View

Sorting

Products found: 75

logo
Offer a reference bonus
0.00

Agari Phishing Response

Challenges of Phishing Incident Response

SOC Time is Valuable While employee reported phishing is important for breach threat intelligence, these reports can overwhelm Security Operations Center analysts due to the sheer number of reported phishing incidents—the majority of which turn out to be false. Many organizations receive tens of thousands of phishing incident reports per year, requiring analysts to correlate data from five or more tools, sift through tedious email logs, and then manually remove emails one by one from inboxes. Manual Phishing Incident Response is Inefficient It can take Security Operations Center analysts five hours or more to manually triage, investigate, and remediate a single phishing incident manually. With the average cybercriminal exfiltrating data from a breach within hours, that precious time can be the difference between preventing a breach and losing millions. The Agari Advantage
  • Prevent Impersonation. Keep your CEO and other key executives safe by preventing email impersonation by attackers.
  • Block Zero-Day Attacks. Stop never-seen-before attacks from exploiting security gaps within your organization.
  • Detect Account Takeovers. Discover attacks from compromised email accounts before they result in financial or information loss.

Key Capabilities

Contain and Remediate Incidents Automatically in Minutes By streamlining response times and automatically removing malicious emails from inboxes, Agari Phishing Response contains breaches in minutes instead of months. Agari Phishing Response provides an end-to-end automated phishing playbook that integrates with Microsoft Office 365 to handle employee phishing reports, triage them, discover similar phishing campaign emails, perform forensic analysis, and then automate the remediation process.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
5
7
logo
Offer a reference bonus
1.00

Allot Communications Secure Service Gateway

Protect network uptime and efficiency Allot Secure Service Gateway is built on the same carrier-class performance and reliability that Allot brings to many of the world’s largest network operators. Flexible redundancy configurations plus passive bypass with automatic port failover maximize uptime and availability. Automate operations and lower TCO Allot Secure Service Gateway integrates multiple functions in an Intel-based platform that protects your investment and lets you scale from 2 to 22 ports of 1GE/10GE network connectivity in a single appliance. Get the visibility you need to control application performance Allot provides live traffic monitoring and usage reporting according to traffic policies that are mapped to your complex data center and cloud applications, giving you full visibility and control of application performance, web access, user quality of experience, shadow IT and web threats. Protect users from Internet threats and enforce acceptable use Allot helps you embrace and maximize the business value of cloud (web) applications by detecting and blocking malware, phishing and other web threats before they harm application performance and user productivity. Allot Secure Service Gateway also detects and surgically filters DDoS and bot traffic before it affects your network. With Allot Secure Service Gateway you can:
  • See how well your mission-critical applications are performing and supporting user productivity
  • Control application performance and improve Quality of Experience according to business priorities
  • Keep malicious or unauthorized user/application traffic off your network
  • Neutralize threats and ensure ongoing performance of business applications
  • Enforce Acceptable Use Policy for shadow IT, BYOD, resource usage
  • Troubleshoot and resolve network issues in real time
  • Simplify and automate your operations
  • Reduce opex and TCO
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
19
18
logo
Offer a reference bonus
0.00

AnubisNetworks MPS

For Service Providers Grow your revenue and lower your costs, managing and selling email security services. The great skillset of Service Providers, their ability with communications networks, and especially their proximity to customers, make Service Providers especially fit to provide carrier-grade systems and value-added managed services on the Cybersecurity market. For Enterprises Email security is critical for business to face the growth of cyber threats The permanent relevance of Email in organizations, affected by the increasing security concerns associated with phishing, data leakage, and privacy protection, among others, pushes Service Providers to provide Email Security on top of the existing email infrastructure. Preferably, with an Email Security service robust enough to build trust on organizations, while becoming a value added service for the cloud platform itself, as well as hosted Service Providers and Resellers. MPS Characteristics AnubisNetworks Global Threat Intelligence Platform AnubisNetworks’ security ecosystem permanently monitors the world for Botnets, IP Reputation, Email phishing and Malware campaigns, and communicates with MPS edge filters, for real time proactive malware prevention. Control Features on top of Security Features DLP (Data Leakage Protection), Quota Management, Rate control, Email Validation, transport Encryption and many other features are available per user and per scope, taking this platform far beyond Email Security. Complete Visibility on your platform Complete details on messages and queues for inbound and outbound flows. MPS also contains several dashboard data, system auditing, business information tools, each feature configurable by scope and data. Customizable/White Label GUI Each of the hierarchy scopes can be fully customized with your brand identity, your partners and your end customers. Lean Management of Quarantine Quarantine can be managed by IT and/or end users, in a centralized console, with the option of web end user interface and/or email interface (via periodic digests). Hierarchic Multitenant System for Inbound and Outbound An advanced architecture with several administration scopes (Virtual scopes, SMTP domains and LDAP based Organizational units), each with distinct roles – including Helpdesk users - for both centralized and delegated management. Email Secure Routing and Virtual Aliases MPS brings a new dimension to email routing management by enabling the usage of BCC, Email Queue holding, Distribution lists, Virtual Aliases, and Listeners based routing. And protected under SPF, TLS and DKIM encryption mechanisms. Auditing, Monitoring and Billing information Advanced and easy access to detailed information on all activities and system information, for billing, auditing and compliance purposes. Email Control
  • DLP - Data Leakage Protection
  • Multitenant Quota management
  • White & Blacklists inheritance
  • Attachments Discovery
  • BCC and Archiving plugins
  • AD Integration for AAA
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
16
1
logo
Offer a reference bonus
0.00

AppRiver Email Security

Running a business is stressful enough in this economy. There was a time when you only needed to worry about a few suspicious email messages in your inbox. Now, any message could be a potential phishing threat lurking in your inbox. It only takes one email to trick your employees and penetrate your network. AppRiver’s Advanced Email Security blocks 99 percent of unwanted mail and malware, keeping your inbox clean and your network safe. Our Threat Intelligence technology relies on the AppRiver security platform and expert human analysis to identify threats and evolve our defenses in real time, keeping our customers safe from brand-spoofing attacks, Business Email Compromise (BEC) attempts, conversation hijacking, and other potentially harmful forms of social engineering. Impersonation Protection Email Security defends businesses and trusted individuals from targeted email attacks such as Whaling or BECs. Our technology checks deceptive email address sources against key display names and quarantines the message or flags the message with a customizable indicator in the subject line. Features:
  • Modern dashboard that spotlights phishing and malware threats
  • Real-time protection from phishing and malware
  • Proprietary technology that protects against conversation hijacking
  • Maximizes or limits user control options
  • Over 60 filtering techniques
  • Office 365-compatible
  • Efficiently filters quarantine with convenient declutter feature
  • Viewable or searchable quarantined messages for a domain
  • Downloadable messages for further analysis
  • Full security management with Two-Factor authentication (2FA)
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
4
logo
Offer a reference bonus
0.00

Avanan

As hackers constantly update their attack methods, Avanan continues to test new algorithms and technologies from different vendors, and adds them to the platform to stay ahead, giving you a significant advantage, future-proofing your security. Avanan's unique position, inside the cloud allows it to catch attacks that have already bypassed Office 365 and Google's default security scans. No single vendor can offer the level of protection provided by Avanan's true defense-in-depth security Features: SECURES INBOUND, OUTBOUND, AND INTERNAL EMAIL While email gateways are blind to internal email,Avanan can see every message,- inbound, outbound, internal, and historical - to block attacks that they can't even see. Avanan deploys inside your Office 365 or Gmail, just like an app,. This gives us real-time and historical visibility into every user, file, event, and policy. BREACH DETECTION Perimeter email gateways can only see external attacks making them blind to insider threats. Not only can Avanan see every email, it monitors the entire suite--every user, every configuration, permissions change, file update and internal message--to identify malicious behavior and compromised accounts UNTESTABLE BY HACKERS Other mail gateways require you to change your DNS MX record,revealing your security to the attackers that can target their vulnerabilities. Because Avanan deploys from the inside, hackers will never know the type of technology nor the depth of your protection. PROTECTION BEYOND EMAIL Avanan secures more than just your email, extending its protection to messages and shared files in other Enterprise SaaS applications like Slack,Box, Dropbox, Google Drive, One Drive and more. DEPLOYS IN MINUTES Avanan is the only cloud-based email security solution that deploys from within Gmail, Microsoft, or whichever SaaS you want to secure. Approve our app from your admin account and in minutes,Avanan finds phishing attacks? completely out of band, with no need for a proxy, appliance, or endpoint agent. MULTI-LAYER DEFENSE When you deploy Avanan, you are really deploying an army of best-of-breed security tools to protect your organization from phishing attacks. We cloudified pre-configured, zero-management versions of the top security tools in the industry. Each security tool runs in parallel, acting as an additional layer of security with no additional latency. Benefits of Avanan:
  • Deploys Inside the Cloud. 100%visibility, with no need to put a gateway or agent between your users and their apps. No latency, no disruption, no change in user experience
  • Pre- configured. We take our partners' latest software and wrap the core technology in the Avanan API, standardizing all their user, file, event and policy information. We make cloud-native versions that are not available anywhere else.
  • Single License. You don't need to pay for each security tool individually. Avanan consolidates each vendor's individual licensing model into a single per-user per month subscription.
  • Standardized Universal Policies. Every SaaS has a completely different policy engine, each with its own rules and enforcement capabilities. With Avanan you can create one policy and apply it everywhere without having to do the translation.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
18
logo
Offer a reference bonus
0.00

AVG Technologies Internet Security

Protect your personal files and your private life

Malware doesn’t just affect your PC anymore — it’s gotten personal. Through ransomware and webcam spying, hackers can get to your most personal files and photos, or even peep into your home. AVG Internet Security now comes with new Webcam Protection and Ransomware Protection features to secure your personal files — and your private life.

Features

Computer Protection Our advanced antivirus scans for, removes and flat-out stops viruses, ransomware, spyware, rootkits, Trojans, and other nasty malware — and because it all happens in real time, we can catch threats before they reach you. We secure your USB and DVD drives just as quickly, too. Our favorite bit? It updates your security automatically, and uses advanced Artificial Intelligence (AI) and real-time analysis to help stop even the newest threats from getting near you. Web & Email Protection Your email has never been safer. Our Email Shield technology specifically targets email attachments to stop threats, wherever they may come from — malicious senders or friends sending malware out unknowingly. Your online security is guaranteed with real-time link & download scanning, and protection against unsecure Wi-Fi spots. If you click it, we scan it — with our best internet security software, you always know your way is clear. Hacker Attacks Protection Our Enhanced Firewall gives you full control over exactly who and what comes in and out of your PC. And our Ransomware Protection provides an extra layer of protection against ever-increasing ransomware attacks. That means nobody messes with any of your private data, files, photos, and passwords — no hackers, no ransomware, nothing. Privacy Protection Keep peeping Toms and suspicious applications from accessing your webcam, encrypt and hide your most private photos and files, or permanently shred documents you’re done with. Payments Protection Whether browsing, banking, or shopping, this is the added internet protection you need. We block spam and scams, and even help you avoid fake copycat websites, to prevent you from accidentally giving our passwords or credit card numbers to the bad guys.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
19
5
logo
Offer a reference bonus
0.00

Axigen Business Mail Server, Calendaring & Collaboration

Business-class Messaging

Powerful technology at your service... Axigen's high-performance mail server technology is specifically built to provide you with fast & secure email communication (via Axigen SmartProcessing™ & Axigen GrowSecure™), while ensuring effective space management (via intelligent Axigen UltraStorage™). ...adapted to work the way you do Available on both Windows & Linux OS, the Axigen messaging solution for business adds to this powerful technology just the right touch of everything: email, calendaring & collaboration, all backed-up by efficient 24x7 technical support.

Calendaring & Collaboration

Schedule meetings & organize tasks Organize your business with effective time-management tools such as personal & public calendars, tasks & notes, available from WebMail, MS Outlook & iCal (Webcal) compatible clients. Share & delegate Share personal email & calendar folders, contacts, appointments & tasks with co-workers. Reserve common company resources, such as meeting rooms & projectors.

Local & Remote Access

Native connectivity with MS Outlook Communicate using MS Outlook, while taking full advantage of Axigen's calendaring & collaboration - via our Outlook Connector (including offline work, advanced search & filters etc). Ajax "Refreshless" WebMail with desktop-like usability Offers you keyboard navigation & shortcuts, drag-and-drop, "Live" email list view, frequent folders, email filters, out-of-office messages, individual Blacklist / Whitelists. Mobile WebMail interface Access your WebMail account from mobile devices with Internet access to check emails, compose / delete messages, set permissions on folders & much more. Other POP / IMAP desktop clients Alternatively, send & receive emails from many other popular POP3 / IMAP email clients, such as Mozilla Thunderbird or Apple Mail. Brandable & localized standard WebMail interface A fast & friendly web interface, with HTML email composer, temporary email addresses (account aliases) & RPOP connections. Easily brandable & localized in your native language (over 25 languages available), with several skins to be used at the end-user's choice.

Wireless Mobile Sync

With ActiveSync®-enabled devices Synchronize your email, contacts, calendars or tasks by using Axigen's built-in Exchange ActiveSync® support for mobile devices. With BlackBerry® smartphones Gain instant access to relevant data such as email messages, contacts or calendars, regardless of time & location, from your BlackBerry® smartphone, via the AstraSync™ or the NotifySync™ client.

Extensive Security Toolset

Multi-layer security The Axigen mail server guarantees secure reception, transit & delivery of email. Protect your confidential data with an extensive set of defensive tools. AntiVirus & AntiSpam integration For extra email protection, you can extend Axigen's standard ClamAV & SpamAssassin defensive tools by integrating any of the available commercial Antivirus & AntiSpam apps.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
9
8
logo
Offer a reference bonus
0.00

Axway MailGate

IT managers constantly strive to balance the need for security with the desire for productivity, by deploying secure tools which allows employees to get their jobs done in and out of the office, while also protecting valuable assets and complying with corporate policies. Axway MailGate SC stands guard at the Internet gateway, preventing potentially damaging messages and attachments from entering your network, and ensuring that sensitive information doesn’t exit accidentally or unsecured. Combining network protection, policy-based content filtering, and automated encryption in a single solution, MailGate SC protects your email network inside and out, reducing administrative headaches, infrastructure costs, and the liabilities associated with unsecured and unmanaged email and file exchange. Comprehensive, flexible, and easy-to-manage email security Axway MailGate SC provides multiple tiers of security that can be used individually, or in combination, to block threats at the DMZ and within the enterprise network, and secure inbound and outbound email traffic at the content and network levels. MailGate SC can seamlessly plug-and-play with your existing architecture with no browser or operating system dependencies, giving you the flexibility to add new levels of security as your needs change — without making changes to your enterprise systems, applications, protocols, or end-user workflows. Centralized email security management
  • Centralized management means you can have MailGate SC up and running quickly, processing close to two million messages per hour
  • A powerful management dashboard provides real-time visibility into email traffic, network attacks, spam statistics, message queues, content filtering, and more — even across multiple instances or virtual environments
  • Automated report generation, data export for custom reporting, and advanced message tracking save time and improve visibility
Advanced Threat Protection Protect against incidents such as Ransom Lockouts, C&C Callbacks and other sophisticated threats carried by Ransomware, Malware, and botnets.
  • Sandboxing removes suspicious attachments from the mail flow, opening them in a secure isolated environment
  • URL Evaluation analyses URL’s embedded in messages, identifying those that may link to a payload or attempt credential-jacking
Data Loss Protection
  • Scan and analyze email and shared file content and more than 300 types of attachments, including multiple levels of embedded archive files and hidden document text
  • Set up simple checkbox filters to identify personal and financial data, including Social Security or personal identification numbers, banking/trading (CUSIP), and credit/debit card numbers
  • Use the financial services lexicon to scan for personal financial information, including statements, account numbers, PINs, and trade confirmations
  • Use the HIPAA lexicon to scan for PHI, including patient identifiers, medical diagnostics and procedures, drug names, and treatment phrases
Encryption and secure delivery
  • Define policies that automate gateway-to-gateway email encryption for any remote domain
  • Enforce TLS or S/MIME connections with remote domains, hostnames, partner sites, or IP addresses
  • Receive automatic alerts on TLS attempts and failures
  • Deliver secure email to any recipient without the need for desktop software, using MailGate SC’s Secure Mailbox capability
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
3
12
logo
Offer a reference bonus
2.40

Barracuda Email Security Gateway

Provides Inbound/Outbound Filtering and Data Leak Prevention The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks. As a complete email management solution, the Barracuda Email Security Gateway lets organizations encrypt messages and leverage the cloud to spool email if mail servers become unavailable. The Barracuda Email Security Gateway is offered without per-user or per-feature fees, and is also available as a virtual appliance or in a public cloud environment (Amazon Web Services (AWS), Microsoft Azure, or VMware vCloud Air). For hosted email security, see Barracuda Essentials for Email Security. Protect Against Email-Borne Threats With the Barracuda Email Security Gateway, protecting against inbound malware, spam, phishing, and Denial of Service attacks ensures that business productivity isn’t impacted by attacks through the email system. Powerful and customizable policies enable further enforcement of detailed requirements that govern inbound email messages. Stop Threats before They Hit the Network Offload CPU-intensive tasks like antivirus and DDoS filtering to the cloud reduces the processing load on the appliance and to ensure that threats never reach the network perimeter. The Barracuda Email Security Gateway is integrated with a cloud-based service that pre-filters email before delivery to the onsite Barracuda Email Security Gateway, which performs further inbound security checks and outbound filtering. Ensure Continuous Email Availability Email is a critical vehicle in today’s business world, therefore a failure of the email server can significantly limit business operations. With the Cloud Protection Layer, bundled free of charge with the Barracuda Email Security Gateway, email is spooled for up to 96 hours, with an option to re-direct traffic to a secondary server. Protect Sensitive Data Leverage powerful encryption technology to ensure that sensitive data cannot be viewed by outside parties. Outbound filtering and quarantine capabilities certify that every outbound email complies with corporate DLP policies. Simple and easy to deploy configurations on the Barracuda Email Security Gateway guarantee that customized email protection is in place in a matter of minutes. Cloud-based centralized management enhances day-to-day workflow and is included with no additional fees. The affordable, all-inclusive pricing model has no per-user fees, minimizing the investment in securing your email infrastructure.
... Learn more
ROI-calculator
ROI-
-
1
10
logo
Offer a reference bonus
2.00

Barracuda Sentinel

A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise Stop Targeted Attacks Before They Reach Your Users Business Email Compromise (BEC) has cost businesses $12B since 2013 plus untold additional losses from lost productivity and damage to reputation. Email impersonation attacks have tricked individuals into sending wire transfers and sensitive customer and employee information to attackers who are impersonating their CEO, boss, or trusted colleague. Barracuda Sentinel uses artificial intelligence and deep integration with Office 365 to stop these attacks before they reach your mail server, as well as detecting threats already sitting in your inbox. Benefits of Barracuda Sentinel Stop Email Impersonation Attacks Traditional email filters sit in front of your mail server, so they don't see threats already in your inbox. Sentinel works from inside O365 and uses artificial intelligence to detect signs of spear phishing and account takeover. Protect Your Business from Account Takeover Account takeover is a major new threat to business data. Sentinel detects account takeover attempts and blocks email attacks launched from compromised accounts. Protect Your Reputation and Stop Domain Fraud Don't let hackers impersonate your domain to launch email attacks. Sentinel protects your brand and reputation through simplified DMARC reporting and analysis.
Identify and Secure Your Highest-Risk Individuals Sentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. Part of a Complete Email Protection Platform With the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. Sentinel Detects Threats that Email Security Gateways Can't Sentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. Protect Your Business Against Account Takeover Corporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. Features Stop Targeted Attacks with AI
  • Prevent Spear Phishing
  • Prevent BEC and CEO Fraud
  • Detect Employee Impersonation
  • Stop Zero-Day Phishing
  • Detect Web Impersonation
  • Stop Inbound Spoofing
  • Continuous Learning
  • Exportable Reports
Stop Account Takeover with AI
  • Alerting for Account Takeover
  • Prevent Account Takeover Infiltration
  • Detect Compromised Emails
  • Delete Emails Sent Internally
  • Notify External Recipients
  • Lock Attackers Out of Accounts
Domain Fraud Prevention
  • Prevent Third Party Domain Spoofing
  • Automated DMARC Reporting
  • DMARC Aggregation and Visualization
  • DKIM/SPF Configuration and Troubleshooting
  • Better Email Deliverability
  • Spoofed Email Reports
  • Detect Misconfigured Legitimate Senders
  • Protects Customer Brands
  • Exportable Reports
Flexible API-based Deployment
  • Lightweight Architecture
  • Instant Setup
  • Works with Any Gateway
  • Historical Assessment
Phishing Simulations
  • Test Employee Security Awareness
  • 80 Real-World Templates
  • Simulate Impersonation and BEC
  • AI Determines Employee Risk
... Learn more
ROI-calculator
ROI-
-
16
15
logo
Offer a reference bonus
0.00

BitDam

Email, shared URL’s, file attachments, cloud drives and new digital communications are transforming the way we work. They are also the most accessible entry point for advanced content-borne cyber attacks. Deep Application Learning Continuous and aggregative CPU-level learning of application paths. BitDam live knowledge base of all legitimate executions for common business applications. Real-time analysis, code benchmarking and immediate alien code detection for advanced threats, regardless of the specific attack technique. Alien Code Detection Forever Protected Applications 100% attack code visibility for known and unknown threats, covering all attachments & links. Prevention of sophisticated exploits and evasion methods, pre-code execution. No need for security updates or patches. BitDam Email Security & Malware Protection Features
  • Close to zero latency – With minimal email latency of just a few seconds, end-users will not notice any change. With BitDam, they’re safe to click everything that lands in their inbox.
  • 2-click integration – Pre-built APIs enables a (literally) 2-click self-service deployment through the BitDam portal, which applies for all mailboxes in the organization.
  • Fast and easy deployment – No MX record change is needed, no hassle to your IT team.
  • Intuitive dashboard – Your SOC team can view email subject and recipients through the BitDam dashboard, making tracking and investigating attacks simple.
  • Email body and clean files are never saved – BitDam scans the entire email including links and attachments, but doesn’t save it unless malicious.
  • Quarantine malicious emails – Malicious emails are automatically quarantined, allowing the SOC team to investigate, delete or release them as needed.
  • Visibility to other security checks – As a SOC team user you can see what basic security checks each email went through. This includes anti-spam, spf, and dmarc checks.
Unmatched detection rates, immediate prevention of ALL advanced content-borne cyber threats. Any Exploit Logical Exploits and Hardware Vulnerabilities Any Payload Macro-Based Malware, Ransomware, Spear Phishing. Any Known Unknown Vulnerability One Day, Zero Day Attacks Make it safe to click across all channels
  • Email
  • Cloud Storage
  • Instant Messaging
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
9
16
logo
Offer a reference bonus
1.00

CelloPoint Secure Email Gateway

Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by CelloLabs which has the capability to filter out all email threats. In addition, Cellopoint Security Gateway eliminates 99% unwanted message and provides a high-class defending capability—not only from known threats, but from those certain to evolve in the future.

Benefits:

  • Protects against spam, viruses, spyware, and other malware
  • Affordable protection is simple and reliable
  • Reduces administrative overhead
  • Intuitive Management GUI

Tier One: Anti-spam Protection

Anti-spam methods eliminate more than 99% of spam with a range of anti-spam technologies including:

  • Denial of Service (DoS) Protection
  • SMTP Rate Limit
  • Bounce Back Protection
  • Directory Harvest Attack (DHA) Prevention
  • Sender IP Reputation Analysis
  • SMTP Transaction Check
  • Virus, Phishing and Spyware Scanning
  • Intelligent Content Analysis (ICA)
  • Heuristics Rule
  • Bayesian Analysis
  • Violation Check

Tier Two: Anti-Virus Filtering

A combination of multiple anti-virus engines offers an extensive real time scanning and virus definition updates. Catch a variety of known virus and phishing patterns, spyware, trojans, worms and malware threats. Easy to deploy in your existing email infrastructure.

Tier Three: Anti-APT-URL Protection

To protect against the phishing targeted attacks and malicious URL links, Cellopoint SEG will scan and block as follow:

Static Black/Whitelist Database

Over 2 million latest global URL black/whitelist database for quick comparison and quarantine.

Dynamic URL ToC (Time of Click) Scanning

To protect against the unknown, suspicious or malicious URL links, Cellopoint SEG will rewrite the links to go through CelloCloud for realtime examination. The URLs will be examined at the time when the users click them. If a link is unsafe, the users will be warned not to visit the site or informed that the site has been blocked by Cellopoint SEG.

Tier Four: Anti-APT-File Protection

To protect against the unknown, new advanced malware emails and attachment fi les, Cellopoint SEG will scan and block as follow:

Dynamic Sandbox Scanning

Suspicious email attachements will be sent as encrypted packages to the powerful cloud computing CelloCloud to do dynamic sandbox scanning.

Full-system emulation

Malware as Office and PDF files is captured and induced into a simulated operating system like Windows, Android, Mac OSX.

Correlation Analysis and Threat Scores

Threat Level Analysis that commands SEG to either block or release certain mails.

Professional Summary Report

Analysis report overview shows malicious file name, threats reputation scores, classifi cation, network activity and registry summary.

High-performance, Easy Deployment

Cellopoint SEG is designed to meet the unique needs of any size of business. It offers all of the performance, flexibility, scalability, customization and end-user control features needed in deployments.

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
8
1
logo
Offer a reference bonus
2.00

Cisco Email Security

New capabilities to protect your users and brand Two new capabilities help block phishing emails from reaching your users and safeguard your company’s domain. Gain additional layers of protection against business email compromise (BEC). Cisco Advanced Phishing Protection Benefits: • Gain a real-time understanding of senders, learn and authenticate email identities and behavioral relationships to protect against BEC attacks • Remove malicious emails from users’ inboxes to prevent wire fraud or other advanced attacks • Get detailed visibility into email attack activity, including total messages secured and attacks prevented • Augment phishing and BEC detection and blocking capabilities offered in Cisco Email Security Cisco Domain Protection Benefits: • Prevent brand abuse through impersonation of your company domain • Gain visibility into your internal and third-party senders who use your domain to send email on your behalf • Automate the Domain-based Message Authentication, Reporting, and Conformance (DMARC) authentication and enforcement process to identify illegitimate senders • Block unauthorized senders and set up DMARC protection to reduce illegitimate emails from your domain • Increase outbound email marketing effectiveness Advanced email security protection Attackers rely primarily on email to distribute spam, malware, and other threats. To prevent breaches, you need a powerful email security solution. Cisco Email Security is your defense against phishing, business email compromise, and ransomware. Get threat intelligence updates every three to five minutes through Cisco Talos for the most up-to-date protection. Cisco Advanced Malware Protection protects against stealthy malware in attachments, and industry-leading URL intelligence combats malicious links. Cisco Email Security also enhances Office 365 email security.  Protecting outgoing email is important too. Cisco Email Security has robust data loss prevention and content encryption capabilities to safeguard sensitive information. This helps you comply with government and industry regulations.
... Learn more
ROI-calculator
Configurator
ROI-
-
10
6
logo
Offer a reference bonus
1.00

Clearswift SECURE Email Gateway

The SECURE Email Gateway is available with our unique, award winning, Adaptive Redaction technology and is a core component of our Adaptive Data Loss Prevention (A-DLP) solution which enables secure collaboration by automatically removing the sensitive data and/or malicious content that breaks policy allowing the rest of the communication to continue. Flexible deployment options – now available in the Cloud You decide how you want to buy and deploy the Clearswift SECURE Email Gateway, either as a pre-installed hardware appliance, as a software image that can be loaded on a choice of hardware platforms, or alternatively virtualized in a VMWare / HyperV environment. It is also available to be deployed in the Cloud including Amazon Web Services providing you with ultimate flexibility to suit your organization’s needs. Encryption for maximum email security With TLS as standard, and cost options to provide either S/MIME, PGP and password protected files or Web portal-based encryption, the Email Gateway offers a variety of options to cater for customer requirements. Whichever you choose, the Gateway allows sensitive data to be delivered securely, in seconds, using the optimal format for the recipient.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
17
5
logo
Offer a reference bonus
0.00

CORE Security

Introducing CORE Security

When it comes to securing your cloud, you need to peace of mind that security’s at the core of your hosted infrastructure. That’s why we’ve put together three ServerChoice CORE Security™ packages, with varying levels of protection, so you can get best-fit cyber security for your organisation.

CORE Base

  • Two-factor authentication
  • TrendMicro anti-virus & malware protection
  • Vulnerability scanning: Unmanaged Quarterly
  • System hardening
  • Next-generation firewall
  • Advanced DDoS mitigation: Standard (20 Gbps)

CORE Enterprise

  • Two-factor authentication
  • TrendMicro anti-virus & malware protection
  • Vulnerability scanning: Unmanaged Monthly
  • System hardening
  • Next-generation firewall
  • File integrity monitoring
  • Advanced DDoS mitigation: Enhanced (250 Gbps)
  • 24/7 SIEM services

CORE Platinum

  • Two-factor authentication
  • TrendMicro anti-virus & malware protection
  • Vulnerability scanning: Managed Monthly
  • System hardening
  • Next-generation firewall
  • File integrity monitoring
  • Advanced DDoS mitigation
  • Pro (Terabit+)
  • 24/7 SIEM services
  • Intrusion Prevention System (IPS)

Bolt-on CORE Security™ Services

In addition to the above security packages, we offer a range of additional security enhancements to deliver maximum protection from cyber threats:
  • Data loss prevention (DLP)
  • Web application firewalls (WAF)
  • Penetration testing
  • URL filtering (Virtual Desktops only)
  • Email spam filtering and antivirus (Exchange only)
  • Compliance consultancy
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
10
5
logo
Offer a reference bonus
1.00

CyberX Platform

The Industrial Internet of Things (IIoT) is unlocking new levels of productivity, helping organizations improve safety, increase output, and maximize revenue. At the same time, digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technology (OT) networks, increasing the attack surface andrisk of cyberattacks on industrial control systems. The CyberX platform is the simplest, most mature, and most interoperable solution for auto-discovering assets, identifying critical vulnerabilities and attack vectors, and continuously monitoring ICS networks for malware and targeted attacks. What’s more, CyberX provides seamless integration with existing SOC workflows for unified IT/OT security governance. The CyberX platform delivers continuous ICS threat monitoring and asset discovery, combining a deep embedded understanding of industrial protocols, devices, and applications with ICS-specific behavioral anomaly detection, threat intelligence, risk analytics, and automated threat modeling.The fact is, CyberX is the only company that addresses all four requirements of Gartner’s Adaptive Security Architecture — with a practical, appliance-based system that can be deployed in less than an hour.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
6
13
logo
Offer a reference bonus
0.00

EgoSecure Data Protection

If data is lost due to theft, negligence or accident, great damage can be done. It can ruin businesses and reputations. The most vulnerable points of attack are our devices, e.g. computers, smartphones, laptops, etc., which are operated by people – and people are fallible. Anti-virus protection and a firewall are not enough to protect data. Data is the life-blood of every organization and for more than 10 years, we have been innovating and leading the way in the field of data protection. To date, more than 2,100 customers from every industry and of all sizes, are benefiting from EgoSecure Data Protection. We do more than just blindly protecting your data. Firstly, our unique solution determines the data protection situation of your network. It then gives you accurate information, specific to your network, with guidance on how to protect yourself via our 20+ protection modules. This process can even be automated. We call this a simply beautiful solution; making complicated things simple is what makes us so very attractive to our customers.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
2
6
logo
Offer a reference bonus
1.00

F-Secure Messaging Security Gateway

F-Secure Messaging Security Gateway delivers the industry’s most effective security for corporate messaging infrastructures. It is the most accurate antispam solution* along with capabilities for email firewall, antivirus, and secure messaging. Depending on company traffic type Messaging Security Gateway can remove as much as 99.5% of spam.

Key features:

  • Secures your network against spam, phishing, viruses, virus outbreaks, denial-of-service attacks, directory harvest attacks right at the gateway.
  • Machine learning technology provides highly effective spam protection and outstanding end-user quarantines, safe lists and block lists.
  • Outstanding virus protection with automatic updates of virus signatures and rules.
  • High-performance and scalable solution proven in the most demanding email infrastructures.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
4
15
logo
Offer a reference bonus
2.10

FireEye Email Security

FireEye Email Security delivers dynamic defense to detect attacks from the very first time they’re seen and blocks the most dangerous cyber threats including malware-laden attachments and URLs, credential phishing sites and business email compromise attacks. Email-borne cyber attacks are targeted, automated and hidden amongst millions of messages, easily morphing before signatures can be created. Leveraging FireEye’s extensive threat intelligence from frontline investigations and millions of sensors, FireEye Email Security prioritizes critical alerts and enables endpoint and network incident mitigation and remediation. FireEye Email Security works seamlessly with the FireEye security operations platform – FireEye Helix – providing visibility across the entire infrastructure. Flexible deployment options FireEye Email Security - Server Edition is an on-premises appliance that protects against advanced email attacks. Real-time updates from the entire FireEye ecosystem combined with attribution of alerts to known threat actors provide context for prioritizing and acting on critical alerts and blocking spear-phishing emails. With nothing to install, FireEye Email Security - Cloud Edition is ideal if you’re migrating email to the cloud. It integrates seamlessly with cloud-based email systems such as Office 365 with Exchange Online Protection to stop targeted, advanced attacks faster and more accurately than Exchange Online Protection alone. Full stack email security solution FireEye MVX engine Rapidly detects and blocks unknown malicious attacks. Advanced URL defense Inspects URLs for links to credential-phishing sites and rewrites URLs. Impersonation detection Stops difficult to detect malware-less attacks. Retroactive analysis and alerting Detects and alerts on URLs that go live after email delivery
... Learn more
ROI-calculator
Configurator
ROI-
-
9
15
logo
Offer a reference bonus
0.00

FireEye Security Suite

FireEye Security Suite provides enterprise-grade protection to secure networks, emails and endpoints for organizations of all sizes. It defends against advanced attacks, accelerates incident response and safeguards the core business.
FireEye Security Suite is designed for organizations with 100-2000 users. It protects multiple attack vectors to break the chain of events that often leads to data loss and business disruption.

Security Suite features
FireEye Network Security, NX Edition
Secure networks with the integrated Intrusion Prevention System (IPS) and detect advanced malicious network attacks such as zero-day attacks and signature-less malware.
Multi-Vector Virtual Execution (MVX) Engine
Cloud MVX engine detonates suspicious artifacts that don't match signature-based indicators and disrupts advanced malicious network attacks.
FireEye Email Security, Cloud Edition
Arrests the first line of attack by stopping viruses, spam, zero-day malware, advanced URL threats and low-volume, highly-targeted phishing attacks.
Email Sender Impersonation Detection
Blocks malware-less impersonation attacks and protects organizations from hard to detect CEO fraud scams and financial loss.
FireEye Endpoint Security, Essentials Edition
Last line of defense with an antivirus engine, behavioral analysis and machine-learning managed by a single unified agent.
Endpoint Protection Against Signature-Free Vulnerability Exploits
Ability to assess and analyze endpoint behavior to reveal and block application exploits.
FireEye solutions included in the Security Suite
  • Network Security: defend networks, data and users with today’s fastest, most reliable cyber-attack protection.
  • Endpoint Security: proactively detect, prevent and analyze known and unknown threats on any endpoint.
  • Email Security: proactively detect and stop all types ofemail-borne threats.
  • FireEye Helix: simplify, integrate and automate security operations to stop threats faster.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
16

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.