Email Security
Cost and Breakeven Analysis of Email Discovery Using Mimosa NearPoint Email Archiving with eDiscover
published by Mimosa Systems on May 15, 2008
This paper describes how Cost and Breakeven Analysis of Email Discovery Using Mimosa NearPoint Email Archiving with eDiscovery Option. This customer is one of the largest manufacturers and marketers of healthcare supplements in North America with corporate headquarters in California. The company wanted to solve two related problems: eDiscovery risk and cost and PST propagation.
Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses
published by Cisco on Feb 12, 2009
Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!
Concentric Hosted Exchange Whitepaper
published by Concentric on Jan 23, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Effective Email Policies: Why Enforcing Proper Use is Critical to Security
published by Sophos on May 07, 2008
The unmonitored and unguarded use of email by employees poses a multitude of risks to organizations. The distribution of inappropriate or offensive content, malicious emails, and the risks of data leakage all threaten working environments, IT resources and an organization's reputation. A comprehensive, transparent and enforceable email acceptable use policy (AUP), combined with robust email security solutions, dramatically reduces exposure to these risks.
How to Lower Email Costs While Increasing Reliability
published by Concentric on Mar 20, 2009
Email has become something of a critical utility, much like the electricity that powers our offices: it must be available 24 hours a day, it must provide reliable performance, and its cost must be reasonable. However, unlike electrical systems (at least from the user’s perspective), email systems require significant amounts of labor to manage well. Email systems must periodically be upgraded. New hardware must be introduced as organizations migrate to new systems. Security must be maintained and upgraded to protect the system from intrusions. Additional hardware must be deployed to protect against outages that could seriously harm user productivity. Plus, unexpected events, such as spam storms or natural disasters can drive up costs substantially in ways that were not anticipated.
Sophos security threat report: 2009
published by Sophos on Dec 09, 2008
Predicting the future in such a rapidly evolving environment is near impossible. One only needs to count the rate at which new malware appears today compared to five years ago to see how quickly the threat has become more serious. Read our security threat report to read about the malware trends we predict will be at the forefront in 2009.
Red Condor: Image Based Spam
published by Red Condor on Oct 01, 2007
Your network is defenseless against image-based spam attacks. Red Condor reveals how a simple approach can result in a less than 0.01% false-positive rate while achieving long term spam block rates greater than 98%. Get this white paper to arm yourself against the latest malicious email threats. Follow the instructions below and you'll learn the secret to living in a spam-free world.
100% Malware-Free Email: A Guaranteed Approach
published by Panda Security on Feb 26, 2008
E-mail is the primary communication tool upon which every business and corporation depends. This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
10 Steps to E-mail Security
published by Clearswift on Feb 02, 2007
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
12 Steps to Ensuring Good Evidential Quality of Email
published by Mimecast on Aug 19, 2008
Litigants in the United States are required by law to give discovery of ‘electronically stored information’ (ESI). The obligations are found in the 2006 modification to the Federal Rules of Civil Procedure (FRCP). The Rules impose rigid timeframes with sanctions for defaulting parties. The law takes discovery seriously because it is one of the cornerstones of civil justice systems. Learn more today.
10 Ways To Reduce Your Email Costs Using Mimecast
published by Mimecast on Jan 27, 2009
Thinking about cutting costs by switching to email archiving and management in the cloud, but not sure how it all adds up? Understand the different ways Mimecast saves you time and money and put figures on what your own cost savings will be.
3 Reasons to Archive Email
published by C2C Systems, Inc. on Jan 31, 2007
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
5 Approaches to Messaging Security: A Technical Overview of the Tradeoffs
published by Sigaba on Oct 20, 2005
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
The Spyware Epidemic: Dealing with 'Legal' Malicious Code
published by Aladdin on Nov 10, 2005
In this Aladdin white paper you will discover an overview of spyware, security threats seen with spyware, the technical underpinnings to spyware, the technology challenges inherent in trying to block spyware, and spyware's legal issues.
The Corporate Threat Posed by Email Trojans
published by GFI on Jan 02, 2007
Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
The Digital Signature Paradox
published by ProofSpace on Jul 31, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
The Top 5 Open Source Security Myths
published by Guardian Digital on Sep 24, 2007
Open source is just a method to reaching a goal, not a goal in itself. In this overview, "The Top 5 Open Source Security Myths," you will be introduced to some of the largest misconceptions regarding open source security.
The Spam-ish Inquisition: Saving Time and Energy on Junk Mail
published by ESET on Nov 19, 2007
Spam looks like a simple enough issue until you have to try to define it: after all, we all think we know it when we see it. Most people have a working definition along the lines of “email I don’t want.” While that’s perfectly understandable, it is difficult to implement technical solutions based on such a subjective definition. Read this paper to learn why SPAM is more than just unwanted email.
The Failure of End Point Security Calls for New Alternatives
published by Panda Security on Feb 26, 2008
With thousands of new malware threats being created and unleashed into the Internet daily, the End Point security model is failing. Without additional layers of security, infiltration may be virtually impossible to stop. This important white paper explores alternatives that eliminate dangerous traffic prior to reaching the network or server.
The McAfee Code: A Buyer's Guide
published by CopiaTECH on Nov 26, 2006
Every network needs Total Protection. This buyer's guide discusses McAfee’s Suite offerings to help you choose the right software for your organization.
The Impact of Messaging and Web Threats
published by Sunbelt Software on Mar 24, 2008
Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses.
The Great Email Security Debate: Appliances, SaaS, or Virtual?
published by Proofpoint on May 20, 2008
Hardware appliances. Software. Software as a Service (SaaS). Virtual appliances. The variety of deployment options for the latest solutions for email security and data loss prevention seems endless... so where do you start when you're trying to evaluate solutions for your organization, knowing that making the wrong choice could have serious negative consequences for your infrastructure, IT resources and email users?
The Impact of Messaging and Web Threats - An Osterman Research White Paper
published by McAfee on Apr 01, 2008
Messaging, internal and Web-based threats are increasing in number and severity. In this paper, you will learn the variety of ways messaging and web security capabilities can be managed, how to define a multi-layer defense strategy and implement key techniques, and anticipate future trends in the messaging threat landscape.
The Botnet Threat: Targeting Your Business
published by MessageLabs on Jun 23, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
The Critical Role of Data Loss Prevention in Governance Risk and Compliance
published by Mimecast on Aug 06, 2008
Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Security is a holistic issue.
More Security Topics
Search The Library
Related Topics
Special Report
Mastering New Challenges in Text Analytics
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.