• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email
  • /
  • Email Security
flow-image
Informatica

Customer 360 for dummies

Did you know that approximately 300 billion emails are sent every day and that about half of all email traffic is considered spam? Sending your customers information that they don’t want or can’t use isn’t the way to build a meaningful relationship. Customers won’t waste their time with companies...

Published: Feb 08, 2022
View More
flow-image
Informatica

Customer 360 for dummies

Did you know that approximately 300 billion emails are sent every day and that about half of all email traffic is considered spam? Sending your customers information that they don’t want or can’t use isn’t the way to build a meaningful relationship. Customers won’t waste their time with companies...

Published: Feb 08, 2022
View More
flow-image
Proofpoint

The Human Factor 2021 Report

As the global pandemic upended work and home routines in 2020, cyber attackers pounced. Dive deep into how this extraordinary time has changed the threat landscape—and what it means for the year ahead. Our premiere threat report draws from one of cybersecurity's largest and most diverse data sets to explore user...

Published: Dec 21, 2021
View More
flow-image
Proofpoint

Unmasking BEC and EAC

Whether they result in fraudulent wire transfers, misdirected payments, diverted payrolls, supply-chain fraud or exposed personal data, BEC and EAC attacks are growing. The good news: these threats can be managed. With the right technology, tighter fiscal controls and a people-centric approach to stopping them, you can...

Published: Apr 21, 2021
View More
flow-image
OpenText

OpenText Secure Mail: Email Encryption Simplified and Integrated

OpenText Secure Mail is a cloud-based secure messaging solution for encrypting, tracking, and preventing the leak and interception of confidential information. 

View More
flow-image
Cisco

Email Security Using Cisco ESA - Technology Design Guide

Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to...

View More
flow-image
Dyn

Delivering the Future: Dyn's Email Partnership with Ongage

In the competitive world of business, sometimes a little help from a friend can go a long way: evident in the partnership between Dyn and Ongage. Ongage was founded in 2010 by a team of email marketers who believed they could make the email world a better place for senders and recipients. They did so by creating a...

View More
flow-image
Proofpoint

User Risk Report

Your cybersecurity posture is only as strong as its weakest link. And in today’s people-centric threat landscape, that means your users. They are your greatest asset, your biggest risk and your last line of defence from threats. For a better understanding of users’ cybersecurity awareness and habits, we...

Published: Apr 21, 2021
View More
flow-image
Monetate

8 Steps to Get Buy-in for a Website Testing Program

Effective website testing provides critical and credible information that can move your business forward. Unfortunately, many marketers still face roadblocks presented by reluctant or skeptical management teams or IT departments.  This white paper presents a specific plan on how to convince your company’s...

View More
flow-image
Cisco

Mitigating Email Virus Attacks

Each day, over 100 billion corporate email messages are exchanged. With email at the heart of businesses, security is a top priority. Email-based threats are more organized, targeted, and dangerous than ever before and the costs of security breaches nullify any short-term savings gained from settling for basic protection....

View More
flow-image
Malwarebytes

Cybercrime tactics and techniques

2019 is off to an action-packed start in cybercrime. From a steadfast increase of pervasive Trojans to a resurgence of randsomare logdged against corporate targets, cybercriminals are going after organizations with a vengence. Read the Cybercrime Tactics and Techniques Q1 2019 Report to learn more about the current state...

View More
flow-image
Mimecast

The Total Economic Impact Of Mimecast's Unified Email Management (UEM) Solution

Mimecast delivers a software-as-a-service (SaaS)-based enterprise email management solution that complements the client’s existing on-premises email infrastructure. It provides services including antispam, antimalware, archiving, eDiscovery, continuity, and policy management. For a more detailed overview of...

View More
flow-image
Proofpoint

User Risk Report

Behind almost every cyber attack is someone who fell victim to it. In each case, someone has clicked the wrong link, opened the wrong file or trusted the wrong email. In the 2021 Verizon Data Breach Investigations Report1, 85% of breaches involved human error. Despite constantly changing tactics, evolving malware...

Published: Dec 21, 2021
View More
flow-image
Proofpoint

Reimagining Email Security

In the changing landscape, security and risk management leaders must ensure that existing security solutions keep pace with fast-changing threats. It’s clear that the defend-the-perimeter model of security hasn’t worked for years and it’s time to make a change—and today that means starting protection...

Published: Dec 21, 2021
View More
  •  
  •  
  • 1
  • 2
  • 3
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon