secure messaging

Results 1 - 22 of 22Sort Results By: Published Date | Title | Company Name
Published By: mindSHIFT     Published Date: Nov 29, 2007
A millisecond of downtime can mean millions of dollars. Maintaining compliance while ensuring your firm has the required speed and uptime can be daunting. Learn what you can do with your email and instant messages to prepare for your next regulatory audit.
Tags : 
secure im, secure instant messaging, audit, security audit, auditing, compliance, email security, high availability, mindshift, messaging
    
mindSHIFT
Published By: TigerText     Published Date: Aug 24, 2016
This white paper exhibits 8 security tips for properly protecting text messages.
Tags : 
    
TigerText
Published By: TigerText     Published Date: Aug 24, 2016
This white paper shows how you can debunk 5 popular text messaging myths.
Tags : 
    
TigerText
Published By: TigerText     Published Date: Aug 24, 2016
This white paper shows how instant communication improves security, population health, and interoperability.
Tags : 
    
TigerText
Published By: TigerText     Published Date: Aug 24, 2016
In this white paper, TigerText allows you to simplify the selection process and more easily identify what you need from your secure texting vendor.
Tags : 
    
TigerText
Published By: Imprivata     Published Date: Dec 06, 2013
The vital information CIOs need to ensure that their text messaging is both secure and in compliance with the current regulations.
Tags : 
secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications, authentication, mobile workers, wireless communications, wireless messaging
    
Imprivata
Published By: Message Systems     Published Date: Apr 29, 2013
Technology Principles for Architecting a Secure Messaging Environment
Tags : 
message systems, secure messaging environment, esps, solution engineering, mike hillyer, safe messaging environment
    
Message Systems
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
This paper compares the Research In Motion BlackBerry solution (BlackBerry mobile devices and BlackBerry Enterprise Server) with the Microsoft® mobile solution (Microsoft Windows Mobile® and Microsoft Exchange Server 2007 SP1 with Microsoft ActiveSync® technology) by analyzing features of the user experience and the administrator experience.
Tags : 
microsoft windows mobile, mobile work, blackberry, smartphone, exchange server 2007 sp1, activesync, secure mobile messaging, security, tco, mobile computing, mobile workers, smart phones, wireless phones, wireless security, total cost of ownership
    
Microsoft Windows Phone
Published By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : 
certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance, email security, security management
    
DataMotion
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging, anti spam, anti spyware, anti virus
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging, anti spam, anti spyware, anti virus, application security, email security, internet security
    
Trend Micro SPN
Published By: IBM     Published Date: Mar 04, 2009
Celina Insurance case study that shows cost reduction and increased productivity - faster, better service to agents and their customers due to integrated systems and real-time collaboration; being “easy to do business with” secures agent loyalty; 50 percent reduction in phone calls and costs due to instant messaging option, and 40 percent reduction in head count while maintaining the same volume of business due to streamlined processes.
Tags : 
lotus software, ibm, celina insurance, lotus extranet, streamlined processes, reduction in intranet traffic, integrated systems, lotus notes, domino 8, networking, software development, bandwidth management, infrastructure, network management
    
IBM
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail, optimum mfp, smtp, secure messaging, latency, lane, kudos, enterprise applications, business management, ip faxing
    
Lane Telecommunications
Published By: Sunbelt Software     Published Date: Aug 04, 2008
Security is the most single critical task for any email administrator. Starting with a foundation of anti-spam and anti-virus capabilities, organizations should focus on other capabilities, as well, including policy management and a variety of other tasks designed to protect the network and the company from external and internal threats.
Tags : 
email security, secure messaging, secure im, exchange, exchange server, microsoft exchange, ms exchange, sunbelt, sunbelt software, security, security management, secure instant messaging
    
Sunbelt Software
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, mobile applications, enterprise server, planning guide, aes, des, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure
    
BlackBerry
Published By: Intermedia     Published Date: Nov 10, 2008
Microsoft Exchange is the leading business email and collaboration solution for the small,up to the large, business markets, and this whitepaper compares the security of Microsoft Exchange Services deployed in-house versus a hosted model with SaaS service providers. By choosing Intermedia as their Hosted Exchange SaaS Solution Provider, businesses can achieve email and total messaging security, as well as a piece of mind, by leveraging Intermedia’s infrastructure and experience with running a secured messaging platform.
Tags : 
intermedia, email security, logical server security, software as a service, saas, microsoft exchange services, security assessment testing, security, microsoft exchange
    
Intermedia
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security, network security, system management software, microsoft exchange, collaboration
    
Sigaba
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : 
access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
    
Sigaba
Published By: Sigaba     Published Date: Aug 21, 2009
This paper presents the business case for secure messaging, which extends far beyond compliance issues. In fact, choices about when to implement secure messaging affect every aspect of banking.
Tags : 
financial, bank, access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, compliance
    
Sigaba
Published By: Imprivata     Published Date: Dec 06, 2013
This whitepaper explores a HIPAA compliant text messaging application that supports encrypted protected health information, and best practices for implementation.
Tags : 
secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications, authentication, intrusion prevention, mobile workers, wireless security, business activity monitoring
    
Imprivata
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.