Not finding what you are looking for? View a video demo or contact us at

Diagrams the four major types of companies involved in the application service provider market and how they relate to the end-user

This report explains why e-mail-borne viruses are such a threat, describes trade-offs that organizations must understand and use when formulating plans, and offers specific recommendations that will help them

The problems posed by e-mail-borne viruses to Microsoft-based systems and strategies to help reduce the risks to reasonable levels

The danger is posed by a lack of understanding of the threat, and the existence of scripting engines and e-mail automation APIs on client PCs

The four underlying trade-offs one needs to understand before formulating strategies to combat e-mail viruses

Strategies for preventing a virus from ever getting on to a system, avoiding activation of a virus that does make it on to a system, limiting the permanent damage an activated virus can do, and preventing the virus from reproducing and spreading

The six points on a network where measures should be taken to protected against e-mail-borne viruses

Technologies that will help combat e-mail viruses in the future, such as public key infrastructures and digital signatures

Issued in response to the recent "LoveBug" virus, the patch for Outlook 98 and Outlook 2000 blocks many types of file attachments and restricts Outlook's programming interfaces

Additional sources of information about combating e-mail viruses