Unsolicited Commercial e-Mail Reports

E-Guide: Enterprise UTM Security: The Best Threat Management Solution?
sponsored by NETGEAR Inc.
EGUIDE: If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.
Posted: 10 Dec 2010 | Published: 10 Dec 2010

NETGEAR Inc.

Mail Security for Microsoft Exchange Server
sponsored by ESET
DATA SHEET: ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past
Posted: 25 Mar 2011 | Published: 25 Mar 2011

ESET

The Bot Threat
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Enterprise

Presentation Transcript: Is SaaS the Future of Enterprise Security?
sponsored by OpenText Security Solutions
PRESENTATION TRANSCRIPT: This presentation transcript discusses how The Web has become a primary attack vector most businesses are not yet prepared for. Compliance and data leakage are a growing concern, and the economic downturn is causing every organization to re-evaluate its spending on personnel and IT resources and how SaaS may just be the answer to these
Posted: 04 Jun 2009 | Published: 04 Jun 2009

OpenText Security Solutions

Fortune 200 Firm Achieves Global Email Protection
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

WatchGuard Technologies, Inc.

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise

IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013

IBM

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
sponsored by Google
EZINE: Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

E-Book: Driving Profitability through Information Security
sponsored by Astaro
EBOOK: While recognizing the need for security is a positive step, many of these organizations are missing an opportunity to improve their operations by using the same tools. In this document you will find some tactics you can add to your security playbook to help make your employees more productive and to help improve your organization’s efficiency.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Astaro