Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Email Spam Filtering

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. Bacn includes: Posts from microblogging platforms like Twitter, Pownce or Jaiku. Friend updates from a social networking platform like Facebook or MySpace. Automatically-generated electronic billing statements from wireless companies or banks. Email newsletters to which the user has intentially  … 
Definition continues below.
Email Spam Filtering Reports
 
Symantec Report on Rogue Security Software
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.
Posted: 10 Dec 2009 | Published: 01 Oct 2009

Symantec Corporation

Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
sponsored by Microsoft
PODCAST: Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 03 Nov 2006 | Premiered: Oct 27, 2006, 09:00 EDT (13:00 GMT)

Microsoft

Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition
sponsored by AVG Technologies USA, Inc.
CASE STUDY: The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Driving Down the Total Cost of Protection
sponsored by Kaspersky Lab
WHITE PAPER: In recent years there has been an exponential growth in malware proliferation around the world. Over 30,000 new threats hit the wire each day, requiring more than 3,500 new malware signatures being released daily by anti-malware companies. Read this white paper to learn about Kaspersky's world class, yet affordable anti-malware protection systems.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

Kaspersky Lab

Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

Not all Malware Detection is Created Equal
sponsored by Sophos, Inc.
WHITE PAPER: The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.
Posted: 01 Apr 2010 | Published: 05 Nov 2009

Sophos, Inc.

Spam 2011: Protection Against Evolving Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: The very best anti-spam solutions today de­liver 95% effectiveness. Unfortunately, that’s not good enough. Check out this white paper to see how enterprises can defend themselves with a comprehensive and adaptive anti-spam solution such as the Proofpoint Protection Suite.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Proofpoint, Inc.

Worry-Free Business Security Standard
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

The N-able MSP Sales & Marketing Digital Binder
sponsored by N-able Technologies
RESOURCE: This digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

N-able Technologies

Maintaining Trust: Protecting Your Web Site Users from Malware
sponsored by IBM
WHITE PAPER: This paper explores the problem of malware and how it is increasingly being delivered through legitimate Web sites. It also introduces new techniques from IBM that are designed to go beyond standard security measures to help organizations proactively defend against threats.
Posted: 31 Dec 2009 | Published: 02 Nov 2009

IBM
 
 
EMAIL SPAM FILTERING DEFINITION (continued): … Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away. Bacn includes: Posts from microblogging platforms like Twitter, Pownce or Jaiku. Friend updates from a social networking platform like Facebook or MySpace. Automatically-generated electronic billing statements from wireless companies or banks. Email newsletters to which the user has intentially subscribed. Changes to a wiki where the user is a collaborator. The term was coined in August 2007 at Podcamp Pittsburgh, a social media "unconference" attended by bloggers and podcasters. The term "bacn" was chosen because of its similarity to spam. Both are popular pork products and both can fill up your inbox pretty quickly. The term "ham," by way of contrast, is sometimes used to refer to email that a user wants to both receive and read right away.
Email Spam Filtering definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement