Email Threat Prevention (ETP)

Email threat prevention (ETP) is a security prevention technique that helps minimize the risks associated with a data breach by adding an additional layer of protection to an existing secure email gateway. Today, email is vulnerable to cyber-attacks and ETP is designed to identify and stop email-borne attacks including phishing, ransomware and other exploitable content that is sent in an email body or downloaded as an email attachment.

Cloud Email Protection

Many ETP solutions support on-premises mail servers or is hosted in the cloud to detect and automatically stop an attack before it enters the work environment. Typically cloud email threat prevention analyzes email attachments and URLs against known threats and uses contextual intelligence or data sanitization technologies to scan email, prioritize alerts, remove malicious elements or and block the threats.

ETP Solutions

ETP solutions (on-premises or cloud-based) are offered by a number of vendors including FireEye, ProofPoint, Symantec, OPSWAT, Check Point and other vendors. Also, specific email and NextGen firewall or application firewall providers may also offer email threat prevention as part of an overall security solution.

Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

Text Abbreviations reviewed by Web Webster   From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

How to Find Your...

SSID is short for Service Set IDentifier. In layman’s terms, an...

Monday.com

Monday.com is a cloud-based work operating system that can be used for a...

Secure Socket Tunneling Protocol...

The secure socket tunneling protocol (SSTP) is a VPN protocol where...