{"id":2097,"date":"2005-06-02T00:00:00","date_gmt":"2005-06-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/02\/security-remains-the-name-of-the-e-mail-game\/"},"modified":"2021-12-30T11:40:39","modified_gmt":"2021-12-30T11:40:39","slug":"security-remains-the-name-of-the-e-mail-game","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/02\/security-remains-the-name-of-the-e-mail-game\/","title":{"rendered":"Security Remains the Name of the E-Mail Game"},"content":{"rendered":"<p>Security will continue to dominate the e-mail management industry over the next year as enterprises face more sophisticated threats from increasingly organized groups of attackers, messaging executives predict.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;We have two years of pretty nasty innovation coming from wrong side,&#8221; said Dave Anderson, president and CEO of Sendmail Inc. &#8220;That may be good from a business perspective for us, but it&#8217;s bad from the perspective of our customers.&#8221;<\/p>\n<p>While threats may still be real, the market for e-mail security also has turned from a seller&#8217;s market to more of a buyer&#8217;s market as the first wave of customers have already installed technology such as anti-spam software, said Peter Christy, a principal at market researcher Internet Research Group.<\/p>\n<p>The e-mail security and management market also appears headed toward more consolidation as bigger vendors such as Symantec Corp. and Microsoft Corp. have more aggressively pursued the market and as areas such as anti-virus protection and spam-fight have become more common, panelist said.<\/p>\n<p>As e-mail and other messaging technologies such as instant messaging are accessed more regularly on mobile devices, security threats will follow as well, Anderson said.<\/p>\n<p>http:\/\/www.eweek.com\/article2\/0,1759,1823283,00.asp?kc=EWRSS03119TX1K0000594<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2097","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2097"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2097\/revisions"}],"predecessor-version":[{"id":4584,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2097\/revisions\/4584"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}