Talk With an Expert

Securing Unix Step By Step - Secure Mail Gateway

Securing Unix Step By Step - Secure Mail Gateway (PDF, 2.80MB)Published: 29 Dec, 2001
Created by:
Maarten Hartsuijker

The goal of this paper is the implementation of a secure e-mail gateway. The decision of which e-mail product to choose, is often based upon functionality. Of course this is perfectly fine, since functionality is what keeps business running. However, the side effect is also that every extra feature often introduces new security risks. Also, a lot of products out there are not designed bottom up with security in mind. Since security has become more of a hot issue over the last years, a lot of changes have been made to make products more and more secure. However, this does still not offer the same security as a product that has had security as one of its primary goals from the beginning.