Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Spam Filters

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An event sink, sometimes called a listener, is a piece of coding that defines how a server or computer is to handle given events. Event sinks are often used in spam filters to trigger actions in response to the receipt of an e-mail message with defined characteristics or certain types of attachments. The destination of data handled by such a program is also sometimes called an event sink. An event  … 
Definition continues below.
Spam Filters Multimedia (View All Report Types)
 
Shutting the Door on Data Theft
sponsored by Websense, Inc.
WEBCAST: Today's threats are much more sophisticated than ever. Hackers write and execute code that's pre-tested to elude antivirus programs. Join Patrik Runald, as he reveals how you can stay a step ahead of these attacks. Learn how inbound and outbound threats bypass traditional defenses, and how shared security intelligence can protect you.
Posted: 15 Sep 2011 | Premiered: Sep 15, 2011

Websense, Inc.

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft

Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
sponsored by Microsoft
PODCAST: Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 03 Nov 2006 | Premiered: Oct 27, 2006, 09:00 EDT (13:00 GMT)

Microsoft

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

ScaleIO: From the Vision to the Reality
sponsored by EMC
VIDEO: The software-defined storage market is constantly changing and updating. In this video, one major business discusses how they identified these changes and how they plan to handle them moving forward.
Posted: 19 Apr 2016 | Premiered: 30 Mar 2016

EMC

Behavioral Analytics: Let Your Data Tell the Story
sponsored by Prelert
WEBCAST: In this brief webcast, learn how to analyze log data, find anomalies, and like them together faster. Uncover the steps to understand not only what happened in an incident, but how it happened as well. View now to learn more.
Posted: 02 Feb 2016 | Premiered: Jan 20, 2016

Prelert

The State of the i
sponsored by Connectria Hosting
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria Hosting

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Reduce Costs and Stay Compliant With Next-Generation SAM
sponsored by CDW Corporation
WEBCAST: Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
Posted: 28 Feb 2014 | Premiered: May 31, 2013

CDW Corporation
 
 
SPAM FILTERS DEFINITION (continued): …  sink directs messages with certain characteristics away from the user's inbox. Such messages may be sent to a quarantine folder or be rejected outright. Each time a message is directed away from the inbox, the program may notify the sender and/or the intended recipient, depending on how the program is written.Among other things, you can use an event sink to specify that:Attachments will download to certain drives or foldersAttachments will be ignored or blockedMessages that would cause an excess of stored data will be rejectedMessages with suspicious characteristics will be quarantined or rejectedNetwork … 
Spam Filters definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement