e-Mail Spam Reports

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

E-Guide: Enterprise UTM Security: The Best Threat Management Solution?
sponsored by NETGEAR Inc.
EGUIDE: If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.
Posted: 10 Dec 2010 | Published: 10 Dec 2010

NETGEAR Inc.

Why Bayesian Filtering Is the Most Effective Anti-spam Technology
sponsored by GFI Software
PRODUCT LITERATURE: This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Presentation Transcript: Is SaaS the Future of Enterprise Security?
sponsored by OpenText Security Solutions
PRESENTATION TRANSCRIPT: This presentation transcript discusses how The Web has become a primary attack vector most businesses are not yet prepared for. Compliance and data leakage are a growing concern, and the economic downturn is causing every organization to re-evaluate its spending on personnel and IT resources and how SaaS may just be the answer to these
Posted: 04 Jun 2009 | Published: 04 Jun 2009

OpenText Security Solutions

Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Sophos Security Threat Report 2011
sponsored by Sophos
WHITE PAPER: Let our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Sophos

Panda’s Managed Email Protection Service
sponsored by Panda Security
DATA SHEET: This data sheet provides information on Panda's Managed Email Protection Service, a managed email cleaning service guaranteeing 100% malware-free email, as well a series of key features of a great value to any company.
Posted: 18 Sep 2009 | Published: 25 Jul 2009

Panda Security

Information Security Magazine November 2009: Stay in Control
sponsored by Information Security Magazine
EZINE: Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

Information Security Magazine