IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 
Definition continues below.
Email Security White Papers (View All Report Types)
1 - 25 of 180 Matches Previous Page  |  Next Page
Enterprise Network Protection Against Cyberattacks Primer: Business Email Compromise
sponsored by TrendMicro
WHITE PAPER: Business email compromise (BEC) schemes have been increasingly successful, as they have become more pervasive. Take a look at this white paper to discover recommendations against BEC.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

TrendMicro

Worldwide Email Security Vendor Assessment
sponsored by TrendMicro
WHITE PAPER: The email security market is a mature market that is experiencing an influx of new features to deal with the adapting threats. Take a look at this white paper to uncover an email security vendor assessment, so that your company can choose which vendor fits your specific needs.
Posted: 21 Sep 2017 | Published: 31 Dec 2016

TrendMicro

Spain: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Spain receive the most malware, phishing and spam attacks?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Sweden: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Sweden experience the most email attacks, including: malware, phishing, and spam?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

United Kingdom: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Take a closer look at this brief resource to reveal cyber threat statistics based on company size and industry in the UK.
Posted: 13 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

A Guide to Avoiding Financial Losses in Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: 77% of U.S. businesses have suffered between 1 and 5 separate incidents of data loss, leakage or exposure in the past 12 months, according to Kaspersky Lab. This white paper reveals the financial woes across the threat landscape.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Kaspersky Lab

Office 365 Risk Mitigation
sponsored by Mimecast
WHITE PAPER: Read this white paper to discover suggestions to enhance the security of your Office 365. With the suggestions provided, determine which security tactics will improve your security posture.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Mimecast

The Human Factor in Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

How Attackers Target Users Through Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This infographic reveals methods hackers employ to target users through productivity apps like Office 365. Learn about sophisticated social engineering techniques, document-sharing lures, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

Email Security Risk Assessment
sponsored by Mimecast
WHITE PAPER: Mimecast tested 45 million emails to determine that nearly 11 million emails, or 24.2%, were "bad" or "likely bad." Discover how an email security risk assessment can improve email protection across its users.
Posted: 15 Aug 2017 | Published: 31 Jul 2017

Mimecast

The Compliance Benefits of a Modern Email Archiving Strategy
sponsored by Mimecast
WHITE PAPER: Email is central to compliance with the expanding number of business regulations across all regions and industries. This expert white paper explores how updating your email archiving process can help you prepare for new legislation, such as the GDPR.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Mimecast

Are You Sure You Didn't Authorize Someone You Shouldn't Have?
sponsored by HID
WHITE PAPER: Explore lessons learned from the Google Docs phishing scam. Learn the role multi-factor authentication plays in protecting organizations from phishing attacks and other cyber threats.
Posted: 14 Aug 2017 | Published: 15 Jun 2017

HID

That Insecure Feeling About Office 365 Email Security and Resilience
sponsored by Mimecast
WHITE PAPER: This expert white paper explores how you can overcome Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Don't Overlook Email When Planning for GDPR Compliance
sponsored by Mimecast
WHITE PAPER: With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Stopping Malware and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: Non-malware attacks have quickly become extremely dangerous and prevalent. In 2016, 97% of organizations were targeted by non-malware attacks. Learn how to use endpoint security technologies to combat all forms of cyberattacks, not just malware.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black

14 Steps to Protect Your Organization from Ransomware
sponsored by Carbon Black
WHITE PAPER: Ransomware is on track to be a $1 billion crime in 2017, according to FBI data. That's a substantial increase from 2015, when ransomware was a "mere" $24 million crime. Uncover immediate steps you can take today to protect against ransomware like WannaCry and NotPetya.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Incident Response for Today's Top 3 Security Scenarios
sponsored by Exabeam
WHITE PAPER: This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

CEO Fraud Prevention Manual
sponsored by KnowBe4
WHITE PAPER: This CEO Fraud Prevention Manual provides an overview of how to deal with this exponentially growing wave of cybercrime in email security. Inside this two-part guide you'll uncover how companies are compromised, the methods of attack and how to prevent an attack. You'll also have access to a checklist to CEO fraud prevention and response.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

KnowBe4

Phishing is Big Business. Don't Get Hooked.
sponsored by Sophos, Inc.
WHITE PAPER: 91% of cyberattacks and their resulting data breaches now begin with a spear phishing email. Dive into the evolution of phishing, how it works, and what it looks like. Discover the importance of combining advanced security technologies with educated, phishing-aware employees.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Sophos, Inc.

Confronting Today's Advanced Email Threats
sponsored by Vircom
WHITE PAPER: Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Vircom

4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn from expert Doug Cahill, ESG Senior Analyst, as he investigates a prescriptive approach to mitigate the risk associated with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

TrendMicro
1 - 25 of 180 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  contains. A list of domain names for services that the sender expects will vouch for the legitimacy of the email. The second part of the protocol requires the recipient to compare the list of services VBR-Info provides with a list of services the recipient trusts. The recipient then queries each service that is common to both lists: the service uses information the domain owner has registered with the domain name service (DNS) to determine whether the sender's IP address is legitimate and whether the content type is approved. If VBR becomes widely adopted, it will provide the recipient with another … 
Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement