Abstract

Abstract: Nowadays, most of people and organizations use the e-mail for different needs to exchange information between users. E-mail application is an important network application. It is significant when business1, health and educational communities use it for exchange of critical information such as business information, health patient record and so on. over the Internet or internal networks, It allows data and messages to be transferred easily between senders and receivers allowing messages to be received, responded to, stored, forwarded and broadcast among recipients. These extensive capabilities have caused the email to be widely adopted as the official communications method for many organizations. Also common for personal use, electronic mail is available through a diverse number of compatible software clients, and also via web-browser. An existing enterprise email implementation second service model adds security processing. The service provider is responsible for monitoring all threats using email as a channel , and for providing an email user interface (UI) In the enterprise augmentation model, an existing on-premise email deployment is augmented by additional cloud-based services and functionalist. This paper explores identity federation and data loss prevention and describing best practices for evaluating, developing, installing and using cloud-based email security services.1.1Intended Audience Email security services are viewed from two perspectives: the providers of these services and the consumers or purchasers of email security services. key service features is needed for both sides to be aware of and plan for and how these features are used to tackle threats to email security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call