IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Email Security Services

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Anti-Spam Services, Email Content Security Services, e-Mail Security Services, Spam Filtering Services, Anti-phishing Services, Email Filtering Services, e-Mail Content Security Services, Authentication and Email Security Services, Software Virus Filtering Services, Managed Email Security Services, Virus Filtering Services, e-Mail Filtering Services
DEFINITION: Self-destructing email is electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender. Although self-destructing email technologies has existed for years, none has been very effective. Several new programs are said to offer better performance as well as email security and privacy enhancements.There are two main types of self-destructing email.  … 
Definition continues below.
Email Security Services Reports
1 - 25 of 45 Matches Previous Page  |  Next Page
Mobilize Your Email with Enterprise-Grade Security and Data Protection
sponsored by Citrix
WHITE PAPER: This white paper explains how to mobilize your email with enterprise-grade security that can increase productivity, while giving IT the flexibility to meet the unique requirements of different use cases and data types.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Citrix

Case study: Ensuring Email Productivity and Security
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This case study describes how a consulting firm enhanced email productivity and security through outsourcing.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Best Practices for Securing Your Cloud Email Service
sponsored by McAfee, Inc.
EGUIDE: This exclusive e-guide compares on-premises and cloud-based email security tools.
Posted: 29 Jun 2015 | Published: 24 Jun 2015

McAfee, Inc.

6 Tips for Getting the Most out of Email Security as a Service
sponsored by Mimecast
EGUIDE: This expert e-guide offers six tips to get the most out of your email security solution and how to evaluate email security as a service providers. View now to learn more.
Posted: 10 Mar 2015 | Published: 07 Jan 2015

Mimecast

Tackle the CISSP exam
sponsored by TechTarget
RESOURCE: Fill out this short survey to get immediate access to this resource and one step closer CISSP certification. For InfoSec professionals, CISSP is globally recognized as a standard of achievement. That is precisely why we assembled an expert guide, CISSP Certification: A step-by-step strategic guide.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

TechTarget

Learn everything you need to know about Business Tablets & their effect on the industry
sponsored by ComputerWeekly.com
RESOURCE: Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

Study Results: Total Economic Impact of an SaaS Enterprise Based Email Management Solution
sponsored by Mimecast
WHITE PAPER: This Forrester research report examines and analyzes the total economic impact and ROI of a cloud-based unified email management platform. Learn more about the features and benefits of this SaaS-based email approach that focuses on 3 key features: email archiving, security and continuity.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Mimecast

Improving Enterprise Email Security: Systems and Tips
sponsored by SearchSecurity.com
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchSecurity.com

Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Maximizing Business Email Security in Gmail
sponsored by SearchSecurity.com
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

SearchSecurity.com

Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

Expert ways to maximize security in Exchange
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Advanced Malware Protection for your Email Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco Systems, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Improving Enterprise Email Security: Systems and Tips
sponsored by Agari
EGUIDE: This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Agari

Six Email Security Best Practices for Email SaaS
sponsored by Symantec Corporation
EGUIDE: Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Why You Should Consider Cloud-Based Email Archiving
sponsored by Perimeter eSecurity
WHITE PAPER: This whitepaper, authored by messaging industry analyst The Radicati Group, looks at the key reasons organizations should consider moving to a cloud-based archiving solution.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Perimeter eSecurity

Email Security in the Cloud: More Secure! Compliant! Less Expensive!
sponsored by McAfee, Inc.
ANALYST BRIEF: Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.
Posted: 08 Aug 2011 | Published: 01 Apr 2010

McAfee, Inc.

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market
sponsored by Webroot
WHITE PAPER: This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs.
Posted: 25 Jul 2011 | Published: 01 Dec 2010

Webroot

Leveraging security from the Cloud
sponsored by IBM
WHITE PAPER: Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM
1 - 25 of 45 Matches Previous Page    1 2    Next Page
 
EMAIL SECURITY SERVICES DEFINITION (continued): …  The first type, also known as retractable email, allows the sender to cancel or void a transmitted message as long as it has not yet been read by the intended recipient. The second type of self-destructing email theoretically disappears from the Internet altogether after a certain length of time has passed. The key word here is "theoretically" because if the recipient sees an email message preservation is always possible -- even if it means taking a photograph of the display screen on which the message appears or having multiple witnesses view the display in real time.The most common … 
Email Security Services definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement