IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients. The use of a fee for e-mail has sometimes been called e-mail postage, e-postage, sender pays or e-stamping.Both America Online (AOL) and Yahoo have announced certified  … 
Definition continues below.
Email SecurityWhite Papers (View All Report Types)
76 - 100 of 136 Matches Previous Page  | Next Page
Cloud Computing: Best Practices for Migrating to Microsoft Business Productivity Online Suite
sponsored by Dell Software
WHITE PAPER: In this new white paper by Quest Software, learn the best practices for migrating to Microsoft Exchange Online and SharePoint Online from any legacy platform. See why organizations like yours are moving to BPOS. Read this white paper today.
Posted: 30 Mar 2010 | Published: 30 Mar 2010

Dell Software

State of Internet Security, Q3 - Q4 2009
sponsored by Websense, Inc.
WHITE PAPER: Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeekerâ„¢ Network during the six-month period ending December 2009.
Posted: 16 Mar 2010 | Published: 16 Feb 2010

Websense, Inc.

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Insight

10 Cool Things Your Firewall Should Do
sponsored by SonicWALL
WHITE PAPER: This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.
Posted: 18 Jan 2010 | Published: 18 Nov 2008

SonicWALL

Key Considerations for Migrating to Exchange 2010
sponsored by EMC Corporation
WHITE PAPER: This white paper addresses the key issues that decision makers should consider as they plan their Exchange 2010 migration. It discusses the results of an in-depth primary research survey conducted by Osterman Research that explores how decision makers are planning their migration to Exchange 2010.
Posted: 21 Dec 2009 | Published: 01 Oct 2009

EMC Corporation

Network Testing Labs Review: Make Internet Risks and Perils Disappear
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn how your organization can install a filtering device that blocks malware from your network. McAfee's Email and Web Security appliance is recognized as an effective tool for identifying "bad" URLs.
Posted: 23 Nov 2009 | Published: 30 Jun 2009

McAfee, Inc.

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: Read this paper and learn how a successful data leak prevention system can protect your business from internal threats in this age of regulatory compliance, risk, and governance.
Posted: 07 Oct 2009 | Published: 15 Dec 2008

Mimecast

Email and Web Security SaaS
sponsored by Webroot
WHITE PAPER: Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption.
Posted: 01 Oct 2009 | Published: 14 Apr 2009

Webroot

Why You Should Consider Hosted Messaging Security
sponsored by Trend Micro GmbH
WHITE PAPER: In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more.
Posted: 25 Sep 2009 | Published: 19 Feb 2009

Trend Micro GmbH

Spam, Spammers, and Spam Control
sponsored by Trend Micro GmbH
WHITE PAPER: This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Posted: 25 Sep 2009 | Published: 06 Mar 2009

Trend Micro GmbH

Gone in 30 Days: Exchange, Retention, and Regulatory Compliance
sponsored by Sherpa Software
WHITE PAPER: In this white paper, we will discuss how to discover, manage, and archive information within your Exchange enterprise to successfully limit your legal exposure and protect your corporate information.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

Sherpa Software

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Authentication in the Enterprise: Current and Changing Requirements
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
Posted: 25 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

Emerging Threats: The Changing Face of Email
sponsored by Kaspersky Lab
WHITE PAPER: More than three years after the infamous declaration from Microsoft's Bill Gates that "spam will be solved" in 2009, unsolicited junk mail continues to bombard email servers, dumping malicious attachments, phishing lures and spam advertising for fake pharmaceuticals.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky Lab

The Executive Guide to Data Loss Prevention
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs.
Posted: 18 Aug 2009 | Published: 18 Aug 2009

Websense, Inc.

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009
sponsored by Proofpoint, Inc.
WHITE PAPER: The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection.
Posted: 12 Aug 2009 | Published: 11 Aug 2009

Proofpoint, Inc.

Security Threat Report: July 2009 Update
sponsored by Sophos, Inc.
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 06 Aug 2009 | Published: 06 Jul 2009

Sophos, Inc.

Email As Part Of A Business Continuity Strategy: Why Always-On-Business Requires Always-On-Email
sponsored by Mimecast
WHITE PAPER: The modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event. Maintaining access to email while upholding risk mitigation and compliance is a challenging endeavor.
Posted: 06 Aug 2009 | Published: 05 Aug 2009

Mimecast

The Critical Need for Encrypted Email and Secure File Transfer Solutions
sponsored by Proofpoint, Inc.
WHITE PAPER: This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Posted: 04 Aug 2009 | Published: 01 Jul 2009

Proofpoint, Inc.

Security Threat Report: July 2009 Update
sponsored by Sophos, Inc.
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Sophos, Inc.

Email Continuity: You don't know what you've got till it's gone
sponsored by Symantec Hosted Services
WHITE PAPER: Because email is ubiquitous, necessary and convenient, it cannot be allowed to fail. This whitepaper looks at the value of email and outlines the issues and concerns of IT managers involved in managing and maintaining business-critical email systems.
Posted: 24 Jul 2009 | Published: 01 Jul 2008

Symantec Hosted Services

Free yourself to do more, while securing your business simply and cost-effectively
sponsored by Sophos, Inc.
WHITE PAPER: It's vital for businesses to secure their systems and data against a growing field of threats. However, implementing and maintaining full-spectrum protection can be a heavy drain on financial and human resources if not done right. Read this whitepaper to learn how a more efficient approach to security can free up much needed resources.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

Sophos, Inc.

Getting Started With E-mail Archiving for Exchange
sponsored by Sherpa Software
WHITE PAPER: This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 19 May 2009 | Published: 01 May 2008

Sherpa Software

Best Practices in Using Reputation-based Anti-Spam Services for Email Security
sponsored by IronPort Systems
WHITE PAPER: This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services.
Posted: 17 Mar 2009 | Published: 09 Feb 2009

IronPort Systems

Outbound Email and Data Loss Prevention in Today's Enterprise
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper overviews a survey completed by Proofpoint and Forrester Consulting that analyzes the legal, financial, and regulatory risks associated with outbound email in large enterprises.
Posted: 05 Feb 2009 | Published: 01 May 2008

Proofpoint, Inc.
76 - 100 of 136 Matches Previous Page    2 3 4 5 6    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  e-mail plans based on a technology developed by Goodmail Systems. For a fee of approximately 1/4 of a cent (USD $0.0025) per e-mail, or USD $2.00 to $3.00 for every 1000 messages sent, advertisers can post e-mail messages that defeat most spam filters commonly used at the server level by Internet service providers (ISPs). Proponents believe that certified e-mail will, if effectively used on a large scale, make spam unprofitable and thereby improve the operation of the Internet by reducing useless electronic traffic.Critics of certified e-mail insist that such a system is not likely to be effective … 
Email Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement