filter

Results 76 - 100 of 150Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
Get the flexibility you need without sacrificing security at the gateway.
Tags : 
trend micro, email gateway security applications, virtualization, datacenter functions, virtual appliances, internet content security, smart protection network, trend micro internet security
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download white paper now to learn the challenges of physical consolidation, performance issues for virtualization and cloud security requirements.
Tags : 
trend micro, cloud security, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 23, 2011
Learn how you can maintain compliance in your virtual environments in a video.
Tags : 
trend micro, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 23, 2011
Cybercriminals are constantly moving in with new methods of attack - here's how to stem the rising tide.
Tags : 
trend micro, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business
    
Trend Micro Inc.
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Tags : 
fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution
    
Fortinet, Inc.
Published By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : 
web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories
    
Osterman Research, Inc.
Published By: Topica     Published Date: May 12, 2011
This whitepaper on creating a successful email is packed full of great tips, strategies and insights into carrying out successful email marketing campaigns!
Tags : 
topica, email marketing, email marketing help, introduction to email marketing, successful email marketing, how to write a better subject line, e-mail design, reputation
    
Topica
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks
    
WatchGuard Technologies
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Find out how it works and why it's actually possible now to move the battle for web security off your web servers.
Tags : 
cloud-based web security, cybercriminals, watchguard reputation enabled defense, web-based attacks, threat management, malware, url filtering
    
WatchGuard Technologies
Published By: ETNA Software     Published Date: Feb 10, 2011
This whitepaper discusses various ways of filtering companies for electronic trading purposes.
Tags : 
filtering software, finance software, investment software, financial tools, trading, technology, software, financial services
    
ETNA Software
Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
Astaro
Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring
    
Astaro
Published By: QFilter.com     Published Date: Nov 23, 2010
The dangers posed by industrial Dust Explosions can affect a wide range of different industries. This article examines the topic, and gives recommendations on how to prevents such incidents from occurring.
Tags : 
dust explosions, dust control, dust safety, dust hazards, dust collection
    
QFilter.com
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips
    
Perimeter E-Security
Published By: Visendo     Published Date: Sep 09, 2010
This whitepaper explains how SMBs can improve their mail security and increase their efficiency when storing, scanning, filtering emails with minimum investment and Visendo innovative email suite.
Tags : 
pop3 connector, antispam filter, anti-phisihing, email security for smbs
    
Visendo
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection.
Tags : 
messagelabs us, messagelabs hosted web security, employee web use, web security, employee monitoring, internet misuse, url filtering
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : 
messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam, anti-virus, email encryption, intrusion prevention
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : 
messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking
    
Symantec.cloud
Published By: APTX     Published Date: Nov 05, 2009
This paper discusses research undertaken to lower the complexity of existing high-quality sub-band ADPCM coding schemes to better satisfy these conflicting criteria.
Tags : 
aptx, sub-band adpcm coding, mobile, compression, wireless audio streaming, filter bank, stereo intensity
    
APTX
Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : 
saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This white paper from Roaring Penguin Software reviews the most common approaches to spam management and email filtering in an ISP environment and details how a suitable anti spam solution must address particular challenges for ISP administrators.
Tags : 
spam, anti-spam, antispam, blocking, filtering, email security, isp, spam management
    
Roaring Penguin
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This paper by Roaring Penguin Software demystifies the enterprise anti-spam market and its various choices and buzzwords to help you cut through the hype and focus on the basics.
Tags : 
spam, antispam, anti-spam, email security, blocking, filtering, roaring penguin
    
Roaring Penguin
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management
    
Secure Computing
Start   Previous    1 2 3 4 5 6    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.