There are many fronts to securing today's networks, with email security being one of the most important. Ranging from fighting spam and viruses to stopping Denial of Service (DoS) attacks, email security is a far-reaching effort and set of technologies meant to protect businesses and people from email-borne threats. In this eBook, we'll discuss how to best address email security in companies with 100+ employees. Topics will include a discussion on appliance-based vs. software and managed solutions; protecting networks from blended threats; ensuring that attacks never get past the network perimeter; understanding email sender reputation and its impact; and zero-day protection. By the end of the eBook readers will have the breadth of knowledge required to understand the real threat that email-borne attacks pose, and how to address those attacks in a way that reduces risk while ensuring users aren't impacted.
|Table of Contents|
|Chapters 1-2||PDF (672 KB)|
There are many fronts to securing today’s enterprises and their networks, with email security being one of the most important. Ranging from fighting spam and viruses to stopping Denial of Service (DoS) attacks, email security is a far-reaching effort that involves a set of technologies meant to protect businesses and people from email-borne threats.
“Spam Fighting and Email Security for the 21st Century” discusses how best to address email security in medium-sized enterprises (i.e., companies with more than 100 employees). Topics include attacks against mail systems and severs, end users, and email messages; and appliance-based, software-based, and managed service solutions. By the end of the eBook, you’ll better understand the real threat posed by email-borne attacks and will know how to address those attacks in a way that reduces risk while ensuring users aren’t affected.
The eBook begins with an introduction to the current state of email security and the risk to corporations that those threats pose. The first half of the eBook explores the threats to the enterprise, discussing the relationship of Confidentiality, Integrity, and Availability (CIA) to email security and showing how you can use that relationship to integrate common security doctrines in the evolving field of email security. In more technical detail, the eBook also covers the most common attack vectors currently in use and how those attacks affect targeted systems.
The second half of the eBook emphasizes best-practice strategies and current solutions, reviewing how enterprises can protect their servers, workstations, and Inboxes from attack. Those attacks can range from spam to phishing to targeted virus attacks. This portion of the eBook also focuses on how the methodologies and technologies discussed are actually deployed (e.g., in a layered defense). For example, when should solutions be deployed at the network, server, and workstation levels and how does each solution’s delivery mechanism affect ease of use, manageability, privacy, and administrative control?
The eBook shows you how to mitigate the risk of current and newly evolving threats. The focus is on solutions that help you manage corporate risk and retain control of your networks and Inboxes.