Web Messaging Security Reports

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.

Messaging and Web Security Best Practices for 2011 and Beyond
sponsored by GFI Software
WHITE PAPER: This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011

GFI Software

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos

Total Economic Impact™ of Trend Micro Enterprise Security
sponsored by Trend Micro, Inc.
ANALYST REPORT: The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Posted: 21 Jul 2010 | Published: 01 Jul 2009

Trend Micro, Inc.

e-Book: Chapter 5 - Understanding the Data Collection Process
sponsored by Symantec Corporation
WHITE PAPER: Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
Posted: 06 Aug 2008 | Published: 01 Aug 2008

Symantec Corporation

Squash Large Business Email Security Challenges
sponsored by Intermedia
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia

Collaboration Without Boundaries: IBM Lotus Domino 8 and Open Collaboration Client Solution Powered by Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: The cost of downtime can be enormous, even catastrophic. IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness.
Posted: 18 May 2009 | Published: 15 May 2009

Red Hat and JBoss

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine