IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Email Security Services

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Anti-Spam Services, Email Content Security Services, e-Mail Security Services, Spam Filtering Services, Anti-phishing Services, Email Filtering Services, e-Mail Content Security Services, Authentication and Email Security Services, Software Virus Filtering Services, Managed Email Security Services, Virus Filtering Services, e-Mail Filtering Services
DEFINITION: Self-destructing email is electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender. Although self-destructing email technologies has existed for years, none has been very effective. Several new programs are said to offer better performance as well as email security and privacy enhancements.There are two main types of self-destructing email.  … 
Definition continues below.
Email Security Services White Papers (View All Report Types)
23 Matches
The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Report: (In)Security Everywhere in 2016
sponsored by ESET
WHITE PAPER: In this report, you'll uncover ways to plow through 2016 with a proactive attitude of security awareness. Read on to learn about the current state of security (or lack thereof), and what you can do to rise above emerging threats such as ransomware, targeted attacks, crimeware, haxposure, and more.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

ESET

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: This white paper discusses a cloud-based email security service that protects users with highly accurate spam detection, robust virus defense, and built-in email continuity. Read on to see how this service can improve the reliability of your email security and reduce your management overhead.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: This white paper explains how you can adopt an automated process for gaining threat intelligence from phishing emails. Learn how you can turn dangerous emails into weapons of your own.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

How to Get Bullet-Proof Grade Enterprise Email Protection
sponsored by LogicNow
WHITE PAPER: This white paper outlines a defense strategy for employing a third-party system to complement your email provider's security protection. Read on to add an additional line of defense to your business' email service to combat the melting pot of internet threats.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

LogicNow

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Why You Should Consider Cloud-Based Email Archiving
sponsored by Perimeter eSecurity
WHITE PAPER: This whitepaper, authored by messaging industry analyst The Radicati Group, looks at the key reasons organizations should consider moving to a cloud-based archiving solution.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Perimeter eSecurity

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market
sponsored by Webroot
WHITE PAPER: This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs.
Posted: 25 Jul 2011 | Published: 01 Dec 2010

Webroot

Leveraging security from the Cloud
sponsored by IBM
WHITE PAPER: Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Email as Part of a Business Continuity Strategy: Why always-on-business requires always-on-email
sponsored by Mimecast
WHITE PAPER: The paper looks at the general approaches available to ensure email continuity from a high level and the implications of deploying each strategy on infrastructure, budget, people and resilience.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Mimecast

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Mimecast

Email and Web Security SaaS
sponsored by Webroot
WHITE PAPER: Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption.
Posted: 01 Oct 2009 | Published: 14 Apr 2009

Webroot

Email Continuity: You don't know what you've got till it's gone
sponsored by Symantec Hosted Services
WHITE PAPER: Because email is ubiquitous, necessary and convenient, it cannot be allowed to fail. This whitepaper looks at the value of email and outlines the issues and concerns of IT managers involved in managing and maintaining business-critical email systems.
Posted: 24 Jul 2009 | Published: 01 Jul 2008

Symantec Hosted Services

A Guide to Email Regulatory Compliance
sponsored by USA.NET, Inc.
WHITE PAPER: This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET.
Posted: 23 Jul 2009 | Published: 23 Jul 2009

USA.NET, Inc.

Best Practices in Using Reputation-based Anti-Spam Services for Email Security
sponsored by IronPort Systems
WHITE PAPER: This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services.
Posted: 17 Mar 2009 | Published: 09 Feb 2009

IronPort Systems
23 Matches
 
EMAIL SECURITY SERVICES DEFINITION (continued): …  The first type, also known as retractable email, allows the sender to cancel or void a transmitted message as long as it has not yet been read by the intended recipient. The second type of self-destructing email theoretically disappears from the Internet altogether after a certain length of time has passed. The key word here is "theoretically" because if the recipient sees an email message preservation is always possible -- even if it means taking a photograph of the display screen on which the message appears or having multiple witnesses view the display in real time.The most common … 
Email Security Services definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement