IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients. The use of a fee for e-mail has sometimes been called e-mail postage, e-postage, sender pays or e-stamping.Both America Online (AOL) and Yahoo have announced certified  … 
Definition continues below.
Email Security Reports
1 - 25 of 315 Matches Previous Page  |  Next Page
Streamlining and Securing Email Infrastructure
sponsored by SilverSky
WHITE PAPER: This white paper details how United Airlines was able to secure and streamline its email messaging infrastructure, giving their staff secure access to email at home and on the road.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

SilverSky

Website Security for Dummies
sponsored by Symantec Corporation
RESOURCE: This resource provides an easy to follow guide that breaks down all the information you need to know in order to effectively protect your website.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Symantec Corporation

Insider Threat Patterns and Ways of Prevention
sponsored by Varonis
EGUIDE: This expert guide addresses the danger of accidental insider threats, giving you insight into how to prevent these threats from happening and how you can analyze network activity to stop unusual actions.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Varonis

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

What to Look for in Email Security Gateways
sponsored by SearchSecurity.com
EBOOK: Email security gateways protect the networks of organizations of all sizes from email-borne threats. But there are a wide variety of these security tools available. How do you know which is best suited for your network?
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  Email Security
SearchSecurity.com

4 Critical Risks Facing Microsoft Office 365 Implementation
sponsored by Mimecast
WHITE PAPER: This white paper presents the 4 critical risks facing Microsoft Office 365 implementation and how to mitigate each one.
Posted: 01 Jul 2015 | Published: 24 Jun 2015

Mimecast

Office 365 Email Migration Surprises – Rhetoric vs. Reality
sponsored by Mimecast
WEBCAST: During this 30 minute webinar, Microsoft Office365 MVP J. Peter Bruzzese, will reveal the post migration surprises he's heard most frequently from companies that have already made the move. He'll provide his realistic assessment of what to expect and what to plan for when moving to the cloud.
Posted: 30 Jun 2015 | Premiered: Jun 3, 2015

Mimecast

Analyzing Consumer IT Security Bad Habits that are Coming into the Office
sponsored by WinMagic
WHITE PAPER: This analytical white paper delves into the false sense of security employees live within as well as the facts and truths about the lack of data security measures in place to mitigate risks. View now to learn how to eliminate user bad habits.
Posted: 29 Jun 2015 | Published: 24 Feb 2014

WinMagic

Best Practices for Securing Your Cloud Email Service
sponsored by McAfee, Inc.
EGUIDE: This exclusive e-guide compares on-premises and cloud-based email security tools.
Posted: 29 Jun 2015 | Published: 24 Jun 2015

McAfee, Inc.

The Human Firewall – Strengthening Email Security
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015

Mimecast

Why Scan to E-Mail Has Made Your Printers a Threat
sponsored by Nuance
VIDEO: This brief video explains why scanning and accidentally e-mailing documents to the wrong place can make your printer one of your company's greatest liabilities.
Posted: 24 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Systems and Tips for Improving Enterprise Email Security
sponsored by Rackspace
EGUIDE: In order to protect on-premises email systems, your organization needs to bring network security strategies up to speed. This expert e-guide provides several practical tips to improve enterprise email security.
Posted: 23 Jun 2015 | Published: 18 Jun 2015

Rackspace

Protect Your Exchange Server with a Simple Update
sponsored by Rackspace
EGUIDE: This expert e-guide takes a look at why it's important to keep on top of Exchange security update installation. Access this exclusive resource now to learn how hackers get around the basic security measures present and how easy it is to become a data breach victim if you ignore security updates and patches.
Posted: 23 Jun 2015 | Published: 17 Jun 2015

Rackspace

Choosing the Best Email Security Tools for Your Business
sponsored by Rackspace
EGUIDE: This exclusive e-guide compares on-premises and cloud-based email security tools.
Posted: 23 Jun 2015 | Published: 16 Jun 2015

Rackspace

Simple Steps to Strengthen Exchange 2013 Security
sponsored by Rackspace
EGUIDE: In this expert e-guide, review the 5 critical areas to check in on to ensure a secure Exchange Server.
Posted: 23 Jun 2015 | Published: 17 Jun 2015

Rackspace

Hosted Exchange Security Questions You Should Be Asking
sponsored by Rackspace
EGUIDE: This expert e-guide presents the 6 questions you need to ask vendors about hosted Exchange environment security.
Posted: 22 Jun 2015 | Published: 17 Jun 2015

Rackspace

How Secure Are Your Exchange Setups?
sponsored by Rackspace
EGUIDE: In this exclusive e-guide, discover an 8 step Exchange phishing security test to ensure that you're not the next breach victim.
Posted: 22 Jun 2015 | Published: 04 Jun 2015

Rackspace

Daily Security Tasks All Exchange Admins Must Do
sponsored by Rackspace
EGUIDE: This expert e-guide outlines 6 daily security tips to keep your exchange environment protected.
Posted: 22 Jun 2015 | Published: 03 Jun 2015

Rackspace

Shore Up Your Office365 Attack Surface
sponsored by SearchSecurity.com
EBOOK: This exclusive e-guide reviews the Microsoft Office 365 suite including the security benefits and challenges you will encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015

SearchSecurity.com

Email Security Best Practices and Avoiding Unplanned Downtime
sponsored by Rackspace
WHITE PAPER: In this white paper, you will gain a deeper understanding of the factors that can impact your current email security vulnerabilities and unplanned downtime.
Posted: 16 Jun 2015 | Published: 27 May 2015

Rackspace

Awareness and Protection Help Prevent Phishing and Spoofing in Email Marketing
sponsored by Neustar®
WHITE PAPER: Access this resource to see how to block fraudulent emails to your customers. Continue reading learn how to see who is sending emails from your organization and how to block emails coming from unauthorized users.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Neustar®

5 Strategies For Email Data Loss Prevention
sponsored by SilverSky
WHITE PAPER: This white paper outlines 5 best practices for preventing sensitive information leakage while staying compliant with rapidly evolving regulations. Continue reading to learn how to bolster your email security strategy.
Posted: 01 Jun 2015 | Published: 27 May 2015

SilverSky

10 Essential Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper lays out 10 essential steps to email security to allow messages to move freely into, out of, and around the enterprise while stopping malicious threats such as viruses, phishing, and DDoS attacks.
Posted: 28 May 2015 | Published: 20 May 2015

Clearswift

Case Study: Community Bank Improves Both Security and Productivity
sponsored by Clearswift
CASE STUDY: Read this case study to discover how a community bank overhauled its e-mail security to ensure both data protection and employee productivity.
Posted: 28 May 2015 | Published: 06 May 2015

Clearswift

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast
1 - 25 of 315 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  e-mail plans based on a technology developed by Goodmail Systems. For a fee of approximately 1/4 of a cent (USD $0.0025) per e-mail, or USD $2.00 to $3.00 for every 1000 messages sent, advertisers can post e-mail messages that defeat most spam filters commonly used at the server level by Internet service providers (ISPs). Proponents believe that certified e-mail will, if effectively used on a large scale, make spam unprofitable and thereby improve the operation of the Internet by reducing useless electronic traffic.Critics of certified e-mail insist that such a system is not likely to be effective … 
Email Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement