IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 
Definition continues below.
Email Security White Papers (View All Report Types)
1 - 25 of 174 Matches Previous Page  |  Next Page
Mobilize Your Email with Enterprise-Grade Security and Data Protection
sponsored by Citrix
WHITE PAPER: This white paper explains how to mobilize your email with enterprise-grade security that can increase productivity, while giving IT the flexibility to meet the unique requirements of different use cases and data types.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Citrix

Modern-Day Mobile Email Gets a Facelift
sponsored by Citrix
WHITE PAPER: You can get all of the scale, functionality and management control required without holding users back from their devices, applications or productivity. This white paper examines a comprehensive enterprise mobility management solution that enables complete and secure mobile device freedom.
Posted: 29 Jul 2015 | Published: 31 Dec 2014

Citrix

Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

Raising Your Google Ranking: A Guide
sponsored by Symantec Corporation
WHITE PAPER: To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

Symantec Corporation

IBM X-Force Threat Intelligence Quarterly, 2Q 2015
sponsored by IBM
WHITE PAPER: This quarterly cyber security report describes just how prevalent insider threats are and gives you guidelines on how to best protect yourself from them.
Posted: 09 Jul 2015 | Published: 30 Jun 2015

IBM

The Holistic Approach To Preventing Targeted Attacks
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper analyzes exactly what happened during the Target hack so you can know how to avoid Target's fate.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Case study: Ensuring Email Productivity and Security
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This case study describes how a consulting firm enhanced email productivity and security through outsourcing.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Website Security Threat Report Part 3
sponsored by Symantec Corporation
WHITE PAPER: Download part 3 of this Website Security Threat Report to discover how the public made criminal's lives easier in falling for the latest social media attacks and online scams. Plus, take an invaluable look ahead and benefit from our security recommendations and best practices.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Website Security Threat Report Part 2
sponsored by Symantec Corporation
WHITE PAPER: Download part 2 of this Website Security Threat Report for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Streamlining and Securing Email Infrastructure
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper details how United Airlines was able to secure and streamline its email messaging infrastructure, giving their staff secure access to email at home and on the road.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

Analyzing Consumer IT Security Bad Habits that are Coming into the Office
sponsored by WinMagic
WHITE PAPER: This analytical white paper delves into the false sense of security employees live within as well as the facts and truths about the lack of data security measures in place to mitigate risks. View now to learn how to eliminate user bad habits.
Posted: 29 Jun 2015 | Published: 24 Feb 2014

WinMagic

Microsoft Collaboration and Productivity Apps: A Dedicated Private Cloud for Your Microsoft Application
sponsored by Rackspace
WHITE PAPER: Read this white paper to find out why a dedicated private cloud is the best environment to run your Microsoft collaboration and productivity apps.
Posted: 08 Jun 2015 | Published: 18 May 2015

Rackspace

Awareness and Protection Help Prevent Phishing and Spoofing in Email Marketing
sponsored by Neustar®
WHITE PAPER: Access this resource to see how to block fraudulent emails to your customers. Continue reading learn how to see who is sending emails from your organization and how to block emails coming from unauthorized users.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Neustar®

5 Strategies For Email Data Loss Prevention
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper outlines 5 best practices for preventing sensitive information leakage while staying compliant with rapidly evolving regulations. Continue reading to learn how to bolster your email security strategy.
Posted: 01 Jun 2015 | Published: 27 May 2015

BAE Systems Applied Intelligence (formerly SilverSky)

10 Essential Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper lays out 10 essential steps to email security to allow messages to move freely into, out of, and around the enterprise while stopping malicious threats such as viruses, phishing, and DDoS attacks.
Posted: 28 May 2015 | Published: 20 May 2015

Clearswift

Website Defense in Depth – Examining the Protect, Detect, React Paradigm
sponsored by Distil Networks
WHITE PAPER: This white paper explores the Protect, Detect, React paradigm in depth and compares several platforms for specific security levels and requirements.
Posted: 27 May 2015 | Published: 25 Mar 2015

Distil Networks

Inside a Spear-Phishing Attack and How To Prevent Them
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

Today's Microsoft Office 365 Security Hurdles
sponsored by Clearswift
WHITE PAPER: This white paper outlines today's 11 Microsoft Office 365 security challenges and how to modify your email security strategy to secure content and data.
Posted: 22 May 2015 | Published: 06 May 2015

Clearswift

The Case for Hosted Exchange
sponsored by Rackspace
WHITE PAPER: This white paper reveals the benefits of managing Microsoft Exchange in the cloud and lays out the detailed costs of managing a hosted versus an on-premises Exchange environment.
Posted: 14 May 2015 | Published: 01 May 2013

Rackspace

Data Companies vs. Bots: Bot types and their impact on online data companies
sponsored by Distil Networks
WHITE PAPER: This white paper discusses the need for real-time identification and protection against scraping bots and examines a new approach to mitigate them.
Posted: 10 Apr 2015 | Published: 04 Feb 2015

Distil Networks

How to Defend Websites in the Era of Site Scraping
sponsored by Distil Networks
WHITE PAPER: This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

Distil Networks

A Holistic Approach to Fending off Bots and Bot Networks
sponsored by Distil Networks
WHITE PAPER: In this white paper, discover how a cloud-based strategy can block bots in real-time before data and intellectual property theft can occur. View now to learn more.
Posted: 09 Apr 2015 | Published: 04 Feb 2015

Distil Networks

10 Ways Everyone Should Approach Cybersecurity in 2015
sponsored by Global Knowledge
WHITE PAPER: This paper reviews key security issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Global Knowledge
1 - 25 of 174 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  contains. A list of domain names for services that the sender expects will vouch for the legitimacy of the email. The second part of the protocol requires the recipient to compare the list of services VBR-Info provides with a list of services the recipient trusts. The recipient then queries each service that is common to both lists: the service uses information the domain owner has registered with the domain name service (DNS) to determine whether the sender's IP address is legitimate and whether the content type is approved. If VBR becomes widely adopted, it will provide the recipient with another … 
Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement