Offer Description Cisco Cloud Security Service

Size: px
Start display at page:

Download "Offer Description Cisco Cloud Security Service"

Transcription

1 Page 1 of 1 Offer Description Cisco Cloud Security Service This document sets out the features and functionalities of the Cisco Cloud Security service ( CES or the Service ) that Cisco will provide to the customer ( Customer or you ), for which Cisco has been paid, and continues to be paid, the appropriate fee. The Cisco Universal Cloud Services Agreement ( SaaS Agreement ) shall govern your use of the features and functionalities provided in this Offer Description. If you are purchasing services directly from Cisco, this Offer Description and the SaaS Agreement are both incorporated into your agreement with Cisco. Capitalized terms used herein and not defined herein, shall have the meanings given to them in the SaaS Agreement. A copy of the SaaS Agreement is currently located at: If you re buying through a reseller, you accept the terms of the SaaS Agreement by using the Service, unless the SaaS Agreement is otherwise incorporated into your arrangement with the reseller. All non-conflicting and additional terms and conditions in your purchase agreement with reseller remain applicable to this purchase, as between you and your reseller. Your use of the Service (independent of the purchase terms) is governed by the SaaS Agreement and the SaaS Agreement takes precedence in regards how you use the Service. Overview The Service is a cloud-based security service that helps the Customer block spam and security threats from the Internet and, depending on the features licensed, prevent the accidental or intentional leakage of the Customer s data. Functionality CES offers inbound protection and outbound control of the Customer s traffic. The following feature functionalities are available as part of the Service depending on the licensed features purchased: Anti-spam Intelligent Multi-scan Anti-spam Anti-virus Outbreak Filters Advanced Malware Protection Safe Unsubscribe Image Analysis Encryption Data Loss Prevention The Service is delivered on a co-managed model. Cisco is responsible for the operation, maintenance of hardware, network infrastructure, virtual infrastructure, and application software. The Customer is responsible for the configuration of the Service and modifications such as

2 Page 2 of 1 additional domains, safelists, blocklists, and policy configurations. administrative access to the application software. Customers are granted Inbound Anti-spam Protection When the Customer configures the inbound Internet flow to be filtered several layers of protection are implemented to classify messages as spam. The valid actions to take on spam are blocking, accepting, tagging, and quarantining. Intelligent Multi-scan Anti-spam This adds an additional classification engine, the Cloudmark Authority engine. The additional engine results are combined with the results of the standard anti-spam classification engine to increase classification accuracy. Inbound Anti-virus Protection The flow passing through CES will be scanned using a signature-based scanner. The default anti-virus scanner is Sophos, and an optional add-on license for McAfee is available. Outbreak Filters Outbreak filters are used to detect zero-hour viruses, -web blended threats, URL classifications and URL reputations. Advanced Malware Protection Advanced Malware Protection ( AMP ) is an optional feature that is applied to inbound attachments as a way to conduct file reputation analysis and file sandboxing. Reputation scores for files are looked up in the AMP cloud to determine if they have previously been detected as a malicious file. Files with an unknown reputation may be optionally directed to the AMP cloud to be sandboxed, where they are analyzed for malicious behavior and a verdict returned on its reputation. AMP is designed to help detect malware that is designed to evade traditional signature-based anti-virus applications. Safe Unsubscribe Safe Unsubscribe is an optional feature that allows recipients of unwanted non-spam messages to safely unsubscribe from the distribution list used by the sender to send . This is done by using a third party to process the unsubscribe request, thus protecting the user from fraudulent use of the unsubscribe link of an . Image Analysis Image Analysis is an optional feature that classifies images in messages to determine if they are pornographic. It is useful for detecting violations of acceptable use policies. Encryption The Encryption features of CES leverage the Cisco Registered Envelope Service (CRES) for the secure delivery of messages to the intended recipient, maintaining confidentiality of the s in transit across the Internet and in the recipient s box. Data Loss Prevention The Data Loss Prevention feature of CES is applied to outbound s and scans the content of s to enforce Customer policies relating to regulatory requirements, acceptable use policies, and intellectual property. It offers multiple turn-key policy sets for common policy regimes such as PCI DSS, HIPAA, SOX, and GLB. Deployment Deployments of CES may include the Customer directing its inbound Internet flow to the Service for scanning by configuring its DNS MX records to point to the Service. Cleaned and scanned inbound s are then forwarded to the Customer s on-premises mail servers or to the Customer s mailbox hosting service, if the Customer is so configured.

3 Page 3 of 1 The Customer may also direct outbound mail flow through the Service. Browser Requirements To access the Service s web-based UI, the browser must support and be enabled to accept JavaScript and cookies, and it must be able to render HTML pages containing Cascading Style Sheets (CSS). The following browsers are supported when using the Service: Firefox 3.6 Windows XP and Vista: Internet Explorer 7 and 8 Windows 7: Internet Explorer 8 and 9, Google Chrome, Firefox 4 Mac OS X: Safari 4 and later, Firefox 4 Do not use (a) multiple browser windows or tabs simultaneously to make changes to the appliance, or (b) concurrent GUI and CLI sessions. Doing either of these will cause unexpected behavior and could render the Service inoperable. The browser s pop-up blocking settings must be disabled in order to use the Service s GUI because some buttons or links in the interface will cause additional windows to open. Customer Responsibilities Customer shall supply Cisco with all technical data and other information Cisco may reasonably request to allow Cisco to supply the Service to the Customer, including a completed deployment questionnaire. Cisco cannot make the Service available unless it receives all required information. Customer is responsible for implementing and using strong passwords for accessing the Service and the associated support portal. The following are common guidelines for choosing strong passwords. These are designed to make passwords less easily discovered by intelligent guessing: Include a combination of numbers, symbols, upper and lowercase letters in passwords, Password length should be around 12 to 14 characters, and Avoid any password based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, or biographical information (e.g., dates, ID numbers, ancestors names or dates, etc.). Customer or its designated personnel must not change the password for Cisco support services or delete the support user ID. In making the Service available, Cisco may instruct the Customer to perform certain tasks or checks relating to Customer s network. Customer shall, at its expense, perform all such checks and tests. Customer will also provide Cisco, or its authorized representative, reasonable and free access to Customer s networking equipment. Customer shall not be required to furnish specialized equipment or know-how. Customer agrees to pay Cisco, at Cisco's then-current rates, plus any reasonable actual out-ofpocket expenses, for any rework or additional professional services requested by Customer (and accepted by Cisco) or any act or omission of Customer, including providing inaccurate information to Cisco, that is required to enable Customer to access the Service. Cisco shall seek Customer s approval in advance of incurring such costs if it knows costs will be incurred as a result of such act or omission of Customer. Customer is responsible for obtaining all approvals required by any third parties in order for Cisco to perform any such professional services. Cisco shall not be in default of its obligation to provide the Service either because such approvals have not been obtained or any third party otherwise prevents Cisco from providing the Service.

4 Page 4 of 1 Customer assumes full responsibility to back-up and/or otherwise protect all data other than configuration data against loss, damage, or destruction. Customer is responsible for any security events that result from any unauthorized configuration of the Service components by Customer s personnel. These include, but are not limited to, configuring CES service components in a manner not prescribed in the Documentation, creating an open relay, changing the network configuration set by Cisco, or shutting down the Cisco infrastructure. CES is a security service. Cisco periodically audits customer usage and if Cisco determines that the Customer is using CES as an outbound bulk delivery service, Cisco may require additional services be purchased by the Customer or require the Customer to re-architect the flow to exclude CES from the outbound bulk flow. Cisco reserves the right to require Customer to purchase additional licenses if the number of actual distinct users (as shown by Cisco s traffic logs) exceeds the number of licenses purchased. The failure of Customer to comply with any of the aforementioned Customer Responsibilities shall be considered a material breach and could lead to termination of Customer s access to the Service. Capacity Assurance As long as Customer has paid all applicable fees, Cisco will, in its sole and reasonable discretion, provide additional capacity to handle an increase in spam volumes and inbound for the number of users specified on the Order. Any such additional capacity for CES includes capacity to handle an increase in spam volumes and inbound . Cisco will use its commercially reasonable efforts to provide capacity for events that were unforeseen by the Customer. Any such additional capacity made available will not exceed 50% of the initial deployed capacity. The above assurance does not apply to: 1. Capacity requirements placed on the Service due to misconfigured, ill-formed or performance intensive activities that include but are not limited to body-scanning, or content dictionaries. 2. Capacity needs placed on the Service due to new requirements as a result of a changing regulatory scheme or business environment. 3. Capacity needs placed on the Service from non-users including, but not limited to, marketing communications, Customer s customers, or an generating program or entity. 4. An increase in volume from marketing campaigns and other application-generated s. Service Level Agreements (SLAs) For the purposes of this Section regarding SLAs, the following defined terms apply: Spam is unsolicited or unauthorized bulk electronic mail (SMTP only), and excludes unwanted marketing messages that include opt-out provisions. Caught Spam is Spam either quarantined or categorized as a threat message in the user interface. Missed Spam is Spam delivered to an end user s inbox. Virus is a binary or executable code whose purpose is to gather information from the infected host, change or destroy data on the infected host, use inordinate system resources in the form of memory, disk space, CPU cycles or network bandwidth on the infected host, use the infected host to replicate itself to other hosts, or provide control or access to any of the infected host s system resources. A Virus does not include: (1) text messages that use fraudulent claims to deceive the customer, and/or prompt the

5 Page 5 of 1 customer to action, (2) a binary or executable code installed or run by the end user that gathers information for sales or marketing purposes, (3) a virus that may be detected and cleaned by other virus scanning products, or (4) an ineffective or inactive virus fragment. Known Virus is defined solely by the provider of anti-virus software that is used for a specific message or file. Uptime Service Level Agreement The Service will accept connections on Port 25 and process at least % over a trailing one-year period. Uptime is determined by dividing the total number of minutes the Service was processing divided by the number of minutes in a one-year period or 525,600 minutes. A Service downtime must exceed 30 seconds per occurrence for it to be considered an infraction. An infraction is limited to a single incident, and separate downtime occurrences cannot be aggregated. Uptime is determined and validated by an industry-recognized third-party monitoring service that performs service-level checks from various locations on the Internet. If Customer experiences a downtime infraction, then subject to the General Exceptions (defined below), Customer will be entitled to the applicable service credit (as set forth in the table below) as its sole and exclusive remedy: Service Credit for Actual Uptime <99.999% Customer may only make a total of two (2) claims for service credits for a downtime occurrence within a rolling three hundred sixty-five (365) day period. If Customer experiences three (3) or more downtime occurrences within a rolling three hundred sixty-five (365) day period, Cisco and Customer will come to a written agreement, within thirty (30) days of Customer providing notice of such occurrence, on the next course of action. If Customer experiences more than five (5) downtime occurrences within a rolling three hundred sixty-five (365) day period and Cisco fails to provide a reasonable written plan of permanent corrective action to Customer within 30 days after notice to Cisco of the fifth (5 th ) downtime occurrence, then Customer shall have the right to cancel the Service at no cost or obligation and no financial responsibility for any future payments. Delivery Time Service Level Agreement The Service will process messages such that the monthly Average Time in the Work Queue of the Service (as shown in the User Interface) will be less than one (1) minute based on a calendar month, provided, that the quantity of messages above 10MB sent to the Service does not exceed 0.01% of all traffic. The Average Time in the Work Queue is the amount of time spent processing a message from the point at which the message is accepted via SMTP to the first SMTP delivery attempt from the Service. If Customer experiences a delivery time infraction, then subject to the General Exceptions (defined below), Customer will be entitled to the applicable service credit (as set forth in the table below) as its sole and exclusive remedy: Monthly Average

6 Page 6 of 1 Time in the Work Queue >1 minute Customer may only make a total of two (2) claims for service credits for a delivery delay occurrence within a rolling three hundred sixty-five (365) day period. If Customer experiences three (3) or more delivery delay occurrences within a rolling three hundred sixty-five (365) day period, Cisco and Customer will come to a written agreement, within thirty (30) days of Customer providing notice of such occurrence, on the next course of action. If Customer experiences more than five (5) delivery time infractions within a rolling three hundred sixty-five (365) day period and Cisco fails to provide a reasonable written plan of permanent corrective action to Customer within 30 days after notice to Cisco of the fifth (5 th ) occurrence, then Customer shall have the right to cancel the Services at no cost or obligation and no financial responsibility for any future payments. Anti-Spam Service Level Agreement The Service will detect and stop at least 99% of all inbound Spam that is routed through the Service. This Spam Catch Rate is determined by dividing Caught Spam by the sum of the Caught Spam and the number of Missed Spam, during a trailing thirty (30) day period. Exception Marketing s with opt-out provisions will not be counted as a Missed Spam. If Customer experiences a Spam Catch Rate infraction, and subject to the exception above and the General Exceptions (defined below), then the Customer will be entitled to the applicable service credit (as set forth in the table below) as its sole and exclusive remedy: Service Credit for Spam Catch Rate <99% Within any given three hundred sixty-five (365) day period, Customer may only make a total of two (2) claims for service credits that the Anti-Spam SLA is not being met. If Customer experiences three (3) or more Spam Catch Rate infractions within a rolling three hundred sixtyfive (365) day period, then Cisco and Customer will come to a written agreement, within thirty (30) days of Customer providing notice of such occurrence, on the next course of action. False Positive Rate Service Level Agreement The Service will not categorize legitimate inbound as Spam more than one (1) time per one million (1,000,000) messages processed. This False Positive Rate is determined by dividing the number of non-spam messages misclassified as Spam by the total attempted messages processed over a trailing thirty (30) day period, as set forth in the user interface. Exceptions messages from legitimate senders whose IP addresses may be compromised due to an unforeseen event will not be counted towards the False Positive Rate. Cisco will make a determination in good faith based on its system logs, monitoring reports and configuration records for such senders. In addition, marketing s with opt-out provisions will not be counted towards the False Positive Rate.

7 Page 7 of 1 If Customer experiences a False Positive Rate infraction and subject to the General Exceptions (as defined below) and the exceptions set forth above, then the Customer will be entitled to the applicable service credit (as set forth in the table below) as its sole and exclusive remedy: Service Credit for False Positive Rate > 1 message in 1,000,000 Within any given three hundred sixty-five (365) day period, Customer may only make a total of two (2) claims for service credits that the False Positive Rate SLA is not being met. If Customer experiences three (3) or more False Positive Rate infractions within a rolling three hundred sixtyfive (365) day period, then Cisco and Customer will come to a written agreement, within thirty (30) days of Customer providing notice of such occurrence, on the next course of action. Virus Catch Rate Service Level Agreement The Service will detect and stop one hundred percent (100%) of all Known Viruses that are routed through the Service within thirty (30) minutes of when the applicable anti-virus provider releases a signature for the platform (the Virus Catch Rate ). Exceptions Messages that contain a URL to a website hosting malware are not included. If Customer experiences a Virus Catch Rate infraction and subject to the General Exceptions (defined below) and the exception set forth above, then the Customer will be entitled to the applicable service credit (as set forth in the table below) as its sole and exclusive remedy: Service Credit for Virus Catch Rate <100% Within any given three hundred sixty-five (365) day period, Customer may only make a total of two (2) claims for service credits that this Virus Catch Rate SLA is not being met. If Customer experiences three (3) or more occurrences within a rolling three hundred sixty-five (365) day period that this Virus Catch Rate SLA is not being met, then Cisco and Customer will come to a written agreement, within thirty (30) days of Customer providing notice of such occurrence, on the next course of action. CRES Uptime Service Level Agreement The Cisco Registered Envelope Service ( CRES ) will be Operational at least % of the time, over a trailing one-year period. For the purposes of this Section, Operational means that Customer will have access to CRES for the purposes of: (1) encrypting s; (2) enabling secure envelope recipient actions (e.g. opening, secure reply, secure forward, and/or forwarding to mobile@res.cisco.com); and (3) CRES user account access. CRES uptime is determined by

8 Page 8 of 1 dividing the total number of minutes CRES was Operational divided by the number of minutes in a one year period or 525,600 minutes. Consequently, an infraction is a minimum of thirty (30) seconds of CRES downtime. An infraction is limited to a single incident, and separate downtime occurrences cannot be aggregated. CRES uptime is determined and validated by an industryrecognized third-party monitoring service that performs service-level checks from various locations on the Internet. Exceptions This CRES Uptime SLA excludes any downtime resulting from Customer s administrator account access. If the Customer experiences a CRES SLA infraction, subject to the General Exceptions (defined below) and the exception set forth above, then the Customer will be entitled to the applicable service credit (as set forth in the table below) as its sole and exclusive remedy: Service Credit for CRES Uptime <99.999% Within any given three hundred sixty-five (365) day period, Customer may only make a total of two (2) claims that the CRES Uptime SLA is not being met. If Customer experiences three (3) or more occurrences within a rolling three hundred sixty-five (365) day period that the CRES Uptime SLA is not being met, Cisco and Customer will come to a written agreement, within thirty (30) days of Customer providing notice of such occurrence, on the next course of action. General SLA Conditions All remedies for service credits referred to above are conditioned upon the Customer having paid all applicable fees and fulfilled all of its obligations under this Offer Description and Customer submitting a claim in accordance with the SLA Claim Procedure below. Service credits do not apply as a result of the Service not meeting a particular SLA due to any of the following ( General Exceptions ): Customer-requested hardware or software upgrades, facility upgrades, or other similar Customer-led network interruptions, A scheduled maintenance period that was announced at least 24 hours in advance, Hardware, software or other data center equipment or services not in the control of Cisco or within the scope of the Service, Hardware or software configuration changes made by the Customer, Denial of Service attacks on the installed security infrastructure or ancillary services such as SenderBase, or Events outside Cisco s reasonable control, including without limitation acts of God, earthquake, labor disputes, industry wide shortages of supplies, actions of governmental entities, riots, war, terrorism, fire, epidemics, or delays of common carriers. With respect to the False Positive Rate SLA, the following conditions also apply: SenderBase reputation filters must be enabled at default levels or more conservatively, Customer must have the reputation messages per connection multiplier set to the default value,

9 Page 9 of 1 Customer must have IronPort Anti-Spam (IPAS) block settings at the default value or more conservatively, Customer must have IronPort Anti-Spam quarantine enabled with settings at default or more conservatively, The Customer must have SenderBase Network Participation enabled, The Customer must provide copies of false positive messages to Cisco, Customer must provide the domains covered by the Service, the number of mailboxes and the incoming mail report for the last 30 days, and Customers must only enable IPAS for spam scanning to qualify. Failure to comply with any of the above conditions may prohibit or limit Customer s right to receive a service credit with respect to the False Positive Rate SLA. With respect to the Virus Catch Rate SLA, the following conditions also apply: Customer must have SenderBase reputation filters enabled at a default level or more aggressively, SenderBase Network Participation must be enabled, Customer must provide all samples of missed Viruses to Cisco, Customer must ensure that the message was scanned by the anti-virus engine (e.g. message did not exceed the maximum scanning size limit), and Customer must provide the domains covered by the service, the number of mailboxes and the incoming mail report for the last 30 days. Failure to comply with any of the above conditions may prohibit or limit Customer s right to receive a service credit with respect to the Virus Catch Rate SLA. SLA Claim Procedure Customer must make a claim for a service credit within thirty (30) days of the claimed infraction. Each claim must be supported with evidence from message logs, sample messages, support ticket numbers, ping or trace route data, reporting data or other applicable method for documenting the occurrence and duration of the claimed infraction. Customer must certify that (1) no Customer-initiated changes or actions were responsible for the occurrence resulting in the claimed infraction, and (2) Customer did not ignore warnings by Cisco of a Customer behavior that is responsible for such occurrence for example, the presence of a mail loop due to configuration within or external to the Service, creating a policy bypass around anti-spam policies in the policy configuration, creating a policy bypass around anti-virus filtering in the configuration, or misconfiguration of an encryption profile or failure to permit upgrade of the PXE-SDK or software version of the Service. Customer must submit all claims for service credits via a support ticket. Cisco will evaluate the claim, respond within forty-eight (48) hours with acceptance of validity of the claim, and, if applicable, make restitution under the applicable remedy section within thirty (30) days following such response. Technical Support Cisco operates a 24/7 help desk for the Service which comprises both Tier 1 and Tier 2 engineers. All issues must be logged with Tier 1 engineers in the first instance. If an issue is not resolved by Tier 1 engineers, then the issue will be escalated to Tier 2 engineers for resolution. If Tier 2 engineers are unable to resolve the issue, then they will escalate the issue internally to Cisco application engineers for resolution. Customer is responsible for (1) using reasonable efforts to internally resolve any support questions prior to contacting Cisco, and (2) reporting any and all errors promptly in writing in English and for providing sufficient information to Cisco to enable Cisco to reproduce the circumstances indicating a reported defect or error. Customer shall provide technical information

10 Page 10 of 1 as may be required by Cisco, including but not limited to IP addresses for Customer s existing solution. Customer can contact Cisco for support issues regarding the Service at the following: Helpdesk Numbers Region Phone Number Europe/Middle East/Africa security@cisco.com +44 (0) Americas/Asia-Pacific security@cisco.com Australia/New Zealand security@cisco.com Severity Definitions The Service help desk shall assign a severity to all problems submitted by Customer in accordance with the following: Severity 1: The Service is down or there is a critical impact to the Customer s business operation. Customer and Cisco will commit full-time resources to resolve the situation. Severity 2: Operation of the Service is severely degraded, or significant aspects of the Customer s business operation are being negatively impacted by a Service degradation. Cisco and Customer will commit full-time resources during Standard Business Hours (defined below) to resolve the situation. Severity 3: Operational performance of the Service is impaired while most business operations remain functional. Cisco and Customer are willing to commit reasonable resources during Standard Business Hours to restore Service to satisfactory levels. Severity 4: Information or assistance is required on the Service s capabilities, installation, or configuration. There is clearly little or no impact to the Customer s business operation. Cisco and Customer are willing to provide resources during Standard Business Hours to provide information or assistance as requested. For the purposes of this Technical Support Section: Business Days means the generally accepted days of operation per week within the relevant region where the Service is provided, excluding local holidays. Local Time means Central European Time for the Service provided in Europe/Middle- East/Africa; Australia's Eastern Standard Time for the Service provided in Australia/New Zealand; Japan s Standard Time for the Service provided in Asia Pacific; and United States Pacific Standard Time for the Service provided in all other locations. Standard Business Hours means 8:00 AM to 5:00 PM, Local Time at location, on Business Days. Escalation Process Customers should engage the below contacts when an issue requires escalation. Severity 1 escalation times are measured in calendar hours - 24 hours per day, 7 days per week. Severity 2, 3, and 4 escalation times correspond with Standard Business Hours. Elapsed Time Severity 1 Severity 2 Severity 3 Severity 4 1 hour Customer Support 4 hours Customer Customer Support Support Manager 24 hours Customer Support Manager 72 hours Customer Support Customer Support 96 hours Customer Support Manager Customer Support Manager

11 Page 11 of 1 -ooo-

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End User

More information

(c) Support Response Time Target 30 minute Support Response Time Target for Emergency Incidents; and

(c) Support Response Time Target 30 minute Support Response Time Target for Emergency Incidents; and Service Level Terms Service Level Agreement Public IaaS Service Level Terms This document (the Public IaaS Service Level Terms ) describes the Service Levels and Service Level Credits applicable to Cisco

More information

Services Description IBM Managed Security Services (Cloud Computing) - hosted e-mail and Web security - express managed e-mail security

Services Description IBM Managed Security Services (Cloud Computing) - hosted e-mail and Web security - express managed e-mail security IBM United Kingdom Limited Registered in England: 741598 Registered Office: PO Box 41, North Harbour, Portsmouth, PO6 3AU (hereinafter IBM ) Services Description IBM Managed Security Services (Cloud Computing)

More information

Mail Hosting Services Terms and Conditions

Mail Hosting Services Terms and Conditions MAIL HOSTING SERVICES TERMS AND CONDITIONS In addition to the General, your use of the Mail Services is subject to the following additional terms and conditions: 1. ADDITIONAL DEFINED TERMS Some words

More information

Cisco Cloud Email Security Interoperability with Microsoft Office 365

Cisco Cloud Email Security Interoperability with Microsoft Office 365 White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Service Level Agreement for Microsoft Online Services

Service Level Agreement for Microsoft Online Services Service Level Agreement for Microsoft Online Services Last updated on: July 1, 2014 1. Introduction. This Service Level Agreement for Microsoft Online Services (this SLA ) is made by Microsoft in connection

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Stop Spam. Save Time.

Stop Spam. Save Time. Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

Comparing Industry-Leading Anti-Spam Services

Comparing Industry-Leading Anti-Spam Services Comparing Industry-Leading Anti-Spam Services Results from Twelve Months of Testing Joel Snyder Opus One April, 2016 INTRODUCTION The following analysis summarizes the spam catch and false positive rates

More information

WATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH

WATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH KEY SALES PITCH First and only true unified security provider for protection bidirectional threats and data loss prevention across email and web in a single solution. XCS leverages ReputationAuthority

More information

HOSTING SERVICES AGREEMENT

HOSTING SERVICES AGREEMENT HOSTING SERVICES AGREEMENT 1 Introduction 1.1 Usage. This Schedule is an addition to and forms an integral part of the General Terms and Conditions, hereafter referred as the "Main Agreement". This Schedule

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

IBM Workload Automation

IBM Workload Automation IBM Workload Automation Service Definition 1 1. Summary 1.1 Service Description IBM Workload Automation (SaaS) is a service management solution that allows customers to model the business processes one

More information

Service Level Agreement for Microsoft Online Services

Service Level Agreement for Microsoft Online Services Service Level Agreement for Effective: September 1, 2011 1. Introduction. This Service Level Agreement for (this SLA ) is provided in connection with, and is a part of, Customer s agreement with Bell for

More information

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ).

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). I. Service Definition. Exchange My Mail will provide Hosted Exchange and other Application Services

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3

More information

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This Service Level Agreement (SLA) is provided by ECS and is intended to define services and responsibilities between ECS and customer. ECS along with contracted 3 rd party partners

More information

SERVICE LEVEL AGREEMENT - Shared Exchange Hosting

SERVICE LEVEL AGREEMENT - Shared Exchange Hosting SERVICE LEVEL AGREEMENT - Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Constructure

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT This Service Level Agreement ( SLA ) applies to and governs such Gabian Technology and its partners SharePoint, Web Hosting, Virtual Private Server, Exchange Hosting, Advisor Earnings, Email Archive, CRM

More information

Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security. Titus White Paper

Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security. Titus White Paper Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security Titus White Paper Information in this document is subject to change without notice. Complying with all applicable

More information

MXSweep Hosted Email Protection

MXSweep Hosted Email Protection ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

PRODUCT DESCRIPTION OF SERVICES PROVIDED BY IPEER

PRODUCT DESCRIPTION OF SERVICES PROVIDED BY IPEER PRODUCT DESCRIPTION OF SERVICES PROVIDED BY IPEER 1. General This agreement / product description ("Product description") hereby states the terms and conditions for the services provided by Ipeer such

More information

Opus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY

Opus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY Joel Snyder Opus One February, 2015 COMPARING RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION The following analysis summarizes the spam catch and false positive rates of the leading anti-spam vendors.

More information

Service Launch Guide (US Customer) SEG Filtering

Service Launch Guide (US Customer) SEG Filtering Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

SERVICE LEVEL AGREEMENT: Shared Exchange Hosting

SERVICE LEVEL AGREEMENT: Shared Exchange Hosting SERVICE LEVEL AGREEMENT: Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Global Data

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Intermedia Technologies

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This Service Level Agreement ( SLA ) applies to and governs such PLEX SharePoint, Web Hosting, Virtual Private Server, Exchange Hosting, CRM and other remotely provided services

More information

the barricademx end user interface documentation for barricademx users

the barricademx end user interface documentation for barricademx users the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX

More information

SAAS MADE EASY: SERVICE LEVEL AGREEMENT

SAAS MADE EASY: SERVICE LEVEL AGREEMENT SAAS MADE EASY: SERVICE LEVEL AGREEMENT THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( SaaS Made Easy ). Capitalized terms used herein but not otherwise defined

More information

Green House Data Spam Firewall Administrator Guide

Green House Data Spam Firewall Administrator Guide Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...

More information

IronPort C10 for Small and Medium Businesses

IronPort C10 for Small and Medium Businesses I r o n P o r t A p p l i a n c e s S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A S T R U C T U R E. IronPort

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3

More information

Email Router and Vetting G-Cloud Service Definition

Email Router and Vetting G-Cloud Service Definition Email Router and Vetting G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved 1 In partnership with Government and industry-leading technology partners, General

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

IT Email Services page 1 of 10 Spam Filtering. Overview

IT Email Services page 1 of 10 Spam Filtering. Overview IT Email Services page 1 of 10 Overview Comcast Spectacor has implemented a system to control unwanted Internet email (spam) from the Internet. Virus emails and some known spam will be filtered automatically.

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Cisco IronPort C670 for Large Enterprises and ISPs

Cisco IronPort C670 for Large Enterprises and ISPs Data Sheet Cisco IronPort C670 for Large Enterprises and ISPs As the battle to protect the corporate email perimeter continues, two trends emerge: higher mail volumes and more resource-intensive scanning.

More information

Additional services are also available according to your specific plan configuration.

Additional services are also available according to your specific plan configuration. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. I. Service Definition SMS (Company) will provide You with Hosted Exchange and other Application Services

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2 Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)

More information

Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements

Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

SaaS Terms & Conditions

SaaS Terms & Conditions SaaS Terms & Conditions These SaaS Terms and Conditions ( SaaS Terms ) are part of the Serraview Services Agreement ( Agreement ) which governs Client s (also referred to herein as you or your ) use of

More information

Spam Testing Methodology Opus One, Inc. March, 2007

Spam Testing Methodology Opus One, Inc. March, 2007 Spam Testing Methodology Opus One, Inc. March, 2007 This document describes Opus One s testing methodology for anti-spam products. This methodology has been used, largely unchanged, for four tests published

More information

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers. WatchGuard XCS v10.0 Update 1 Release Notes WatchGuard XCS Build 140312 Revision Date 11 November, 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard XCS v10.0 Update 1. This

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

Spam Filter Message Center. User Guide

Spam Filter Message Center. User Guide Spam Filter Message Center User Guide Powered by MX Resources, LLC 10573 W. Pico Blvd., #343 Los Angeles, CA 90064 (888) 556-7788 support@mxresources.com Introduction Introduction to the Postini Message

More information

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200 800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A

More information

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

STATE MODEL CLOUD COMPUTING SERVICES SPECIAL PROVISIONS (Software as a Service)

STATE MODEL CLOUD COMPUTING SERVICES SPECIAL PROVISIONS (Software as a Service) SHI THESE SPECIAL PROVISIONS ARE ONLY TO BE USED FOR SOFTWARE AS A SERVICE (SaaS), AS DEFINED BELOW. THESE SPECIAL PROVISIONS ARE TO BE ATTACHED TO THE GENERAL PROVISIONS INFORMATION TECHNOLOGY AND ACCOMPANIED

More information

C I S C O E M A I L S E C U R I T Y A P P L I A N C E

C I S C O E M A I L S E C U R I T Y A P P L I A N C E C I S C O E M A I L S E C U R I T Y A P P L I A N C E U R L F I L T E R I N G September 2015 Version 1.3 Tobias Mayer Consulting Systems Engineer The most current version of this document can be found

More information

How To Use Adobe Software For A Business

How To Use Adobe Software For A Business EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed

More information

Panda Cloud Email Protection

Panda Cloud Email Protection Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)

More information

WATCHGUARD BARRACUDA KEY SALES PITCH TRUTH BEHIND THE PITCH

WATCHGUARD BARRACUDA KEY SALES PITCH TRUTH BEHIND THE PITCH KEY SALES PITCH Long time provider of email security with large customer base XCS 170, 370 and 570 appliances integrate bi directional email threat protection and data loss prevention on a single platform.

More information

PRODUCT SPECIFIC TERMS AND CONDITIONS DYN MANAGED DNS SERVICES V.3

PRODUCT SPECIFIC TERMS AND CONDITIONS DYN MANAGED DNS SERVICES V.3 DYN MANAGED DNS SERVICES 1. INTRODUCTION. These Product Specific Terms and Conditions (these Product Terms ) are entered into by and between Dyn and Client, and are incorporated into the Agreement entered

More information

LiveArchive. For the latest version of this document please go to: http://www.exchangedefender.com/docs. v 1.0 May 16,2011 Audience: Staff

LiveArchive. For the latest version of this document please go to: http://www.exchangedefender.com/docs. v 1.0 May 16,2011 Audience: Staff LiveArchive For the latest version of this document please go to: http://www.exchangedefender.com/docs v 1.0 May 16,2011 Audience: Staff Table of Contents ExchangeDefender Overview 3 ExchangeDefender LiveArchive

More information

Terms and conditions for Small Business Hosting

Terms and conditions for Small Business Hosting Terms and conditions for Small Business Hosting The terms of use below constitute a legal agreement between you (the Customer) and ExchangeGuru.net (the Company). Your agreement to be bound by these terms

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

IBM IT Service Management. Service Definition

IBM IT Service Management. Service Definition Service Definition 1 1. Summary 1.1 Service Description IBM SmartCloud Control Desk (SaaS) is a service management solution that includes or supports the following processes: Knowledge Management Service

More information

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS.

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. I. Service Definition Infront Webworks, will provide you with cloud based services and other application

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

WatchGuard QMS End User Guide

WatchGuard QMS End User Guide WatchGuard QMS End User Guide WatchGuard QMS Overview The WatchGuard QMS device enables spam messages from the WatchGuard XCS to be directed to a local quarantine area that provides spam storage for each

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

ModusMail Software Instructions.

ModusMail Software Instructions. ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of

More information

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1 Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

USM IT Security Council Guide for Security Event Logging. Version 1.1

USM IT Security Council Guide for Security Event Logging. Version 1.1 USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate

More information

Paladin Computers Privacy Policy Last Updated on April 26, 2006

Paladin Computers Privacy Policy Last Updated on April 26, 2006 Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Anti Spam Best Practices

Anti Spam Best Practices 53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT This Service Level Agreement ( SLA ) applies to and governs such SherWeb SharePoint, Web Hosting, Virtual Private Server, Exchange Hosting, CRM and other remotely provided services as SherWeb may offer

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

TERMS OF SERVICE. Halcuro ABN: 40 210 060857 GPO Box 2017 Brisbane City, 4001 Queensland, Australia

TERMS OF SERVICE. Halcuro ABN: 40 210 060857 GPO Box 2017 Brisbane City, 4001 Queensland, Australia TERMS OF SERVICE Halcuro ABN: 40 210 060857 GPO Box 2017 Brisbane City, 4001 Queensland, Australia Last Update 27th September 2015 Introduction We may refer to Halcuro throughout this document as "us"

More information