IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Email Security Services

RSS Feed   
ALSO CALLED: Anti-Spam Services, Email Content Security Services, e-Mail Security Services, Spam Filtering Services, Anti-phishing Services, Email Filtering Services, e-Mail Content Security Services, Authentication and Email Security Services, Software Virus Filtering Services, Managed Email Security Services, Virus Filtering Services, e-Mail Filtering Services
DEFINITION: Self-destructing email is electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender. Although self-destructing email technologies has existed for years, none has been very effective. Several new programs are said to offer better performance as well as email security and privacy enhancements.There are two main types of self-destructing email.  … 

Email Security Services definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary
Email Security Services Reports
1 - 25 of 52 Matches Previous Page  |  Next Page
INKY Computer Vision
sponsored by Inky Technology
VIDEO: MSPs need to know that they’re being protected from ransomware and other dangerous security threats that come from phishing emails. Watch this short video to learn how INKY’s computer vision technology helps identify even the most advanced of fake emails that would typically fool an end user.
Posted: 12 Oct 2021 | Premiered: 21 Mar 2021

Inky Technology

Which deployment model is right for me?
sponsored by Inky Technology
WHITE PAPER: While many businesses now offer API-based solutions to enhance email security, particularly aimed at phishing, these tactics aren’t always the best approach. Access this white paper to learn how inline email security differs from API-based security and discover why INKY thinks that their standard model works best for customers.
Posted: 06 Oct 2021 | Published: 06 Oct 2021

Inky Technology

MANAGED XDR - MANAGED DETECTION AND RESPONSE SERVICE
sponsored by Trend Micro
DATA SHEET: Today’s attacks are dangerous – monetizing intellectual property, encrypting essential data for ransom or damaging the flow of information in the case of nation state attacks. Managed extended detection and response (XDR) can provide 24/7 protection from these attacks. View this Trend Micro data sheet to see the full security layer.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE: Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020

Atakama

Prevent Fraud And Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organisations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of the DMARC standard.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Are your remote workers sitting ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Mimecast

The New Normal: Working from Home and Phishing Threats
sponsored by Inky Technology
RESOURCE: It’s estimated that during the COVID-19 pandemic, close to 50% of the US workforce is remote – this massive and sudden transition towards remote work is known as the “new normal”. With this change in workplace comes a change in cyberthreats – with phishing being the most prominent. Read this blog post to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Inky Technology

Email Security vs. Email Privacy: What You Need to Know
sponsored by Inky Technology
RESOURCE: Since it was first introduced, email has blown up into a business-critical communication tool. However, its popularity has led to an innumerable amount of cyberattacks over the years. In this blog post, explore the differences between email security and email privacy – and discover how to achieve both.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE: Cyberattacks are costly - $10.2 billion in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Danger within: email and security awareness training strategies for effective account takeover protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER: Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 12 Aug 2020 | Published: 31 Jul 2020

Barracuda

2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Proofpoint

Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

13 email threat types to know about right now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

Protecting Business and Remote Workers from Covid-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

Email Security: Never more important
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Spear Phishing vol2: Top Threats and Trends. Email account takeover, Defending against lateral phishing
sponsored by Barracuda
WHITE PAPER: This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Email security: Never more important
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

Spear Phishing: Top Threats and Trends Vol. 1
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 28 May 2019 | Published: 31 Mar 2019

Barracuda

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by Barracuda
WHITE PAPER: Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.
Posted: 28 May 2019 | Published: 30 Apr 2018

Barracuda

12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Claranet

Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020

Kaspersky

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com
1 - 25 of 52 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences