View
Sorting
Products found: 34
Barracuda Email Security Gateway…
Calyptix AccessEnforcer UTM Firewall…
- UTM Firewall. A managed firewall with deep packet inspection that blocks threats to your network before they can cause harm. Prevent scans, spoofing, SYN floods, DDoS attacks, fragmentation attacks, and more automatically.
- GUI-Based Management. Graphic interface that allows technicians to configure and monitor the network with clicks instead of code. Check network alerts, change settings, or set a DMZ with a single click.
- VPN Unlimited. Two VPN services provide fast and secure connections to your remote network. Create an unlimited number of VPN clients and policies, and let users connect with Android, iOS, OS X, and Windows devices.
- Web Filtering. Monitors and controls web browsing for any and all users on the network. Set policies to allow or deny specific types of content and filter by topic, keyword, extension, and file type. Customize the block page and set policies to apply only at certain times. Activate the HTTPS filter with a single click.
- Email Filtering. Scans incoming emails with multiple anti-virus and anti-spam engines and checks them against real-time DNS blacklists. Filter email by geography, keyword, and global whitelist and blacklist, and allow users to manage individual spam folders. Supports SMTP and easy integration with Microsoft Exchange.
- Intrusion Detection & Prevention. Examines the contents of every packet for malicious content with IDS/IPS before it enters the network. Set to block or log potential threats, and ban malicious hosts automatically with dynamic blacklisting mode.
- Quality of Service (QoS). Ensure VoIP phones and other critical systems are not robbed of network bandwidth by non-essential traffic. Allocate or limit bandwidth for any source or destination, and allow systems to “borrow” spare bandwidth when available.
CelloPoint Secure Email Gateway…
Cellopoint Security Email Gateway is a multi-featured mail gateway deployed in front of a mail server to provide added security and functions. It is powered by CelloLabs which has the capability to filter out all email threats. In addition, Cellopoint Security Gateway eliminates 99% unwanted message and provides a high-class defending capability—not only from known threats, but from those certain to evolve in the future.
Benefits:
- Protects against spam, viruses, spyware, and other malware
- Affordable protection is simple and reliable
- Reduces administrative overhead
- Intuitive Management GUI
Tier One: Anti-spam Protection
Anti-spam methods eliminate more than 99% of spam with a range of anti-spam technologies including:
- Denial of Service (DoS) Protection
- SMTP Rate Limit
- Bounce Back Protection
- Directory Harvest Attack (DHA) Prevention
- Sender IP Reputation Analysis
- SMTP Transaction Check
- Virus, Phishing and Spyware Scanning
- Intelligent Content Analysis (ICA)
- Heuristics Rule
- Bayesian Analysis
- Violation Check
Tier Two: Anti-Virus Filtering
A combination of multiple anti-virus engines offers an extensive real time scanning and virus definition updates. Catch a variety of known virus and phishing patterns, spyware, trojans, worms and malware threats. Easy to deploy in your existing email infrastructure.
Tier Three: Anti-APT-URL Protection
To protect against the phishing targeted attacks and malicious URL links, Cellopoint SEG will scan and block as follow:
Static Black/Whitelist Database
Over 2 million latest global URL black/whitelist database for quick comparison and quarantine.
Dynamic URL ToC (Time of Click) Scanning
To protect against the unknown, suspicious or malicious URL links, Cellopoint SEG will rewrite the links to go through CelloCloud for realtime examination. The URLs will be examined at the time when the users click them. If a link is unsafe, the users will be warned not to visit the site or informed that the site has been blocked by Cellopoint SEG.
Tier Four: Anti-APT-File Protection
To protect against the unknown, new advanced malware emails and attachment fi les, Cellopoint SEG will scan and block as follow:
Dynamic Sandbox Scanning
Suspicious email attachements will be sent as encrypted packages to the powerful cloud computing CelloCloud to do dynamic sandbox scanning.
Full-system emulation
Malware as Office and PDF files is captured and induced into a simulated operating system like Windows, Android, Mac OSX.
Correlation Analysis and Threat Scores
Threat Level Analysis that commands SEG to either block or release certain mails.
Professional Summary Report
Analysis report overview shows malicious file name, threats reputation scores, classifi cation, network activity and registry summary.
High-performance, Easy Deployment
Cellopoint SEG is designed to meet the unique needs of any size of business. It offers all of the performance, flexibility, scalability, customization and end-user control features needed in deployments.
Check Point 21000 Appliances…
Check Point 600 Appliance…
Check Point vSEC Virtual Edition…
Cisco Email Security…
Clearswift SECURE Email Gateway…
F-Secure Messaging Security Gateway…
F-Secure Messaging Security Gateway delivers the industry’s most effective security for corporate messaging infrastructures. It is the most accurate antispam solution* along with capabilities for email firewall, antivirus, and secure messaging. Depending on company traffic type Messaging Security Gateway can remove as much as 99.5% of spam.
Key features:
- Secures your network against spam, phishing, viruses, virus outbreaks, denial-of-service attacks, directory harvest attacks right at the gateway.
- Machine learning technology provides highly effective spam protection and outstanding end-user quarantines, safe lists and block lists.
- Outstanding virus protection with automatic updates of virus signatures and rules.
- High-performance and scalable solution proven in the most demanding email infrastructures.
FireEye Email Security…
Forcepoint Email Security…
Forcepoint Email Security Cloud’s proactive URL Wrapping and Phishing Education secure email wherever users need access, even on mobile devices. Our unrivaled cloud infrastructure delivers phishing, malware and DLP protection for Microsoft Office 365™ and other popular email systems.
The Forcepoint Email Security advantage
Real-time threat protection
Real-time threat protection uses a unique blend of detection technologies, including machine learning, sandboxing, and predictive analytics to effectively stop advanced threats such as ransomware. Protection against highly evasive zero-day threats
Get advanced malware detection (sandboxing) with our full system emulation sandbox. Deep content inspection reveals highly evasive zero-day threat with no false positives. Powerful encryption for additional protection
Encrypt sensitive email conversations and enhance mobile security by controlling sensitive attachments access by device. Incident risk ranking to find the greatest risks
Incidents are correlated across multiple events to identify true cumulative risk trends and activity. A risk score is included to help security teams identify the greatest risks based on real-time activity. Integrated data loss prevention
Integrated industry-leading data loss prevention stops data infiltration and exfiltration capabilities. Unique phishing education feature
Use Forcepoint Email Security’s unique phishing education features to help users adopt best practices and identify those who need additional training to improve their security awareness. Complete out-of-the-box solution
Forcepoint Email Security includes DLP, URL wrapping, and other capabilities that are considered premium "add-ons" or upgrades by many competitors, delivering the most comprehensive inbound and outbound defenses out of the box. Deployment flexibility
How you deploy our email security solution is up to you. Choose from a range of physical and virtual appliances to leverage existing hardware, cloud deployment, or hybrid environments.
Fortinet FortiMail Secure Email Gateway…
- Top-rated Antispam and Antiphishing: Maintain productivity by shielding end users from unwanted spam and malicious phishing attacks
- Independently certified advanced threat defense: Thwart cyber criminals intent on stealing data, holding systems for ransomware, conducting fraud, and other malicious purposes
- Integrated data protection: Maintain the privacy of personal information and confidentiality of sensitive data in compliance with regulatory and corporate guidelines
- Enterprise-class management: Free staff and end users to drive the business by reducing the time spent on email administration
- High-performance mail handling: Speed the delivery of legitimate email at an affordable cost
McAfee Email Gateway…
Micro Focus Secure Gateway…
- Sexual harassment lawsuits
- Criminal charges
- A hostile work environment
- Reputation damage
- A pre-installed Micro Focus Secure Gateway server that is configured and actively scanning email
- An Secure Gateway license key. Either a full license or trial key will work. (Contact your Micro Focus representative for your evaluation key)
Microsoft Exchange Online Protection…
- Eliminate threats before they reach the corporate firewall with multi-layered, real-time anti-spam and multi-engine anti-malware protection.
- Protect your company's IP reputation by using separate outbound delivery pools for high-risk email.
- Five financially backed SLAs attest to a high quality of service, including protection from 100% of known viruses and 99% of spam.
- Globally load-balanced network of datacenters helps to ensure a 99.999% network uptime.
- Manage and administer from the Exchange Administration Center—a single web-based interface.
- Near real-time reporting and message trace capabilities provide insight into email environments by retrieving the status of any message that Exchange Online Protection processes.
- Active content, connection, and policy-based filtering enables compliance with corporate policies and government regulations.
- IT-level phone support 24 hours a day, 7 days a week, 365 days a year at no additional cost.
- No hardware or software required to install, manage, and maintain, which minimizes up-front investment.
- Get a predictable payment schedule through a subscription-based service for customers with an on-premises email deployment. Exchange Online Protection is also included in Exchange Online and any Office 365 plan that includes Exchange Online.
- Simplify IT environments by reducing the need for in-house email security servers and applications.
- Ensure that no email is lost or bounced by automatically queuing email if the destination email server becomes unavailable for any reason.
- Get up and running quickly with a simple MX record change.
Mimecast Email Security…
Mimecast secure employee communication and reduces risk with targeted threat protection, data leak prevention and enforced security controls.The Mimecast solution helps organizations to prevent email-ransomware as well as protect systems from the data loss.Protects against social‐engineering attacks that attempt to extract money or data from your unsuspecting users.According to Mimecast’s 2018 State of Email Security Report, 90% of global organizations have seen the volume of phishing attacks increase or stay the same over the past 12 months.
Smart Email Security with Mimecast
URL Protection
URL Protect service provides multistep detection and blocking of malicious URLs, including pre-click URL discovery, on-click inline employee education and post-click resolution and blocking of dangerous files types.
Impersonation Protection
Mimecast helps to defend email impersonation through Real-time scanning of all inbound emails to detect header anomalies, domain similarity, sender spoofing and clearly marked alerts on delivered emails.
Internal Email Protection
Internal Email Protect scans attachments and URLs for malware and malicious links, as well as content inspection enabled by Data Leak Prevention and it can automatically delete infected emails and attachments from employees’ inboxes.
Ransomware Protection
Unlike vendors of standalone security or backup products, Mimecast tackles ransomware with a layered cyber resilience solution; bringing together protection, continuity, archiving, and recovery capabilities for your email from a single cloud solution.
Email Archiving & Continuity
Mimecast ensures continuity when primary email systems are offline. Customizable thresholds let administrators monitor inbound and outbound email. Anytime, anywhere access to archive data improves employee productivity and workflow efficiency.
Attachment Protect
Attachment Protect service provides multiple layers of defense against potentially malicious email attachments, balancing speed of delivery with detection efficacy.The ability to convert Office and PDF files to a safe file format for immediate delivery to employees.
PA-500 next-generation firewall…
PineApp Mail SeCure…
Proofpoint Email Protection…
Protection against BUSINESS EMAIL COMPROMISE (BEC)
Dynamically classify impostor email (BEC) other threats that don't involve malware. These low volume, hard-to-detect threats have cost businesses more than $2.3 billion and cannot be detected by solutions that detect only malware. We detect and classify impostor email through a combination of authentication (DMARC), pre-defined rules, and dynamic classification. Our technology actively assesses the reputation of the sender for accurate protection without additional administration overhead.
We analyze:
- Sender-recipient relationship
- Domain reputation
- Email headers and envelope attributes
- Email content
Granular filtering and control
Email Protection can control all aspects of inbound and outbound email. Our policy engine gives you complete flexibility. Custom rules support global, group and user-level controls to meet the needs of even the most complex enterprise. Individual quarantines enable you to separate email types to allow your people to access their email digest and quarantine while keeping malicious emails away. Quarantines include:
- Spam
- Impostor
- Bulk
- Phishing
- Malware
- Adult
- Low Priority
Detailed visibility
Email Protection gives you a wealth of data and search tools. Our advanced message tracing features a high-performance search engine to help you quickly pinpoint hard-to-find log data based on dozens of search criteria. With more than 60 real-time reports for detailed visibility into mail flow and trends, Email Protection provides the data that can help address issues and trends as they emerge. Give your people self-service control over their email preferences such as:
- Quarantines
- Safe and block lists
- Bulk mail delivery
These services are also easy to brand, providing familiarity for users who access these tools. And with support for numerous languages, you can deploy them globally. More than 90% of targeted attacks start with email, and these security threats are always evolving. Proofpoint Email Protection provides multiple layers of security to stop malware and non-malware threats, such as email fraud. It can control all aspects of inbound and outbound email to detect and block threats, and prevent confidential information from getting into the wrong hands.
Features and Benefits
- Advanced Email Filtering, Control and Visibility. Email Protection allows you to set up robust policies as a first step in routing email to users. You can create detailed firewall rules based on your needs. Even set up policies for anti-virus. We also leverage user bulk mail actions to improve accuracy of future detection and classification. With a wealth of data and search tools, you can ensure your organization's email is protected.
- Impostor Email Threat Protection. Imposter attacks are hard to detect. Our Stateful Composite Scoring Service (SCSS) is a machine learning approach that searches specifically for these email threats. It uses what’s known about your unique environment, along with data from all Proofpoint customers, to more effectively detect and block email fraud.
- Internal Mail Defense. As organization move to cloud-based email services, compromised accounts are on the rise. Internal Mail Defense can automatically scan all internal email traffic, providing a multilayered approach to looking for such things as spam, malware or phishing attacks being sent via compromised accounts. It removes these emails and provides reporting to shows which accounts have been compromised.
- Email Continuity. Email downtime can be a significant hit to worker productivity. Enterprise Continuity ensures email is always available, even if your company email is down. It provides full access to users—via Outlook integration, a web portal or native mobile support. And it automatically activates in an outage, with fully automated recovery.
Retaurus E-Mail Security…
Retarus Email Security stops malware such as viruses, spam, phishing emails, ransomware and other digital threats. Retarus Cloud Email Security Services can be customized to meet the security needs of your business.
Do you need extended protection with Retarus Advanced Threat Protection? Protect against advanced threats and social engineering and phishing attacks that disrupt traditional security mechanisms. To defend these smart attacks successfully, companies need at least as smart protection. Retarus Advanced Threat Protection includes four virus scanners including Deferred Delivery Scan, Sandboxing, Time-of-Click Protection and CxO Fraud Protection.
Brand new malicious programs can not be stopped even by the best virus filters at first because the patterns are not yet known at the beginning. With Retarus' patent-pending Patient Zero Detection technology, it is now possible to detect malware in emails that have already been delivered and alert the recipient as soon as the patterns are available. Analysts strongly recommend the use of so-called post-delivery protection mechanisms.
The innovative Retarus Queueless Design analyzes incoming e-mails without buffering - e-mails arrive without delays thanks to minimal throughput times. For maximum security, Retarus virus scanners and filter methods are constantly updated and continuously optimized.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.