Borderware Technologies

Displaying 1-9 of 9 results

  • White Papers // Aug 2009

    BorderWare Email Encryption

    The BorderWare Email Encryption solution is the most comprehensive and easy-to-use tool for keeping confidential information secure and avoiding embarrassing and potentially damaging and costly data leakage caused by user errors or oversights. The BorderWare Email Encryption solution provides maximum security to organizations and its users with its transparent encryption...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Malware in Email

    Email is known to be one of the most popular infection vectors. Besides malicious programs attached to messages, email is linked to other threats such as phishing and messages containing links to infected web pages. Finally, spam which uses social engineering techniques to get users to perform specific actions is...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Malware Trends and Report

    This paper provides an overview the evolution of malware, adware and potentially malicious programs in 2007, and compares this data to that of 2006. A new statistical method was used to prepare this report; the 2006 figures used in this report were also recalculated using the new method. As a...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Web 2.0 and Security

    The next time a company claims that it's "Web 2.0," test their features against the list above. The more points they score, the more they are worthy of the name. However, that as Web 2.0 technologies are fairly new and although their value and usefulness are increasing daily, so are...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Dynamic Inspection: Uncategorized Content Filtering

    The BorderWare Security Platform provides consolidated security and administration by combining email and Web security with data loss prevention. The threats and risks of Web 2.0 are real and vast, and can only be addressed by technology, methodologies and security approaches that are designed for the very nature of the...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    ReputationAuthority: Your First Line of Defense

    Commonly, spammers and unknown solicitors send email to a local domain, domains that match destination or IP address, looking for a valid email address. Once the spammer receives confirmation of an existing address and the profile of the address construction, such as first name plus last name initial"@"domain.com, the spammer...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Clustering and Queue Replication

    This BorderWare Technology paper details the unique, native features and functionalities that support the multiple levels of redundancy available with the BorderWare Security Platform. The BorderWare Security Platform for Email Security is a set-and-forget, all-inclusive messaging appliance that is specifically designed for enterprises to centrally control, protect and manage both...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    E-Profiling for Instant-On Data Loss Prevention: Instant and Accurate Policy Creation and Discovery

    BorderWare Data Loss Prevention (DLP) has been specifically designed for organizations to quickly and affordably discover, monitor, remediate, manage and report on the Email andWeb content leaving their network. All of these steps for data-in-motion privacy and security is easily enabled and managed by the BorderWare Security Platform. Used by...

    Provided By Borderware Technologies

  • White Papers // Apr 2008

    NHS Strategic Encryption Requirements

    The requirements discussed in this paper have been developed by the NHS Connecting for Health Infrastructure Security Team and are intended to cover the broad range of requirements understood to be held by NHS organisations. Data Loss Prevention (DLP) is a highly discussed, and debated, technology that is designed to...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    BorderWare Email Encryption

    The BorderWare Email Encryption solution is the most comprehensive and easy-to-use tool for keeping confidential information secure and avoiding embarrassing and potentially damaging and costly data leakage caused by user errors or oversights. The BorderWare Email Encryption solution provides maximum security to organizations and its users with its transparent encryption...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Malware in Email

    Email is known to be one of the most popular infection vectors. Besides malicious programs attached to messages, email is linked to other threats such as phishing and messages containing links to infected web pages. Finally, spam which uses social engineering techniques to get users to perform specific actions is...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Malware Trends and Report

    This paper provides an overview the evolution of malware, adware and potentially malicious programs in 2007, and compares this data to that of 2006. A new statistical method was used to prepare this report; the 2006 figures used in this report were also recalculated using the new method. As a...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Web 2.0 and Security

    The next time a company claims that it's "Web 2.0," test their features against the list above. The more points they score, the more they are worthy of the name. However, that as Web 2.0 technologies are fairly new and although their value and usefulness are increasing daily, so are...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Dynamic Inspection: Uncategorized Content Filtering

    The BorderWare Security Platform provides consolidated security and administration by combining email and Web security with data loss prevention. The threats and risks of Web 2.0 are real and vast, and can only be addressed by technology, methodologies and security approaches that are designed for the very nature of the...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    ReputationAuthority: Your First Line of Defense

    Commonly, spammers and unknown solicitors send email to a local domain, domains that match destination or IP address, looking for a valid email address. Once the spammer receives confirmation of an existing address and the profile of the address construction, such as first name plus last name initial"@"domain.com, the spammer...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    Clustering and Queue Replication

    This BorderWare Technology paper details the unique, native features and functionalities that support the multiple levels of redundancy available with the BorderWare Security Platform. The BorderWare Security Platform for Email Security is a set-and-forget, all-inclusive messaging appliance that is specifically designed for enterprises to centrally control, protect and manage both...

    Provided By Borderware Technologies

  • White Papers // Apr 2008

    NHS Strategic Encryption Requirements

    The requirements discussed in this paper have been developed by the NHS Connecting for Health Infrastructure Security Team and are intended to cover the broad range of requirements understood to be held by NHS organisations. Data Loss Prevention (DLP) is a highly discussed, and debated, technology that is designed to...

    Provided By Borderware Technologies

  • White Papers // Aug 2009

    E-Profiling for Instant-On Data Loss Prevention: Instant and Accurate Policy Creation and Discovery

    BorderWare Data Loss Prevention (DLP) has been specifically designed for organizations to quickly and affordably discover, monitor, remediate, manage and report on the Email andWeb content leaving their network. All of these steps for data-in-motion privacy and security is easily enabled and managed by the BorderWare Security Platform. Used by...

    Provided By Borderware Technologies