Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Email Spam Filtering

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. Bacn includes: Posts from microblogging platforms like Twitter, Pownce or Jaiku. Friend updates from a social networking platform like Facebook or MySpace. Automatically-generated electronic billing statements from wireless companies or banks. Email newsletters to which the user has intentially  … 
Definition continues below.
Email Spam FilteringWhite Papers (View All Report Types)
 
Putting Anti-spam Solutions to the Test . . . Before You Buy
sponsored by MailFrontier
WHITE PAPER: This whitepaper will help you take the anxiety out of testing anti-spam solutions. By following our five-step plan, you can test anti-spam solutions quickly and easily. Most important, you will get results you can trust.
Posted: 10 Aug 2004 | Published: 01 Aug 2004

MailFrontier

Should You Install Messaging Security Software on Your Exchange Server?
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the pros and cons of installing third-party software on the Exchange Server, and information on Sunbelt Software's Ninja Email Security.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

10 Questions to Ask Before You Buy an Anti‐Spam Solution
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

Fast and Effective Endpoint Security for Business
sponsored by ESET
WHITE PAPER: This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Email Security Eguide
sponsored by Sunbelt Software
WHITE PAPER: Email security and spam only get more difficult to control as spammers get more sophisticated. Read this eGuide from SearchWindowsSecurity.com contributors to get a better understanding of just how big a threat spam is and what to do about it.
Posted: 01 Jun 2007 | Published: 01 Jun 2007

Sunbelt Software

A Guide to Keeping E-mail Legal: Four Pillars of Compliance
sponsored by SonicWALL
WHITE PAPER: This paper provides guidance on how to keep your company use of e-mail systems legal, without interrupting basic business processes. It also explains the compliance requirements that affect e-mail systems.
Posted: 29 Aug 2006 | Published: 01 Aug 2006

SonicWALL

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave
 
 
EMAIL SPAM FILTERING DEFINITION (continued): … Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. Bacn includes: Posts from microblogging platforms like Twitter, Pownce or Jaiku. Friend updates from a social networking platform like Facebook or MySpace. Automatically-generated electronic billing statements from wireless companies or banks. Email newsletters to which the user has intentially subscribed. Changes to a wiki where the user is a collaborator. The term was coined in August 2007 at Podcamp Pittsburgh, a social media "unconference" attended by bloggers and podcasters. The term "bacn" was chosen because of its similarity to spam. Both are popular pork products and both can fill up your inbox pretty quickly. The term "ham," by way of contrast, is sometimes used to refer to email that a user wants to both receive and read right away.
Email Spam Filtering definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement