Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Any good software to control emails and attachment?

Posted on 2006-06-28
7
Medium Priority
?
171 Views
Last Modified: 2013-12-04
Is there any good software that will check and block user from sending unauthorised attachments?  or log the content of the attachment?  recently i find that my staff might be sending out company's confidential document throught emails.

We are using some email services provided by the 3rd party company, certain staff using MS Outlook to access their emails, while some simply use the webmail to read.  We don't have an in house mail server, thus cannot control the emails flow to or from our company.
0
Comment
Question by:ohjani
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
7 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 200 total points
ID: 16999771
As there is webmail involved, you'd have to ask your mail service provider to do that for you.
0
 
LVL 1

Author Comment

by:ohjani
ID: 17006758
i've already asked them, they said they dont have any service for that.  That's why i need to look for it myself.  i was thinking prob some keylogger, or email logger kind of stuff to be installed in my staff pc ... but not really those keylogger which track all your key stroke, i just need something similar to that, but log down the email (uploading and downloading) transaction detail ..
0
 
LVL 1

Author Comment

by:ohjani
ID: 17136426
Admin,

i'd like to close this question since no one has provided me with any solution.  TQ
0
 
LVL 88

Expert Comment

by:rindi
ID: 17136492
I did provide you with the possible solution, the only chance being that your provider does that, if he can't do it then there is no other solution (except change the provider for one which supports such functions).
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
How to fix incompatible JVM issue while installing Eclipse While installing Eclipse in windows, got one error like above and unable to proceed with the installation. This video describes how to successfully install Eclipse. How to solve incompa…
Suggested Courses

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question