Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Anti Spam

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Anti Spam

Anti spam solutions generally fall under two categories, client-based and server-based. Client-based tools allow each user to configure the software so that it can perform according to individual needs with it’s decentralized approach. Server-based solutions perform spam identification and filtering before legitimate emails are distributed to the intended recipients throughout the network thus reducing the impact that spam has on end-user productivity and on network resources.
Results 276 - 300 of 451Sort Results By: Published Date | Title | Company Name
White Paper Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application
    
Lumension
White Paper Published By: M86 Security     Published Date: Nov 02, 2010
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
White Paper Published By: M86 Security     Published Date: Nov 01, 2010
This paper will outline the evolution of APTs, explain the motivation behind them, and determine best practices for defending against these threats.
Tags : 
m86 security, threats, best practices, phishing, vulnerability
    
M86 Security
White Paper Published By: Symantec.cloud     Published Date: Sep 28, 2010
Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.
Tags : 
messagelabs, symantec hosted services, embedded links, worm, security
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Sep 14, 2010
Understand the extent of the costs you risk incurring if you have either no or inadequate protection in place.
Tags : 
symantec.cloud, messagelabs symantec hosted services, email threat, email security, hacking
    
Symantec.cloud
White Paper Published By: IBM     Published Date: Aug 30, 2010
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Tags : 
ibm, test data privacy, compliance, data masking, payment card industry
    
IBM
Free Offer Published By: Software Security Solutions     Published Date: Aug 23, 2010
ESET NOD32 Centrally Managed Business Edition. The Thinking Person's Solution.
Tags : 
software security, eset business edition, free trial, anti-virus software, smb
    
Software Security Solutions
White Paper Published By: Symantec.cloud     Published Date: Aug 10, 2010
Off-the-shelf instant messaging (IM) lets malware into the Enterprise, and compromises regulatory compliance and copyright protection. Find out how a secure IM service can keep you covered.
Tags : 
messagelabs us, instant messaging, malware, information mobile worker, saas
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss how the Internet bandwidth is a finite and expensive resource that needs protection from spammers, criminals, hackers, time-wasters and employee misuse.
Tags : 
messagelabs us, symantec hosted services, internet bandwidth, security, data protection
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : 
messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Jul 06, 2010
Read our white paper to understand the changing web threat in 2010 & equip your business to defend against it.
Tags : 
messagelabs symantec, web threat, malware, threat detection, web security services
    
Symantec.cloud
White Paper Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.
Tags : 
messagelabs symantec, security safeguard, email spam, malware, anti spam
    
MessageLabs Ltd.
White Paper Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.
Tags : 
messagelabs symantec, web threat, security safeguard, malware, web security services
    
MessageLabs Ltd.
White Paper Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest whitepaper & create a step-by-step approach to IT security that will work for your business.
Tags : 
messagelabs symantec, it security, malware, security management, anti spam
    
MessageLabs Ltd.
White Paper Published By: Symantec.cloud     Published Date: Apr 27, 2010
We surveyed 273 managers in IT & our research reveals the Top 10 Web Security Threats; And How to Solve Them.
Tags : 
messagelabs symantec, web security threat, malware, bandwidth, bandwidth management
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 27, 2010
Create a step-by-step approach to IT security that will work for your business.
Tags : 
messagelabs hosted symantec, it security, smb, malware, small business networks
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 27, 2010
Spammers reach new heights of inventiveness and professionalism. Understand the latest spam threat.
Tags : 
messagelabs intelligence, symantec hosted services, spam threat, web security services, security safeguard
    
Symantec.cloud
White Paper Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper explains how Proofpoint MLX technology provides unrivalled defense against spam.
Tags : 
proofpoint mlx, spam detection, email security, phishing attack, saas
    
Proofpoint
White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Tags : 
watchguard technologies, unified threat management, utm, network humming, security
    
WatchGuard Technologies
White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs
    
WatchGuard Technologies
White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization's network security posture.
Tags : 
watchguard technologies, cloud-based security, protection, network security, malware threats
    
WatchGuard Technologies
White Paper Published By: Webroot UK     Published Date: Mar 22, 2010
This paper examines the realities of web threats and looks at the promise that cloud-based solutions bring for organisations in terms of providing a higher level of protection against the increasingly complex and sophisticated threats being seen today.
Tags : 
webroot, web security, cloud computing, malware threats, anti spam
    
Webroot UK
White Paper Published By: Webroot UK     Published Date: Mar 22, 2010
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, remote access, malware, viruses
    
Webroot UK
White Paper Published By: Webroot UK     Published Date: Mar 22, 2010
The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats
Tags : 
webroot, web security service, cloud computing, web threats, business process automation
    
Webroot UK
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search