Skip to main content
 

filtering

Results 76 - 98 of 98Sort Results By: Published Date | Title | Company Name
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this white paper from St. Bernard Software to read about a variety of contemporary, Internet-borne threats that are making it foolhardy for any business to provide unfettered Internet access for its users.
Tags : 
filtering, email security, firewall, access control, employee internet access, internet security, web security, restrictions, st bernard, st. bernard
    
St Bernard Software
Published By: Campaigner     Published Date: Jan 08, 2007
This white paper is designed to educate you about the main obstacles that can prevent your email from reaching a recipient’s inbox; and the simple tactics that you can implement to avoid these obstacles.
Tags : 
email deliverability, email marketing, email, email filtering, customer reach, customer relationship management, got corp, got corporation
    
Campaigner
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
    
GFI
Published By: Gold Lasso     Published Date: Jul 13, 2007
Successful delivery is the driving force behind an effective email marketing campaign. The purpose of this paper is to provide a summary of terms (or jargon) related to e-mail deliverability, increase general knowledge of the concept, discuss delivery barriers and provide tactics to overcome these issues.
Tags : 
email delivery, deliverability, inbox, email marketing, enewsletter, email newsletter, e-newsletter, newsletter, blocking, filtering, gold lasso
    
Gold Lasso
Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids, spam, spam filtering, security policies, gateway av, risk management, perimeter, perimeter esecurity
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
Before Microsoft released Microsoft XP Service Pack 2 (SP2), most attackers would compromise a computer system by simply attacking it with known vulnerabilities or "bugs" that could allow the attacker to gain some level of control over the system. Newer attack methods were starting to be seen where the attacker would take advantage of vulnerabilities within the Internet browser itself.
Tags : 
virus, anti-virus, anti virus, spyware, windows xp, xp sp2, intrusion detection, ids, intrusion prevention, ips, spam, filtering, blocking, malware, malicious code, windows firewall, perimeter, perimeter esecurity
    
Perimeter
Published By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : 
spam, bayesian, filter, filtering, block, blocking, spamming, phishing, total cost of ownership, tco, messaging, email, email security, mail server, mail servers, comdom, comdom software
    
COMDOM Software
Published By: SPAMfighter     Published Date: Nov 27, 2007
This paper will discuss the shortcomings of some established filtering methods and outline how SPAMfighter's community-based approach to filtering can result in it performing much better than competing products and delivering a far superior return on investment.
Tags : 
spam, anti spam, anti-spam, spamfighter, spam fighter, exchange, productivity, costs, spending, spend management, email security, exchange server, servers
    
SPAMfighter
Published By: Microworld     Published Date: Dec 12, 2007
Content Security refers to monitoring Internet access and e-mail activity in your network. This white paper provides information about Content Security, its need and recommends features that good Content Security software should have.
Tags : 
email content, content security, anti spam, internet security, email security, internet security, spam, filtering, blocking, filter, email filtering, microworld
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
Due to its nature of open source code, Linux is fast becoming popular and is being deployed in ever increasing numbers on mail servers, corporate networks and desktops. Till recently, systems running on Linux were relatively free from virus and other threats. But with the greater penetration of Linux operating systems, virus authors have begun to target them.
Tags : 
virus, spam, linux, anti-spam, anti spam, anti virus, anti-virus, mailscan, email security, internet security, email filter, filter, filtering, blocking, white list, black list, microworld
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
At the Mail Gateway, MailScan for SMTP Servers scans and cleans mails that flow between all local users and mails between the Internet and Mail Server. It protects organizations against Viruses, Worms, Trojans, Backdoors and many other malware, blocks Spam and Phishing mails, while providing total Content Security for email traffic.
Tags : 
mailscan, mail scan, email security, filtering, filter, email filter, blocking, internet security, virus, spam, anti-virus, anti-spam, anti spam, anti virus, malware, microworld
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.
Tags : 
spam, email security, anti-spam, anti spam, email, intrusion prevention, mail scan, mailscan, email, phishing, filter, filtering, email filter, blocking, nilp, microworld
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
Spam is the vilest manifestation of e-mail abuse. This white paper provides information about Spam, losses caused by Spam, how Spam works and suggests key features that a good Anti-Spam software should have.
Tags : 
email security, email, dos, ddos, denial of service, denial-of-service, spam, anti-spam, anti spam, filter, filtering, blocking, block, microworld
    
Microworld
Published By: MessageLabs     Published Date: Jan 13, 2009
Uncontrolled internet use brings web-malware, malicious links and Trojans to the corporate network.  Uncover the web security options available to your business.  Choosing the right solution can be complicated. FREE Web-filtering Buyer’s Guide (PDF/40KB)
Tags : 
messagelabs, web-filtering, web-filtering buyer’s guide, web-malware, malicious links, trojans, web security solution
    
MessageLabs
Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream's approach towards personalization differs dramatically from others.  In "Traditional Approaches Contrasted with ChoiceStream's Universal Recommender" technology brief you'll learn about the components of personalization systems.  Most importantly, you’ll learn how to choose a winning algorithm that provides the right personalization solution for your online store.
Tags : 
choicestream, personalization technology brief, universal recommender, best-of-breed personalization, collaborative filtering, preference capture, algorithms
    
ChoiceStream
Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream’s “Seven Key Requirements for Personalized Recommendation Services” white paper outlines e-commerce recommendation services and key capabilities that can improve sales revenue and customer engagement.  You’ll also receive a Recommendation Evaluation Scorecard to help you objectively summarize critical core requirements in order to maximize your return on investment.
Tags : 
choicestream, personalized recommendation services, quality recommendations, collaborative filtering, in-session click analysis, cohorts, cross-sells, cross-promotions, blacklists, seamless multi-channel support
    
ChoiceStream
Published By: Visendo     Published Date: Sep 09, 2010
This whitepaper explains how SMBs can improve their mail security and increase their efficiency when storing, scanning, filtering emails with minimum investment and Visendo innovative email suite.
Tags : 
pop3 connector, antispam filter, anti-phisihing, email security for smbs
    
Visendo
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips, mission critical systems, system av, patch management, policy management, layered security, end user security awareness training, strong policies, audited procedures
    
Perimeter E-Security
Published By: ETNA Software     Published Date: Feb 10, 2011
This whitepaper discusses various ways of filtering companies for electronic trading purposes.
Tags : 
filtering software, finance software, investment software, financial tools, trading, technology, software, financial services, stocks, equities, filtering companies, filter, electronic trading, back-office
    
ETNA Software
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: ZScaler     Published Date: Dec 13, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft
    
ZScaler
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
    
CDW Symantec
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.