IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 
Definition continues below.
Email Security Multimedia (View All Report Types)
1 - 25 of 34 Matches Previous Page  |  Next Page
Don't Settle for Passé Email Protection
sponsored by Mimecast
WEBCAST: In this webinar, you'll learn the basics on how to beef up your email protection strategy. Prepare yourself, your colleagues, and your organization for advancements in this evolving imperative.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Mimecast

There Will Be Attacks: Prepare Your Email Defenses
sponsored by Mimecast
WEBCAST: Your organization can't tolerate any email downtime. Learn how to prevent damages to money, your reputation, and business operations with the right arsenal of email security tools.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Mimecast

It's Time to Re-evaluate Your Email Encryption Solution
sponsored by ZixCorp
VIDEO: Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.
Posted: 12 May 2016 | Premiered: 18 Dec 2013

ZixCorp

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015

Mimecast

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Today's Top 10 Web Hacking Techniques
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn today's top 10 web hacking techniques, such as Heartbleed and ShellShock, and how to protect your network. View it now to discover the 3 keys to email and web security.
Posted: 01 Oct 2015 | Premiered: Apr 9, 2015

WhiteHat Security

Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Sophos EndUser Protection Overview
sponsored by Sophos, Inc.
VIDEO: This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013

Sophos, Inc.

Dell Compellent for Microsoft Exchange Server 2010
sponsored by Dell, Inc.
WEBCAST: Dell Compellent SANs help ensure high performance, cost-effective storage, simplified operations and data protection for all Microsoft Exchange 2010 environments. Check out this comprehensive webcast to learn how Dell Compellent SAN can help you manage Exchange 2010 storage complexity.
Posted: 27 Apr 2012 | Premiered: Apr 18, 2012, 01:00 EDT (05:00 GMT)

Dell, Inc.

What Security Threats Can We Expect in 2012?
sponsored by Websense, Inc.
WEBCAST: View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more.
Posted: 15 Dec 2011 | Premiered: Dec 15, 2011

Websense, Inc.

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva

Worry-Free Business Security Advanced
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

Moving Email Management to the Cloud: Understanding IT Transitions
sponsored by Mimecast
WEBCAST: During this Mimecast webinar, you'll gain an understanding of what to look for in a cloud services provider, learn how to identify your own IT transitions points related to their specific email environment, uncover how to address any potential internal security questions when transitioning to a cloud-based service, and more!
Posted: 13 Aug 2010 | Premiered: Aug 13, 2010

Mimecast

Why Cloud-Based Security and Archiving Make Sense
sponsored by Google Postini
WEBCAST: Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both.
Posted: 03 Jun 2010 | Premiered: Jun 3, 2010

Google Postini

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 21 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 14 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Exchange 2010 Roadmap Series: Backup and Recovery
sponsored by Dell, Inc. and Intel®
WEBCAST: In this expert mediacast, featuring Exchange pro, Lee Benjamin, learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls.
Posted: 09 Dec 2009 | Premiered: Dec 9, 2009

Dell, Inc. and Intel®

McAfee Email and Web Security Appliance Trial
sponsored by Intel Security
PRODUCT DEMO: Email--Turn on the best filters, and walk away. Better malware detection rate and better spam and phishing catch rate--simply more effective than other filters. If that sounds like something you need, install a free trial of McAfee Email and Web Security Virtual Appliance behind your existing spam filter and see what real protection offers.
Posted: 02 Sep 2009 | Premiered: 02 Sep 2009

Intel Security

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.
1 - 25 of 34 Matches Previous Page    1 2    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  contains. A list of domain names for services that the sender expects will vouch for the legitimacy of the email. The second part of the protocol requires the recipient to compare the list of services VBR-Info provides with a list of services the recipient trusts. The recipient then queries each service that is common to both lists: the service uses information the domain owner has registered with the domain name service (DNS) to determine whether the sender's IP address is legitimate and whether the content type is approved. If VBR becomes widely adopted, it will provide the recipient with another … 
Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement