A more secure Exchange Server is within reach

Securing Exchange Server is crucial for maintaining the end-user experience and protecting the enterprise.

Having a secure Exchange Server deployment is a crucial goal for every admin in every enterprise. Getting there isn't always easy, but there are ways to ensure that your enterprise is on top of its security needs while making sure you've done all you can to prevent major breaches from occurring.

We compiled some of the most helpful resources on Exchange Server security -- including whether to choose on-premises or third-party security tools -- and ways to secure Exchange Server post deployment.

Third-party vs. native email security tools

Native security controls are a good start for keeping email secure, but there are third-party options to consider. Answer these questions about risk, mobile use, control needs, resiliency, cost expectations, overall goals and support.

How to choose the best security tools for Exchange

If your enterprise decides that it's time to look at third-party tools to secure Exchange Server, you'll have to decide between on-premises tools and cloud-based tools. Consider important factors, as well as the benefits and drawbacks of each option.

Check us out

For the latest on how to secure Exchange Server deployments, visit our Exchange Server security page and follow us on Twitter @ExchangeTT.

Tighten up security in Exchange Server

Keeping a secure Exchange Server deployment is critical in the enterprise. This compilation on security includes useful tools, security best practices, and other resources to help you decide the best steps to keep your environment secure.

Secure Exchange 2010 after installation

There are seven steps admins can take after deploying Exchange 2010 to help ensure it remains secure. Antivirus software and spam control are a must, but there are a few other steps you need to take that you may not have thought about.

Is Exchange 2013's anti-malware protection enough?

Is the native anti-malware protection in Exchange 2013 enough to replace what your enterprise already uses? There are a few ways to help you answer this serious security question when you plan on moving to Exchange 2013.

This was last published in April 2014

Dig Deeper on Spam and virus protection

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Policies already allow you to detect sensitive information such as financial or personal data. DLP Document Fingerprinting expands this capability to detect forms used in your organization create a document fingerprint based on your organization’s patent request form to identify when users are sending that form, and then use DLP actions to properly control dissemination of the content
Cancel

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close