IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Email Security Reports
1 - 25 of 317 Matches Previous Page  |  Next Page
Armorblox shields enterprises from email-based social engineering attempts
sponsored by Armorblox
PRODUCT OVERVIEW: Email-based social engineering attacks remain a top threat to organizations. These attacks target users as their entry point for a breach, which traditional methods struggle to detect. In this white paper, take a closer look into Armorblox’s approach to email-based security by highlighting its key capabilities, use cases, and a SWOT analysis.
Posted: 21 Feb 2020 | Published: 13 May 2019

Armorblox

Securing the Human Perimeter with Natural Language Understanding
sponsored by Armorblox
WHITE PAPER: The traditional notion of what constitutes a perimeter is disappearing, user behavior is evolving, and organizations are incorporating mobile workforces and remote devices. Applying adequate security today requires a change in mindset to focus on the human perimeter. Download this white paper to learn more.
Posted: 21 Feb 2020 | Published: 31 May 2019

Armorblox

Creative Lodging Solutions
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Creative Lodging Solutions (CLS), a travel management company, partnered with Absolute to establish control and visibility of their endpoints to eliminate blind sports and protect intellectual property.
Posted: 20 Feb 2020 | Published: 15 May 2019

Absolute Software Corporation

Best Practices for Enterprise Phishing Protection
sponsored by PhishLabs
WHITE PAPER: According to the SANS Institute, 95% of data breaches start with phishing attacks. As these attacks become increasingly frequent and difficult to detect, organization’s need to rethink how they reduce the risk of these attacks. Download this white paper to uncover 15 best practices to boost your phishing detection and security.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

PhishLabs

Securing the Human Layer
sponsored by Armorblox
WHITE PAPER: While the advancement of technology has enabled organizations to enhance their productivity, it also exposes networks and users to security risks. This whitepaper highlights the flaws of modern security tactics and explores how incorporating AI is can safeguard the most crucial part of an organization – its people.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Armorblox

Product Overview
sponsored by Armorblox
PRODUCT OVERVIEW: In this product overview, take a closer look at the capabilities and features of Armorblox: A cloud-native email security platform that addresses the inbound and outbound security threats plaguing today’s email platforms. Read on to learn more.
Posted: 20 Feb 2020 | Published: 05 Feb 2020

Armorblox

Webinar: BEC Attacks Are the Costliest Form of Phishing
sponsored by PhishLabs
WEBCAST: Business Email Compromise (BEC) attacks are quickly becoming the costliest and least detectible form of phishing attacks. They occur when a scammer impersonates a trusted individual to exploit relationships via email. So, what can your organization do to prevent these attacks? Watch this webinar to find out.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

Handling Threats That Land in User Inboxes
sponsored by PhishLabs
WEBCAST: Traditionally, phishing is associated with email-based attacks containing malicious links. However, 98% of modern phishing attacks that reach users don’t contain any sort of malware. So, how can your organization be better prepared against modern threats? Watch this webinar to learn more.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

Webinar: Proactively Protect Users with Email Incident Response
sponsored by PhishLabs
WEBCAST: Phishing attacks are growing in their frequency, and the damage caused by these campaigns is increasingly costly. It’s more critical than ever for security leaders to reconsider how they approach phishing detection. In this webinar, discover the key characteristics of an effective program and view a demo of PhishLabs’ Email Incident Response.
Posted: 18 Feb 2020 | Premiered: Feb 18, 2020

PhishLabs

The Email Incident Response Playbook
sponsored by PhishLabs
WHITE PAPER: Just as technology advances, so too do the tactics used in cyberattacks. Phishing tactics have grown in their complexity, and traditional detection methods are incapable of adequate security. Download this playbook to discover how to build an incident response program that can detect, isolate and respond to phishing attack.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

How to Handle Phishing Threats That Bypass Email Security Technology
sponsored by PhishLabs
WHITE PAPER: The scope of phishing attacks has evolved beyond email over recent years to malicious attempts within any digital medium. In this white paper, take a closer look at modern phishing tactics, where they’re likely to strike and best practices for mitigating these threats.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

SLED - 3 Easy Ways to Secure Your K-12 School District
sponsored by Cisco Umbrella
RESOURCE: Deployed in 3 simple steps, Cisco Umbrella secures your entire school district in minutes. Easily protect students and staff against phishing attacks, filter content, and gain visibility into all activity, on or off-campus. Download this infographic to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Cisco Umbrella

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

SIG - More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Fayolle Preempts Cyberattacks and Persistent Threats
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the story of Fayolle, a French engineering and construction company, as they partner with Malwarebytes to address the rise in cyberattacks as a result of a cloud environment transition. Download the study now to uncover Fayolle’s results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Email security: Never more important
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

How Phishing Security Software is Different from Email Security Software
sponsored by Inky Technology
RESOURCE: All legacy email security apps on the market have value and are useful within the space that they operate. However, there are many differences between traditional email security software and anti-phishing software platforms. Read on to learn more.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Inky Technology

5 Examples of Phishing Emails That Killed Companies
sponsored by Inky Technology
RESOURCE: In this article, uncover the 5 most costly phishing attacks of the last few years.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Inky Technology

What is the CCPA & How Will it Affect Email Security?
sponsored by Egress Software Technologies Inc
VIDEO: This video explains the the significance and implications of California’s new data privacy regulations, specifically focusing on how they will affect email use among employees. Watch now to learn more.
Posted: 04 Feb 2020 | Premiered: 08 Nov 2019

Egress Software Technologies Inc

Core - DNS - The Big Easy - 3 steps to better security
sponsored by Cisco Umbrella
WEBCAST: When it comes to cybersecurity, there are 3 main ‘ways’ in which data breaches occur. In this webinar, take a closer look at the top challenge areas facing IT security teams, and discover the 3 methods in which attacks happen & how to stop them.
Posted: 03 Feb 2020 | Premiered: Dec 11, 2019

Cisco Umbrella

Introducing Egress Risk-based Protection
sponsored by Egress Software Technologies Inc
VIDEO: When it comes to email protection, traditional ‘one-size-fits-all approaches are incapable of recognizing the increasingly sophisticated attacks & risks. In this video, take a closer look at Egress’ Risk-based Protection for email security and discover how it can help you identify & mitigate today’s risks.
Posted: 03 Feb 2020 | Premiered: 02 May 2019

Egress Software Technologies Inc

Taking A “Prevent and Protect” Approach to Insider Data Breaches
sponsored by Egress Software Technologies Inc
VIDEO: As cyberattacks become occur more frequently than ever, organizations need to ensure their security efforts are focused on protecting from both external & internal threats. In this video, join the CPO of Egress in an overview of how an email security strategy can enhance regulatory compliance, reduce costs & increase profitability.
Posted: 03 Feb 2020 | Premiered: 23 Oct 2019

Egress Software Technologies Inc

Proofpoint Advanced Email Protection: Analyst Report
sponsored by Proofpoint
WHITE PAPER: As companies continue to rely on email as their primary communication channel, the need for email security becomes a critical priority. According to Forrester, as many as 94% of attacks start with email. In this report, take a closer look at the results of Forrester’s research into the benefits and costs of email security programs.
Posted: 03 Feb 2020 | Published: 31 Oct 2019

Proofpoint

Why Your Company Needs Third-Party Solutions for Office 365
sponsored by Egress Software Technologies Inc
WHITE PAPER: Organizations are increasingly turning to Microsoft Office 365 as their preferred collaboration platform. While its convenience is hard to beat, security settings may not be meeting your needs. In this report, discover how your company can achieve security in Office 365 that meets compliance requirements.
Posted: 31 Jan 2020 | Published: 31 Jan 2019

Egress Software Technologies Inc
1 - 25 of 317 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info