Experton Security Vendor Benchmark 2016: Experton Group evaluates IT security market

Be it due to increasingly sophisticated cyber-attacks, high cost pressure or strict legal guidelines such as the EU Data Protection Regulation or the new German IT Security Act – IT security stands alongside cloud computing, big data, social business and mobile enterprise as one of the topics to which the ITC is currently paying most attention. In its annual survey the Experton Group examined the offerings of 138 service providers who currently play an important role on the security market. Retarus has immediately achieved inclusion in the quadrant “Product Challenger” being positioned as one of the strongest cloud service providers in the category “E-Mail / Web / Collaboration Security”.

En savoir plus

Tags: // // // //

Email archiving and encryption – working in tandem

Regulatory requirements make it mandatory for companies to archive their digital correspondence compliantly for many years. In an age when business emails are increasingly transmitted in encrypted form, this is often much more easily said than done. At first glance audit-proof archiving and encrypted emails appear to be mutually exclusive. Retarus E-Mail Security allows IT managers to easily overcome both challenges simultaneously.

En savoir plus

Tags: // //

Large E-Mail Handling: What spam and large file attachments have in common

Email users are seldom pleased to suddenly discover email attachments of several megabytes on their smartphones, while providers and companies justifiably fear that their internal email architecture will be overloaded by “mega mails” – a drawback that large file attachments share with spam messages. This means that a solution is required which fulfills the needs of users and IT administrators alike.

En savoir plus

Tags: // // //

Spam or no Spam: That is the question!

The definition of spam is actually unambiguous: But in everyday life it often happens that users also feel bothered by the mass of newsletters or notification emails in their in-boxes, despite the fact that they may have consciously subscribed to them at some point in the past. How should IT administrators respond to this situation? What does this mean with respect to the configuration of spam filters?

En savoir plus

Tags: // //