Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Email Spam Filtering

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. Bacn includes: Posts from microblogging platforms like Twitter, Pownce or Jaiku. Friend updates from a social networking platform like Facebook or MySpace. Automatically-generated electronic billing statements from wireless companies or banks. Email newsletters to which the user has intentially  … 
Definition continues below.
Email Spam Filtering Reports
 
Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business
sponsored by Sunbelt Software
PRESENTATION TRANSCRIPT: In this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Sunbelt Software

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Trend Micro, Inc.

Should You Install Messaging Security Software on Your Exchange Server?
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the pros and cons of installing third-party software on the Exchange Server, and information on Sunbelt Software's Ninja Email Security.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

McAfee Security Journal
sponsored by Intel Security
WHITE PAPER: This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Intel Security

Not all Malware Detection is Created Equal
sponsored by Sophos, Inc.
WHITE PAPER: The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.
Posted: 01 Apr 2010 | Published: 05 Nov 2009

Sophos, Inc.

Symantec Endpoint Protection 11.0.3
sponsored by Symantec Corporation
WHITE PAPER: In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

Symantec Corporation

10 Questions to Ask Before You Buy an Anti‐Spam Solution
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

The Impact of Messaging and Web Threats
sponsored by Sunbelt Software
WHITE PAPER: Messaging, internal and Web-based threats are increasing in number and severity. Read this Osterman Research white paper to learn how organizations must implement a layered defensive strategy to protect against all types of threats and how Sunbelt Software can help.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

McAfee Threats Report: Third Quarter 2010
sponsored by McAfee, Inc.
ANALYST REPORT: This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

McAfee, Inc.
 
 
EMAIL SPAM FILTERING DEFINITION (continued): … Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. Bacn includes: Posts from microblogging platforms like Twitter, Pownce or Jaiku. Friend updates from a social networking platform like Facebook or MySpace. Automatically-generated electronic billing statements from wireless companies or banks. Email newsletters to which the user has intentially subscribed. Changes to a wiki where the user is a collaborator. The term was coined in August 2007 at Podcamp Pittsburgh, a social media "unconference" attended by bloggers and podcasters. The term "bacn" was chosen because of its similarity to spam. Both are popular pork products and both can fill up your inbox pretty quickly. The term "ham," by way of contrast, is sometimes used to refer to email that a user wants to both receive and read right away.
Email Spam Filtering definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement