IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 
Definition continues below.
Email Security Reports
26 - 50 of 334 Matches Previous Page  |  Next Page
Don't Overlook Email When Planning for GDPR Compliance
sponsored by Mimecast
WHITE PAPER: With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Stopping Malware and Non-Malware Attacks
sponsored by Carbon Black
WHITE PAPER: Non-malware attacks have quickly become extremely dangerous and prevalent. In 2016, 97% of organizations were targeted by non-malware attacks. Learn how to use endpoint security technologies to combat all forms of cyberattacks, not just malware.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black

14 Steps to Protect Your Organization from Ransomware
sponsored by Carbon Black
WHITE PAPER: Ransomware is on track to be a $1 billion crime in 2017, according to FBI data. That's a substantial increase from 2015, when ransomware was a "mere" $24 million crime. Uncover immediate steps you can take today to protect against ransomware like WannaCry and NotPetya.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black

How Ransomware is Evolving into the Perfect Crime
sponsored by Barkly
WEBCAST: Ransomware is on the rise. The 2017 WannaCry ransomware attack impacted 300,000 systems in 150 countries, while NotPetya affected 100,000 systems in 65 countries. Access this in-depth webcast to get a full understanding of new ransomware trends.
Posted: 03 Aug 2017 | Premiered: Aug 3, 2017

Barkly

Incident Response for Today's Top 3 Security Scenarios
sponsored by Exabeam
WHITE PAPER: This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

The Numbers Don't Lie: ShareFile Delivers
sponsored by Citrix
PRODUCT LITERATURE: The numbers are in and they say ShareFile offers small businesses exactly what they really want. Open for more. See for yourself. ShareFile simply does more to help small businesses work the way they want—on any device, any time.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

CEO Fraud Prevention Manual
sponsored by KnowBe4
WHITE PAPER: This CEO Fraud Prevention Manual provides an overview of how to deal with this exponentially growing wave of cybercrime in email security. Inside this two-part guide you'll uncover how companies are compromised, the methods of attack and how to prevent an attack. You'll also have access to a checklist to CEO fraud prevention and response.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

KnowBe4

modusCloud Email Security URL Defense
sponsored by Vircom
RESOURCE: Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

Vircom

Phishing is Big Business. Don't Get Hooked.
sponsored by Sophos, Inc.
WHITE PAPER: 91% of cyberattacks and their resulting data breaches now begin with a spear phishing email. Dive into the evolution of phishing, how it works, and what it looks like. Discover the importance of combining advanced security technologies with educated, phishing-aware employees.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Sophos, Inc.

Confronting Today's Advanced Email Threats
sponsored by Vircom
WHITE PAPER: Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Vircom

4 Countermeasures to Protect Against Ransomware
sponsored by TrendMicro
WHITE PAPER: Learn from expert Doug Cahill, ESG Senior Analyst, as he investigates a prescriptive approach to mitigate the risk associated with ransomware.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

TrendMicro

Malware Year in Review 2016
sponsored by PhishMe
WHITE PAPER: Ransomware's explosive growth in 2016 was evidence of a paradigm shift in criminal business ventures, resulting in estimated losses of well over $1 billion. Discover 4 major malware trends and specific examples of how they worked, and what it may mean for 2017.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

PhishMe

Internet and Security Threat Report 2017
sponsored by Symantec
WHITE PAPER: Uncover a massive amount of data on current trends and analysis of today's cybersecurity issues and what malicious actors have been up to in the past 3 years. Discover where they might be going, the damage they've done, and much more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Symantec

Enterprise Phishing Susceptibility and Resiliency Report
sponsored by PhishMe
WHITE PAPER: Discover the rising threat of spear phishing email campaigns, what lies at the heart of a solid defense and reporting strategy to mitigate their effects, and more on what can be done to fight back.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

PhishMe

Planning for Office 365 Gaps
sponsored by Mimecast
WHITE PAPER: Learn how to put a plan into action to keep your system safe from the 3 risks that Office 365 poses.
Posted: 07 Jun 2017 | Published: 07 Jun 2017

Mimecast

What do 200 IT Decision Makers Think of Office 365?
sponsored by Mimecast
RESEARCH CONTENT: In the fall of 2016, 200 IT decision makers from around the globe were interviewed by VansonBourne Research about their experience using Office 365 Exchange Online in 4 areas. Download now to view their evaluation, and react accordingly when implementing it in your organization.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Mimecast

Closing The Cloud Email Security Gap
sponsored by Mimecast
RESEARCH CONTENT: This Forrester Research Report surveys 220 IT pros tests the hypothesis that organizations are unaware of how at risk their cloud email systems are, and need to take extra steps to make sure their data remains secure.
Posted: 06 Jun 2017 | Published: 31 Jan 2017

Mimecast

Choosing a Unified Mobile and Cloud Security Platform
sponsored by MobileIron
RESOURCE: Discover how to secure email and mobile apps and learn about MobileIron's EMM platform that was built from the ground up to secure mobile, cloud, and desktop devices, regardless of their OS.
Posted: 24 May 2017 | Published: 24 May 2017

MobileIron

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

TrendMicro

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.
26 - 50 of 334 Matches Previous Page    1 2 3 4 5    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  contains. A list of domain names for services that the sender expects will vouch for the legitimacy of the email. The second part of the protocol requires the recipient to compare the list of services VBR-Info provides with a list of services the recipient trusts. The recipient then queries each service that is common to both lists: the service uses information the domain owner has registered with the domain name service (DNS) to determine whether the sender's IP address is legitimate and whether the content type is approved. If VBR becomes widely adopted, it will provide the recipient with another … 
Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement