IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 
Definition continues below.
Email Security Reports
1 - 25 of 326 Matches Previous Page  |  Next Page
Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

Raising Your Google Ranking: A Guide
sponsored by Symantec Corporation
WHITE PAPER: To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

Symantec Corporation

Raise your Google Ranking
sponsored by Symantec Corporation
RESOURCE: To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

Symantec Corporation

Best Practices for Keeping Enterprise Email Secure
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
EGUIDE: Access this expert eGuide to learn the best practices for evaluating cloud-based email security providers, and discover whether email security SaaS initiatives are really worth your interest.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

IBM X-Force Threat Intelligence Quarterly, 2Q 2015
sponsored by IBM
WHITE PAPER: This quarterly cyber security report describes just how prevalent insider threats are and gives you guidelines on how to best protect yourself from them.
Posted: 09 Jul 2015 | Published: 30 Jun 2015

IBM

The Holistic Approach To Preventing Targeted Attacks
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper analyzes exactly what happened during the Target hack so you can know how to avoid Target's fate.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Case study: Ensuring Email Productivity and Security
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This case study describes how a consulting firm enhanced email productivity and security through outsourcing.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Website Security Threat Report Part 3
sponsored by Symantec Corporation
WHITE PAPER: Download part 3 of this Website Security Threat Report to discover how the public made criminal's lives easier in falling for the latest social media attacks and online scams. Plus, take an invaluable look ahead and benefit from our security recommendations and best practices.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Website Security Threat Report Part 2
sponsored by Symantec Corporation
WHITE PAPER: Download part 2 of this Website Security Threat Report for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Countdown to Compromise: The Timeline of a Spear-Phishing Attack
sponsored by Mimecast
WHITE PAPER: This white paper uses a typical spear-phishing scenario to demonstrate the dangers spear-phishing poses.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Mimecast

The Economic Benefits of Unified Email Management
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the cost-effectiveness of a software-as-a-service email management and security solution.
Posted: 06 Jul 2015 | Published: 30 Apr 2013

Mimecast

Streamlining and Securing Email Infrastructure
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper details how United Airlines was able to secure and streamline its email messaging infrastructure, giving their staff secure access to email at home and on the road.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Website Security for Dummies
sponsored by Symantec Corporation
RESOURCE: This resource provides an easy to follow guide that breaks down all the information you need to know in order to effectively protect your website.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Symantec Corporation

Insider Threat Patterns and Ways of Prevention
sponsored by Varonis
EGUIDE: This expert guide addresses the danger of accidental insider threats, giving you insight into how to prevent these threats from happening and how you can analyze network activity to stop unusual actions.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Varonis

The Changing Face of Security Management
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn how you can implement a threat based, network cognizant security system that is prepared for the constantly changing landscape of security.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Global Knowledge

What to Look for in Email Security Gateways
sponsored by SearchSecurity.com
EBOOK: Email security gateways protect the networks of organizations of all sizes from email-borne threats. But there are a wide variety of these security tools available. How do you know which is best suited for your network?
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  Email Security
SearchSecurity.com

4 Critical Risks Facing Microsoft Office 365 Implementation
sponsored by Mimecast
WHITE PAPER: This white paper presents the 4 critical risks facing Microsoft Office 365 implementation and how to mitigate each one.
Posted: 01 Jul 2015 | Published: 24 Jun 2015

Mimecast

Office 365 Email Migration Surprises – Rhetoric vs. Reality
sponsored by Mimecast
WEBCAST: During this 30 minute webinar, Microsoft Office365 MVP J. Peter Bruzzese, will reveal the post migration surprises he's heard most frequently from companies that have already made the move. He'll provide his realistic assessment of what to expect and what to plan for when moving to the cloud.
Posted: 30 Jun 2015 | Premiered: Jun 3, 2015

Mimecast

Analyzing Consumer IT Security Bad Habits that are Coming into the Office
sponsored by WinMagic
WHITE PAPER: This analytical white paper delves into the false sense of security employees live within as well as the facts and truths about the lack of data security measures in place to mitigate risks. View now to learn how to eliminate user bad habits.
Posted: 29 Jun 2015 | Published: 24 Feb 2014

WinMagic

Best Practices for Securing Your Cloud Email Service
sponsored by McAfee, Inc.
EGUIDE: This exclusive e-guide compares on-premises and cloud-based email security tools.
Posted: 29 Jun 2015 | Published: 24 Jun 2015

McAfee, Inc.

Strengthening Security From the Inside Out
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015

Mimecast

Why Scan to E-Mail Has Made Your Printers a Threat
sponsored by Nuance
VIDEO: This brief video explains why scanning and accidentally e-mailing documents to the wrong place can make your printer one of your company's greatest liabilities.
Posted: 24 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Shore Up Your Office 365 Attack Surface
sponsored by SearchSecurity.com
EBOOK: This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015

SearchSecurity.com

Microsoft Collaboration and Productivity Apps: A Dedicated Private Cloud for Your Microsoft Application
sponsored by Rackspace
WHITE PAPER: Read this white paper to find out why a dedicated private cloud is the best environment to run your Microsoft collaboration and productivity apps.
Posted: 08 Jun 2015 | Published: 18 May 2015

Rackspace
1 - 25 of 326 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  contains. A list of domain names for services that the sender expects will vouch for the legitimacy of the email. The second part of the protocol requires the recipient to compare the list of services VBR-Info provides with a list of services the recipient trusts. The recipient then queries each service that is common to both lists: the service uses information the domain owner has registered with the domain name service (DNS) to determine whether the sender's IP address is legitimate and whether the content type is approved. If VBR becomes widely adopted, it will provide the recipient with another … 
Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement