• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

spam

Results 176 - 200 of 205Sort Results By: Published Date | Title | Company Name
By: Microworld     Published Date: Dec 12, 2007
At the Mail Gateway, MailScan for SMTP Servers scans and cleans mails that flow between all local users and mails between the Internet and Mail Server. It protects organizations against Viruses, Worms, Trojans, Backdoors and many other malware, blocks Spam and Phishing mails, while providing total Content Security for email traffic.
Tags : 
mailscan, mail scan, email security, filtering, filter, email filter, blocking, internet security, virus, spam, anti-virus, anti-spam, anti spam, anti virus, malware, microworld
    
Microworld
By: Microworld     Published Date: Dec 12, 2007
NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.
Tags : 
spam, email security, anti-spam, anti spam, email, intrusion prevention, mail scan, mailscan, email, phishing, filter, filtering, email filter, blocking, nilp, microworld
    
Microworld
By: Microworld     Published Date: Dec 12, 2007
The Small and Medium Businesses contribute to around 68% of the world economy while making up for 80% of the employment. The security needs, issues and priorities of SMBs are different in many ways from that of large Business Houses.
Tags : 
smb, smbs, small business, soho, internet security, email security, spam, spamming, anti-spam, phishing, pharming, malware, trojan, trojans, anti-virus, virus, anti virus, spyware, anti-spyware, anti spyware
    
Microworld
By: Microworld     Published Date: Dec 12, 2007
Spam is the vilest manifestation of e-mail abuse. This white paper provides information about Spam, losses caused by Spam, how Spam works and suggests key features that a good Anti-Spam software should have.
Tags : 
email security, email, dos, ddos, denial of service, denial-of-service, spam, anti-spam, anti spam, filter, filtering, blocking, block, microworld
    
Microworld
By: Microworld     Published Date: Dec 12, 2007
X-Spam for Exchange 2000-2003 (X-Spam) is a highly adaptive Anti-Spam Software that protects the Microsoft Exchange 2000-2003 servers from Spam. X-Spam uses advanced regular expressions and meta tests to positively identify Spam and block it. This white paper discusses Spam and provides information on X-Spam.
Tags : 
black list, rbl, dul, dial up user, spam, anti spam, anti-spam, x-spam, blacklist, whitelist, mailscan, email security, exchange server, windows server, microworld, microsoft exchange
    
Microworld
By: MessageLabs     Published Date: Jan 13, 2009
New spamming techniques are upon us -  419 spam, botnets, CAPTCHA cracking – what’s next from the 'bad guys'? Spam remains the biggest email-born threat to businesses. Learn how to protect your business.  FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, secure network, block spam, spamming techniques, spam, business threat, networking, security, network security, anti spam, anti spyware
    
MessageLabs
By: MessageLabs     Published Date: Jan 13, 2009
Spam, viruses and other malware pose a serious threat to your business.  Is your email security accurate enough to protect you?Re-evaluate your solution FREE Email Security Buyer’s Guide (PDF/40KB)
Tags : 
messagelabs, email security, email security buyer’s guide, spam, viruses, malware, security, anti spam
    
MessageLabs
By: Red Condor     Published Date: Mar 17, 2008
Your network is defenseless against image-based spam attacks. Red Condor reveals how a simple approach can result in a less than 0.01% false-positive rate while achieving long term spam block rates greater than 98%. Get this white paper to arm yourself against the latest malicious email threats. Follow the instructions below and you'll learn the secret to living in a spam-free world.
Tags : 
image-based, image based spam, spam, image spam, red condor, redcondor, security, anti spam, email security
    
Red Condor
By: Bronto     Published Date: Jan 03, 2013
With the proliferation of SPAM and other unwanted email, getting your message to the inbox and opened has become a significant challenge.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services, outsourcing, outsourced it, managed services, managed systems, tech support, it solutions, security, compliance, disaster recovery, it management, infrastructure, small business networks
    
Managed Systems, Inc.
By: SubscriberMail     Published Date: Apr 14, 2009
If your opt-out process asks list members to provide a reason for the unsubscribe, are you listening to what they are saying? It can be silly, or downright filthy, but it can also provide valuable insight into the good and bad of your email marketing practices.
Tags : 
subscribermail, unsubscribe, email marketing, e-mail marketing, website, marketing, e-mail content, rich media, landing pages, inbox preview, crm, customer relationship management, can-spam, spam
    
SubscriberMail
By: MessageLabs     Published Date: Jul 02, 2009
This whitepaper looks at the value of email and outlines the issues and concerns of IT Managers involved in managing and maintaining business critical emails systems. Learn more today!
Tags : 
messagelabs, email manager, email, it management, microsoft exchange server, viruses, spyware, spam, disaster recovery, compliance, international computing
    
MessageLabs
By: Data Guard Systems, Inc     Published Date: May 06, 2009
Whether and organization or an individual, identity theft spells a long, expensive, and complex recovery process. However, online identity theft can be prevented with encryption software and advanced password protection.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, data security, security
    
Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
By: Trend Micro SaaS     Published Date: Oct 07, 2007
Der umfassende Hosted-Service wehrt Bedrohungen ab, ehe sie das Netzwerk erreichen, und kombiniert dazu leistungsfhige Anti-Spam- und Anti-Phishing-Funktionen mit mehrfach ausgezeichnetemViren- und Spyware-Schutz. Trend Micro, einer der Marktfhrer im Bereich der Sicherheits-Software, aktualisiert und optimiert die Lsung, um das Netzwerk des Kunden zuverlssig zu schtzen und gleichzeitig wertvolle IT-Ressourcen einzusparen.
Tags : 
trend, messaging hosted security, e-mail, netzwerk, mx-datensatzes, spyware-schutz
    
Trend Micro SaaS
By: 4Retail     Published Date: Nov 19, 2009
If you find yourself under the burden of mass emails and wasting valuable time sifting through volumes of unnecessary information, read on to find out why you are not alone and how you can change your working practices by looking to alternative ways of communicating.
Tags : 
email overload, communication, document management, problem of spam, project management, global sourcing, global sourcing management, on demand collaboration solution, email viruses, communication tool, growing inboxes, document upload, email security, content management system, email archiving
    
4Retail
By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans.
Tags : 
messagelabs, symantec hosted services, malware, trojan attack, email guard, spam, anti spam, anti spyware, anti virus, email security, security management
    
Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : 
messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability, encryption, identity management, vulnerability management
    
Symantec.cloud
By: Symantec.cloud     Published Date: Jan 28, 2011
In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
symantec cloud, search engine link spam, messagelabs, viruses, trojans, spyware, phishing, url, universal resource locator, anti spam, anti spyware, anti virus, cloud computing
    
Symantec.cloud
By: Visendo     Published Date: Sep 09, 2010
This whitepaper explains how SMBs can improve their mail security and increase their efficiency when storing, scanning, filtering emails with minimum investment and Visendo innovative email suite.
Tags : 
pop3 connector, antispam filter, anti-phisihing, email security for smbs
    
Visendo
By: PulseConnect     Published Date: Sep 04, 2012
It's easy to assume that automated emails don't require a lot of work on your part because, well, they're automated. In reality, automated emails require some careful thought and planning to successfully trigger messages that best connect with your recipients...and don't end up in their spam folder.
Tags : 
email marketing, email automation, conversion rates, email targeting
    
PulseConnect
By: Symantec     Published Date: Oct 07, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.
Tags : 
intelligence, cyber security, threats, trends, malware, spam, business risks, security
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter