IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 
Definition continues below.
Email Security White Papers (View All Report Types)
1 - 25 of 159 Matches Previous Page  |  Next Page
Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

CEO Fraud Prevention Manual
sponsored by KnowBe4
WHITE PAPER: This CEO Fraud Prevention Manual provides an overview of how to deal with this exponentially growing wave of cybercrime in email security. Inside this two-part guide you'll uncover how companies are compromised, the methods of attack and how to prevent an attack. You'll also have access to a checklist to CEO fraud prevention and response.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

KnowBe4

Phishing is Big Business. Don't Get Hooked.
sponsored by Sophos, Inc.
WHITE PAPER: 91% of cyberattacks and their resulting data breaches now begin with a spear phishing email. Dive into the evolution of phishing, how it works, and what it looks like. Discover the importance of combining advanced security technologies with educated, phishing-aware employees.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Sophos, Inc.

Confronting Today's Advanced Email Threats
sponsored by Vircom
WHITE PAPER: Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Vircom

The Current State of Email Security
sponsored by Microsoft
WHITE PAPER: 83% of IT security managers cited email as a primary source of attack. Access this white paper to learn about the current state of email security, where you stand in relation to your peers, and how you can prepare for future attacks.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Microsoft

4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn from expert Doug Cahill, ESG Senior Analyst, as he investigates a prescriptive approach to mitigate the risk associated with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

TrendMicro

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

TrendMicro

Internet and Security Threat Report 2017
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Symantec & Blue Coat Systems

Enterprise Phishing Susceptibility and Resiliency Report
sponsored by PhishMe
WHITE PAPER: Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

PhishMe

Planning for Office 365 Gaps
sponsored by Mimecast
WHITE PAPER: In this white paper, learn how to use third party offerings, and put a plan into action to keep your system safe from the 3 risks that Office 365 poses.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Mimecast

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Bump Your Email Up To Business Class: How do you know it's time for business-grade email?
sponsored by Microsoft
WHITE PAPER: As a growing volume of emails appear in workers' inboxes each day, employees need the best tools to streamline collaboration and maximize productivity. Discover an enterprise class technology that can help organizations work smarter with secured access from virtually anywhere.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

Email Security Threats: Not Just from the Outside
sponsored by Mimecast
WHITE PAPER: Analysts have recently evaluated the state of enterprise security readiness for email threats. Learn how to look beyond basic defensive capabilities to avoid missing out on advancing security technologies.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

The Mimecast Email Security Risk Assessment 2017
sponsored by Mimecast
WHITE PAPER: By testing cloud security services against email security systems, Mimecast gathered data from 25,000 customers to understand the severity of threats and the effectiveness of commonly deployed email security systems. Learn more about what kind of threats are getting through incumbent email security systems both in large number and type.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Mimecast

Resetting Your Email Security Strategy
sponsored by Mimecast
WHITE PAPER: Don't join the growing list of companies suffering multi-million dollar financial losses. Learn how the right mix of leadership and technology can help prevent attacks when you focus on ongoing education and training, use technology to detect potential phishing, and 4 more.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast

How the Risks of Ransomware are Increasing in Impact to Organizations
sponsored by Mimecast
WHITE PAPER: In this white paper, you'll learn how effective email security services can identify ransomware, prevent it from spreading, and restore data if the threat advances. Discover details on these three items.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Mimecast

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

How to Transform Employee Worst Practices Into Enterprise Best Practices
sponsored by KnowBe4
WHITE PAPER: Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4
1 - 25 of 159 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  contains. A list of domain names for services that the sender expects will vouch for the legitimacy of the email. The second part of the protocol requires the recipient to compare the list of services VBR-Info provides with a list of services the recipient trusts. The recipient then queries each service that is common to both lists: the service uses information the domain owner has registered with the domain name service (DNS) to determine whether the sender's IP address is legitimate and whether the content type is approved. If VBR becomes widely adopted, it will provide the recipient with another … 
Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement