IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 
Definition continues below.
Email Security Reports
1 - 25 of 282 Matches Previous Page  |  Next Page
Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Hewlett Packard Enterprise

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

CISSP Exam Prep and Practice Guide
sponsored by TechTarget
EGUIDE: The CISSP exam is challenging and covers a vast array of complex and in-depth topics; many deem it as a remarkably difficult exam to pass. But don't worry – we are here to help. Our new expert resource,CISSP Prep: 4 Steps to Achieve Your Certification, has everything you need to earn and maintain your CISSP certification.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

TechTarget

Secure Email Against Targeted Phishing Attacks
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: To protect against targeted phishing attacks and other email-borne malware, you need the ability to identify infected traffic before your users click on it. Discover how you can extract malicious content from all emails before they hit your users' inboxes and neutralize attacks early without impacting user experience.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

The myth of email as proof of communication
sponsored by ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

ComputerWeekly.com

Case Study: How H-E-B Took the Reins of its Email Security
sponsored by Proofpoint, Inc.
CASE STUDY: In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it. Access now to gain helpful insights from HEB's email revitalization initiatives.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Proofpoint, Inc.

Exchange to Office 365 Migration: The Good, the Bad, and Essentials Tools to Ease the Transition
sponsored by Riverbed Technology, Inc.
EGUIDE: Discover how to set an effective strategy for Office 365 migration in this e-guide. By reading on, learn about the advantages of its advanced content management and collaboration, as well as iron out potential app migration headaches when moving from Exchange and non-Exchange platforms.
Posted: 28 Nov 2016 | Published: 22 Nov 2016

Riverbed Technology, Inc.

Why Email Security Matters: The Advantages of Hosted Protection
sponsored by Solarwinds MSP
EBOOK: Discover the key advantages of hosted email protection. Learn this method's detailed protection mechanisms, which include blacklisting, antispam engines that look for telltale signatures, and real-time message source evaluation.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Solarwinds MSP

Expert Guide to Email Encryption
sponsored by TechTarget
RESOURCE: In this expert guide, The Architecture of Email Encryption, learn the importance of email encryption in the enterprise and the various services and products you can leverage to achieve a confidential email system. Plus, learn how this fits nicely into your overall enterprise-wide cybersecurity plan.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

TechTarget

Ransomware - Anatomy of an attack
sponsored by Cisco Umbrella and Dimension Data
VIDEO: Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.
Posted: 04 Oct 2016 | Premiered: 08 Sep 2016

Cisco Umbrella and Dimension Data

Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015

Proofpoint, Inc.

Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.

Is Additional Security Needed for Office 365?
sponsored by Proofpoint, Inc.
WHITE PAPER: Safeguard against advanced threats and targeted attacks to your Office 365 users. Gain visibility and threat insights to identify attacks quickly and contain them as early as possible.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Banish Bad Bots By Asking These 13 Questions
sponsored by Distil Networks
WHITE PAPER: With bots being such a hot topic in web security, vendors are claiming they have the ability to effectively identify and mitigate bots. Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

Best Practices for Dealing With Phishing and Ransomware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.
Posted: 14 Dec 2016 | Published: 30 Sep 2016

KnowBe4

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

How to Transform Employee Worst Practices Into Enterprise Best Practices
sponsored by KnowBe4
WHITE PAPER: Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

The Phishing Breakthrough Point
sponsored by KnowBe4
WHITE PAPER: Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Squash Large Business Email Security Challenges
sponsored by Intermedia
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia

Ransomware Response Guide
sponsored by IBM
WHITE PAPER: The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.
Posted: 26 Jul 2016 | Published: 01 May 2016

IBM

Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE: One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016

Check Point Software Technologies Ltd.

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation
1 - 25 of 282 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  contains. A list of domain names for services that the sender expects will vouch for the legitimacy of the email. The second part of the protocol requires the recipient to compare the list of services VBR-Info provides with a list of services the recipient trusts. The recipient then queries each service that is common to both lists: the service uses information the domain owner has registered with the domain name service (DNS) to determine whether the sender's IP address is legitimate and whether the content type is approved. If VBR becomes widely adopted, it will provide the recipient with another … 
Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement