email policy

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name

10 Reasons to Choose Mimecast

Published By: Mimecast     Published Date: May 20, 2009
Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.
Tags : 
mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara, compliance, esg, webmail, storage capacity, storage, sales & marketing software, web services, service management, colocation and web hosting
    
Mimecast

10 Steps to Data Loss Prevention: Email and Web Gateway Best Practices

Published By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy, compliance, email security, intrusion prevention, best practices, data protection
    
M86 Security

10 Steps to Data Loss Prevention: Email and Web Gateway Best Practices

Published By: M86 Security     Published Date: Feb 09, 2011
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security

10 Ways to Reduce Your Costs with Cloud-Based Email management

Published By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper to learn 10 ways your company will save by moving your email management to the cloud.
Tags : 
mimecast, cloud-based email management, email archiving, software-as-a-service, e-discovery, continuity, policy management, business continuity, email security, policy based management, cloud computing
    
Mimecast

3 Reasons to Archive Email

Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
Tags : 
email archiving, email security, storage, security policies, policy based management, compliance, exchange server, c2c, microsoft exchange
    
C2C Systems, Inc.

9 Considerations for Securing Web Apps in the Cloud

Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities ó and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS

Acceptable Misues Policy? Top Tips for Bringing Your AUP Up to Date - Free Guide

Published By: MessageLabs     Published Date: Jun 03, 2009
Does your email and web Acceptable Usage Policy (AUP) need a refresh? Shoosmiths Solicitors and MessageLabs combine to provide you with some top tips to ensuring your policy is fit for purpose. Click here.
Tags : 
aup, acceptable usage policy, message labs, shoosmiths solicitors, copyright, security provisions, guidance, email usage, etiquette, personal use, blogging, security, wireless, wireless hardware, wireless phones
    
MessageLabs

Are You Properly Safeguarding the Personal information contained in your mailing database?

Published By: Eloqua     Published Date: Jan 13, 2012
Email deliverability is about maximizing the potential number of emails reaching the inbox. Privacy is about safeguarding the personal information contained in your mailing database. Download this guide to learn about privacy and deliverability.
Tags : 
email deliverability, email privacy, privacy and deliverability, email marketing, marketing automation, email marketing platform, digital body language, database marketing, email privacy policy
    
Eloqua

Comparing Email Management Systems that Protect Against Spam, Viruses, Malware & Phishing Attacks

Published By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : 
email management, email, email security, messaging, spam, anti spam, spyware, anti spyware, virus, anti virus, sunbelt, sunbelt software, architecture, phishing, policy based, policy-based, malware, trojan, trojans, mail server
    
Sunbelt Software

Do More With Email Deliverability and Privacy

Published By: Oracle     Published Date: Sep 30, 2019
Email deliverability and privacy matters now more than ever. New and existing laws up the stakes for companies that donít comply with standards and regulations. And todayís email marketers find it increasingly difficult to be heard. You need to master deliverability and privacy to tackle the noise generated by social media, other email marketers, and even word-of-mouth marketing. Your reputation as an email sender impacts your potential reach as a marketer. Here are some factors that can earn you a poor deliverability score and prevent emails from reaching your desired target: f Lack of adherence to an email privacy policy f Poor list management f Frequency and relevancy of sends f Complaints from recipients f Number of blocks f Spam trap hits f How people are engaging Getting your message delivered is vital to revenue performance. A slight increase at the top of the funnel can make a huge difference to your bottom line.
Tags : 
    
Oracle

E-mail and Web Security SaaS

Published By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : 
webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention, anti-virus, threat protection, internet security, web service security
    
Webroot UK

E-Policy Best Practices Guide

Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this information-packed white paper by Nancy Flynn, Executive Director of the ePolicy Institute, for a no-nonsense look at the business risks and legal liabilities associated with employee misuse of the Internet, email, instant messaging (IM), and peer-to-peer (P2P) file-sharing technology.
Tags : 
spyware, security policy, security policies, policy based management, email security, secure im, st. bernard, st bernard, epolicy, anti spyware, secure instant messaging
    
St Bernard Software

Effective Content Analysis for Email Inspection & Control

Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, nemx, data management, microsoft exchange, contact management
    
Nemx Software Corporation

Email Encryption for InterScan Messaging Hosted Security

Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering, anti spam, anti spyware
    
Trend Micro SaaS

Email Retention and Archiving

Published By: Symantec.cloud     Published Date: Jan 26, 2011
Manage Electronic Records, Minimize Workplace Risks and Maximize Compliance. Learn about the legal and compliance regulations associated with maintaining your business critical emails. Understand how your business could face legal issues if a proper archiving solution is not in place.
Tags : 
symantec cloud, email retention, archiving, legal and compliance, epolicy institute, compliance, policy based management, email archiving, cloud computing
    
Symantec.cloud

Email Retention and Archiving:Manage E-Records, Minimize Workplace Risks & Maximize Compliance

Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance, knowledge management, data management, data protection, records management, pci compliance
    
MessageLabs

Exhange 2007 - Migration Alternatives

Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Email has become today's most mission-critical communication channel. Each and every day, 800 million business users worldwide use email during the course of their work day and about 80 percent of a company's intellectual property passes though its email server. Email is a vital component of both internal communication between employees and external communication with customers and business partners. It has become such an integral part of normal day-to-day business operations that most companies simply cannot function without it: when email stops, your ability to conduct business also stops.
Tags : 
alt-n technologies, email, exchange server, mdaemon, smtp, pop, imap, syncml, pocket pc, sender policy framework (spf), sender id, email security, windows, windows server
    
Alt-N Technologies

How Protecting Your Customers' Privacy Builds Your Business

Published By: TRUSTe     Published Date: Jul 24, 2009
Whether registering for downloads or e-newsletters, re-ordering or renewing, or telling their friends, customers who feel more confident to click, learn, and shop online, spend more. See how Truste privacy products and programs have helped businesses of all sizes increase conversions, order value, and customer engagement throughout the customer lifecycle.
Tags : 
truste, cheapflights, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales, increase online sales, increase online transactions, boost online transactions, certification, registrations
    
TRUSTe

Importance Of Delivery Control

Published By: Port25 Solutions     Published Date: Mar 09, 2012
PowerMTA is a configurable and robust email solution to ensure emails are being delivered at an optimal rate, even if ISPs flag your network. Changes in ISP policy can be met easily with PowerMTA and are dynamically adjustable for any threshold.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management, data management, customer relationship management, customer satisfaction, enterprise resource planning, infrastructure, design and facilities
    
Port25 Solutions

Internal Email Control: Its Essential Role in Compliance Management

Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, email control, email policy, compliance management, nemx, nemx software, governance, microsoft exchange
    
Nemx Software Corporation

Is Your Web site Killing Customer Confidence?

Published By: TRUSTe     Published Date: Sep 16, 2009
Put yourself in the customer's shoes: when shopping online, what are the things that worry you most? Before you enter your name and email address do you think about spam clogging your inbox? If you are like most consumers, you check to see if the site bears the seal of a third-party verification program and if the site has a privacy policy.
Tags : 
truste, cheapflights, customer confidence, privacy policy, adsense, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales, increase online sales, increase online transactions, boost online transactions
    
TRUSTe

Not Just Words: Enforce Your Email and Web Acceptable Usage Policies

Published By: MessageLabs     Published Date: Aug 29, 2008
Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.
Tags : 
messagelabs, compliance, email policies, policy, enforce policy, email security, security policies, secure instant messaging
    
MessageLabs

Not Just Words: Enforce Your Email and Web Acceptable Usage Policies

Published By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : 
messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity, email security, policy based management, web service security
    
Symantec.cloud

Protecting sensitive corporate data against the full spectrum of mobile risk

Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organizationís sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.