IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients. The use of a fee for e-mail has sometimes been called e-mail postage, e-postage, sender pays or e-stamping.Both America Online (AOL) and Yahoo have announced certified  … 
Definition continues below.
Email SecurityReports
1 - 25 of 297 Matches Previous Page  | Next Page
Learn everything you need to know about Business Tablets & their effect on the industry
sponsored by ComputerWeekly.com
RESOURCE: Access an exclusive copy of Computer Weekly Buyer's Guide to Business Tablets to get an inside look at the impact tablets are having on organisations. To get your complimentary edition to the guide please take our brief Email Security Survey to help us continue to deliver the most relevant and up to date information regarding the topic.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

Emerging Security Threats: Know Your Enemy in 2014
sponsored by BitGlass
WEBCAST: In this webinar, discover the process that cybercrime undergoes and how it directly affects the victim.
Posted: 11 Jul 2014 | Premiered: Jun 24, 2014


Presentation Transcript- Emerging Security Threats: Know Your Enemy in 2014
sponsored by BitGlass
TRANSCRIPT: In this webinar transcript, discover the process that cybercrime undergoes and how it directly affects the victim.
Posted: 11 Jul 2014 | Published: 24 Jun 2014


License to Kill Personal Storage Files
sponsored by C2C Systems
VIDEO: This exclusive video details the hidden threat personal storage files present and offers a free software trial that will help you locate, migrate and eliminate these files.
Posted: 11 Jul 2014 | Premiered: 12 May 2014

C2C Systems

Podcast - Emerging security threats: Know your enemy in 2014
sponsored by BitGlass
PODCAST: In this podcast, discover the process that cybercrime undergoes and how it directly effects the victim.
Posted: 10 Jul 2014 | Premiered: Jun 24, 2014


Return to sender: Improving email security with DMARC
sponsored by BitGlass
EGUIDE: This expert e-guide explains how domain-based messaging authentication, reporting and conformance (DMARC) can enhance your email security when the stakes are high for cyber attacks.
Posted: 09 Jul 2014 | Published: 09 Jul 2014


The 7 Perils of PST Files
sponsored by C2C Systems
WHITE PAPER: This whitepaper details seven perils of personal storage files.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

C2C Systems

Web Attack Survival Guide Infographic
sponsored by Imperva
WHITE PAPER: This brief infographic provides 7 essential steps for Web attack survival.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Imperva

Symantec Intelligence Report: Internet Security Threats - May 2014
sponsored by Symantec Corporation
WHITE PAPER: Read this Symantec Intelligence Report for an in-depth analysis of the trends in internet security that we have seen in the past year, including data on targeted attacks and data breaches; malware tactics; social media and mobile threats; and more.
Posted: 07 Jul 2014 | Published: 31 May 2014

Symantec Corporation

City of Manchester Solves Personal Storage File Problems
sponsored by C2C Systems
CASE STUDY: This exclusive case study details how the city of Manchester, New Hampshire went about solving their personal storage file problem.
Posted: 07 Jul 2014 | Published: 10 Jul 2013

C2C Systems

Network protection and UTM Buyers Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Top 10 Review: Voltage SecureMail Cloud Standard
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper highlights a secure email platform that scored 10/10 in reviews on recipient experience and administration tools
Posted: 17 Jun 2014 | Published: 31 Dec 2013

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Rethinking Email Security: Best Practices to Protect and Maintain Private Communications
sponsored by Voltage Security, Inc.
WEBCAST: This webcast offers 9 best practices for successful policy-based encryption to improve email security.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Voltage Security, Inc.

Cloud-based Email Q&A: Pros, Cons, and Tips for Success
sponsored by Mimecast
WEBCAST: In this webcast, uncover survey results on cloud-based email, including discussions on migration, benefits, and deployment.
Posted: 11 Jun 2014 | Premiered: Jun 11, 2014

Mimecast

Infographic: Dangerous File Sharing
sponsored by GlobalScape
WHITE PAPER: Uncover little known facts about how many employees are using consumer-grade file-sharing solutions to send business data, and what critical risk this puts organizations in.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

GlobalScape

Infographic: Is Your Company in the Cyber War Crosshairs?
sponsored by Threat Track Security
WHITE PAPER: This infographic outlines some key statistics about today's threat landscape – helping you find out if you're in the crosshairs of a cybercriminal.
Posted: 28 May 2014 | Published: 28 May 2014

Threat Track Security

Energy Companies and Financial Services Firms Remain Vulnerable to Data-Breaching Malware
sponsored by Threat Track Security
WHITE PAPER: This exclusive whitepaper takes a look at the current threat landscape and how many businesses remain vulnerable to data-breaching malware.
Posted: 27 May 2014 | Published: 29 May 2014

Threat Track Security

Case Study: Connecting Consultants and Customers Securely at Arthur D. Little
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Five Things To Do After You've Been Hacked
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Access this informative guide to find out 5 things to do after you've been hacked – keeping your system safe and secure.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

Internet Security Threat Report - 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
Posted: 07 May 2014 | Published: 07 May 2014

Symantec Corporation

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

Top 5 Reasons Why Focusing on Email is the Key to Successfully Enabling BYOD
sponsored by ZixCorp
WHITE PAPER: This expert resource details five reasons why you must include corporate email access to enable an effective BYOD policy.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

ZixCorp
1 - 25 of 297 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  e-mail plans based on a technology developed by Goodmail Systems. For a fee of approximately 1/4 of a cent (USD $0.0025) per e-mail, or USD $2.00 to $3.00 for every 1000 messages sent, advertisers can post e-mail messages that defeat most spam filters commonly used at the server level by Internet service providers (ISPs). Proponents believe that certified e-mail will, if effectively used on a large scale, make spam unprofitable and thereby improve the operation of the Internet by reducing useless electronic traffic.Critics of certified e-mail insist that such a system is not likely to be effective … 
Email Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement