IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients. The use of a fee for e-mail has sometimes been called e-mail postage, e-postage, sender pays or e-stamping.Both America Online (AOL) and Yahoo have announced certified  … 
Definition continues below.
Email SecurityReports
126 - 150 of 292 Matches Previous Page  | Next Page
eGuide: Email Security and Compliance Best Practices
sponsored by SearchSecurity.com
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 04 Jan 2011 | Published: 04 Jan 2011

SearchSecurity.com

Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email
sponsored by Coviant Software Corporation
WHITE PAPER: Read this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers.
Posted: 15 Dec 2010 | Published: 14 Dec 2010

Coviant Software Corporation

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Websense, Inc.

Email as Part of a Business Continuity Strategy: Why always-on-business requires always-on-email
sponsored by Mimecast
WHITE PAPER: The paper looks at the general approaches available to ensure email continuity from a high level and the implications of deploying each strategy on infrastructure, budget, people and resilience.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Mimecast

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Mimecast

Seven Criteria for Evaluating Security as-a-Service (SaaS) Solutions
sponsored by Websense, Inc.
WHITE PAPER: This white paper examines the security challenges organizations are facing today; addresses misconceptions about Security as-a-Service (SaaS); and provides criteria to help you evaluate SaaS solutions.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Websense, Inc.

Seven Keys to Making or Breaking Your Exchange Infrastructure
sponsored by Dell Software
WHITE PAPER: Exchange Server 2007 changed the way your communications infrastructure operated forever, delivering a potent and powerful e-mail engine. And with Exchange Server 2010, Microsoft’s upped the ante, delivering a more powerful feature set and functionality. But does all of this mean bigger management headaches?
Posted: 03 Nov 2010 | Published: 03 Nov 2010

Dell Software

What Are Your Obligations to Retain Email and Other Electronic Content?
sponsored by Proofpoint, Inc.
WHITE PAPER: This paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands.
Posted: 29 Oct 2010 | Published: 29 Oct 2010

Proofpoint, Inc.

Exchange Insider E-Zine - Volume 4: The Exchange Migration Path Is Paved With Caution
sponsored by Google
EZINE: Volume 4 of the Exchange Insider e-zine looks at how diminished budgets will affect IT pros’ migration plans in 2010—and where Exchange Server 2010 fits into their roadmaps. Also discover tools you need to troubleshoot mail flow issues and to tackle the perpetual question of how much security is needed for your Exchange environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

Worry-Free Business Security Advanced
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

eGuide: Email Security and Compliance Best Practices
sponsored by Google Postini
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

Google Postini

Should Your Email Live In The Cloud? A Comparative Cost Analysis
sponsored by Google
ANALYST REPORT: This analyst report presents a spreadsheet cost model to help you calculate your fully loaded on premise email costs and compare it against cloud-based alternatives.
Posted: 18 Oct 2010 | Published: 05 Jan 2009

Google

Data Loss Prevention: Email and Web Gateway Best Practices
sponsored by M86 Security
WHITE PAPER: This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them. Read this paper to learn more about single-channel DLP at the email and Web gateways.
Posted: 08 Oct 2010 | Published: 07 Oct 2010

M86 Security

E-Book: Driving Profitability through Information Security
sponsored by Astaro
EBOOK: While recognizing the need for security is a positive step, many of these organizations are missing an opportunity to improve their operations by using the same tools. In this document you will find some tactics you can add to your security playbook to help make your employees more productive and to help improve your organization’s efficiency.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Astaro

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

Outbound Email and Data Loss Prevention in Today’s Enterprise, 2010
sponsored by Proofpoint, Inc.
WHITE PAPER: This report summarizes the findings of Proofpoint’s seventh annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to help raise awareness of the policy, technology and cultural issues surrounding email and Web monitoring, data protection and information leaks.
Posted: 08 Sep 2010 | Published: 08 Sep 2010

Proofpoint, Inc.

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.
Posted: 31 Aug 2010 | Published: 31 Aug 2010

Insight

Why Content Filters Can't Eradicate Spam
sponsored by Mimecast
WHITE PAPER: The vanguard of current spam management systems has been the content filter. These spam filters use various techniques applied to the words and content of email in order to determine whether the email should be allowed to the recipient or not. Read this white paper to learn more.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Mimecast

Presentation Transcript: E-mail Archiving-- Replication and Disaster Recovery
sponsored by Hewlett-Packard Company - Information Management
PRESENTATION TRANSCRIPT: Why is the architecture of your e-mail archiving solution so important? Read this presentation transcript  featuring Gary Bergo, Master Architect for Hewlett-Packard’s Information Management Group.
Posted: 18 Aug 2010 | Published: 18 Aug 2010

Hewlett-Packard Company - Information Management

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
sponsored by Mimecast
WHITE PAPER: The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

Mimecast

IBM ISS Global Data Center content analysis technology for the Web and e-mail
sponsored by IBM
WHITE PAPER: The IBM content analysis process, part of the IBM ISS Global Data Center, is built on a platform that classifies millions of web pages and e-mails every day. Access this white paper for a detailed look at how this technology will effectively protect users from unwanted content.
Posted: 17 Aug 2010 | Published: 19 Nov 2008

IBM

Moving Email Management to the Cloud: Understanding IT Transitions
sponsored by Mimecast
WEBCAST: During this Mimecast webinar, you'll gain an understanding of what to look for in a cloud services provider, learn how to identify your own IT transitions points related to their specific email environment, uncover how to address any potential internal security questions when transitioning to a cloud-based service, and more!
Posted: 13 Aug 2010 | Premiered: Aug 13, 2010

Mimecast

E-Discovery, Case Management & Litigation Hold: Comprehensive Archive and Search Capability to Meet Legal and Regulatory Requirements
sponsored by Mimecast
DATA SHEET: Mimecast Unified Email Management™ is a cost effective Software-as-a-Service solution that offers integrated E-Discovery, Litigation Hold and Case Managment functionality, giving you the tools you need to rapidly execute data preservation policies and email discovery requests and guard against the risk of failing to produce required information.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Mimecast

The True Costs of E-mail Encryption
sponsored by Trend Micro
WHITE PAPER: Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more.
Posted: 11 Aug 2010 | Published: 11 Aug 2010

Trend Micro

E-Book: Moving to the Cloud
sponsored by Google
EBOOK: When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps.
Posted: 05 Aug 2010 | Published: 06 Jul 2010

Google
126 - 150 of 292 Matches Previous Page    4 5 6 7 8 9    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  e-mail plans based on a technology developed by Goodmail Systems. For a fee of approximately 1/4 of a cent (USD $0.0025) per e-mail, or USD $2.00 to $3.00 for every 1000 messages sent, advertisers can post e-mail messages that defeat most spam filters commonly used at the server level by Internet service providers (ISPs). Proponents believe that certified e-mail will, if effectively used on a large scale, make spam unprofitable and thereby improve the operation of the Internet by reducing useless electronic traffic.Critics of certified e-mail insist that such a system is not likely to be effective … 
Email Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement