May 2012 | Type: White Paper
Rating: + 5
Company: Verisign UK
Phishing - The act of luring unsuspecting people to provide sensitive information. This paper highlights the current growth and trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and your customers. VIEW SUMMARY
Category: Application Security | Published: May 2012 | Type: White Paper
Rating: + 17
Since Eric Butler created Firesheep in 2010 it has gone mobile. FaceNiff is an Android application that allows users to steal login details for many social media sites. Importantly, it also works over WPA-encrypted wireless networks. This report gives you the steps users need to protect themselves. VIEW SUMMARY
Category: SSL | Published: May 2012 | Type: White Paper
Rating: + 1
Email is the principal form of communication throughout the enterprise community. Lately, however, the administrative needs for email have become more and more complex. Archiving, security and compliance have all contributed to increasing difficulty for IT. VIEW SUMMARY
Category: Email Management | Published: February 2012 | Type: White Paper
Rating: + 1
Email continuity is a simple concept: Employees should have access to their email at work, on their phone and through any Internet browser whenever necessary. But that continuity goal can be elusive for many businesses trying to balance users' needs with their budgets and IT resources VIEW SUMMARY
Category: Email Campaign Management | Published: February 2012 | Type: White Paper
Rating: + 1
Company: Symantec UK
This guide presents selection criteria to help you choose the right solution for strategic deployment of email encryption. It begins with six ideas for defining your organisation's business strategy for email encryption and presents six operational best practices for using this technology. VIEW SUMMARY
Category: Email Encryption | Published: November 2011 | Type: White Paper
As a member you receive free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
© Incisive Media Investments Limited 2013, Published by Incisive Financial Publishing Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 04252091 & 04252093.