Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Email Spam Filtering

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. Bacn includes: Posts from microblogging platforms like Twitter, Pownce or Jaiku. Friend updates from a social networking platform like Facebook or MySpace. Automatically-generated electronic billing statements from wireless companies or banks. Email newsletters to which the user has intentially  … 
Definition continues below.
Email Spam Filtering Reports
 
Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

Maximize ROI with Email Security in the Cloud
sponsored by Proofpoint, Inc.
WEBCAST: Watch this webinar replay and hear SaaS expert Paul LaPorte discuss how in-the-cloud and new hybrid email security solutions can deliver more value than on-premises solutions.
Posted: 09 Jan 2009 | Premiered: Jan 9, 2009

Proofpoint, Inc.

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave

Symantec Report on Rogue Security Software
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.
Posted: 10 Dec 2009 | Published: 01 Oct 2009

Symantec Corporation

Total E-mail Security
sponsored by Sunbelt Software
WHITE PAPER: Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.
Posted: 11 Nov 2008 | Published: 11 Nov 2008

Sunbelt Software

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses
sponsored by Cisco Systems, Inc.
CASE STUDY: Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Cisco Systems, Inc.

McAfee Endpoint Protection Suite
sponsored by McAfee, Inc.
WHITE PAPER: This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.
Posted: 31 May 2013 | Published: 31 May 2013

McAfee, Inc.

Anti-Phishing: Best Practices for Institutions and Consumer
sponsored by McAfee, Inc.
WHITE PAPER: Phishing has become the most malicious form of spam, leaving both organizations and consumers vulnerable to financial losses and stolen information. Read this white paper to learn about best practices for protecting your company from phishing attacks.
Posted: 27 Mar 2007 | Published: 01 Nov 2005

McAfee, Inc.

J.E. Dunn Construction Eliminates Spam and Increases Productivity Using Proofpoint™
sponsored by Proofpoint, Inc.
CASE STUDY: J.E. Dunn Construction received an increasing volume of unsolicited and often-offensive inbound emails, which hampered employee productivity and constrained IT resources. Disgruntled employees reported spending one to two hours per day deleting spam.
Posted: 15 Apr 2004 | Published: 01 Jan 2004

Proofpoint, Inc.
 
 
EMAIL SPAM FILTERING DEFINITION (continued): … Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. Bacn includes: Posts from microblogging platforms like Twitter, Pownce or Jaiku. Friend updates from a social networking platform like Facebook or MySpace. Automatically-generated electronic billing statements from wireless companies or banks. Email newsletters to which the user has intentially subscribed. Changes to a wiki where the user is a collaborator. The term was coined in August 2007 at Podcamp Pittsburgh, a social media "unconference" attended by bloggers and podcasters. The term "bacn" was chosen because of its similarity to spam. Both are popular pork products and both can fill up your inbox pretty quickly. The term "ham," by way of contrast, is sometimes used to refer to email that a user wants to both receive and read right away.
Email Spam Filtering definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement