Harreld, Heather
August 2000
Network World;08/28/2000, Vol. 17 Issue 35, p44
Trade Publication
Focuses on electronic mail security service providers, which protect a company's sensitive messages from being read by electronic eavesdroppers. Convenience store chain 7-Eleven's use of ZixMail.com's ZixIT service to protect its corporate e-mail; Projected growth of e-mail boxes from 1999 to 2001; E-mail security options.


Related Articles

  • E-mail Security and Users' 'Conversational Rights'. Mulligan, Geoff // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p75 

    Interviews Geoff Mulligan, chief executive officer and founder of QVTech, a provider of policy, encryption and security software and technology. Threats to electronic mail (e-mail) security; Myths and truths about virus infections through e-mail; Need for businesses to define their corporate...

  • Anonymous Web Browsing and Hosting. KUMAR, MANOJ; RANI, ANUJ // International Journal of Engineering Science & Technology;Feb2013, Vol. 5 Issue 2, p371 

    In today's high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our...

  • Computer Network Security – Evolving Risks. Schirick, Edward A. // Camping Magazine;Mar2012, Vol. 85 Issue 2, p16 

    The article discusses the increase of the risk of computer network security breaches faced by camps in the U.S. It states that many camps have implemented policies governing employees on the use of the Internet, e-mail, and social media in response to the evolving risk. However, it indicates...

  • Encipher.it Encrypts Email for Free. WAWRO, ALEX // PCWorld;Jul2012, Vol. 30 Issue 7, p36 

    The article discusses how to use the code Encipher.it to encrypt email and other text which has been typed in a browser. The author describes how users can encrypt and decrypt messages, noting that the code runs locally on computers and that it uses a 256-bit AES (Advanced Encryption Standard)....

  • Protecting email both ways. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Sep2014, Vol. 25 Issue 9, p39 

    The article focuses on protecting e-mails from fishing and malware as well as from interception. Threats for a business enterprise's computer system arising out of an email are discussed. It notes that there are several Internet security products and vendors to offer an email gateway that is...

  • Creating secure ecosystems for communications.  // Lawyer;1/27/2014, p1 

    The article focuses on the cyber security and encryption company Silent Circle, founded by Phil Zimmerman. Topics include the use of electronic mail (e-mail) encryption systems, personal data protection services, and its launch of the Dark Mail Alliance, a partnership between e-mail provider...

  • A New Probability based Analysis for Recognition of Unwanted Emails. Rathore, Shashi Kant; Jassi, Palvi; Agarwal, Basant // International Journal of Computer Applications;Aug2011, Vol. 28, p6 

    Electronic mail is used as a mean for personal and business communication. The volume of unwanted messages or mails that are received is growing as well. Cost of sending this type of Email is very low for sender, so several people and companies use it to quickly distribute unsolicited bulk...

  • Hybrids will improve your mileage. Osterman, Michael // Network World;5/7/2007, Vol. 24 Issue 18, p39 

    The article offers a hybrid approach to manage the messaging systems of a company. Such approach involves the combination of on-premise servers and appliances with managed or hosted services that provide specific types of functionality. It uses a spam-filtering service to monitor incoming...

  • Food for thought on security. Ng, Victor // NetworkWorld Asia;Mar/Apr2010, Vol. 6 Issue 1, p14 

    The article presents the ideas for managing security risks using few resources. It includes viewing security from a business perspective to protect and improve the business process, responding to every threat and buying point solutions, and complete the infrastructure security by using solutions...

  • Networks Face New Email-Related Threats. Marshall, Jeffrey; Heffes, Ellen M. // Financial Executive;Jun2005, Vol. 21 Issue 5, p11 

    The article discusses e-mail related threats to corporate computer networks. One way to corrupt computer networks is through the utilization of zombie networks. They are created through a partnership of e-mail spammers and software virus writers. Once a specific computer in a network is...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics