IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Email Security Reports
1 - 25 of 324 Matches Previous Page  |  Next Page
Keep Your Essential Office 365 Backed Up on the Cloud
sponsored by OffSiteDataSync
VIDEO: In this short video, discover what it takes to keep your Office 365 environment resourcefully and securely backed up on the cloud – and how to meet both retention and compliance requirements in the process.
Posted: 10 Dec 2018 | Premiered: 05 Dec 2018

OffSiteDataSync

Security Automation Quick Wins
sponsored by Siemplify
VIDEO: The state of security operations has led to teams embracing automation to combat alert overload and make the most of their security tools. However, many companies don't know where to start. This webcast details which processes are ripe for automation and gives practical examples for automating security operations processes.
Posted: 07 Dec 2018 | Premiered: 05 Dec 2018

Siemplify

Inner Workings of Ransomware and Ways to Detect and Respond
sponsored by Arctic Wolf
VIDEO: Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain.
Posted: 07 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Maximize Your Investment in Microsoft Office 365 with Citrix Workspace
sponsored by Citrix
WHITE PAPER: Download this resource to find out how a unified workspace management platform can help you simplify the move to Office 365 with an integrated approach to cloud, mobility, and application delivery requirements, to ensure a seamless transition.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

Citrix

Threat Intelligence Report
sponsored by F5 Networks
RESOURCE: How do you safeguard your employees from becoming phishing bait? In this report, learn why phishing campaigns work so well, how unsuspecting users play into the hands of attackers, and what your organization can do to avoid them.
Posted: 30 Nov 2018 | Published: 31 Dec 2017

F5 Networks

Email Fraud Defense (EFD)
sponsored by Proofpoint, Inc.
VIDEO: Learn how to block fraudulent emails before they reach your employees, customers, and partners with Proofpoint Email Fraud Defense (EFD).
Posted: 01 Nov 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

2018 User Risk Report
sponsored by Wombat Security Technologies
RESEARCH CONTENT: More than 6,000 working adults across the world were surveyed about their personal security habits. To find out what these employees really know about cybersecurity, download this report for some shocking results. Could some of these folks be working at your organization?
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Wombat Security Technologies

Playbook Fridays: Forcing Active Directory (AD) Password Resets via ThreatConnect Victims
sponsored by ThreatConnect
RESOURCE: This blog post highlights an intelligence driven orchestration platform that automates almost any cybersecurity task, runs in real time, and provides you with detail information about each run. Find out how this platform can integrate with your active directory service to detect attacks and prevent damaging breaches.
Posted: 11 Oct 2018 | Published: 08 May 2018

ThreatConnect

Keeping Users Off the Spear Phishing Hook Webinar
sponsored by MediaPRO
VIDEO: Increasingly, IT security teams are running simulated phishing campaigns internally, to try and reduce their exposure to phishing threats. To learn how your organization can deploy this kind of training, tune into this webinar for simulation best practices, anti-phishing tools, and more.
Posted: 01 Oct 2018 | Premiered: 19 Sep 2018

MediaPRO

A How-To Guide for Effective Simulated Phishing Campaigns
sponsored by MediaPRO
WHITE PAPER: As many companies know, innocent-looking email requests can lead to the release of sensitive information. This is why employers are adopting simulated email phishing campaigns to test the true knowledge of their employees. Read on for best practices to get the most out of your phishing campaigns.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

MediaPRO

How Huisman Used Forcepoint Email and Web Security Cloud to Reduce Risk
sponsored by Forcepoint
CASE STUDY: Find out how Huisman, a globally operating company specializing in engineering and manufacturing, reduced risk with Forcepoint's cloud solution for email and web security.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Forcepoint

Australian Organizations Know They Should Be More Cyber Resilient
sponsored by Mimecast
WHITE PAPER: If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Mimecast

No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

Phishing Has Never Been Easier
sponsored by Cylance
RESOURCE: Open this resource to learn how to address phishing with domain-based message authentication, reporting and conformance (DMARC), an email authentication system policy and reporting protocol.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Cylance

Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint, Inc.
EBOOK: Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Cybersecurity for the Modern Era: Choosing People-Centered Solutions
sponsored by Proofpoint, Inc.
EBOOK: Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Proofpoint, Inc.

Cyber Resilience for Email: Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: Email is the number one application that organizations depend on for communications. Unfortunately, it is also the number-one attack vector used by cybercriminals. Learn how your organization can stay protected against advanced email-borne threats, today.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Mimecast

Cyber Resilience for Email: Solution Brief
sponsored by Mimecast
EBRIEF: Learn how your organization can stay protected against advanced email-borne threats through Mimecast's threat protection, adaptability recoverability and durability solution.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Mimecast

Mimecast Advanced Security
sponsored by Mimecast
DATA SHEET: Learn how Mimecast's set of advanced cloud-based email security services can help protect your organization from advanced email-borne threats.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Mimecast

The State of Email Security: 2018 Report
sponsored by Mimecast
WHITE PAPER: Email is at the intersection of a massive amount of risk. Attackers are using IT initiatives like migrating emails to cloud platforms are giving them the opportunity to exploit gaps in your security program. Download this report to learn more about how to fill the gaps in your email security.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

Mimecast

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

Ransomware Defense for Healthcare in 45 Seconds
sponsored by Cisco Umbrella
VIDEO: Hacking is big business, and healthcare is the number one targeted industry. Find out how advanced malware protection can keep patient data, research and your network safe.
Posted: 10 Jul 2018 | Premiered: 10 Jul 2018

Cisco Umbrella

Email Security in the Era of the Cloud: An Executive Brief
sponsored by SparkPost
WHITE PAPER: How secure is your email from hackers? This executive brief explores the successful attacks on organizations like the Democratic National Committee, Anthem Health, Sony Pictures and Seagate and how modern cloud platforms make the complex risks more manageable.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

SparkPost

Human Factor Report 2018
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: This 2018 Human Factor Report teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 31 May 2018 | Published: 31 May 2018

Proofpoint, Inc.
1 - 25 of 324 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement