email threat prevention (ETP)
Email threat prevention (ETP) is a security prevention technique that helps minimize the risks associated with a data breach by adding an additional layer of protection to an existing secure email gateway. Today, email is vulnerable to cyber-attacks and ETP is designed to identify and stop email-borne attacks including phishing, ransomware and other exploitable content that is sent in an email body or downloaded as an email attachment.
Cloud Email Protection
Many ETP solutions support on-premises mail servers or is hosted in the cloud to detect and automatically stop an attack before it enters the work environment. Typically cloud email threat prevention analyzes email attachments and URLs against known threats and uses contextual intelligence or data sanitization technologies to scan email, prioritize alerts, remove malicious elements or and block the threats.
ETP solutions (on-premises or cloud-based) are offered by a number of vendors including FireEye, ProofPoint, Symantec, OPSWAT, Check Point and other vendors. Also, specific email and NextGen firewall or application firewall providers may also offer email threat prevention as part of an overall security solution.
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.
From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top... Read More »Huge List of Computer Certifications
Have you heard about a computer certification program but can't figure out if it's right for you? Use this handy list to help you decide. Read More »
Computer architecture provides an introduction to system design basics for most computer science students. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »