sponsored by GFI Software
Posted:  02 May 2006
Published:  01 May 2006
Format:  PDF
Length:  5  Page(s)
Type:  Product Literature
Language:  English
ABSTRACT:
This white paper explains what email exploits are, provides examples of common email exploits, and discusses why a non signature-based approach (i.e., not a virus engine) is needed to protect against email exploits.





BROWSE RELATED RESOURCES
Email Security | Email Security Software | Malware | Microsoft Exchange

View All Resources sponsored by GFI Software

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement