| WEBCAST
ROUNDUP |
![]() |
|
![]() |
| Dear SearchExchange.com member,
View these webcasts recently held on SearchExchange.com:
![]()
> Strategic e-mail and instant messaging management > The Enemy in Your In-box:
Perimeter E-mail Strategies that Will Work > Getting More Mileage from Active Directory > Top
Messaging Vulnerabilities: Implementing Technical Solutions
|
|
|
VENDOR WEBCAST
Strategic e-mail and instant messaging management
|
![]() |
| SPEAKER: |
Nancy Flynn, executive
director of The ePolicy Institute, and author of "E-Mail Rules", "Instant Messaging Rules", "The ePolicy Handbook" and "Writing
Effective E-Mail" |
|
SPONSOR: |
IBM |
SUMMARY: |
In this webcast, Nancy Flynn,
executive director of The ePolicy Institute, and author of "E-Mail Rules," "Instant Messaging Rules," "The ePolicy Handbook" and
"Writing Effective E-Mail," will discuss how your organization can be improved by a strategic e-mail and IM management program based on
best practices that combine written policies, training, retention and deletion guidelines, monitoring and enforcement. Learn how this
program can prevent misuse, anticipate litigation and limit costly liabilities.
Webcast attendees will receive a copy of the "2004 Workplace E-Mail and IM Survey" from the American Management Association and The
ePolicy Institute. The publication will give you a clearer idea of where your organization stands when it comes to effective e-mail and
IM risk management. |
![]() |
|
![]() |
|
|
EXPERT WEBCAST
The Enemy in Your In-box: Perimeter E-mail Strategies that
Will Work
|
![]() |
| SPEAKER: |
Rami Habal, Director,
Proofpoint, Inc. |
|
SPONSOR: |
Proofpoint, Inc. |
SUMMARY: |
Companies are becoming
increasingly concerned about ensuring that messages leaving the organization comply with both internal rules and external regulations,
such as HIPAA, Gramm-Leach-Bliley and Sarbanes-Oxley. A recent survey by Proofpoint and Forrester consulting found that nearly 75% of
large companies rate outbound email risk reduction as important or very important over the next 12 months.
At this webcast, learn how to reduce the risks associated with outbound email content while also eliminating inbound spam and other
messaging threats. You'll learn about:
- The range of inbound and outbound email threats facing today's enterprise
- The legal and financial risks associated with outbound email content and security
- How to detect and prevent leaks of confidential internal memos and valuable intellectual property via email
- New technologies being used by some of the world's most forward-thinking companies to stop inbound spam and viruses, while
securing their outbound email channel
|
![]() |
|
![]() |
|
|
VENDOR WEBCAST
Getting More Mileage from Active Directory
|
![]() |
| SPEAKER: |
Darren Mar-Elia, Chief
Technology Officer for Windows Management, Quest Software |
|
SPONSOR: |
Quest Software |
SUMMARY: |
At this webcast, hear about the
importance of effectively managing AD and better leveraging it as the central identity store within an organization.
Successful administration of AD depends on many key factors. The focus of this presentation will be on six key areas of AD management
and the individual importance that each one plays. Areas of focus include:
- Hardening Security
- Enforcing Compliance
- Empowering users
- Deploying Group Policy
- Automating User Provisioning
- Leveraging AD
|
![]() |
|
![]() |
|
|
EXPERT WEBCAST
Top Messaging Vulnerabilities: Implementing Technical
Solutions
|
![]() |
| SPEAKER: |
Kevin Beaver, Founder and
principal consultant, Principle Logic, LLC |
|
SPONSOR: |
Exchange Adviser newsletter |
SUMMARY: |
Information security expert Kevin
Beaver will cover how admins can implement technical solutions that will help them fight messaging attacks and actually make them
stick. Kevin will discuss the process issues that are often the root of all messaging security problems. These issues include lack of
content filtering processes that lead to data leakage, employee monitoring (or lack thereof), breakdowns in communication with human
resources and upper management, system maintenance problems and policies that are not properly implemented and enforced. |
![]() |
|
![]() |
| VIEW WEBCASTS |
![]() |
|
Get informed. Check out all our available webcasts to get the information you need to make the right IT Business decisions
from leading industry experts and vendors.
> View all Webcasts
|
![]() |
![]() |
| FREE E-MAIL SERVICES! |
![]() |
| |
Enter your e-mail and
start receiving Exchange Adviser.
|
![]() |
| |
E-mail: |
|
Not a member? We'll activate your membership with your subscription. |
![]() |
|
![]() |
![]()
|
![]() |
|
|
|
|
|