TITLE

Messaging-security gateway defined

PUB. DATE
October 2007
SOURCE
Network World;10/15/2007, Vol. 24 Issue 40, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the messaging-security gateway, a firewall for electronic mail (e-mail). It is said to scan both inbound and outbound e-mail, a messaging security gateway which applies all in of the e-mail-specific protection needed to do business in a spam, virus and malwareladen world. An overview of the four security features of a messaging-security gateway includes spam filtering, virus and malware blocking and content filtering, is offered. Moreover, it is believed that businesses needs content filtering and archiving features, where messaging-security gateways are moving to provide these services.
ACCESSION #
27101378

 

Related Articles

  • Protecting precious information. JAIN, HEMANT KUMAR // Education Insider;Jul2014, Vol. 3 Issue 7, p70 

    The article reports that security analysts should understanding importance of information security within a company. It mentions that the main job of security analysts is to examine the security measures of an organisation. It further mentions that specialised analysts generally install and use...

  • SECURE COMPUTING USES SCADA-SPECIFIC SECURITY SIGNATURES.  // Computer Security Update;Nov2008, Vol. 9 Issue 11, p3 

    The article reports that the San Jose, California-based Secure Computing Corp. has incorporated three new signature file types for supervisory control and data acquisition (SCADA)-specific protocols into its industry-leading Secure Firewall product. It is stated that SCADA systems are used by...

  • The Firewall Rule Authentication Method Based on 6to4 Tunnel. Li Zhou; Liangyi Gong; Xin Zou // International Journal of Security & Its Applications;May2013, Vol. 7 Issue 3, p133 

    The enterprise internal information security faced with many hidden trouble, and information leakage has been the largest security problem. Firewall is the main technology to solve information leakage, but end-to-end cryptograph tunnel communication can throughfirewall information filtering...

  • Strategies to Improve Database Security. Curtin, C. Matthew // Database Trends & Applications;Dec2007, Vol. 21 Issue 12, p17 

    The article focuses strategies to improve database security. Three common mistakes concerning database security include direct database attacks, lost media, and application bugs. To prevent or control database attacks, the systems should be connected to a firewall so that authorized machines can...

  • How to buy a new messaging-security product. Snyder, Joel // Network World;10/15/2007, Vol. 24 Issue 40, p50 

    A list of five feature areas of new messaging-security product is presented. This includes the antispam, where biggest differentiation between products is the quality of the antispam engine when applied to the email flow. Another is the antivirus, which is said to adversely affect deployment for...

  • Virtual StoneGate Security Solution.  // Software World;Mar2008, Vol. 39 Issue 2, p26 

    The article discusses the introduction of a comprehensive StoneGate Security Solution by Stonesoft for VMware virtual environment. It is suggested that StoneGate Firewall/VPN is the first virtual appliance that protects the network and guarantees business continuity for both virtual and physical...

  • WHAT JUST HAPPENED? Mitchell, John // ITNOW;Spring2016, Vol. 58 Issue 1, p24 

    The article discusses balancing of the risk equation and being prepared for potential impacts related to information security. Topics discussed include chances of cyberattacks on the firms despite having firewall and anti-malware, response of the U.S. government to the information released by...

  • Finjan Prevents Zero-Day Exploit.  // Database & Network Journal;Aug2009, Vol. 39 Issue 4, p26 

    The article reports on the discovery of zero-day exploit by Finjan Software Inc. It notes that the zero-day vulnerability (CVE-2009-1862) in Adobe Acrobat Reader and Flash player are exploited by cybercriminals. The exploit, which was detected by the Malicious Code Research Center of Finjan,...

  • Enhancement of RSA Key Generation Using Identity. Muhammad, Norhidayah; Zain, Jasni Mohamad; Saman, Md Yazid Mohd; Ramle, Mohd Fadhil // Australian Journal of Basic & Applied Sciences;2014 Special, Vol. 8 Issue 21, p93 

    The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. This algorithm used user's identity to replace the numbers that are...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics