Access "Editor's Desk: An email security guide for managers"
This article is part of the November 2005 issue of Comparing five of the top network-based inline IPS appliances
No, I don't want to refinance my mortgage. No, I don't need Viagra. And no, I don't want to lose weight fast. So, why do such electronic solicitations continue their onslaught on my junk inbox and even slip in with legitimate traffic occasionally? Because spammers have teamed with the hacker underground to create increasingly clever ways to circumvent our e-mail filters. Let's face it: We can't live without e-mail for either work or play. That's why, by 2009, another 600 million inboxes are expected to join the 1.2 billion inboxes that exist worldwide today. In my case, e-mail has all but replaced the letter and phone call. Because e-mail is indispensable, there is a huge need to secure e-mail clients. That's why we're pleased to publish our E-mail Security Guide for Managers. The all-in-one guide synthesizes strategic e-mail security advice into a format designed for managers like you. In this special section, we'll help you understand today's most pressing e-mail security concerns, how common threats are evolving and your product options for defending your... Access >>>
Premium Content for Free.
Secure Reads: Contemporary Cryptography
Read a review of the book Contemporary Cryptography.
Application Security: Secure Software's CodeAssure Suite
Secure Software's CodeAssure Suite
Avoiding Network Traffic Confusion with Consistent Firewall Rules
Keep network traffic flowing by collaborating firewall rules and network access devices.
Content Filtering: InterScan Web Security Suite 2.5
Trend Micro's InterScan Web Security Suite 2.5
Antispyware: SurfControl's Enterprise Threat Shield 3.0
by Steven Weil, Contributor
SurfControl's Enterprise Threat Shield 3.0
ZyXEL Communication's ZyWALL P1
- Secure Reads: Contemporary Cryptography
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
SecureWave's Sanctuary Device Control 3.0.1
E-mail Security Guide for Managers
Staying on top of the latest e-mail threats.
Vulnerability tools provide a realistic view of the enterprise, where vulnerabilities are viewed in the context of the IT landscape.
Recent Releases: Security product briefs, November 2005
Learn about the security products that launched in November 2005.
On the Line
See how five IPS appliances match up against attacks.
- Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
Editor's Desk: An email security guide for managers
Knights of Spamalot
Layer 8: SOX security spending is an old, wrinkled tactic
Ping: Katrina's Security Survivors
Katrina's Security Survivors
Perspectives: ITIL has application in security
The Information Technology Infrastructure Library (ITIL) is a set of best practices and guidelines for managing IT services can be applied to information security.
- Editor's Desk: An email security guide for managers
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...