• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Lang: CN | EN
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email
  • /
  • Email Management
flow-image
Proofpoint

Reimagining Email Security

In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...

Published: Jun 17, 2021
View More
flow-image
Dell

The Move to Exchange 2013: Migraine or Migration?

Migration of your most precious business asset, that which is mission-critical for the success of the company on so many levels—your Exchange messaging solution—is not something to be taken lightly. Some call it migrating, or upgrading or transitioning with a period of coexistence, but regardless of the...

View More
flow-image
Malwarebytes

Cybercrime tactics and techniques

2019 is off to an action-packed start in cybercrime. From a steadfast increase of pervasive Trojans to a resurgence of randsomare logdged against corporate targets, cybercriminals are going after organizations with a vengence. Read the Cybercrime Tactics and Techniques Q1 2019 Report to learn more about the current state...

View More
flow-image
Proofpoint

Driving Real Behaviour Change

Starting a new training programme may seem daunting. Maintaining one that keeps your users engaged, changes their behaviour and reduces your organisation’s exposure to threats might be an even bigger challenge. This guide shows you how to create and sustain an efficient and effective cybersecurity education...

Published: Apr 21, 2021
View More
flow-image
ESET

Rethinking endpoint and email security for the BYOD era

The attacks can and do hit organizations of all sizes and are only becoming more widespread and difficult to detect. The consumerization of IT and Bring Your Own Device (BYOD) only exacerbates the issue since companies now have many more endpoints to protect—many of which they don’t own. In a survey of...

View More
flow-image
Clearswift

Why Encrypt? Securing Email Without Compromising Communications

For many companies, data loss prevention (DLP) has, for too long, emphasised the management of internal data, blocking sensitive information from leaving company networks. But this is not a real world solution when email continues to be the main channel over which employees distribute and share what is often confidential...

View More
flow-image
Cisco

Email Security Using Cisco ESA - Technology Design Guide

Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to...

View More
flow-image
Fortinet

What Today’s Retailers Need in a Security Architecture

Retail cybersecurity in the age of the omnichannel customer experience requires CIOs and vice presidents of IT to take a 30,000-foot view. Supporting multiple point-of-sale (POS) solutions, an assortment of cloud-based applications, distributed networking software, customer mobile devices, and other emerging technologies...

Published: Jan 19, 2021
View More
flow-image
Mimecast

The Importance of Continuity in Office 365 Environments

This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.

View More
flow-image
Proofpoint

Stopping BEC and EAC

Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi‑layered defences. Cyber attackers have countless ways of tricking your users, preying on their trust and exploiting their access to key data, systems and resources. To succeed, attackers need to find just one tactic...

Published: Apr 21, 2021
View More
flow-image
Proofpoint

2021 State of the Phish

There’s no question that organisations (and individuals) faced many challenges in 2020, both new and familiar. Information security teams felt the strain, too. On top of “ordinary” cybersecurity issues, professionals in these roles dealt with an explosion of pandemic-themed phishing scams and a continued...

Published: Apr 21, 2021
View More
flow-image
Clearswift

10 Essential Steps to Email Security

By following some basic principles, email can be allowed to move freely into, out of and around your enterprise while stopping the things that cause damage. Download this whitepaper now and discover the 10 essential steps to email security. Those responsible for these threats are getting increasingly sophisticated...

View More
flow-image
HP

Improve productivity with an email solution designed for SMBs:

The power of HP ProLiant Gen8 server technology, powered by Intel, creates an ideal foundation for your business email solution no matter where you are on your IT journey. 

View More
flow-image
Proofpoint

The Hidden Costs of Free: Are Microsoft 365’s Native Security Features the Value They Seem?

All email, cloud, and compliance solutions are not created equal. As organisations make the move to Microsoft 365, many assume that the platform's built-in or bundled features will keep users safe and compliant. But these “good enough” features may not be good enough for your organisation.  Download...

Published: Apr 21, 2021
View More
  •  
  •  
  • 1
  • 2
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon