e-Mail Decryption White Papers

(View All Report Types)
ESG: Realizing and Maximizing E-mail Archiving ROI
sponsored by EMC Corporation
WHITE PAPER: ESG research indicates that organizations with e-mail archive implementations experience several measurable benefits, including lower storage costs as well as more efficient compliance, electronic discovery, and data protection operations. This white paper discusses the benefits of evaluating solutions to achieve the statuses mentioned above.
Posted: 23 Apr 2009 | Published: 23 Apr 2009

EMC Corporation

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

The Perfect Storm - Why Now Is The Time For Open Source
sponsored by Red Hat and Intel
WHITE PAPER: Open source is recognized for its ease of use, high performance, and affordability, especially amidst turbulent economic conditions. The high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions.
Posted: 19 Jun 2009 | Published: 01 Jun 2009

Red Hat and Intel

Unprotected Laptops: The Million Dollar Gamble: How Much Can Your Company Afford to Lose?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this white paper to learn more about laptop security and how asset and data protection solutions from Dell can help save your company millions of dollars.
Posted: 27 Jan 2009 | Published: 27 Jan 2009

Dell, Inc. and Intel®

Virtualize Servers with Microsoft Hyper-V and NetApp
sponsored by NetApp and Microsoft
WHITE PAPER: Microsoft's Hyper-V technology provides a full-featured server virtualization environment that is well suited for Windows and non-Windows environments. This article will help you understand Hyper-V with some guidelines for getting started using the technology in NetApp environments.
Posted: 09 Feb 2009 | Published: 09 Feb 2009

NetApp and Microsoft

The Virtual Machine Aware SAN
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper describes the innovative approach introduced by the Cisco MDS 9000 Family to support an end-to-end virtualized SAN environment that is flexible, secure, scalable, and mobile.
Posted: 24 Oct 2008 | Published: 24 Oct 2008

Cisco Systems, Inc.

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
sponsored by Tripwire, Inc.
WHITE PAPER: As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Tripwire, Inc.

HP Data Protector Software Advanced Backup to Disk Integration with Virtual Tape Libraries White Paper
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper provides a better understanding of the integration of HP Data Protector Software with Virtual Tape Libraries by utilizing the Advanced Backup to Disk functionality available with the HP Data Protector Software.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Hewlett Packard Enterprise

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP Inc
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP Inc

Laws, regulations and compliance: Top tips for keeping your data under your Control
sponsored by Sophos UK
WHITE PAPER: The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Posted: 20 Mar 2009 | Published: 01 Dec 2008

Sophos UK