IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Email Security White Papers (View All Report Types)
1 - 25 of 144 Matches Previous Page  |  Next Page
The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

Ransomware 101: 3 Keys Ways to Get Started Combating Ransomware
sponsored by Splunk
WHITE PAPER: Ransomware was recently declared the number 2 most dangerous online threat to consumers and organizations, according to Europol. This white paper offers insight into complex, growing ransomware attacks and reveals 3 tangible steps to combatting ransomware within your organization.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Splunk

Filling the Gaps in Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper provides information from an Osterman Research survey regarding users' experience with Office 365 security.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

The 7 Challenges to Online Identity Verification
sponsored by Evident
WHITE PAPER: Lack of trust is the most important hurdle for users of the sharing economy, so providers must deliver security to their users. This white paper provides actionable steps to secure your business to demonstrate your marketplace is a safe place for people to engage.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

Evident

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance

Next Generation Secure Web Gateway: The Cornerstone of Your Security Architecture
sponsored by Symantec
WHITE PAPER: Explore this white paper to uncover whether a web proxy would be beneficial in protecting your organization from sophisticated web-based attacks.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Symantec

A Guide to Avoiding Financial Losses in Cybersecurity
sponsored by Kaspersky Lab
WHITE PAPER: 77% of U.S. businesses have suffered between 1 and 5 separate incidents of data loss, leakage or exposure in the past 12 months, according to Kaspersky Lab. This white paper reveals the financial woes across the threat landscape.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Kaspersky Lab

Hackers Have Moved onto the Cloud Exploiting OAuth
sponsored by Cisco Umbrella
WHITE PAPER: In the wrong hands, OAuth can be a weapon. Access this infographic to gain insight into the recent Google OAuth attack, the growing risk, and what can be done to protect your organization from similar attacks.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Cisco Umbrella

How Attackers Target Users Through Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This infographic reveals methods hackers employ to target users through productivity apps like Office 365. Learn about sophisticated social engineering techniques, document-sharing lures, and more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data and content security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this white paper for 4 best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

10 Things You Need to Know About Ransomware
sponsored by Cylance
WHITE PAPER: As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. In this resource uncover the 10 facts your organization should know about ransomware.
Posted: 03 May 2017 | Published: 03 May 2017

Cylance

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015

Proofpoint, Inc.

A Primer on File-Borne Malware Threats
sponsored by OPSWAT inc
WHITE PAPER: Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.
Posted: 02 Oct 2017 | Published: 02 Oct 2017


Spain: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Spain receive the most malware, phishing and spam attacks?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems

Navigating The Evolving Threat Landscape with Network Security
sponsored by TrendMicro
WHITE PAPER: Discover why targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. Learn how to combat these threats with network security tactics.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

TrendMicro

Ransomware Response Guide
sponsored by IBM
WHITE PAPER: The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.
Posted: 26 Jul 2016 | Published: 01 May 2016

IBM

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Email and Threat Intelligence: From Inbox to Action
sponsored by ThreatConnect
WHITE PAPER: Discover how you can accurately collect and examine threat intelligence to prevent phishing schemes from infecting your network. Gain knowledge and insight into malicious actors so you can prevent future, possibly business-crippling, attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

ThreatConnect

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Improve Enterprise Email Systems with HP Messaging Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.
Posted: 04 Sep 2014 | Published: 30 Apr 2013

Hewlett-Packard Enterprise
1 - 25 of 144 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement