Your Search returned 1 results from our Editorial content

Sort By

MESSAGING SECURITY

Mimecast’s Next Trick: Unlocking Unstructured Data

Many pundits expect Peter Bauer to float Mimecast but his ambitions are bigger than that

   

Your Search returned 31 results from our White Paper Library

Sort By
Red Condor

Laptop Security

The New Threat Reality: Seven Threats to Watch Out For

New and emerging threats are comprised of highly sophisticated and potentially catastrophic campaigns. Cybercriminals use multiple components and social...


Symantec Corporation

Anti-Spam

Symantec Internet Security Threat Report

Symantec’s analysts unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious...


Websense

Internet Security

Seven Criteria for Evaluating Security-as-a-Service (SaaS)...

SaaS is increasing in popularity as an effective and lower total-cost delivery platform. This paper looks at the top seven criteria to reduce the cost...


Websense

Internet Security

How Technology Unification Delivers the Best Security with...

This whitepaper looks at how security framework empowers organizations to leverage Internet communications channels and Web 2.0 applications without increasing...


Websense

Email Encryption

Email Threats

Review this insider's guide to gain valuable insight into how the email security market is changing and learn what you should take into account when reviewing...


BlackBerry

Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


Sybase

Handheld Devices

Sybase Solutions for iPhone

The iPhone has emerged as one of the top mobile devices used in the enterprise. Join this on-demand webcast to learn about device security and management,...


Symantec.cloud

Cloud Computing Platforms

Next Generation of Web Exploits: When Good Sites Go Bad...

Download this FREE whitepaper to find out about the latest generation of Web attacks and what you can do to protect your organization.


Google

Messaging Security

Security Whitepaper: Google Apps Messaging and Collaboration...

Google provides cloud services reliably due to its experience with operating its own business, as well as its core services like Google Search, in a similar...


Proofpoint

Encryption

How Encrypting Content in Transit and at Rest Reduces Liabilities...

This white paper explains how to implement effective encryption to ensure your organization reduces costs and liability. Discover four top encryption points...


Previous 1 3 4
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Is the internet a disappointment?