7 steps to safeguard enterprise e-mail
Joel Snyder, senior partner with consultancy Opus One and technical editor of Information Security magazine, presented this session at
|Information Security Decisions Fall 2005.
As a critical business application, e-mail requires careful attention from a security perspective. In this session, Joel describes the "e-mail onion," and the many layers of networking and infrastructure that go into building a successful e-mail system. As he reveals each layer, you learn about the potential security risks, standards and mitigating technologies, ranging from IP-based security through TLS and S/MIME, up to content-layer issues such as antispam, antivirus and policy-based e-mail controls. Download this presentation and learn how to:
- Evaluate your existing e-mail security issues and identify gaps
- Establish a solid methodology for securing e-mail and plugging the holes
- Maintaining corporate e-mail security beyond the status quo
Download this presentation
This was first published in October 2005
Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.