IT Services  >   Content Management Services  >   Secure Content Management Services  >  

Email Security Services

RSS Feed   
ALSO CALLED: Anti-Spam Services, Email Content Security Services, e-Mail Security Services, Spam Filtering Services, Anti-phishing Services, Email Filtering Services, e-Mail Content Security Services, Authentication and Email Security Services, Software Virus Filtering Services, Managed Email Security Services, Virus Filtering Services, e-Mail Filtering Services
DEFINITION: Self-destructing email is electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender. Although self-destructing email technologies has existed for years, none has been very effective. Several new programs are said to offer better performance as well as email security and privacy enhancements.There are two main types of self-destructing email.  … 

Email Security Services definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary
Email Security Services Reports
1 - 25 of 79 Matches Previous Page  |  Next Page
Prevent Fraud and Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organizations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of Mimecast’s email authentication offering.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Security Without Compromise: A New Approach to Eliminating Malware
sponsored by Menlo Security
WEBCAST: 50% of all cyberattacks are based in malware, and 99% of those are driven by email and web attack vectors. How can organizations stay protected? A new way to reduce threats is through a method called ‘isolation.’ Gartner estimates that by 2022, isolation can reduce end-user system attacks by 70%. Interested? Watch this webcast for a closer look.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Menlo Security

Cisco Video Demo: Cisco Cloud Mailbox Defense
sponsored by Cisco
VIDEO: Organizations looking for a more effective security strategy against email threats need an up-close view of value. Cloud email tends to be vulnerable, and so it’s important to understand what technologies are available to defend it. View this demonstration of Cisco Cloud Mailbox Defense.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Cisco

Are Your Remote Workers Sitting Ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organizations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Mimecast

The New Normal: Working from Home and Phishing Threats
sponsored by Inky Technology
RESOURCE: It’s estimated that during the COVID-19 pandemic, close to 50% of the US workforce is remote – this massive and sudden transition towards remote work is known as the “new normal”. With this change in workplace comes a change in cyberthreats – with phishing being the most prominent. Read this blog post to learn more.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Inky Technology

Email Security vs. Email Privacy: What You Need to Know
sponsored by Inky Technology
RESOURCE: Since it was first introduced, email has blown up into a business-critical communication tool. However, its popularity has led to an innumerable amount of cyberattacks over the years. In this blog post, explore the differences between email security and email privacy – and discover how to achieve both.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Email Security Threats: How to Protect Your Business, People and Data
sponsored by Barracuda
WEBCAST: Every organization is challenged by email security. Rogue actors are increasingly using email to target employees and system administrators with a growing range of threats and techniques – and detection has become more difficult as a result. Stay up to date by viewing this webcast on the latest email security threats and how to defend from them.
Posted: 29 Sep 2020 | Premiered: Sep 29, 2020

Barracuda

Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE: Cyberattacks are costly - $10.2 billion in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Spear Phishing: The Targeted Attacks that Aim for Your Business
sponsored by Vade Secure
WHITE PAPER: Phishing and spear phishing are two of the most common types of cyberattacks. In a growing digital economy, technological assets are coming under greater threat from these two very similar attacks. How do you identify a phishing attack, and how can you take a proactive approach? Read this white paper to learn the answers.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


Boys & Girls Clubs of Puerto Rico Protects Microsoft 365 Users from Targeted Attacks While Improving Performance
sponsored by Vade Secure
CASE STUDY: The Boys & Girls Clubs of Puerto Rico needed a way to secure their Microsoft 365 platforms while receiving quicker responses from their helpdesk. Confronted with a rise in phishing, spear phishing and malware attacks, they needed to act fast. Jump into the case study to look up-close at how they solved their problem.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


How to Spot a Spear Phishing Email
sponsored by Vade Secure
RESOURCE: The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


Dunkirk Enhances Microsoft 365 Email Security with Vade Secure for Microsoft 365
sponsored by Vade Secure
CASE STUDY: The victim of targeted attacks, the city and urban community of Dunkirk sought to bolster their defenses against email-based cyberattacks. This case study provides an overview of Dunkirk’s selection criteria as well as the results of their email security project – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Claranet

Egress Prevent
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: An emerging practice in today’s email security strategies is the implementation of preventative measures to stop data breaches before they happen – regardless if they’re accidental or intentional. This solution brief explores the key features and capabilities of Egress Prevent, which uses machine learning to secure email inboxes and users.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Egress Software Technologies Inc

Danger Within: Email and Security Awareness Training Strategies for Effective Account Takeover Protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Outbound Email Security Essentials
sponsored by Zivver
WHITE PAPER: As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Zivver

Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER: Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 12 Aug 2020 | Published: 31 Jul 2020

Barracuda

The State of Email Security 2020
sponsored by Mimecast
EGUIDE: The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Mimecast

3 Indicators to Monitor for Business Email Compromise (BEC)
sponsored by CI Security
WHITE PAPER: Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

CI Security

2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

Email Security Threat Report 2020
sponsored by Darktrace
WHITE PAPER: Year after year, email remains one of the most lucrative vectors for cybercriminals, likely due to the growing limitations of traditional email security methods. Download this report for an breakdown of 4 key email threats and discover how a self-defending inbox can be implemented to stop attacks before they strike.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

Darktrace

Incorporating Technology to Mitigate Email Exploits and Human Error
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: Traditional email security approaches are no longer viable in today’s environment. In fact, a recent FBI study indicated that BEC generates more than 50% of all cybercrime revenue. Download this IDC Vendor Spotlight report for a closer look at Egress’ Intelligent Email Security offering, which uses machine learning to enhance threat readiness.
Posted: 10 Jun 2020 | Published: 31 May 2020

Egress Software Technologies Inc

The 10 Biggest & Boldest Business Email Compromise Scams of 2020 and 2019
sponsored by Proofpoint
EBOOK: Business email compromise (BEC) is a growing threat continues to plague inboxes, stealing billions of dollars across industries of all sizes. In this e-book, Proofpoint provides a look at 10 of the biggest, boldest and most interesting business email compromise scams across 2019 and 2020. Read on to get started.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Proofpoint

Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky Lab
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020

Kaspersky Lab
1 - 25 of 79 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info