IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Email Security Services

RSS Feed   
ALSO CALLED: Anti-Spam Services, Email Content Security Services, e-Mail Security Services, Spam Filtering Services, Anti-phishing Services, Email Filtering Services, e-Mail Content Security Services, Authentication and Email Security Services, Software Virus Filtering Services, Managed Email Security Services, Virus Filtering Services, e-Mail Filtering Services
DEFINITION: Self-destructing email is electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender. Although self-destructing email technologies has existed for years, none has been very effective. Several new programs are said to offer better performance as well as email security and privacy enhancements.There are two main types of self-destructing email.  … 

Email Security Services definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary
Email Security Services Reports
1 - 25 of 75 Matches Previous Page  |  Next Page
Six-Step Guide to Email Security Best Practices
sponsored by Clearswift
WHITE PAPER: The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Clearswift

2019 Proofpoint Domain Fraud Report
sponsored by Proofpoint
WHITE PAPER: Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Proofpoint

Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky Lab
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020

Kaspersky Lab

5 Identity Attacks that Exploit Your Broken Authentication
sponsored by Okta
RESOURCE: Compromised credentials are the leading cause of data beaches. These credentials can be compromised through a number of attacks, including phishing, credential stuffing and password spraying. In this infographic, learn how your organization can defend against data breaches with strong authentication.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

Okta

Stop Targeted Attacks and Data Loss on G Suite
sponsored by Armorblox
PRODUCT OVERVIEW: Today’s cloud-delivered email inboxes require deliberate security measures that go above and beyond traditional on-prem email security practices and tools. Download this solution brief to learn more about Armorblox for G Suite, designed to prevent targeted cyberattacks and data loss on cloud-delivered email platforms.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Armorblox

Stop Phishing and Data Loss on Slack
sponsored by Armorblox
DATA SHEET: In this brief, learn how Armorblox for Slack can help to stop malicious URLs and attachments, prevent PII/PCI disclosures, and protect against lateral data loss across cloud applications.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Armorblox

Stop Targeted Attacks and Data Loss on Office 365
sponsored by Armorblox
DATA SHEET: In this brief, learn how Armorblox for Office 365 can help stop targeted email attacks, protect against direct and lateral data loss, and automate remediation of threats reported to the phishing/abuse mailbox.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Armorblox

Stop targeted attacks and data loss on Exchange
sponsored by Armorblox
PRODUCT OVERVIEW: While email is rapidly moving towards the cloud, most organizations opt for on-premise or hybrid deployments. Unfortunately, cloud-based email security solutions are often ill-equipped to protect hybrid inboxes. Download this solution brief to learn more about a cloud email security platform designed to stop targeted attacks and data loss.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

Armorblox

2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

Incorporating Technology to Mitigate Email Exploits and Human Error
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: Traditional email security approaches are no longer viable in today’s environment. In fact, a recent FBI study indicated that BEC generates more than 50% of all cybercrime revenue. Download this IDC Vendor Spotlight report for a closer look at Egress’ Intelligent Email Security offering, which uses machine learning to enhance threat readiness.
Posted: 10 Jun 2020 | Published: 31 May 2020

Egress Software Technologies Inc

Phishing. The biggest threat to SMBs
sponsored by Crosskey Cyber Security
RESOURCE: Phishing emails are the most common threat to small and medium businesses, and their growing efficacy leads to increasingly costly disruptions. In the following article, you’ll find an overview of the signs of a phishing attack, specific examples of what these attacks look like and advice for how employees can protect themselves.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Crosskey Cyber Security

Top 10 Security Events to Monitor in Azure Ad and Microsoft 365
sponsored by Quest
WHITE PAPER: Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.
Posted: 28 May 2020 | Published: 28 May 2020

Quest

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

Cool Vendors in Cloud Office Security
sponsored by Armorblox
RESOURCE: As organizations continue to embrace the operational benefits of cloud office suites, security leaders need to ensure that data protection isn’t overlooked. In this Gartner report, take an in-depth look at four key vendors and their innovative approaches to cloud office security, email and collaboration.
Posted: 11 May 2020 | Published: 01 May 2020

Armorblox

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

Protecting Business and Remote Workers from COVID-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

2020 State of Malware Report
sponsored by Malwarebytes
WHITE PAPER: Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.
Posted: 14 Apr 2020 | Published: 29 Feb 2020

Malwarebytes

WEBINAR: Protecting Against Coronavirus Email Fraud
sponsored by Armorblox
VIDEO: Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.
Posted: 14 Apr 2020 | Premiered: 08 Apr 2020

Armorblox

How Vendor Email Compromise Works
sponsored by Armorblox
WHITE PAPER: The FBI updated their estimate of how much money was lost due to Business Email Compromise (BEC) attacks to $26 billion over the past three years, making it one of the costliest forms of cyberattack. Recently, Vendor Email Compromise (VEC), a variant of BEC, has emerged. In this blog post, learn more about VEC and how it differs from BEC.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Armorblox

Cloud App Security Report Infographic
sponsored by Trend Micro
RESOURCE: Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Trend Micro

Coronavirus Credential Phishing
sponsored by Armorblox
WHITE PAPER: As the spread of the Coronavirus continues to create a sense of uncertainty, cyberattackers have been pushing their efforts to capitalize on people’s doubts and fears. In this white paper, dissect an example of a credential phishing attack: what theses attacks consist of, why it got through & how it was detected.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Armorblox

Augmenting Native Office 365 Email Security to Stop Targeted Email Attacks
sponsored by Armorblox
WHITE PAPER: Email remains the top communication method within and among businesses. In order to take advantage of this, cyberattackers develop targeted campaigns that focus on tricking users into clicking on malware. In this white paper, learn how to complement your existing Office 365 security features with third-party services to stop email attacks.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Armorblox

Third-Party Security Controls Needed to Close Gaps in Native Email Security
sponsored by Armorblox
ANALYST REPORT: With the move to cloud-delivered email solutions and an expanding email threat landscape, email security is in a state of transformation and organizations are reconsidering their current email security controls. Tap into this ESG report to learn what 403 IT and security professionals have to say about their email security concerns.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Armorblox
1 - 25 of 75 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info