IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients. The use of a fee for e-mail has sometimes been called e-mail postage, e-postage, sender pays or e-stamping.Both America Online (AOL) and Yahoo have announced certified  … 
Definition continues below.
Email SecurityReports
76 - 100 of 296 Matches Previous Page  | Next Page
Understanding Advanced Persistent Threats and Complex Malware
sponsored by Dell SecureWorks UK
WEBCAST: Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks UK

Mobile Data Security and Compliance Challenges in the Enterprises
sponsored by SearchSecurity.com
EGUIDE: The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

SearchSecurity.com

Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange
sponsored by SearchSecurity.com
EZINE: This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

SearchSecurity.com

About to Buy Guide: Spam/virus protection for Exchange
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

SearchSecurity.com

Expert ways to maximize security in Exchange
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

Cloud Content Security: Understanding SaaS data protection
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines the growing trend of SaaS security, or cloud-based security services. Learn about the pros and cons of adopting SaaS security in your organization.
Posted: 30 Apr 2012 | Published: 30 Apr 2012

SearchSecurity.com

Expert E-zine: Who has access to your email?
sponsored by SearchSecurity.com
EZINE: In this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers.
Posted: 15 Dec 2011 | Published: 14 Dec 2011

SearchSecurity.com

How to prevent phishing attacks: User awareness and training
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

SearchSecurity.com

Top 5 Strategies for Getting an Email Archiving Project off the Ground
sponsored by Symantec Corporation
WHITE PAPER: This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more.
Posted: 06 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.
Posted: 28 Aug 2012 | Published: 21 Aug 2012

Dell Software

Dell Compellent for Microsoft Exchange Server 2010
sponsored by Dell, Inc.
WEBCAST: Dell Compellent SANs help ensure high performance, cost-effective storage, simplified operations and data protection for all Microsoft Exchange 2010 environments. Check out this comprehensive webcast to learn how Dell Compellent SAN can help you manage Exchange 2010 storage complexity.
Posted: 27 Apr 2012 | Premiered: Apr 18, 2012, 01:00 EDT (05:00 GMT)

Dell, Inc.

e-Zine: Purchasing Considerations for Exchange 2010
sponsored by Dell and Microsoft
EZINE: Find out why now is the best time to migrate to Exchange 2010 in this expert e-zine. Plus, discover how to cost-effectively meet the hardware and performance demands of this latest upgrade.
Posted: 23 Apr 2012 | Published: 18 Apr 2012

Dell and Microsoft

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.

Best and Worst Practices for Exchange email archiving
sponsored by Metalogix
EGUIDE: In this expert e-guide, discover the best and worst practices for email archiving, and review an essential checklist for ensuring that Exchange archives remain compliant.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

Metalogix

Beyond Spam - Email Security in the Age of Blended Threats
sponsored by EdgeWave
WHITE PAPER: In this paper, explore the new threat reality, including the tactics and designs cyber criminals are using today and uncover some of the next generation technologies that can help mitigate these threats.
Posted: 12 Mar 2012 | Published: 12 Mar 2012

EdgeWave

Escalating Targeted Web and Email Attacks
sponsored by M86 Security UK
WHITE PAPER: Today's cybercriminals are more dangerous and sophisticated than ever before, launching more targeted attacks for bigger payoffs. And with new emerging technologies, also come new ways of exploitation. In this resource, explore the growing issue of targeted web and email threats and discover a unique approach to mitigating them.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

M86 Security UK

Security Labs Report
sponsored by M86 Security UK
WHITE PAPER: This Security Labs report offers insight into the significant trends and developments in web and email security today. View now to uncover key findings and gain recommendations on how to protect your organisation.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

M86 Security UK

CSC CloudMail for VMware Zimbra
sponsored by CSC
WHITE PAPER: Moving your messaging application to the cloud can help you lower TCO and increase integration by eliminating the need to maintain an in-house email system. Learn how you can enjoy a full suite of email, calendaring, sharing and document management abilities on any desktop or operating system with a cloud-based platform.
Posted: 26 Jan 2012 | Published: 26 Jan 2012

CSC

Presentation Transcript: Mobile Strategies, Part 1: Harnessing the IT Consumerization Deluge
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This presentation transcript reveals key findings from a recent consumerisation poll and provides recommendations and best practices to help organisations address these key topics. Obtain predictions for the future of the media tablet market and gain insight into five trends that are shaping the consumerisation landscape.
Posted: 25 Jan 2012 | Published: 25 Jan 2012

Dell, Inc. and Intel®

The Total Economic Impact of USA.NET SaaS Secure Messaging Solution
sponsored by Perimeter eSecurity
WHITE PAPER: The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations.
Posted: 20 Jan 2012 | Published: 20 Jan 2012

Perimeter eSecurity

What Security Threats Can We Expect in 2012?
sponsored by Websense, Inc.
WEBCAST: View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more.
Posted: 15 Dec 2011 | Premiered: Dec 15, 2011

Websense, Inc.

Messaging and Web Security Best Practices for 2011 and Beyond
sponsored by GFI Software
WHITE PAPER: This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011

GFI Software

Modern Cyber Threats and Government Agencies
sponsored by M86 Security
WHITE PAPER: View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

M86 Security

Best Practices for Securing Exchange Email
sponsored by Perimeter eSecurity
WHITE PAPER: End-to-end security is as vital to today's businesses as email itself. Find out how you can achieve best practices in secure email utilizing an email hosting provider.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Perimeter eSecurity

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner
sponsored by Perimeter eSecurity
CASE STUDY: Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity
76 - 100 of 296 Matches Previous Page    2 3 4 5 6 7    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  e-mail plans based on a technology developed by Goodmail Systems. For a fee of approximately 1/4 of a cent (USD $0.0025) per e-mail, or USD $2.00 to $3.00 for every 1000 messages sent, advertisers can post e-mail messages that defeat most spam filters commonly used at the server level by Internet service providers (ISPs). Proponents believe that certified e-mail will, if effectively used on a large scale, make spam unprofitable and thereby improve the operation of the Internet by reducing useless electronic traffic.Critics of certified e-mail insist that such a system is not likely to be effective … 
Email Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement