e-Mail Encryption Software White Papers

(View All Report Types)
Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Test Data Management for Security and Compliance
sponsored by EMC Corporation
WHITE PAPER: As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER: This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013

SOASTA, Inc

Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012

Fujitsu

HP Server Automation Virtual Appliance
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Read this exclusive white paper to find out the key features of HP's latest server automation software.
Posted: 27 Feb 2014 | Published: 31 May 2013

Hewlett Packard Enterprise

Preventing Security Risks in Real Time
sponsored by IBM
WHITE PAPER: This resource investigates why developing security intelligence – the ability to predict, identify, and react to potential threats – is a key priority in today's evolving threat landscape.
Posted: 16 Oct 2013 | Published: 31 Jul 2012

IBM

A Modern Approach To The Data Deluge
sponsored by Red Hat
WHITE PAPER: Find out how businesses are utilizing software-defined storage to manage the increasing levels of technology complexity.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Red Hat

Five Tips to Reduce Risk From Modern Web Threats
sponsored by Sophos
WHITE PAPER: Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
Posted: 19 Dec 2013 | Published: 30 Sep 2013

Sophos

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by TechTarget Security
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Security