X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 e mail encryption


E-mail Encryption: Protecting Data in Transit
Secure Mail is a plug-in that integrates into Microsoft Outlook. The main functions of Secure Mail are provided in the toolbar or the menu. It’s possible to pre

e mail encryption  Webmail , Free Secure E Mail , Mail Secure Email , Most Secure Mail , Secure E Mail Account , Secure E Mail Services , Exchange Secure Mail , Send Secure Mail , Web Secure Mail , Securemail Website , Securemail Seal , Businesses Securemail , Enterprise Email Security , Email Full Encryption , Awarded Securemail , Secure Mail Suite , Secure Email Program , Secure Mail Screening , Implementing Secure Mail , Secure Computing , Accessing Secure Email , Secure E Mail Connectivity , Securemail Enables , Secure

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

CRM for Financial and Insurance Markets RFI/RFP Template

Insurance and Investment, Marketing Automation, Sales Force Automation (SFA), CRM Analytics, Call Center and Customer Service, Professional Services Automation (PSA), e-CRM, E-Mail Response Management, Industry Vertical Module Availability, Product Technology  

Evaluate Now

Documents related to » e mail encryption

Development of an Internet Payment Processing System


This article describes the author's experience with the development of the first Yugoslav Internet payment processing system. The system's architecture is very similar to the Three Domain (3D) model that started to emerge later. This success story is worthwhile sharing with a wider audience.

e mail encryption   Read More

The CyberAngel: Laptop Recovery and File Encryption All-in-One


Relevant Technologies took the CyberAngel into our labs to test it for our acceptability rating. It worked as advertised, and had more features than expected.

e mail encryption   Read More

ArticSoft FileAssurity


Low cost file, folder and e-mail encryption and digital signature software. Secure file deletion above and beyond US Government DOD standards. Secure archives, certificate and key generation, and free reader software. FileAssurity is Open-PGP compliant and will import and generate PGP format keys, and encrypt/decrypt, sign/verify PGP compliant files. FileAssurity provides Government grade security without the complexity of other encryption products.

e mail encryption   Read More

Network Associates Hopes to Rekindle the Flame


Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to be down for the count. Year 2000 will be a better year. The momentum of the market will add enough spark to NAI's new corporate strategy to ignite a profitability flame and help it regain its stance.

e mail encryption   Read More

e-SASA


PDG Group Model 1114

e mail encryption   Read More

Bank is First Mover in Canadian E-Commerce


TD Bank of Canada has entered into a partnership with Commerce One to create an E-purchasing marketplace in Canada. As the first such endeavor, the bank hopes to capture both mind- and marketshare before the inevitable competitors crowd in.

e mail encryption   Read More

Informatica Heads for E-Business


Informatica Corp. (Nasdaq: INFA) today announced the acquisition of Influence Software, a leading provider of analytic applications for the e-business value chain. Informatica is acquiring Influence Software for roughly $80 million in a stock transaction that will be treated as a pooling of interests. The acquisition marks a realization of Informatica's vision to become a leading provider of packaged analytic applications for B2B e-business.

e mail encryption   Read More

Why Organizations Need to Archive E-mail


For most companies, e-mail is an integral part of the business workflow and a primary channel for communication. For these reasons, e-mails can be considered legal business documents and should be retained for a predefined period to satisfy government regulations. With an e-mail archiving system, message contents and attachments are stored in a read-only format, ensuring they are archived in their original state.

e mail encryption   Read More

Altrec Takes E-commerce to Extremes


Altrec is a startup E-commerce website that takes aim on the upscale outdoor recreation market. In this interview Altrec's CTO discusses the initial technology decisions on which the company's infrastructure is based.

e mail encryption   Read More

HP e-Vectra Product Follow-up


Hewlett Packard announced that the e-Vectra sealed case would include an “easy swap” hard drive.

e mail encryption   Read More