Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

What security settings best apply to the client?

When deploying an email security project, there are certain bases you need to cover, one of which is security settings. Find out how to determine the correct security settings for your client when implementing email security.

When installing new services or products for a client, such as email security, resellers need to be cognizant of the requirements that may apply to their organization. Since companies are in the business to make money, as it pertains to their particular vertical market, they may or may not be aware of email security requirements that apply to their organization. Detailed conversations with the client will help ensure the client has a better idea of requirements and what configurations will work best for their organization. Take the opportunity to educate the client, if necessary.

About the author
 Russ Rogers is an information security expert and author of Nessus Network Auditing, 2nd Edition. Russ is currently a penetration tester for the federal government. Listen to Russ's supplemental podcast on email security.

If no particular email security requirements exist, ensure the client is aware of best practices in information security. Basic rules, such as securing the underlying operation system, keeping the OS and application patched on a consistent basis, avoiding the use of clear text protocols where possible, and ensuring appropriate user access control, should all be reiterated to the client.

This was last published in April 2008

Dig Deeper on Application security and data protection

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close