IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients. The use of a fee for e-mail has sometimes been called e-mail postage, e-postage, sender pays or e-stamping.Both America Online (AOL) and Yahoo have announced certified  … 
Definition continues below.
Email SecurityReports
201 - 225 of 287 Matches Previous Page  | Next Page
Anti-spam tricks for the midmarket toolbox
sponsored by McAfee, Inc.
PODCAST: Listen in as Stephen Cobb, adjunct professor of Information Assurance at Norwich University, Vermont, and president of Cobb Associates, discusses the spam challenges that are facing CIOs in the midmarket.
Posted: 01 Oct 2008 | Premiered: Oct 1, 2008

McAfee, Inc.

Top Five Strategies for Getting an Email Archiving Project off the Ground
sponsored by Symantec Corporation
DATA SHEET: Proactive archiving reduces business risks, lower costs and increases efficiency. This quide has five strategies recommended by Symantec for building the case for an archive and rationalizing your requirements of an email archiving system.
Posted: 26 Jun 2009 | Published: 15 Jan 2008

Symantec Corporation

Free yourself to do more, while securing your business simply and cost-effectively
sponsored by Sophos, Inc.
WHITE PAPER: It's vital for businesses to secure their systems and data against a growing field of threats. However, implementing and maintaining full-spectrum protection can be a heavy drain on financial and human resources if not done right. Read this whitepaper to learn how a more efficient approach to security can free up much needed resources.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

Sophos, Inc.

Hitchcock Schools Protects SQL Servers and Data with Replay AppImage
sponsored by AppAssure Software, Inc.
CASE STUDY: The IT group at Hitchcock is responsible for all the end-user devices, network equipment, and servers that support students, teachers, administrators, and education programs. Central to their mission is protecting data that resides on SQL servers. That would be a much bigger worry if it weren't for Replay AppImage.
Posted: 09 Jun 2009 | Published: 01 Jun 2009

AppAssure Software, Inc.

Lloyd Gosselink Rochelle & Townsend Ensure Reliable, Constant, E-mail Services with Replay AppImage
sponsored by AppAssure Software, Inc.
CASE STUDY: The network administrators at Lloyd Gosselink Rochelle & Townsend, PC have taken many steps to ensure reliable, constant, e-mail services. Like any law firm, e-mail is a central application and protecting the e-mail system is a central function of information services. One of the most important steps was implementing Replay AppImage.
Posted: 09 Jun 2009 | Published: 01 Jun 2009

AppAssure Software, Inc.

Getting Started With E-mail Archiving for Exchange
sponsored by Sherpa Software
WHITE PAPER: This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 19 May 2009 | Published: 01 May 2008

Sherpa Software

McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite
sponsored by McAfee, Inc.
PRODUCT LITERATURE: Check out this brief paper to learn how McAfee helps keep small and medium-sized businesses protected with a smart, simple, secure solution designed for small and medium enterprise customers. McAfee Total Protection for Secure Business provides comprehensive endpoint, email, web, and data security--all in a single, integrated suite.
Posted: 23 Apr 2009 | Published: 02 Dec 2008

McAfee, Inc.

Great Things Happen on the Road to Disaster Recovery
sponsored by AppAssure Software, Inc.
CASE STUDY: In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup.
Posted: 14 Apr 2009 | Published: 10 Apr 2009

AppAssure Software, Inc.

AppAssure makes Network Administrator "Hero of the Day"
sponsored by AppAssure Software, Inc.
CASE STUDY: Before implementing AppAssure's MailRetriever, Imagine's Exchange environment suffered unrecoverable corruption. During the ensuing downtime, the network administrators searched for a better backup solution. Imagine Schools now relies on MailRetriever for Exchange to backup Exchange, SQL servers, and school Web sites.
Posted: 09 Apr 2009 | Published: 09 Apr 2009

AppAssure Software, Inc.

Best Practices in Using Reputation-based Anti-Spam Services for Email Security
sponsored by IronPort Systems
WHITE PAPER: This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services.
Posted: 17 Mar 2009 | Published: 09 Feb 2009

IronPort Systems

Outbound Email and Data Loss Prevention in Today's Enterprise
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper overviews a survey completed by Proofpoint and Forrester Consulting that analyzes the legal, financial, and regulatory risks associated with outbound email in large enterprises.
Posted: 05 Feb 2009 | Published: 01 May 2008

Proofpoint, Inc.

Improving Regulatory Compliance with Encryption
sponsored by Utimaco Safeware
WHITE PAPER: This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions.
Posted: 02 Feb 2009 | Published: 01 Feb 2007

Utimaco Safeware

Preparing For Email and File Archiving Best Practices
sponsored by Proofpoint, Inc.
VIDEO: Learn how to get started on building a business case for deployment, preparing your organizations' employees and understanding the new federal rules of civil procedure.
Posted: 16 Jan 2009 | Premiered: 15 Jan 2009

Proofpoint, Inc.

Maximize ROI with Email Security in the Cloud
sponsored by Proofpoint, Inc.
WEBCAST: Watch this webinar replay and hear SaaS expert Paul LaPorte discuss how in-the-cloud and new hybrid email security solutions can deliver more value than on-premises solutions.
Posted: 09 Jan 2009 | Premiered: Jan 9, 2009

Proofpoint, Inc.

Antimalware E-Guide
sponsored by Sunbelt Software
EGUIDE: This E-Guide from SearchEnterpriseDesktop.com and Sunbelt Software defines the malware problem, discusses the enhancements and gaps in Windows Vista and offers some suggestions of how to remove malware from windows systems.
Posted: 25 Nov 2008 | Published: 01 Jun 2007

Sunbelt Software

Should You Install Messaging Security Software on Your Exchange Server?
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the pros and cons of installing third-party software on the Exchange Server, and information on Sunbelt Software's Ninja Email Security.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

eBook: Software as a Service: What You Should Consider When Moving to SaaS
sponsored by SearchSecurity.com
EBOOK: Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

SearchSecurity.com

IDC Vendor Spotlight - Using a Hosted Service for Holistic Email Management
sponsored by Mimecast
WHITE PAPER: Effective email management solutions provide a holistic approach that encompasses the related issues of archiving, business continuity, and security.
Posted: 11 Nov 2008 | Published: 11 Nov 2008

Mimecast

Total E-mail Security
sponsored by Sunbelt Software
WHITE PAPER: Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.
Posted: 11 Nov 2008 | Published: 11 Nov 2008

Sunbelt Software

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Learn why email Data Leak Prevention is critical to safeguard the information that is inside your network.
Posted: 10 Oct 2008 | Published: 05 Aug 2009

Mimecast

Battling Modern Botnets in the Enterprise
sponsored by FireEye
WHITE PAPER: The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business.
Posted: 29 Sep 2008 | Published: 01 Sep 2008

FireEye

All-in-one Email Security Reduces Spam and IT Administration Time
sponsored by Sunbelt Software
CASE STUDY: After using an earlier version of Sunbelt’s enterprise anti-spam solution, Roberts Wesleyan College reviewed a number of software solutions and found Ninja to be the best product at the best price.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Sunbelt Software

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.

Protecting Essential Information: Securing the Foundation of the Internet Business Platform
sponsored by Websense, Inc.
WHITE PAPER: Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more.
Posted: 31 Jul 2008 | Published: 01 Jul 2008

Websense, Inc.

Messaging Security Goes Virtual: Improve Email Security and Lower Costs with Virtual Appliances
sponsored by Proofpoint, Inc.
WHITE PAPER: Virtualization provides the ability to increase server and storage capacity without reinvesting in new hardware. That can translate into huge cost savings - not only in hardware costs, but in power, cooling, and management as well. Read on to learn how virtual appliances can deliver huge ROI.
Posted: 15 Jul 2008 | Published: 01 Jul 2008

Proofpoint, Inc.
201 - 225 of 287 Matches Previous Page    7 8 9 10 11 12    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  e-mail plans based on a technology developed by Goodmail Systems. For a fee of approximately 1/4 of a cent (USD $0.0025) per e-mail, or USD $2.00 to $3.00 for every 1000 messages sent, advertisers can post e-mail messages that defeat most spam filters commonly used at the server level by Internet service providers (ISPs). Proponents believe that certified e-mail will, if effectively used on a large scale, make spam unprofitable and thereby improve the operation of the Internet by reducing useless electronic traffic.Critics of certified e-mail insist that such a system is not likely to be effective … 
Email Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement