• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email
  • /
  • Document Management
flow-image
Malwarebytes

Best Practice Makes Perfect: Malware Response in The New Normal

Before Covid-19, cyber security teams already confessed to being overworked – battling simply to keep their heads above a constant tide of security alerts, across numerous tools and reports. High profile security breaches, with malware at their root, were a seemingly weekly occurrence. The financial and reputational...

Published: Jan 22, 2021
View More
flow-image
Proofpoint

Driving Real Behaviour Change

Today’s most potent cyber threat isn’t a zero-day vulnerability, new malware or the latest exploit kit. It’s your own users. That’s because today’s attacks target people, not IT infrastructure. No matter what form they take, most cyber attacks need a human victim to help activate them. They...

Published: Nov 24, 2020
View More
flow-image
Illumio

Enable End-to-End Zero Trust To Achieve Effective Outcomes

Illumio was named a Leader in Forrester’s latest Wave report evaluating the top Zero Trust platform providers. Out of 15 vendors, Illumio received the highest scores in the three primary categories.  Zero Trust priorities have evolved in 2020 to require solutions that secure your remote workforce with an...

Published: Jan 18, 2021
View More
flow-image
Illumio

Secure Beyond Breach

Securing the perimeter is no longer enough. The focus has shifted to ensuring your organization continues to function if and when you’re breached — and that’s what micro-segmentation is all about. This book will help you become secure beyond breach. Based on real-world scenarios and written...

Published: Jan 18, 2021
View More
flow-image
ThinkingPhones

Unified Communications Buyer's Guide 2016

Investing in unified communications is certainly beneficial, but identifying the correct solution can be difficult. What factors determine the cloud's value? What can you do without? Most importantly—what does your business need? Thankfully, we're taking the guesswork out of it. The Unified Communication...

Published: Nov 01, 2015
View More
flow-image
Mimecast

The State of Email Security 2020

Global business is interspersed with a diversity of industrial sectors, united by a single, common communication thread that is key to any business: email connectivity. Email continues to be the most popular attack vector, via organizations at their email perimeters, from inside the organization (through compromised...

Published: Oct 26, 2020
View More
flow-image
IT Corporate

Advanced MySQL 8

Design cost-efficient database solutions, scale enterprise operations and reduce overhead business costs with MySQL. Advanced MySQL 8 teaches you to enhance your existing database infrastructure and build various tools to improve your enterprise applications and overall website performance. The helps you optimize...

Published: Jan 15, 2021
View More
flow-image
F5 Networks

How Malware Can Steal Your Data

As applications drive business, more and more valuable data is accessed and exchanged through them.  Cybercriminals attempt to compromise your apps with schemes like social engineering, malware writing, botnet herding, credit card fraud, credential laundering, trading in stolen digital goods, and selling corporate...

Published: Apr 02, 2019
View More
flow-image
Cisco

Email Security Using Cisco ESA - Technology Design Guide

Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to...

Published: Jan 16, 2014
View More
flow-image
Mimecast

The Total Economic Impact Of Mimecast's Unified Email Management (UEM) Solution

Mimecast delivers a software-as-a-service (SaaS)-based enterprise email management solution that complements the client’s existing on-premises email infrastructure. It provides services including antispam, antimalware, archiving, eDiscovery, continuity, and policy management. For a more detailed overview of...

Published: May 15, 2014
View More
flow-image
Mimecast

Magic Quadrant for Secure Email Gateways

The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability, encryption and better protection from targeted phishing attacks.

Published: Mar 01, 2015
View More
flow-image
BlackBerry

The Case for Secure Communications

The tapping of voice communications has occurred virtually as long as electronic communication has been in existence. In the early days of electronic communications, and prior to the implementation of digital technology, tapping a phone was very easy. One simply needed access to the physical wiring where a listening device...

Published: Aug 08, 2019
View More
flow-image
IT Corporate

Linux All-In-One For Dummies, 6th Edition

Inside, over 500 pages of Linux topics are organized into eight task-oriented mini books that help you understand all aspects of the latest OS distributions of the most popular open-source operating system in use today.Linux All-in-One For Dummies covers topics such as getting up and running with basics, desktops, networking,...

Published: Aug 16, 2019
View More
flow-image
DocuSign

Increase Your Productivity with DocuSign for Office 365

Microsoft has teamed up with DocuSign to make our industry-leading eSignature apps available to businesses and consumers within Microsoft applications, making it easier than ever to stay productive. Robust apps for Outlook, Word, SharePoint, Dynamics CRM, Windows and Windows Phone are making it easier for organisations...

Published: Jul 30, 2019
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x