IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 
Definition continues below.
Email Security White Papers (View All Report Types)
1 - 25 of 175 Matches Previous Page  |  Next Page
FINRA Regulat ions Requi re TechnologyInnovat ion to Address Supervision andMoni tor ing Workload
sponsored by Proofpoint, Inc.
WHITE PAPER: Business leaders need to find a healthy balance between flexible business solutions and data monitoring abilities. Learn how to protect and govern your sensitive information to help mitigate risk and, in the process, better comply with regulatory requirements.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Proofpoint Advanced Security Platform for Microsoft Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: Safeguard against advanced threats and targeted attacks to your Office 365 users. Gain visibility and threat insights to identify attacks quickly and contain them as early as possible.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

Quick Steps to Integrate Office 365 and ZixGateway® Hosted
sponsored by ZixCorp
WHITE PAPER: Add greater protection emails by routing Office 365 to ZixGateway Hosted. It automatically scans routed outbound email from Office 365 connectors. If sensitive information triggers Zix content policies, those messages and their attachments are automatically encrypted.
Posted: 03 Jun 2016 | Published: 01 May 2016

ZixCorp

The Top Email Data Risks of Office 365
sponsored by Mimecast
WHITE PAPER: This webinar examines common risks you may come across with Office 365. View now to explore the state of email threats, and how to augment your Office 365 deployment with proper protection strategies.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Mimecast

Security Teams Must Empower Employees to Prevent Phishing Attacks
sponsored by Mimecast
WHITE PAPER: Technology alone won't stop phishing attacks; empowering employees to prevent incidents is critical. Uncover ways to boost this level of security awareness, and help users protect themselves and the enterprise from these cybercrimes.
Posted: 02 Jun 2016 | Published: 20 Aug 2015

Mimecast

5 Security Questions to Ask Before Selecting Office 365
sponsored by Mimecast
WHITE PAPER: True IT professionals know that the same best practices for on-premises software deployments apply to the cloud, and they should be wary when considering Office 365. Explore five questions to ask before your Office 365 deployment.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

13 Questions You Must Ask Your Bot Mitigation Vendor
sponsored by Distil Networks
WHITE PAPER: Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

The MSP’s Complete Guide to Cyber Security
sponsored by Intronis
WHITE PAPER: Don't put off security talks until after it's too late. This white paper gathers stats and facts about cybersecurity in regards to SMBs. Learn about common cybersecurity mistakes SMBs constantly make and tips on how to approach cloud security.
Posted: 11 May 2016 | Published: 01 Apr 2016

Intronis

Comprehensive Security for Cloud-based Email
sponsored by Symantec Corporation
WHITE PAPER: Understand today's biggest cloud threats – including overlooked security issues lurking in commonly used cloud-based productivity apps – and accurately assess how much protection your cloud needs.
Posted: 10 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Automate email encryption to best protect corporate data
sponsored by ZixCorp
WHITE PAPER: This white paper provides an overview of why it's important to encrypt every corporate email you send and receive. Access now to learn how you can automatically encrypt emails eliminating the risk of interception and allowing your business peace of mind.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

Navigating Email Security
sponsored by ZixCorp
WHITE PAPER: Learn how to protect against email data breaches with an overview of the three key groups with which to classify your emails.
Posted: 05 May 2016 | Published: 01 Apr 2016

ZixCorp

Email Threats: Key features of an email gateway security solution
sponsored by LogicNow
WHITE PAPER: What are the key features of an email gateway security solution? Find out inside, plus – get an overview of the changing face of email threats.
Posted: 02 May 2016 | Published: 01 Apr 2016

LogicNow

The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Proofpoint, Inc.

Risk or Reward? UC, IM, and Social Media in the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: For pharmaceutical companies, the reward from social channels is high, but they must mitigate the risk in order to make it worth using. Learn how to capture and archive all content from social channels to stay in line with corporate governance and regulatory requirements.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

Research on Impostor Emails: Types, Targets, Threats, and More
sponsored by Proofpoint, Inc.
WHITE PAPER: This infographic reveals the facts about imposter emails based on recent research. Access now to learn what to look for in a phishing scheme and how to mitigate the threat.
Posted: 21 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Email Archiving vs. Destructive Retention Policies
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, learn how to overcome challenges related to email storage and security. Discover the limitations of destructive retention policies, and how archiving is surpassing it as a method to secure your information, provide compliance, and improve discovery and productivity.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Protecting Business Critical Services – Email
sponsored by LogicNow
WHITE PAPER: This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

Hook, Line, and Sinker: How Credential Phishing is Changing
sponsored by Proofpoint, Inc.
WHITE PAPER: Find out the facts about phishing attacks and a 4-step strategy to stop them.
Posted: 04 Apr 2016 | Published: 30 Mar 2016

Proofpoint, Inc.

Email Phishing: The Impostor in the Machine
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox
Posted: 04 Apr 2016 | Published: 16 Mar 2016

Proofpoint, Inc.

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

The Human Risk Factor Infographic
sponsored by Proofpoint, Inc.
WHITE PAPER: This brief infographic lists the 9 things you need to know about human error exploits today and offers defensive insight to protect your organization and users.
Posted: 01 Apr 2016 | Published: 23 Mar 2016

Proofpoint, Inc.

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Defending Your Office 365 Data: A Complete Guide
sponsored by Datto, Inc.
WHITE PAPER: Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.
1 - 25 of 175 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  contains. A list of domain names for services that the sender expects will vouch for the legitimacy of the email. The second part of the protocol requires the recipient to compare the list of services VBR-Info provides with a list of services the recipient trusts. The recipient then queries each service that is common to both lists: the service uses information the domain owner has registered with the domain name service (DNS) to determine whether the sender's IP address is legitimate and whether the content type is approved. If VBR becomes widely adopted, it will provide the recipient with another … 
Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement