Author Archives: Greg Olsen

SecurityWeek: When to Deploy a Load Balancer for Email

In my latest SecurityWeek column, “When to Deploy a Load Balancer for Email,” I discuss a common load balancer configuration, as well as where to deploy a load balancer. I’ve also highlighted some of the best practices for deploying them … Continue reading

Posted in Barry Shurtz, Email Security, Greg Olsen, SecurityWeek | 1 Comment

SecurityWeek: The Other Things You Can Do with TLS

If you’re familiar with Transport Layer Security (TLS), chances are you think of it as a simple means of securing the transmission of email between two mail transfer agents (MTAs) and the encryption of email. However, the near-universal feature of … Continue reading

Posted in Barry Shurtz, Email Security, Greg Olsen, SecurityWeek | Leave a comment

SecurityWeek: Are you blocking your own email?

It’s a problem that occurs frequently in the workplace—when legitimate email is discarded as spam, slipping under our radar. Insurance, mortgages, real estate, and private wealth management are just a few examples of industries that rely on a network of … Continue reading

Posted in Email Security, Greg Olsen, SecurityWeek | Leave a comment

SecurityWeek: Converged Infrastructure Implications for Email Security

It seems to happen all too often – something that’s ‘old’ is all of a sudden new again. And recently, that’s the case around converged infrastructure in which it’s a new name for an old idea. Converged Infrastructure has been … Continue reading

Posted in Greg Olsen, SecurityWeek | Leave a comment

SecurityWeek: Leveraging an Email Backbone for Mailbox Migration

My latest SecurityWeek column, “Leveraging an Email Backbone for Mailbox Migration,” focuses on the email backbone and why it’s an important architectural tool in maintaining email integrity during the email migration process. Enterprises first need to have an understanding of … Continue reading

Posted in Email Backbone, Greg Olsen, SecurityWeek | Leave a comment

SecurityWeek: Deploying DKIM for Increased Email Deliverability

One of the key challenges for email users today is whether or not they can trust that the email they receive is not a scam (i.e. phishing). It is also important to understand what a sender should be doing to … Continue reading

Posted in Greg Olsen, SecurityWeek | Leave a comment

SecurityWeek: SaaS and the Email Delivery Conundrum

For my weekly article in SecurityWeek, this time around I opted to look at email and its relationship – good and bad – with SaaS, which has become the dominant solution for new CRM deployments. The driving force behind an … Continue reading

Posted in Barry Shurtz, Greg Olsen, SecurityWeek | Leave a comment

SecurityWeek: Optimizing Email Security With Directory Integration

Technology trends such as cloud computing and virtualization initiatives are being driven by the rule in IT projects for 2011 – efficiency and optimization.  This urge to do more with less is forcing enterprises to lower costs while maintaining a … Continue reading

Posted in Barry Shurtz, Greg Olsen | Tagged | Leave a comment

SecurityWeek: DLP Adoption – Best Practices for Email

Enterprises need to understand how Data Leak Protection (DLP) impacts their organization due to the danger of someone inadvertently or accidentally releasing data that can result in financial and reputational repercussions.  Gartner estimates that 60% of the data leakages occur … Continue reading

Posted in Barry Shurtz, Greg Olsen, SecurityWeek | Tagged | Leave a comment

SecurityWeek: DKIM Verification Best Practices – Bringing Trust Back to Email

One of the key challenges in email today is to know whether to trust that the email s/he receives is not a scam. Phishing, the fraudulent use of email for the purposes of acquiring personal information from the receiver in … Continue reading

Posted in Barry Shurtz, Greg Olsen | Leave a comment