messaging protocol


Also found in: Dictionary.

messaging protocol

The rules, formats and functions for exchanging messages between the components of a messaging system. The most widely used messaging protocol is the Internet's Simple Mail Transfer Protocol (SMTP). Other messaging protocols are IBM's SNADS, Novell's MHS, Lotus' cc:Mail, Microsoft's MS Mail and the international X.400. See messaging system.
References in periodicals archive ?
We expect to establish similar emergency messaging protocols in other cities where Clear Channel Outdoor has deployed digital networks.
This solution will enable customers to address both internal and external threats carried in a variety of messaging protocols via one single, open platform with integrated dashboard reporting that meets the needs of compliance enforcement and secure content management.
This solution will enable customers to address both internal and external threats carried in a variety of messaging protocols, including webmail and instant messaging, via a single, open platform with integrated dashboard reporting that addresses the needs of compliance enforcement and secure content management.
This prevents messaging protocols being subverted and being used for external network attacks or unauthorized transfer of confidential data.
CipherTrust's integrated best-of-breed capabilities deliver maximum availability and unmatched security, effectiveness and enterprise manageability across multiple messaging protocols including e-mail, instant messaging and Web-based mail.
iTKO's LISA 3 release includes several significant component and system testing capabilities, including functional and load test suite management, native support for messaging protocols, and an improved workflow process so non-developers can easily learn and test every layer of an SOA application.
It supports standard messaging protocols including Financial Information Exchange (FIX), and the marketdata protocols of the major stock exchanges.
In the last 12 months, our customers have been asking us to apply our highly effective policy-based approach to e-mail security to other messaging protocols.