IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 
Definition continues below.
Email Security Reports
1 - 25 of 331 Matches Previous Page  |  Next Page
The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security. Discover what lessons its limitations will teach you, such as: siloed security is not sustainable, fragmented data loss prevention decreases your chance of success, archiving must be defensible and e-discovery ready, and more.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

The myth of email as proof of communication
sponsored by ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

ComputerWeekly.com

Case Study: How H-E-B Took the Reins of its Email Security
sponsored by Proofpoint, Inc.
CASE STUDY: In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it. Access now to gain helpful insights from HEB's email revitalization initiatives.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Proofpoint, Inc.

Exchange to Office 365 Migration: The Good, the Bad, and Essentials Tools to Ease the Transition
sponsored by Riverbed Technology, Inc.
EGUIDE: Discover how to set an effective strategy for Office 365 migration in this e-guide. By reading on, learn about the advantages of its advanced content management and collaboration, as well as iron out potential app migration headaches when moving from Exchange and non-Exchange platforms.
Posted: 28 Nov 2016 | Published: 22 Nov 2016

Riverbed Technology, Inc.

Four Countermeasures to Protect Against Ransomware
sponsored by Trend Micro
WHITE PAPER: Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.
Posted: 18 Nov 2016 | Published: 31 Aug 2016

Trend Micro

Exclusive Endpoint Security Guide
sponsored by TechTarget
RESOURCE: In our new guide, Endpoint Security Basics: Comparing Antimalware Tools, expert Ed Tittel explains why all organizations, no matter their size, need to protect endpoints with antimalware products. Learn thebasics on how exactly these tools work to protect end-user devices and the networks they connect to from malicious code.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

TechTarget

Preventing PDF Exploits with Endpoint Security
sponsored by TrendMicro
VIDEO: See how endpoint security can fail when it comes to detecting malicious documents, particularly PDFs. Uncover a side-by-side comparison of endpoint security vendors as they attempt to deal with malicious documents.
Posted: 07 Nov 2016 | Premiered: 07 Nov 2016

TrendMicro

Next Level Threats: Stopping Ransom & CEO Email fraud
sponsored by Trustwave
WEBCAST: Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.
Posted: 07 Nov 2016 | Premiered: Oct 19, 2016

Trustwave

Confidently Move Your Email to the Cloud
sponsored by Mimecast
WHITE PAPER: Companies that have migrated to cloud services must mitigate single-vendor exposure by strengthening security coverage, combating downtime and improving archiving. Learn more about how to augment Office 365's existing security features.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Mimecast

Email Security Best Practices to Help Avoid Downtime
sponsored by Rackspace
WHITE PAPER: This white paper aims to provide a deeper understanding of the factors that can impact your current email solution's security risks and unplanned downtime, as well how to help you better compare and evaluate your current email solution with that of a newer version.
Posted: 31 Oct 2016 | Published: 01 Sep 2016

Rackspace

Email Security in a Zero Trust World: Modern Email Security for the IT Security Professional
sponsored by Mimecast
WHITE PAPER: This white paper takes critical perspectives into consideration -- from CISOs to security administrators -- regarding email threats in cloud, digital, and legacy security environments. Learn what industry professionals have to say about a solid defense-in-depth strategy for email that protects mission-critical infrastructure and data.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

Personify your Security Team and Gain Access a Recent Email Security Report
sponsored by Mimecast
WHITE PAPER: This infographic reveals five IT security personas that are common within vulnerable organizations. Find out how to evolve your security team from Nervous to Vigilant, and gain access to the Mimecast Business Email Threat Report 2016.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

How the Cloud Has Changed Email Archiving Forever
sponsored by Mimecast
WHITE PAPER: To solve mailbox bloat, CIOs are turing to email archiving solutions—but on-premises archiving is now too difficult to manage. Discover how cloud is changing email archiving, and overcome the capacity shortcomings associated with traditional systems with self-service recoverability, and more.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Mimecast

Why Email Security Matters: The Advantages of Hosted Protection
sponsored by LogicNow
EBOOK: Discover the key advantages of hosted email protection. Learn this method's detailed protection mechanisms, which include blacklisting, antispam engines that look for telltale signatures, and real-time message source evaluation.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

LogicNow

Combat the Most Common Forms of Phishing Attacks
sponsored by Agari
WHITE PAPER: Learn the behaviors of, and remedies for, 6 of the top phishing attacks that are targeting enterprises in ever increasing numbers.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Agari

Complete Email Protection, Delivered in the Cloud
sponsored by Trustwave
WHITE PAPER: How do you eliminate email threats before they reach the network? Access now to learn how you can use the cloud to achieve advanced protection against modern email threats and in-depth data security and compliance management.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

The Importance of Proactive Risk Management in Email Security
sponsored by Agari
WHITE PAPER: Business email compromise (BEC) scams are becoming more sophisticated. Access this executive brief to keep ahead of the curve and learn how to mitigate the risks of the newest breed of BEC attacks while gaining deep insight into your email ecosystem.
Posted: 14 Oct 2016 | Published: 14 Oct 2016

Agari

Expert Guide to Email Encryption
sponsored by TechTarget
RESOURCE: In this expert guide, The Architecture of Email Encryption, learn the importance of email encryption in the enterprise and the various services and products you can leverage to achieve a confidential email system. Plus, learn how this fits nicely into your overall enterprise-wide cybersecurity plan.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

TechTarget

Ransomware - Anatomy of an attack
sponsored by Cisco
VIDEO: Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.
Posted: 04 Oct 2016 | Premiered: 08 Sep 2016

Cisco

Waste less time fighting ransomware attacks
sponsored by Cisco
RESOURCE: Have you ever wanted to learn more about the infrastructure being used by a ransomware attack? Discover how to map out the internet infrastructure that attackers use to launch current and future attacks.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

Cisco

Kona Client Reputation
sponsored by Akamai
WHITE PAPER: Discover the business benefits and operational benefits you can achieve by adding a new, advanced algorithm to your security infrastructure. Profile malicious users before they have a chance to infect your network.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Akamai

Securing Microsoft Office 365 - The Inside Track To Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: This report explores Office 365 adoption concerns around issues such as threat protection, intelligence and response. Find out what additional security measures your organization can take to securely deploy Office 365 and reap its full benefits.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

Proofpoint, Inc.

Security Framework: A Guide for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

Advanced Security Platform for Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: If your organization is looking to migrate to Microsoft Office 365, you might be wondering whether additional security is needed. Discover how to safeguard users against advanced threats and targeted attacks and gain the power to identify these attacks as they happen.
Posted: 12 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Squash Large Business Email Security Challenges
sponsored by Intermedia
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia
1 - 25 of 331 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  contains. A list of domain names for services that the sender expects will vouch for the legitimacy of the email. The second part of the protocol requires the recipient to compare the list of services VBR-Info provides with a list of services the recipient trusts. The recipient then queries each service that is common to both lists: the service uses information the domain owner has registered with the domain name service (DNS) to determine whether the sender's IP address is legitimate and whether the content type is approved. If VBR becomes widely adopted, it will provide the recipient with another … 
Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement