Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

network boundaries

Results 1 - 3 of 3Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : 
secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence, dlp, saas, virus filtering, spam filtering, archiving, antivirus, email encryption, transport layer security, tls, network intrusion prevention system, gartner email security magic quadrant, 2011
    
Proofpoint
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Maponics     Published Date: Sep 24, 2010
This case study tells the story of how HelloMetro, a network of more than 1,600 city guide web sites, used Maponics Neighborhood Boundaries and ZIP Code Boundaries to significantly increase web site traffic and revenue.
Tags : 
neighborhood data, neighborhood boundaries, neighborhood database, neighborhood names, neighborhood information by zip code
    
Maponics
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.