GFI MailSecurity deployment strategies

GFI MailSecurity can be deployed in 2 operating modes: Either as an SMTP gateway or as a VS API version for Exchange 2000/2003. It can be used in 3 ways, either by using one of these modes or by using both in tandem. This paper describes the GFI MailSecurity operating modes in detail and helps you choose the best way to deploy GFI MailSecurity on your network.

Spotlight

Moka5

Fundamentally Transforming Enterprise End-user Computing. Based on research conducted by Stanford University, Moka5 (M5) fundamentally transforms enterprise end-user computing. M5 creates a highly-elastic enterprise perimeter where user data and applications are delivered as simply-managed and highly-secure workspaces to popular end-user devices.

OTHER WHITEPAPERS
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

Security and Privacy White Paper

whitePaper | October 31, 2022

As cloud-based software solutions become prominent, discussions continue to revolve around security. When organizations implement a cloud-based solution, they put their trust in the solution provider to protect their data and deliver a secure platform.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

Cybersecurity and Financial SystemResilience Report

whitePaper | July 27, 2022

The Consolidated Appropriations Act, 20211 (CAA) requires the Federal Reserve Board (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.

Read More
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More

Spotlight

Moka5

Fundamentally Transforming Enterprise End-user Computing. Based on research conducted by Stanford University, Moka5 (M5) fundamentally transforms enterprise end-user computing. M5 creates a highly-elastic enterprise perimeter where user data and applications are delivered as simply-managed and highly-secure workspaces to popular end-user devices.

Events