Security Experts:

Greg Olsen's picture

Greg Olsen

Greg Olsen is Director of Business Development at Sendmail, Inc. Greg has more than 20 years of experience as an IT professional. He has been designing, deploying, and managing SMTP email infrastructures for 17 years. He has broad industry experience across high technology, higher education, government, and financial services industries. In his current role at Sendmail, Inc., he manages the third-party technology partnerships, including VMWare, and the open source initiatives of Sendmail.

Recent articles by Greg Olsen

  • There are specific situations where it makes sense to deploy a load balancer for email and times when deploying a load balancer can actually lower the reliability and service level of an email infrastructure.
  • Transport Layer Security is a means of securing the transmission of email between two MTAs (mail transfer agents). In this column, I’ve highlighted some of the other things that can be done with TLS besides this opportunistic encryption of email.
  • Inbound email to your firm containing important communications related to revenue or customer service could be blocked by your own anti-spam software. How can you prevent against false positives?
  • Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing. This trend toward Converged Infrastructure has important implications for the email security IT infrastructure.
  • Thinking of migrating mailboxes to a cloud provider? The email backbone is an important architectural tool when dealing with the migration of email mailboxes and maintaining email integrity during the migration process.
  • These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
  • The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.
  • One of the best ways to optimize security for messaging infrastructure is to leverage the power of something already deployed—the corporate directory.
  • Enterprises today need to not only understand how Data Leak Prevention (DLP) impacts their organization, but also need to be aware of DLP specifically as it relates to email.
  • DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
  • When considering policy-based email encryption, there are best practices that an organization can follow for policy-based email encryption.
  • Email is a primary mode of communication in business today and consequently is a mission critical enterprise application. A well-designed corporate email infrastructure should have a security architecture built on the bastion host principle.
view counter