HIT Consultant Insightful coverage of healthcare innovation
 

message security

Results 51 - 70 of 70Sort Results By: Published Date | Title | Company Name
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Reactivity     Published Date: Aug 21, 2009
The vast majority of IT professionals and business people agree that security is the leading concern for SOA and XML messages and most quickly realize that SSL is limited by not providing content security, auditability or reliability. This paper will discuss how to extend SOA beyond the perimeter through high performance.
Tags : 
soa, web services, xml, service oriented architecture, service-oriented architecture, soa security, xml security, security performance, reactivity
    
Reactivity
Published By: MessageLabs     Published Date: Jan 13, 2009
Spam, viruses and other malware pose a serious threat to your business.  Is your email security accurate enough to protect you?Re-evaluate your solution FREE Email Security Buyer’s Guide (PDF/40KB)
Tags : 
messagelabs, email security, email security buyer’s guide, spam, viruses, malware
    
MessageLabs
Published By: MessageLabs     Published Date: Jan 13, 2009
Uncontrolled internet use brings web-malware, malicious links and Trojans to the corporate network.  Uncover the web security options available to your business.  Choosing the right solution can be complicated. FREE Web-filtering Buyer’s Guide (PDF/40KB)
Tags : 
messagelabs, web-filtering, web-filtering buyer’s guide, web-malware, malicious links, trojans, web security solution
    
MessageLabs
Published By: MessageLabs     Published Date: Jun 03, 2009
Does your email and web Acceptable Usage Policy (AUP) need a refresh? Shoosmiths Solicitors and MessageLabs combine to provide you with some top tips to ensuring your policy is fit for purpose. Click here.
Tags : 
aup, acceptable usage policy, message labs, shoosmiths solicitors, copyright, security provisions, guidance, email usage, etiquette, personal use, blogging
    
MessageLabs
Published By: MessageLabs     Published Date: Jul 02, 2009
Get to grips with hosted security: Hosted security? Managed security? Cloud security? SaaS? The latest hype, or the secret to hassle free IT Security? Understand how Hosted Security can save you time & money whilst delivering highly accurate threat protection. Download today!
Tags : 
messagelabs, security, it management, email security, web security, email archive, continuity, ‘software as a service’, data centers
    
MessageLabs
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : 
messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Hosted security is an efficient and cost-effective solution for many midmarket organizations. Learn how to evaluate hosted security services, and make a business case for reliable security with predictable costs.
Tags : 
messagelabs, symantec hosted services, hosted security provider, total cost of ownership, tco
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : 
messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department.
Tags : 
messagelabs, security safeguard, symantec hosted services, web threat, malware, employee monitoring, productivity
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : 
messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : 
messagelabs us, it security, smb, risk management, protection, malware, anti-spam, anti-virus, back-ups, firewalls, user authentication
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : 
messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability, encryption
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will look at aligning security processes, the human element of security, with the latest security technologies - creating a secure barrier against today's most insidious threats.
Tags : 
messagelabs symantec hosted services, best practices, security process, security technology, threats, anti-virus
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
Read the latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce.
Tags : 
messagelabs symantec hosted services, wireless workforce, mobile data security, data and services, business practices, security, management policy
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will examine the information security needs of midmarket organizations, and how SaaS security services can help address those needs specific to a distributed workforce.
Tags : 
messagelabs symantec hosted services, saas, distributed workforce, information security, software-as-a-service, messaging
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : 
messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Dec 06, 2010
This white paper discusses the fundamentals of financial services compliance.
Tags : 
messagelabs symantec hosted services, best practices, financial services compliance, archiving, security, saas
    
Symantec.cloud
Published By: IBM Corporation     Published Date: Jun 01, 2011
Gartner has identified five key failures in crucial interactions between security and risk professionals and their client.
Tags : 
ibm, gartner, communication, security message, enterprise risk management, jeffrey wheatman, chief information security officer, ciso, business leaders, security program
    
IBM Corporation
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.