• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email
  • /
  • Email Archiving
flow-image
Illumio

Secure Beyond Breach

Securing the perimeter is no longer enough. The focus has shifted to ensuring your organization continues to function if and when you’re breached — and that’s what micro-segmentation is all about. This book will help you become secure beyond breach. Based on real-world scenarios and written...

Published: Jan 18, 2021
View More
flow-image
Illumio

Enable End-to-End Zero Trust To Achieve Effective Outcomes

Illumio was named a Leader in Forrester’s latest Wave report evaluating the top Zero Trust platform providers. Out of 15 vendors, Illumio received the highest scores in the three primary categories.  Zero Trust priorities have evolved in 2020 to require solutions that secure your remote workforce with an...

Published: Jan 18, 2021
View More
flow-image
Proofpoint

Driving Real Behaviour Change

Today’s most potent cyber threat isn’t a zero-day vulnerability, new malware or the latest exploit kit. It’s your own users. That’s because today’s attacks target people, not IT infrastructure. No matter what form they take, most cyber attacks need a human victim to help activate them. They...

Published: Nov 24, 2020
View More
flow-image
Malwarebytes

Best Practice Makes Perfect: Malware Response in The New Normal

Before Covid-19, cyber security teams already confessed to being overworked – battling simply to keep their heads above a constant tide of security alerts, across numerous tools and reports. High profile security breaches, with malware at their root, were a seemingly weekly occurrence. The financial and reputational...

Published: Jan 22, 2021
View More
flow-image
Mimecast

The State of Email Security 2020

Global business is interspersed with a diversity of industrial sectors, united by a single, common communication thread that is key to any business: email connectivity. Email continues to be the most popular attack vector, via organizations at their email perimeters, from inside the organization (through compromised...

Published: Oct 26, 2020
View More
flow-image
Fortinet

Key Principles and Strategies for Securing the Enterprise Cloud

Customers are turning to the cloud to reduce capital expenses and increase agility as part of their digital innovation (DI) initiatives. Despite the benefits, cloud migration results in business-critical data and services being scattered across clouds and data centers. This leads to an expanded attack surface and a corresponding...

Published: Oct 21, 2020
View More
flow-image
Mimecast

Bloor: Take control of large file sharing

Find out why Mimecast Large File Send hits the bullseye If you are concerned that users’ reliance on consumer grade file sharing services creates data security and privacy risks, you are not alone. In a new report, Taking control of file sharing services, Bloor Research draws on detailed research to: ...

Published: Sep 08, 2015
View More
flow-image
Mimecast

Making Your Email Archive Work Harder for Business Advantage

Email is still the dominant form of communication in businesses today. This case study discusses a new tool for email archiving, a process that enables businesses to maintain a complete record of knowledge and intellectual property.

Published: Mar 01, 2015
View More
flow-image
IT Corporate

Functional Programming For Dummies

Using functional programming techniques can make you incredibly efficient when solving certain problems or when you need to make full use of multiprocessing techniques to ensure that you get maximum benefit from each processor (or core). The functional programming paradigm supports the concept of pure languages (such...

Published: Oct 21, 2019
View More
flow-image
Cisco

Email Security Using Cisco ESA - Technology Design Guide

Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to...

Published: Jan 16, 2014
View More
flow-image
IT Corporate

Office 365 All-in-One For Dummies

The deepest reference on Microsoft’s productivity service Office 365 offers the same productivity power as past versions of Microsoft Office along with tools designed to boost collaboration in the workplace and instant access to the latest Office updates without buying a whole new software package. It’s...

Published: Jan 16, 2020
View More
flow-image
IT Corporate

CISSP For Dummies

Secure your CISSP certification! If you’re a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass the exam. Plus, you'll get tips on...

Published: Oct 02, 2019
View More
flow-image
IT Corporate

Keeping Your AI Under Control: A Pragmatic Guide to Identifying, Evaluating, and Quantifying Risks

Much of our daily lives intertwine with artificial intelligence. From watching movies recommended by our entertainment streaming service, to interacting with customer service chatbots, to autotagging photos of friends in our social media apps, AI plays an invisible part in enriching our lives. While AI may be seen as a...

Published: Jan 08, 2020
View More
flow-image
Mimecast

Planning for Office 365 Gaps

Whether you plan for proper risk management or hope for it, we all have a role to play when it comes to protecting email and data in the cloud. Ignoring the gaps that come with relying on a single vendor dramatically increases your risk profile and potential for a negative business impact. It doesn’t have to...

Published: Oct 26, 2020
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x