Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

email filtering

Results 1 - 25 of 37Sort Results By: Published Date | Title | Company Name
Published By: Act-On     Published Date: May 10, 2012
For an email campaign to be successful, marketers must reach the right person at the right time, with the right offer. By learning the basics of deliverability, you're better prepared to build emails that will actually reach your potential customers.
Tags : 
email deliverability, deliverability, best practices, spamtrap, spam filtering, blacklists, blocklists, soft bounce
    
Act-On
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod
    
BAE Systems
Published By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering
    
Burton Group
Published By: Campaigner     Published Date: Jan 08, 2007
This white paper is designed to educate you about the main obstacles that can prevent your email from reaching a recipient’s inbox; and the simple tactics that you can implement to avoid these obstacles.
Tags : 
email deliverability, email marketing, email, email filtering, customer reach, customer relationship management, got corp, got corporation
    
Campaigner
Published By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
EdgeWave
Published By: EdgeWave     Published Date: Oct 15, 2011
Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.
Tags : 
edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation
    
EdgeWave
Published By: GetActive Software     Published Date: Jan 23, 2007
Nonprofit organizations of all sizes are facing considerable challenges as they reach out to their supporters using email. Learn how to overcome these challenges and connect with your customer with a minimum of filtering and blocking.
Tags : 
email marketing, deliverability
    
GetActive Software
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam
    
GFI
Published By: GFI     Published Date: Jul 20, 2009
GFI MailEssentials for Exchange/SMTP/Lotus is a server based anti-spam, anti-phishing and email management solution, which is used by 80,000 customers worldwide. The latest version uses two anti-spam engines, along with advanced spam filtering techniques, to give administrators a high spam capture rate straight out-of-the-box, with minimal configuration. GFI MailEssentials also minimizes false positives, so you do not need to worry about important emails being marked as spam.
Tags : 
gfi, anti-spam, spam, lotus, gfi mailessentials, e-mail security, anti-phishing, phishing
    
GFI
Published By: Gold Lasso     Published Date: Jul 13, 2007
Successful delivery is the driving force behind an effective email marketing campaign. The purpose of this paper is to provide a summary of terms (or jargon) related to e-mail deliverability, increase general knowledge of the concept, discuss delivery barriers and provide tactics to overcome these issues.
Tags : 
email delivery, deliverability, inbox, email marketing, enewsletter, email newsletter, e-newsletter, newsletter
    
Gold Lasso
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
McAfee
Published By: Microworld     Published Date: Dec 12, 2007
Content Security refers to monitoring Internet access and e-mail activity in your network. This white paper provides information about Content Security, its need and recommends features that good Content Security software should have.
Tags : 
email content, content security, anti spam, internet security, email security, internet security, spam, filtering
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
Due to its nature of open source code, Linux is fast becoming popular and is being deployed in ever increasing numbers on mail servers, corporate networks and desktops. Till recently, systems running on Linux were relatively free from virus and other threats. But with the greater penetration of Linux operating systems, virus authors have begun to target them.
Tags : 
virus, spam, linux, anti-spam, anti spam, anti virus, anti-virus, mailscan
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
At the Mail Gateway, MailScan for SMTP Servers scans and cleans mails that flow between all local users and mails between the Internet and Mail Server. It protects organizations against Viruses, Worms, Trojans, Backdoors and many other malware, blocks Spam and Phishing mails, while providing total Content Security for email traffic.
Tags : 
mailscan, mail scan, email security, filtering, filter, email filter, blocking, internet security
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.
Tags : 
spam, email security, anti-spam, anti spam, email, intrusion prevention, mail scan, mailscan
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
Spam is the vilest manifestation of e-mail abuse. This white paper provides information about Spam, losses caused by Spam, how Spam works and suggests key features that a good Anti-Spam software should have.
Tags : 
email security, email, dos, ddos, denial of service, denial-of-service, spam, anti-spam
    
Microworld
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because itís effective. Thatís the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : 
web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories
    
Osterman Research, Inc.
Published By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : 
secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that canít be patched: people. Thatís why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employeeís inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Return Path     Published Date: Jan 29, 2013
Internet Service Providers make filtering decisions about what email to block or mark as SPAM based on three main factors. Find out what they are in ďEmail Sender Reputation Report: Key Factors that Impact Email Effectiveness."
Tags : 
email filtering factors, sender reputation, email blocking
    
Return Path
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This white paper from Roaring Penguin Software reviews the most common approaches to spam management and email filtering in an ISP environment and details how a suitable anti spam solution must address particular challenges for ISP administrators.
Tags : 
spam, anti-spam, antispam, blocking, filtering, email security, isp, spam management
    
Roaring Penguin
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This paper by Roaring Penguin Software demystifies the enterprise anti-spam market and its various choices and buzzwords to help you cut through the hype and focus on the basics.
Tags : 
spam, antispam, anti-spam, email security, blocking, filtering, roaring penguin
    
Roaring Penguin
Published By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : 
email management, email, email security, messaging, spam, anti spam, spyware, anti spyware
    
Sunbelt Software
Published By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : 
messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking
    
Symantec.cloud
Previous   1 2    Next    
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.