Hosted Services: Benefits & Challenges

Brunk, Matt
November 2007
Business Communications Review;Nov2007, Vol. 37 Issue 11, p14
Trade Publication
The article discusses the use of hosted e-mail security services by businesses. Hosted services are services operated off a business' premises. The author discusses how the implementation of hosted services can affect the security of customer websites and the number of appliances and solutions required for networks. Hosted services can result in the blocking of e-mail and problems coordinating with Internet service providers (ISPs). The service can serve as a firewall to prevent spamming and reduce the need for additional appliances.


Related Articles

  • commentary: BETTER SOLUTIONS NEEDED.  // Communications News;Dec2005, Vol. 42 Issue 12, p35 

    This article addresses the importance of installing a multilayered e-mail and collaboration solution to the network security of small businesses. Installing all-in-one solutions acts as alternatives to a small number of complex relative expensive solutions available in the market. This prevents...

  • Menacing Messages. Amato-McCoy, Deena M. // Chain Store Age;Dec2006, Vol. 82 Issue 12, p69 

    The article discusses the effort of Cattlemens Restaurants Inc. to eliminate its unsolicited electronic mail messages. The company utilized the RazorGate appliance from Sunnyvale, California-based Mirapoint. The cost-effective solution was installed between the Internet firewall and the...

  • Low-cost defense. Connolly, P.J. // InfoWorld;9/24/2001, Vol. 23 Issue 39, p64 

    Presents tips on how companies can prevent denial of service attacks in their computer networks and Web sites. How to use ingress filtering; Brands of personal firewall software; Advice for Internet service providers.

  • Barracuda Spam Firewall 400 v6.1.  // SC Magazine: For IT Security Professionals (UK Edition);Sep/Oct2014, p30 

    The article offers a review of the Spam Firewall 400 v6.1 integrated hardware and software solution from Barracuda.

  • BEWARE. Barcelo, Yan // CA Magazine;Sep2008, Vol. 141 Issue 7, p36 

    The article offers advice on how to combat with the increasing number of threats abound in cyberspace. It discusses several consequences and causes of contamination in computers, including viruses, spywares, spams, and many others.. Advice includes installation of all necessary protection...

  • Ask Dr. Internet. Blass, Steve // Network World;1/15/2007, Vol. 24 Issue 2, p21 

    The article reports on configuring a Linux sendmail server. A reader is trying to organize a sendmail server so it could deliver mail from the localhost to support sending e-mail from a Web application on the same machine. Sendmail is able to deliver mails from the remote system but fails to do...

  • Getting more for less. Sullivan, Kristina B. // PC Week;05/12/97, Vol. 14 Issue 19, p81 

    Looks at how the remote access server (RAS) is expanding to offer support for communications technologies at lower price levels. The 32-port RAS with Fast Ethernet by Lantronix; The Model 5399 remote access server with a 576-modem capability by Bay Networks Inc.; The Remote Authentication...

  • Spam gangs stalk the Net. Angus, Fiona // Australian Personal Computer;Aug2002, Issue 284, p18 

    Focuses on the competition between unsolicited e-mail senders and their counterparts in Australia. Concern of internet service providers to control network infrastructures; Demand of Coalition Against Unsolicited Bulk Email of Australia; Investigation conducted by OzMail.

  • Firewall stall. Connolly, P.J. // InfoWorld;9/30/2002, Vol. 24 Issue 39, p22 

    Comments on the cybersecurity plan of the U.S. government that would require Internet service providers to provide personal firewalls to their customers. Regulations by the government to promote safety on the road; Lack of protection for individuals and small businesses.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics