View daniela.manolescu Profile
UserName: daniela.manolescu Contact this user
Articles posted by daniela.manolescu

Axigen AJAX WebMail Third-party Web Content

Free email services based on Web-centric platforms have long been used as advertising delivery agents. This hybrid approach to compensating for the expenses of running a free service has opened the door to a brand new and very useful customer...

600% rise in phishing in 2009

(Linda McGlasson, Bank Info Security) Bogus security software applications are among the types of electronic crimes that grew 585% over the first half of 2009, according to a new study. The Anti Phishing Working Group's (APWG) latest report shows...

Social Media is the newest playground for cybercriminals

Cisco's Annual Security Report for 2009 highlights the impact of social media, particularly social networking, on network security and explores the critical role that people, not technology, play in creating opportunities for cybercriminals. The...

Report predicts the rise of self-healing botnets in 2010

(John E. Dunn, TechWorld ) The world is not only losing the war against spam, the situation might be about to get a whole lot worse with the emergence of a new type of automatic botnet able to thrive without direct human control, Symantec's...

10 email scams to watch out for

(Debra Littlejohn Shinder, TechRepublic) If it seems like you’re getting hit with more email scams than ever, you’re right. Email scams have been with us since the Internet went commercial back in the early 1990s. But scammers have gotten...

Email related predictions for 2010

(Laura, Word to the Wise Blog) In 2010 e mail marketing is going to get much more challenging for everyone. Recipients, and their ISPs, are expecting more and better things from email marketing. Senders who are currently meeting expectations may...

Spam traps catch 95% of email sent

(Matthew Broersma, ZDNet UK) Less than five percent of all email is delivered to mailboxes, as the rest is junk blocked by spam-fighting efforts, according to Enisa, the European Network and Information Security Agency. While anti-spam measures are...

Cloud storage adoption slow for businesses

(Andy Moon, TechRepublic) A new survey found that only 8% of businesses (small, medium, and enterprise) have any current plans to utilize cloud storage and only 3% are using it now. These results suggest that, while there is a lot of potential for...

5 ways to protect & hide your email to stop receiving spam

(Tina, makeuseof.com) While spam protection has become quite effective at recognizing unsolicited bulk email, it’s still impossible to filter out and stop receiving spam. The easiest way is to control the information you’re releasing about...

Spammers exploiting more news stories

(Lance Whitney, CNET News) "Bomb Blast." "Jackson is still alive: proof." "Obama cursed by Pope." These are just a few of the subjects used by cybercriminals last year to trick people into opening malware-infected...

10 issues to consider during virtualization planning

(Brien Posey, TechRepublic) Server virtualization is becoming increasingly popular, and it seems that everyone is in a mad dash to virtualize their datacenter.  While there’s no disputing the benefits of server virtualization, there are...

America's 10 most wanted botnets

(Ellen Messmer, Network World) Botnet attacks are increasing, as cybercrime gangs use compromised computers to send spam, steal personal data, perpetrate click fraud and clobber Web sites in denial-of-service attacks. Ranked by size and strength,...

Security of virtualization, cloud computing divides IT and security pros

(Ellen Messmer, Network World) Is moving to virtualization  and cloud computing making network security easier or harder? When some 2,100 top IT and security managers in 27 countries were asked, the response revealed a profound lack of...

Why mobility will - and does already - matter to IT

(Chris Silva, ZDNet) While mobile enterprise seems to be a lot of futurespeak, it turns out it does actually matter to CIOs, and has been highlighted in Forrester’s  recent “The Top 15 Technology Trends EA Should Watch” report....

Security tips for large and small businesses

(Steven Andrés, PC World) Whether your business is a big fish or a small-fry home office, you can get hacked just the same, and the stakes are higher than a few canceled credit cards. Here are a few tips to protect your users and your networks...

Mobile Cloud Computing

(Sarah Perez, ReadWriteWeb) According to the latest study from Juniper Research, the market for cloud-based mobile applications will grow 88% from 2009 to 2014. The market was just over $400 million this past year, report says, but by 2014 it...

Email Use Is Increasing

(Morgan Stewart,emailInsider) The Wall Street Journal is the latest to jump on the "email is dead" bandwagon. The article, "Why Email No Longer Rules... and what that means for the way we communicate," opens with the proclamation,...

Top 10 tech skills for 2010

(Jody Gilbert, TechRepublic) What areas should you focus on over the next year? This survey-based list highlights the 10 most sought-after IT skills. At the end of last year, the Global Knowledge/TechRepublic 2010 Salary Survey asked, “What...

Spam plague in February and more to come

(Mis Asia Writer, Network World) Global spam volume grows by 25 per cent. A new research revealed a surge in spam levels in February 2010 to make up 89.4% of all e-mails. Spam levels in Hong Kong reached 90.6% and virus activity in China was the...

10 things to consider before deploying a cloud

(Jack Wallen, TechRepublic) If you’re planning to set up a cloud, be forewarned: The process could turn out to be time consuming, complicated, and expensive. Jack Wallen shares his cloud deployment experiences. Are you thinking about setting...

What Are the Most Underrated Security Technologies?

(Bill Brenner, ComputerWorld) The security community has grown to depend on some basic technologies in the fight against cyber thieves. Here are four techniques and related technologies several cited as underrated in today's security fight. 1....

Top 6 Security Myths and How to Beat Them

(Kenneth van Wyk, Computerworld) Should it really be necessary for a consumer to be a security  expert to safely use a computer? We get disgusted that users keep falling for old tricks. But what are we doing to actually help these people?...

What IT cares about: Key technologies for 2010

(Infoworld Staff, InfoWorld) A survey released yesterday, of where IT pros are actively engaged, confirms strong business interest in analytics, cloud, and collaboration technologies, but it also shows that open source and ERP are falling off their...

Tens of millions still opening junk e-mail

(Dave Rosenberg, CNET) In this day and age of technological advancement and digital lifestyles, it's incredible to me that nearly half of a recently surveyed audience opened junk e-mail (aka spam), intentionally. According to a new survey report,...

New cyber security threats

(Veronica C. Silva, MIS Asia, NetworkWorld) A new report on consumer online behaviour and criminal activities on the Internet noted that new security threats have recently emerged, prompting the implementation of a mix of security solutions to protect...

Mobile Device Security Woes

(Jon Oltsik, NetworkWorld) Large organizations now realize that endpoint security (and management) extends beyond PCs to mobile devices like Blackberrys, Droids, iPhones, iPads. Mobile device security is one of those areas that should get more...

10 ways to make sure your data doesn't walk out the door

(Debra Littlejohn Shinder, TechRepublic) Many organizations focus on protecting against external attacks but ignore a threat that might be even more destructive: data theft by someone inside the company. Here’s an up-to-date look at critical...

5 Best Practices for Enterprise Security

(Jamey Heary, PCWorld) With today's limited security budgets you need to be sure that you've adequately covered your highest risk areas before moving on to other things. Take a look at the top 5 security solutions you can put in place today to cover...

Top 10 Mobile Trends of 2010

(Richard MacManus, ReadWriteWeb) Just as businesses in the PC-based Web spent years in the 90's wondering if a desktop app or web browser based service was the best choice, in 2010 the same question applies to mobile phone applications. 1. Native...

Mac Users Do Not Spam, Linux Users Do

(Wolfgang Gruener, ConceivablyTech) MessageLabs has released a new issue of its monthly intelligence report, which reveals interesting statistics of spam originating from client computers that are infected by botnets. Not surprisingly, most spam comes...

How to Integrate Data Loss Protection in Web 2.0 Security Strategies

(Bob Hinden, eWeek) Businesses in all types of industries today are investing in data loss protection technology at increasingly higher rates because of the increase in corporate insider threats. As more employees utilize Web applications for...

Need for collaboration will drive apps into the cloud

(Stuart Corner, ITWire) The need to integrate mainstream enterprise applications such as ERP and CRM with unified communications services and make them accessible from any device, anywhere will drive all these applications into the cloud over the next...

The Virtualization Checklist

(Susan J. Aluise, Washington Technology) Virtualization could be the least sexy, most essential component of cloud computing – and that means whether it’s a top-down, government-wide initiative or a grass-roots, bottom-up project in a...

IDC Predicts Steady Growth in Cloud Server Market Through 2014

(Chris Preimesberger, eWeek) Based on IDC's first cloud computing survey focused exclusively on servers, the research company predicts that server revenue in the private cloud category will grow from $7.3 billion in 2009 to $11.8 billion in 2014, or...

Are you ready for these Internet security threats?

(Linda Musthaler & Brian Musthaler, NetworkWorld) Symantec has published its annual in-depth threat report and recommendations on how to improve enterprise security. Based on multiple sources, the report presents an in-depth view of what...

A storage virtualization primer

(Scott Lowe, TechRepublic) Storage is perhaps the least optimized component of the virtualized organization, but all of that can change with storage virtualization. Although the concept of storage virtualization can be difficult to grasp, the benefits...

IT Budgets and Cloud Computing Services Increase, Report Finds

(Nathan Eddy, eWeek) A new survey of more than 1,200 cost-conscious businesses shows a growing confidence among IT departments to expand budgets and embrace technologies like cloud computing and virtualization. A report from IT management specialist...

Virtualization Planning: 4 Systems Management Keys to Success

(Glenn O'Donnell and Rachel Dines, CIO) As virtualization management tools proliferate, consider carefully how these tools fit into your IT processes and management portfolio. Keep your eye on these key system management capabilties, says Forrester...

Research: 1.3 million malicious ads viewed daily

(Dancho Danchev, ZDNet) New research indicates that 1.3 million malicious ads are viewed per day, with 59% of them representing drive-by downloads, followed by 41% of fake security software also known as scareware. More findings from the Dasient...

Endpoint security: managing enterprise smartphone risk

(Tim Lohman, Computerworld) Almost by the day, enterprises are becoming more receptive to the consumerisation of IT and introduction of mobile devices and platforms into their environment. But introducing smartphones, netbooks or newer technologies...

Your email address says more about you than you think

(Zack Whittaker, ZDNet) The email address you use shows more about you than you think. There is a psychology to everything, and using the 'wrong' email address could cost you an employment opportunity or more. It sounds simple enough, but I do worry...

What are the prospects for smartphone security threats?

(Chad Perrin, TechRepublic) Smartphones are becoming ubiquitous, but they are still limited in their usefulness. This is actually a boon for their security, at least for now — because they have not been effectively secured well enough to replace...

Cloud security: The basics

(Mary Brandel, NetworkWorld) Cloud computing is one of the most-discussed topics among IT professionals today. And not too long into any conversation about the most highly touted cloud models - software as a service (SaaS), infrastructure as a service...

3.7 billion phishing emails were sent in the last 12 months

(Carrie-Ann Skinner, NetworkWorld) Cybercriminals sent 3.7 billion phishing emails over the last year, in a bid to steal money from unsuspecting web users, says CPP. 25% of Brits have been victims of scams, losing on average £285. A new...

IT professionals still not protecting mobile devices

(Hannah Douglas, ITPro) In a time of threats to corporate data and costly breaches, companies aren’t doing enough to protect sensitive information, according to research. According to a newly released report, sponsored by a data protection and...

Securing 4G smartphones

(Brad Reed, NetworkWorld) Like all good things, the increase in speed and power comes with greater risks: added data capacity, connection speeds makes 4G smartphones more vulnerable. This article describes what any smart IT department should know...

Companies count the cost of IT failure

(Stephen Pritchard, ITPro) Companies are becoming more aware of the direct financial costs of computer downtime, according to a survey of IT managers. One in five businesses lose £10,000 an hour through systems downtime. Almost one in four...

20 Tech Habits to Improve Your Life

(Gina Trapani, PC World) Technology is supposed to make life easier, but it doesn't seem that way when you're struggling to wrangle 289 new e-mail messages, dealing with a hard-drive crash, or suddenly realizing that you left an important file on the...

CRM Vendor Proposals: 10 Items You Need Most

(David Taber, NetworkWorld) If a significant CRM system project is on your agenda in this new fiscal year, here are checklist items that you need to look out for in vendor proposals. 10 Things You Want: 1. A project plan focused on user adoption...

The top 10 'most wanted' spam-spewing botnets

(Ellen Messmer, Network World) Spam continues to grow largely due to the growth in malicious botnets. Many botnets are command-and-control systems used by criminals and are still the main way that spam is spewed into your e-mail box. A recent report...

Security secrets the bad guys don't want you to know

(Robert McMillan, ComputerWorld) You know to keep your antivirus program and patches up to date, to be careful where you go on the Internet, and to exercise online street-smarts to resist being tricked into visiting a phishing site or downloading a...

Set Up a Virtualization Server

(Paul Venezia, ITWorld) If there's one technology that can greatly improve computing environments of any size, it's virtualization. Virtualizing even a small infrastructure can ease administration and reduce costs. The reasons to virtualize even a...

Choosing the right cloud platform

(Phil Wainewright, ZDNet) The emergence of a number of self-proclaimed ‘open’ cloud platforms presents any would-be cloud adopter with a confusing plethora of choice. Taking the bigger picture into account, who are the winners likely to...

Cloud Computing Is More Likely for Low-Risk Systems: Report

(Don E. Sears, eWeek) Three out of five companies are adopting cloud computing technologies, including private clouds and lower-risk technologies, says a new report. The main areas of adoption are in lower-risk technology categories. Low-risk...

10 things you should know about successful cloud-based BPM

(Vinaykumar Mummigatti, TechRepublic) Business process management offers many enticing benefits, including impressive ROI. The problem is, it often fails. See how BPM in a cloud environment can help you overcome barriers to a successful...

Malware reaches all time high

(Tom Brewster, ITPro) Malware levels have reached new heights as the first six months of 2010 proved to be the most active for malicious file activity on record, McAfee has reported. There were 10 million new pieces of malware logged in the first...

Don't get burned: Put some SPF 50 on your business continuity/disaster recovery plan

(Jeff Godlewski, ComputerWorld) On vacation, forgetting your sunscreen may lead to a painful burn, but forgetting key components of an organization's business continuity (BC)/disaster recovery (DR) plan hurts a lot more. Overlooking even one item can...

The 10 best IT certifications: 2010

(Jody Gilbert, TechRepublic) Just as with many popular arguments, IT certifications are popular fodder for debate. Except that certifications, in an IT professional’s microcosm of a world, have a bigger impact on the future. Just which...

Enterprises Ready to Turn to Cloud E-Mail

(Maxwell Cooter, CIO) The battle for email cloud is set to heat up as enterprises start to rethink their email strategies, that's according to Forrester chief analyst, Ted Schadler. In a new Forrester report, Four Giants Compete For Your Cloud Email...

How secure are virtualized servers?

(David Heath, ITWire) You'd think that a virtualized environment would be a safe way to encapsulate a server, but that appears to be far from the truth. Earlier this year, Gartner released its own research  into the security of virtualized...

Sophos booklet helpful in corporate security awareness

(M.E.Kabay, NetworkWorld) The recently-released free Sophos booklet, "10 myths of safe web browsing", is a simple, short summary of some basic Web safety information that can serve our purposes in raising security consciousness and...

Five tips for avoiding self-inflicted email security breaches

(Chad Perrin, TechRepublic) Email security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of email security is ensuring you don’t shoot yourself in the foot. These tips focus on...

Do not underestimate the bad guys

(Mike Bantick, ITWire) Security firm Sophos has recently produced its 2010 mid-year Security Threat Report, and whilst many things remain the same, there are plenty of new security vectors for the connected among us to deal with. If there is one...

Most hacking victims blame themselves

(Robert McMillan, ComputerWorld) Just under two-thirds of all Internet users have been hit by some sort of cybercrime, and while most of them are angry about it, a surprisingly large percentage feel guilt too, according to a survey commissioned by...

Vulnerability management: The basics

(Bill Brenner, NetworkWorld) The more apps companies deploy, the more complicated vulnerability management becomes. In the rush to find every security hole and seal it off from potential hackers, it's easy to let something important slip through....

A list of hottest IT security certifications

(Carolyn Duffy Marsan, NetworkWorld) Interest in IT security certifications is booming, as more U.S. companies tighten up the protection surrounding their critical network infrastructure and as a growing number of employees view security expertise as...

Fear of data loss, social media security risks rising

(Joan Goodchild, NetworkWorld) A new survey finds more organizations are dealing with data loss and security breaches due to employee use of social media sites. Email security firm Proofpoint polled 261 IT decision makers at organizations with more...

10 things you should know about supporting mobile devices

(Brien Posey, TechRepublic) The explosion of mobile device usage in business has led to some tricky and unexpected support challenges. Brien Posey lists some of the concerns IT pros should be aware of. Mobile devices have been around in one form or...

Mobile workers pose biggest security risk

(John E Dunn, TechWorld) Mobile workers trigger more security alerts when they leave the office than when they do at their desks, the latest Symantec MessageLabs Intelligence Report has suggested. According to the company, the explanation for this...

6 tips for guarding against rogue sys admins

(Carolyn Duffy Marsan, NetworkWorld) One of the biggest threats that organizations face is losing sensitive data - such as payment card or personally identifiable information about customers or employees - to theft from their own employees. The threat...

Report: 95 percent of all email is spam

(Lance Whitney, CNet) Spam accounted for 95% of all email sent worldwide during the third quarter, according to a report released today. Panda Security's third-quarter report also found that 50% of all spam came from 10 countries, with India,...

Gartner: Enterprise IT spending to hit $2.5 trillion next year

(Network World) Worldwide enterprise IT spending will rise from $2.38 trillion this year to $2.46 trillion in 2011, a 3.1% increase, the research firm Gartner said Monday. "Over the next five years, enterprise IT spending will represent a...

Gartner's top 10 technologies for 2011

(Larry Dignan, TechRepublic) Gartner on Tuesday outlined the 10 technologies it thinks will give technology execs the most bang for their budgets in 2011. How many of these technologies will be a true hit? Here’s Gartner’s 2011 list: 1....

People feel safer on a PC than on a mobile device

(Lance Whitney, CNet) A majority 87% of people polled for a new study think their home PCs offer better defense against viruses, malware, and hackers than do their mobile phones. Released today by the National Cyber Security Alliance and Symantec, the...

Email is top cloud application in Europe

(Maxwell Cooter, TechWorld) European cloud users see email as the first technology to be ported to the cloud, in stark contrast to North Americans who see software testing as the main reason to go down the cloud route. Furthermore, European companies...

A hazy view of cloud security

(Dave Kearns, Network World) More than three-quarters of the respondents in a recent survey couldn't say who they believe should be responsible for data housed in a cloud environment. A recent survey of 384 business managers from large enterprises...

Encryption adoption driven by PCI, fear of cyberattacks

(Ellen Messmer, NetworkWorld) A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI)...

Top Ten Business Predictions for 2011

(Michael Friedenberg , ComputerWorld) It's the time of year for bold and brazen predictions, so here's a forecast of the Top 10 trends, priorities and events of 2011. 10. Social media will keep dominating the business conversation. 9. The CIO-CMO...

Survey: private cloud the choice of two out of five organizations

(Joe McKendrick, ZDNet) Many in the industry don’t recognize the concept of “private cloud,” saying that it fails to meet the true definition of cloud, being a collection of resources across the Web. However, it looks like many...

Keep Your E-Mail Private and Secure

(Tony Bradley, PC World) E-mail is one of the most widely used forms of communication today. Estimates from May 2009 suggest that around 250 billion e-mails are sent every day. That equates to more than 2.8 million e-mail messages per second, and some...

Report: Spam down, but malware continues hold

(Lance Whitney, CNet) Spam may be down but malware marches merrily on. That's the message from the "November Threat Landscape Report" released yesterday by security vendor Fortinet. Global spam levels ultimately fell 12% in November after...

Top Security Predictions for 2011

(Tony Bradley, PC World) It's time to look ahead to 2011 with some predictions for what the year holds in store for security. Aside from the festivities of the holidays, one thing that always makes December special is the combination of reflecting...

7 Scrooge-worthy scams for the holidays

(Joan Goodchild, NetworkWorld) All crooks want for Christmas is to steal your money and sensitive information. Security experts give tips on avoiding scams. The 2-week mark before Christmas is when things start to ramp up out of control. Spammers...

Five cloud security trends experts see for 2011

(Bob Violino, CSO) What do CSOs and other IT security experts expect to be top-of-mind cloud security issues in 2011? Here are five things to watch for in the coming year: 1. Smart phone data slinging 2. Need for better access control and identity...

10 year-end tasks for network administrators

(Rick Vanover, TechRepublic) With 2010 coming to a close, this is a great time to get things in shape for next year. Here are some tips to help you get ready for 2011. 1. Use up that remaining budget 2. Get your software and hardware maintenance up...

Axigen Free Mail Server - A Great Alternative to Open Source

Are you planning to jump on the “open source software” bandwagon? Or contemplating the idea of switching from an open source setup to a commercial solution? Here are a few considerations to keep in mind. This article discusses the...

New Year's Tech Resolutions for Small Businesses

(Christopher Null, ComputerWorld) There's no telling what the future will bring, but one thing is sure: In the world of technology, nothing stays the same for very long. The year 2010 wasn't terribly turbulent for tech, but 2011 is shaping up to be...

Virtual, mobile, social endeavors drive IT in 2011

(Ann Bednarz, NetworkWorld) Caution still pervades the economic forecasts, but it's not deterring IT executives from aggressively expanding their virtualization efforts, extending mobility initiatives, and tackling newer priorities such as cloud...

Top 10 Tech Scares of the Decade

(Sarah Jacobsson Purewal, PCWorld) The dawn of the new millennium prompted fears about the future, but so far reality has not quite matched the predictions of catastrophe. The first 10 years passed uneventfully - well, aside from Y2K and a bunch of...

Cybercriminals shifting focus from PCs to mobiles

(Stuart Corner, ITWire) Cisco has released its annual security report saying it shows "a major cybercrime turning point" in that cybercriminals have begun shifting focus from Windows PCs to smartphones, tablets and mobile platforms in...

Forrester: 2011 security strategy recommendations

(Khalid Kark, NetworkWorld) Every New Year brings an opportunity to review existing security plans and adjust strategies for the next year. Most CISOs are struggling with the same issues, ranging from dealing with the changing threat landscape to...

10 things to look for in a data center

(Erik Eckel, TechRepublic) Going to the cloud might make a lot of sense for your organization — but only if you choose a secure, reliable data center that can handle your needs. Erik Eckel runs through 10 essential criteria for data center...

10 tech trends to watch in 2011

(Gil Kirkpatrick, TechRepublic) Based on the results of surveys conducted at The Experts Conference last year, analysts at Quest Software have put together this set of predictions for the upcoming year. There is a lot of buzz right now over cloud...

Low security awareness found across IT

(Jaikumar Vijayan, ComputerWorld) A broad spectrum of IT people, including those close to security functions, appear to have little awareness of key security issues impacting their organizations, a new survey shows. About 22% of respondents claimed...

Security departments not prepared for new technologies

(Joan Goodchild, CSO) Rapid adoption of mobile technology, social media and cloud computing in the workplace is creating a security problem for IT departments worldwide as they struggle to keep pace with demands, according to a survey released this...

Five tips for deciding whether to virtualize a server

(Brien Posey, TechRepublic) Not all servers are suited for virtualization. Be sure you consider these possible deal-killers before you try to virtualize a particular server. Even though server virtualization is all the rage these days, some servers...

Beware the coming corporate smartphone threat warn experts

(Lia Timson, ITWire) Rogue smartphone applications coupled with social engineering will be the undoing of corporate IT infrastructures, network security experts have warned. As more and more enterprises succumb to the temptation of allowing employee...

Corporate data breach average cost hits $7.2 million

(Ellen Messmer, Network World) The cost of a data breach went up to $7.2 million last year up from $6.8 million in 2009 with the average cost per compromised record in 2010 reaching $214, up 5% from 2009. The Ponemon Institute's annual study of...

Surge in malware marks start of year

(Lance Whitney, CNET) The first three months of the year have so far witnessed a rise in malware and some notable cyberattacks, according to a report released today by Panda Security. Tracking a big jump in malware (PDF), Panda Security has...

How to Reduce Malware-Induced Security Breaches

(Steve Dispensa, eWeek) Malware has caused the industry to rethink its security best practices, introducing tools such as transaction verification to guard against real-time, man-in-the-middle attacks. Out-of-band authentication mechanisms are growing...

10 challenges facing IT

(Alan Norton, TechRepublic) IT is always facing challenges. Some of these challenges have slowly changed over time, but many of them are perennial offenders. How will IT meet these challenges today and in the near future? Where do they rank in order...

10 things to keep in mind when purchasing a new server

(Brien Posey, TechRepublic) If you’re in the market for a new server, you need to evaluate your choices carefully to make sure the one you buy will meet your needs. A network server is a big investment and usually represents a long-term...
News posted by daniela.manolescu

AXIGEN Expands Its BlackBerry Mobile Sync with AstraSync

Bucharest, Romania – March 4, 2010 – AXIGEN, the professional messaging solution vendor (www.axigen.com), announced today that it has expanded its mail servers’ mobile sync functionalities for BlackBerry® users by adding support...

Free mobile sync from AXIGEN Mail Server

The AXIGEN Team (http://www.axigen.com) is happy to announce their latest promotion, centered on offering business travelers free mobile email in addition to the messaging solution that fits them best. In today’s competitive marketplace, mobility...

AXIGEN Releases New 7.4 Beta Version with Greylisting

The AXIGEN Team (http://www.axigen.com) is happy to inform you that AXIGEN Mail Server 7.4 Beta has just been released. The new version focuses on enhanced email protection, introducing advanced security features such as Greylisting.The...

AXIGEN Reaches Malta through 4sIghT Consultants

Bucharest, Romania, and Msida, Malta - May 4 2010 – AXIGEN (www.axigen.com), the professional messaging solution vendor, announced today the signing of their first reseller agreement in Malta, with 4sIghT Consultants (www.4sightconsultants.com)....

Kaspersky Lab and Axigen Partner to Deliver Premium Email Security

Bucharest, Romania – August 18, 2010 – Kaspersky Lab (www.kaspersky.com), a leading developer of secure content management solutions, and Axigen (www.axigen.com), the professional messaging solution vendor, announce today they have signed a...

Axigen Releases Version 7.5 with Top Level Security & Performance

Bucharest, Romania – September 1st, 2010 – Axigen, the professional messaging solution vendor, announces today the commercial release of version 7.5 of their integrated email, calendaring and collaboration platform. Axigen 7.5 raises the...

Axigen Enhances Worldwide Channel Partner Program

Bucharest, Romania, November 1, 2010 – Axigen (http://www.axigen.com), the professional messaging solution vendor, announced today the launch of its enhanced Partner Program, redesigned to provide channel partners with increased Axigen sales,...

Experience the Axigen Ajax WebMail with Calendars, Tasks and Notes

The Axigen Team (http://www.axigen.com) has added calendars, to do lists and notes to their Ajax WebMail interface and wants your opinion on it. Take the Alpha demo now and have your say on what you like, dislike or should be improved (in terms of...

Axigen Presents Itself as a Fully Grown Messaging and Collaboration Platform with Version 8

Bucharest, Romania – March 31, 2011 – Axigen (http://www.axigen.com), the professional messaging solution vendor, announced today the commercial release of a new version of their flagship product, the Axigen messaging platform, proving its...
Events posted by daniela.manolescu

AXIGEN Webinar: Taking the road to Virtualization

AXIGEN (www.axigen.com), the professional messaging solution vendor, is pleased to announce a free, live webinar entitled ‘Taking the road to Virtualization’, scheduled for May 25, 09:00 GMT and May 27, 16:00 GMT, 2010.Join this 40 minute...
Already a member?
Blacklist monitoring alerts
sign up Signup for our real-time monitoring service and receive email notifications each time one of your IPs gets blacklisted.
Free Signup
Mail Server Operating System Poll
.01

What OS do you use for your email server?
Linux
Windows
Other
disabled next
.02

How many mailboxes do you currently manage?
1-50
51-300
300+
previous next
.03

Would you like to comment upon the choosing of this particular OS?

previous
 
DNS Tools
Get IP status, owner and location, obtain its corresponding hostname or check specific ports.
Ping Statistics
Reverse DNS Lookup
Whois Info (IP owner)
GeoIP Information
Check Port
Open Relay Test
Test if your mail server is an open relay for spammers.
Blacklist Checker
Check if your IP is listed in DNS based email blacklists (DNSBL)