IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Email Security Services

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Anti-Spam Services, Email Content Security Services, e-Mail Security Services, Spam Filtering Services, Anti-phishing Services, Email Filtering Services, e-Mail Content Security Services, Authentication and Email Security Services, Software Virus Filtering Services, Managed Email Security Services, Virus Filtering Services, e-Mail Filtering Services
DEFINITION: Self-destructing email is electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender. Although self-destructing email technologies has existed for years, none has been very effective. Several new programs are said to offer better performance as well as email security and privacy enhancements.There are two main types of self-destructing email.  … 
Definition continues below.
Email Security Services Reports
1 - 25 of 66 Matches Previous Page  |  Next Page
Maximize Online Archiving Security
sponsored by LogicNow
WHITE PAPER: Discover how using email archival is vital to enterprises looking to secure their records and leave nothing to chance. Learn how a cloud-based service can remove many of the costs, concerns and complexities associated with on-premises email solutions, including the setup, management and monitoring of email servers.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

LogicNow

Online Archiving Now Easier Than Ever
sponsored by LogicNow
WHITE PAPER: Discover how using email archival is vital to enterprises. Learn how it not only covers your bases when catastrophe looms, but also provides robust security to your messages.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

LogicNow

The Need For Comprehensive Email Security Is Greater Than Ever
sponsored by LogicNow
WHITE PAPER: Discover how to keep your email secure, easily and affordably. Learn about how to deploy an adaptive spam defense, sophisticated threat detection, email continuity, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

LogicNow

10 Reasons to Archive Your Email in the Cloud
sponsored by LogicNow
WHITE PAPER: Discover 10 reasons why archiving your email in the cloud can give your enterprise an edge, including: hit the ground running with a low barrier to entry, more certainty when estimating costs versus in-house, lower management costs, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

LogicNow

Think Again if you believe your email archiving problems are solved with Office 365
sponsored by LogicNow
WHITE PAPER: Learn not only the shortcomings of Office 365's email archiving, but also how to give your enterprise significant benefits to compensate for these limitations, including how to maximize compliance with data protection laws, minimize legal risk, support governance and compliance objectives with easy message retrieval, and more.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Email Security Strategies for Mid-Sized Enterprises
sponsored by LogicNow
WHITE PAPER: Discover how to create an email strategy to combat not only traditional spam attacks, but also malware, spear/phishing, denial of service, directory harvest attacks, and more. Learn the potential damage these attacks can create and how to mitigate the risks.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Bullet-proofing Office 365 Email
sponsored by LogicNow
WHITE PAPER: Learn the importance of protecting your Office 365's cloud-based email system. Uncover how to utilize the CIA triad (confidentiality, integrity, availability), how to build a broader defense strategy, the benefits of "bullet-proofing" your email, and more.
Posted: 23 Aug 2016 | Published: 31 Dec 2015

LogicNow

Unlocking Ransomware, the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT: Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organizations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Palo Alto Networks

Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE: One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016

Check Point Software Technologies Ltd.

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast
WHITE PAPER: Understanding the 5 phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, six ways to stop these thieves, and more.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Mimecast

The Many Benefits of Email Security Gateways
sponsored by ZixCorp
EGUIDE: This e-guide examines the benefits of email security gateways. Beyond just preventing malicious email, gateways have a plethora of other benefits including DLP and BYOD security.
Posted: 07 Jun 2016 | Published: 31 May 2016

ZixCorp

Worse than Spam: How to Identify and Mitigate Exploitative Emails
sponsored by Mimecast
EGUIDE: Experts have laid out top email attacks that threat actors are committing today. Explore ways to identify each one, and how various companies have handled (or mishandled) these cyber-crimes. Once you've identified what to look for, you'll also learn how to establish email security best practices.
Posted: 03 Jun 2016 | Published: 15 May 2016

Mimecast

5 Security Questions to Ask Before Selecting Office 365
sponsored by Mimecast
WHITE PAPER: True IT professionals know that the same best practices for on-premises software deployments apply to the cloud, and they should be wary when considering Office 365. Explore five questions to ask before your Office 365 deployment.
Posted: 25 May 2016 | Published: 25 May 2016

Mimecast

Your Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.
Posted: 16 May 2016 | Published: 16 May 2016

Datto, Inc.

Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

A Guide to Email Security for Mid-sized Businesses
sponsored by LogicNow
WHITE PAPER: In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

LogicNow

Squash Large Business Email Security Challenges
sponsored by Mimecast
EGUIDE: This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis. Access now to learn how to overcome complexity in Exchange environments, incident response, and more.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Mimecast

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: This white paper explains how you can adopt an automated process for gaining threat intelligence from phishing emails. Learn how you can turn dangerous emails into weapons of your own.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Best Practices for Securing your Cloud Email Service
sponsored by Mimecast
EGUIDE: This eGuide explains how to weigh the two so your migration succeeds, and what criteria to look for in the security tools every email service needs.
Posted: 19 Nov 2015 | Published: 19 Nov 2015

Mimecast

Make Your Cloud Email Migration a Smooth Transition
sponsored by Mimecast
WEBCAST: Watch this two-part webinar to learn the benefits of migrating your email to the cloud, and the questions you should ask before doing so. Learn tips on how you can have a seamless cloud migration.
Posted: 26 Oct 2015 | Premiered: Feb 25, 2015

Mimecast

Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 16 Sep 2015 | Published: 28 Feb 2014

Mimecast

Post-Migration Risks of Office 365
sponsored by Mimecast
WHITE PAPER: This white paper presents the 3 common expectations organizations have when moving to Office 365 and demystifies the hype around each. View now to learn the steps to take to ensure data security in the cloud-based email service.
Posted: 15 Sep 2015 | Published: 29 Jul 2015

Mimecast

Email Security in a Zero Trust World
sponsored by Mimecast
WHITE PAPER: In this white paper, you will learn why your organization needs to embrace a more secure, "Zero Trust" model to improve email security.
Posted: 14 Sep 2015 | Published: 05 Aug 2015

Mimecast

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 66 Matches Previous Page    1 2 3    Next Page
 
EMAIL SECURITY SERVICES DEFINITION (continued): …  The first type, also known as retractable email, allows the sender to cancel or void a transmitted message as long as it has not yet been read by the intended recipient. The second type of self-destructing email theoretically disappears from the Internet altogether after a certain length of time has passed. The key word here is "theoretically" because if the recipient sees an email message preservation is always possible -- even if it means taking a photograph of the display screen on which the message appears or having multiple witnesses view the display in real time.The most common … 
Email Security Services definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement