(Go: >> BACK << -|- >> HOME <<)

Email Security


Mimosa Systems

Cost and Breakeven Analysis of Email Discovery Using Mimosa NearPoint Email Archiving with eDiscover

published by Mimosa Systems on May 15, 2008

This paper describes how Cost and Breakeven Analysis of Email Discovery Using Mimosa NearPoint Email Archiving with eDiscovery Option. This customer is one of the largest manufacturers and marketers of healthcare supplements in North America with corporate headquarters in California. The company wanted to solve two related problems: eDiscovery risk and cost and PST propagation.

Cisco

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses

published by Cisco on Feb 12, 2009

Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!

Concentric

Concentric Hosted Exchange Whitepaper

published by Concentric on Jan 23, 2009

Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.

Sophos

Effective Email Policies: Why Enforcing Proper Use is Critical to Security

published by Sophos on May 07, 2008

The unmonitored and unguarded use of email by employees poses a multitude of risks to organizations. The distribution of inappropriate or offensive content, malicious emails, and the risks of data leakage all threaten working environments, IT resources and an organization's reputation. A comprehensive, transparent and enforceable email acceptable use policy (AUP), combined with robust email security solutions, dramatically reduces exposure to these risks.

Concentric

How to Lower Email Costs While Increasing Reliability

published by Concentric on Mar 20, 2009

Email has become something of a critical utility, much like the electricity that powers our offices: it must be available 24 hours a day, it must provide reliable performance, and its cost must be reasonable. However, unlike electrical systems (at least from the user’s perspective), email systems require significant amounts of labor to manage well. Email systems must periodically be upgraded. New hardware must be introduced as organizations migrate to new systems. Security must be maintained and upgraded to protect the system from intrusions. Additional hardware must be deployed to protect against outages that could seriously harm user productivity. Plus, unexpected events, such as spam storms or natural disasters can drive up costs substantially in ways that were not anticipated.

Sophos

Sophos security threat report: 2009

published by Sophos on Dec 09, 2008

Predicting the future in such a rapidly evolving environment is near impossible. One only needs to count the rate at which new malware appears today compared to five years ago to see how quickly the threat has become more serious. Read our security threat report to read about the malware trends we predict will be at the forefront in 2009.

Red Condor

Red Condor: Image Based Spam

published by Red Condor on Oct 01, 2007

Your network is defenseless against image-based spam attacks. Red Condor reveals how a simple approach can result in a less than 0.01% false-positive rate while achieving long term spam block rates greater than 98%. Get this white paper to arm yourself against the latest malicious email threats. Follow the instructions below and you'll learn the secret to living in a spam-free world.

Panda Security

100% Malware-Free Email: A Guaranteed Approach

published by Panda Security on Feb 26, 2008

E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.

Clearswift

10 Steps to E-mail Security

published by Clearswift on Feb 02, 2007

Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.

Mimecast

12 Steps to Ensuring Good Evidential Quality of Email

published by Mimecast on Aug 19, 2008

Litigants in the United States are required by law to give discovery of ‘electronically stored information’ (ESI). The obligations are found in the 2006 modification to the Federal Rules of Civil Procedure (FRCP). The Rules impose rigid timeframes with sanctions for defaulting parties. The law takes discovery seriously because it is one of the cornerstones of civil justice systems. Learn more today.

Mimecast

10 Ways To Reduce Your Email Costs Using Mimecast

published by Mimecast on Jan 27, 2009

Thinking about cutting costs by switching to email archiving and management in the cloud, but not sure how it all adds up? Understand the different ways Mimecast saves you time and money and put figures on what your own cost savings will be.

C2C Systems, Inc.

3 Reasons to Archive Email

published by C2C Systems, Inc. on Jan 31, 2007

Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.

Sigaba

5 Approaches to Messaging Security: A Technical Overview of the Tradeoffs

published by Sigaba on Oct 20, 2005

This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.

Aladdin

The Spyware Epidemic: Dealing with 'Legal' Malicious Code

published by Aladdin on Nov 10, 2005

In this Aladdin white paper you will discover an overview of spyware, security threats seen with spyware, the technical underpinnings to spyware, the technology challenges inherent in trying to block spyware, and spyware's legal issues.

GFI

The Corporate Threat Posed by Email Trojans

published by GFI on Jan 02, 2007

Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.

ProofSpace

The Digital Signature Paradox

published by ProofSpace on Jul 31, 2007

Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.

Guardian Digital

The Top 5 Open Source Security Myths

published by Guardian Digital on Sep 24, 2007

Open source is just a method to reaching a goal, not a goal in itself. In this overview, "The Top 5 Open Source Security Myths," you will be introduced to some of the largest misconceptions regarding open source security.

ESET

The Spam-ish Inquisition: Saving Time and Energy on Junk Mail

published by ESET on Nov 19, 2007

Spam looks like a simple enough issue until you have to try to define it: after all, we all think we know it when we see it. Most people have a working definition along the lines of “email I don’t want.” While that’s perfectly understandable, it is difficult to implement technical solutions based on such a subjective definition. Read this paper to learn why SPAM is more than just unwanted email.

Panda Security

The Failure of End Point Security Calls for New Alternatives

published by Panda Security on Feb 26, 2008

With thousands of new malware threats being created and unleashed into the Internet daily, the End Point security model is failing.  Without additional layers of security, infiltration may be virtually impossible to stop.  This important white paper explores alternatives that eliminate dangerous traffic prior to reaching the network or server.

CopiaTECH

The McAfee Code: A Buyer's Guide

published by CopiaTECH on Nov 26, 2006

Every network needs Total Protection. This buyer's guide discusses McAfee’s Suite offerings to help you choose the right software for your organization.

Sunbelt Software

The Impact of Messaging and Web Threats

published by Sunbelt Software on Mar 24, 2008

Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses.

Proofpoint

The Great Email Security Debate: Appliances, SaaS, or Virtual?

published by Proofpoint on May 20, 2008

Hardware appliances. Software. Software as a Service (SaaS). Virtual appliances. The variety of deployment options for the latest solutions for email security and data loss prevention seems endless... so where do you start when you're trying to evaluate solutions for your organization, knowing that making the wrong choice could have serious negative consequences for your infrastructure, IT resources and email users?

McAfee

The Impact of Messaging and Web Threats - An Osterman Research White Paper

published by McAfee on Apr 01, 2008

Messaging, internal and Web-based threats are increasing in number and severity.  In this paper, you will learn the variety of ways messaging and web security capabilities can be managed, how to define a multi-layer defense strategy and implement key techniques, and anticipate future trends in the messaging threat landscape.

MessageLabs

The Botnet Threat: Targeting Your Business

published by MessageLabs on Jun 23, 2008

In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.

Mimecast

The Critical Role of Data Loss Prevention in Governance Risk and Compliance

published by Mimecast on Aug 06, 2008

Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Security is a holistic issue.



More Security Topics

Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, Phishing, PKI, Policy Based Management, Security Management, Security Policies, Single Sign On, SSL, Secure Instant Messaging, Web Service Security, PCI Compliance, Vulnerability Management

Search The Library

Related Topics

Authentication
101 Documents
Data Protection
316 Documents
Encryption
109 Documents
Firewalls
67 Documents
Hacker Detection
90 Documents
IT Management
489 Documents
Internet Security
200 Documents
Microsoft Exchange
101 Documents
Network Security
239 Documents
Phishing
43 Documents
Security
538 Documents
Windows Server
91 Documents

Special Report

Mastering New Challenges in Text Analytics

This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.