1 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY Systems Managed Service
2 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents Systems Managed Service Test objectives and scenario...3 Test network...4 Test methodology...5 Product test reporting...6 Certification...7 The product...8 Test report...10 Test results...15 West Coast Labs conclusion...16 Security features buyers guide...17 West Coast Labs, William Knox House, Britannic Way, Llandarcy, Swansea, SA10 6EL, UK. Tel : , Fax :
3 SYSTEMS MANAGED SERVICE 3 Test objective and scenario The war for control of corporate inboxes has been raging for some years now as Anti-Spam solution providers seek to protect us from unsolicited, inappropriate and often offensive intrusions into our time. The originators of these s are becoming ever more inventive and so more and more companies are coming to rely on automatic solutions with learning engines to protect their users and machines. The s themselves are getting more sophisticated. Spam is now no longer just advertising material, but is evolving, and often acting as the precursor to identity theft. This Technology Report examines the functionality and performance of participating Anti-Spam products which are aimed at the small, midsize and corporate network environments. It has been open to both software and appliance-based solutions plus hosted services. The objective of our overall testing program, which is open to all Anti- Spam Vendors is, through a real-world test environment, to provide an independent validation of Anti-Spam solution effectiveness with particular reference to: A detailed view of the features and functions of the solutions Spam detection capability and rates of detection of each solution Integration into a network infrastructure and level of administration required to operate effectively.
4 4 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Test network Software solutions are installed on servers that exceed the minimum specifications required by the vendor. Appliance-based solutions are installed on the network according to the vendor s recommended placing. For hosted services, WCL test through identified accounts and will change the MX records to divert the mail stream through the hosted service. In order to allow the DNS change to propagate, service providers allow a 2-day settling-in period. Details of the tuning and vendor customer support will form part of the additional feature testing and reporting.
5 SYSTEMS MANAGED SERVICE 5 Test methodology WCL has a number of domains available which act as honeypots for spam, receiving genuine, not canned spam. These domains receive varying levels of spam and are intended to mirror different environments. Within each domain are designated user accounts with a variety of practices and needs - some are subscribed to a variety of newsgroups and mailing lists. Some user accounts actively contribute to mailing lists. The domain designated for testing purposes will be that which currently receives spam at a level consistent with the test requirements. For testing in this Technology Report and for the certification of each of the participating solutions, we used live mail feeds coming in to various extra domains wholly owned and controlled by West Coast Labs. Each domain used contains a number of individual user accounts with established addresses, along with distribution lists. To maintain the flow of genuine mail, test engineers used several internal and external accounts, to send s that simulated real life transactions common in business: for example requesting meetings, sending notifications to groups and non-business related social s. s were also sent from web-based accounts to simulate external users sending non business-related s and home workers. Individual user accounts were subscribed to several mailing lists and daily newsletters for grey mail purposes. For each solution we configured the device or software to fit in with the test network and placed it into a stream of live mail to see how it would cope in an out-of-the-box configuration with real-world traffic. However, we do recognize that a large part of spam detection relies on an initially intensive learning process. Hence, we will be placing these devices in the mail feed in coming months for longer periods of time, interactively training them, and updating the performance data included in the online White Papers.
6 6 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Product test reporting For each product that we test, we will issue a report which will address the following aspects of the product: 1. Management/Administration Ease of Setup/Installation Ease of Use Logging and reporting function Rule creation Customization Content Categories Technical Support Available Program Help Menu 2. Functionality Processing Steps Allow/Blocking of Quarantine Area Additional functionality reporting Block Addresses Blacklist/Whitelist Allow Addresses 3. Performance Volume or % of spam detected False positive rate Spam incorrectly passed through Legitimate mail blocked Legitimate subscription mail blocked
7 SYSTEMS MANAGED SERVICE 7 Certification - Checkmark Upon successful completion of the catch rate testing, participating solutions will be accredited to Checkmark Certifications for Anti-Spam subject to achieving the following catch rates:- Checkmark Anti-Spam Certification PREMIUM 97% and over Catch Rate. Checkmark Anti-Spam Certification STANDARD 90% and over Catch Rate.
8 8 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT The product Systems offers best-of-breed protection, management and compliance services which collectively ensure that is always available as a productive business tool for its customers in the SME and enterprise markets. url : Systems says about the Business Benefit of its Managed Service Systems suite of services collectively free up the corporate resources bandwidth and user time - which spam would otherwise consume, whilst offering protection from Denial of Service (DoS) attacks and reducing the risk of failure for the business user. Powerful yet flexible rules engines allow organisations to monitor traffic and prioritise business critical , such as sales-leads. Image filters protect users from pornographic material, thereby protecting employers from potential law suits. archiving features rapid search and retrieval which ensures that copies of all s are always available, whether for disaster recovery, compliance or legal reasons. url :
9 SYSTEMS MANAGED SERVICE 9 The product Systems says about the Technical Benefits of its Managed Service Manages flow of to corporate servers using a suite of multi-layered/ multi-technology approaches to remove spam and eliminate all viruses. Provides buffering service if an organisation loses internet access or suffers internal server outage. Outbound monitoring and filtering reduces risk of confidential documentation leakage, and protects company reputation. Mirrored infrastructure in different geographical locations, coupled with real-time replication minimizes risk. Comprehensive user management enables delegated management and monitoring. Real time audit trail of every that is sent / received enables 100% trackability and accountability. Detailed graphical reporting for up to 3 years contributes to capacity planning. url :
10 10 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Test report Introduction Systems is a UK based company offering a managed service that corporations can route mail through before it gets to their servers. In addition to providing the anti-spam service tested here they also provide anti-virus scanning with the choice of Sophos or F-Secure. This approach removes the need for purchasing and housing extra hardware in house and also outsources the responsibility for protection.
11 SYSTEMS MANAGED SERVICE 11 Test report Installation and Configuration The set up and configuration is very simple and this is helped by a comprehensive and easy to understand Service Deployment Plan. This sets out an eight stage process for administrators to follow that acts as a guide to switching the flow of a mail feed. Both the document and the process have been well thought out and have been written so that they can be used by either a novice or experienced administrator. Checklists are also provided throughout to ensure that all bases have been covered and that the change over is smooth. Systems support also perform a scan of an organisation s current MX records to establish the current mail route and then provide a draft pre-filled with the changes that need to be made and the contact address for the hosting company. Once the changes have been made to the relevant MX records, mail will start flowing through the Systems service and the protection activates. Their support team is also very on the ball on the one occasion we had to contact them the response and resolution of our query was very speedy.
12 12 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Test report The Interface The web based customer management portal is decked out in very tasteful subdued blues and greys that are easy on the eye. A good proportion of the interface is Flash based and the animations on some of the pages add a bit of sparkle to the user experience. The initial page after logging in shows a pie chart that breaks down the traffic for a 28 day period into colour coded slices, and displays the data on a per day basis below in histogram format. Also included here is an overview of the status of the accounts, a list of notifications of upgrades and improvements from support, the network status of each domain and a list of top viruses received, top recipients within the domains, and top inbound sender domains. Having all of this data easily within reach makes getting a snapshot view of how the domains are performing very easy. The main menu is listed across the top of the screen with the options being Users, Accounts, Domains, Logs, Reports, and Help. The Users section allows a current administrator to add further administrators with varying scopes they can be set up to make changes to individual domains or to the entire account. There is also the ability to restrict a user to a specific IP address for logins. These are useful features which allow for the dissemination of responsibility if a company has several domains, whilst still allowing one or more administrators to have overall control of the Systems account.
13 SYSTEMS MANAGED SERVICE 13 Test report The Interface (continued) The next section is Accounts and this allows the user to change the address for administrative notifications for the entire Systems account covering all domains, and also to set rules that will apply across all domains registered on a simple Condition Action basis. These include conditions based upon message size, attachment types, specific words in either the body or the subject, phrases in the mail headers and time restrictions. The Actions include allowing the message, allowing with a spam filter override, copy, redirect, delete with no notifications or quarantine. There is also a further set of options that allows the user to specify notification and logging actions. The Domains section allows control over individual domains at a more granular level. Recipients of administrative notifications may also be specified here on a per domain basis, rules can be added for certain domains and not others in the same fashion described above, different mail signatures can be specified for each domain, and there are sections to configure alerts and filter settings.
14 14 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Test report The Interface (continued) The Logs section provides a variety of different logs ranging from Mail in, Virus and Spam through to Quarantine and an Event Log. The logs are well formatted and cleanly presented, with the data easy to see. An administrator can quickly look at a message subject, recipients, sender and status to see which rules have been triggered for certain groups of s. There are also good filtering options here to allow limitation to specific recipients, senders, subjects or date ranges. Messages in Quarantine can be viewed in their own window. This window displays the headers and then has a separate section for the message content, with the option to spawn the content in its own distinct window to examine the contents more closely if required. The Reporting section gives a set of overall reports and allows searches to be performed and then saved as favourites to be run again at a later date. These are presented as Flash animations and are in keeping with the look and feel of the rest of the interface. There are a large number of options available within the search parameters various different report types, timescales, comparative or aggregate reports over all domains, and direction of mail are all selectable and there are a variety of presentation options. Each scan is then saved under the Historic section so that it can be re-run later if needed.
15 SYSTEMS MANAGED SERVICE 15 Results Type of Mail Delivered as Genuine (%) Delivered as Spam (%) GENUINE SPAM Systems Managed Service performed well, delivering 100% of the genuine mail correctly and correctly classifying 98% of the spam mail in a straight out of the box configuration. It is also worth noting that the Systems Managed Service solution delivers a good proportion of grey and list mail as genuine whilst still stopping a lot of the more questionable material. This gives an organisation the flexibility and opportunity to define policies during a training period without missing mail that could be potentially business critical.
16 16 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT West Coast Labs conclusion Overall Systems Managed Service is a well presented and clean looking system with a lot of functionality. The options are easy to locate and the online help is well written and clear. It can be highly recommended to any company that wishes to take some pressure from a busy administrator or who wishes to outsource the responsibility for spam and virus scanning their mail to a third party The Systems Managed Service software performed consistently well in the tests, and therefore West Coast Labs is pleased to award the Systems Managed Service the Premium level Anti-Spam Checkmark. West Coast Labs, William Knox House, Britannic Way, Llandarcy, Swansea, SA10 6EL, UK. Tel : , Fax :
17 SYSTEMS MANAGED SERVICE 17 Security features buyers guide as stated by Systems SPAM FEATURES Does the product block spam out of box or does it require addition or tuning of rules? Blocks spam out of the box, a true managed service were Systems ensure the system blocks true spam. Is user feedback required over initial stage of deployment? Not required. FILTERING Does the product utilise keyword lists? Not for core spam filtering, but keywords can be used to block unwanted s. Does the product utilise Bayesian filtering? Bayesian is used, but as a small element of the spam detection. Can white-lists/black-lists be set? As with keywords, they are avaliable but not to block spam / avoid false positives but to enhance user experience... i.e. if a student wanted to study spam from hotmail addresses a white list could be used to only allow spam from hotmail through. Does product support RBL? YES. Does the product support the setting of different confidence levels? Can actions be varied at different confidence levels? YES, configurable per organisation, per domain or each user. Can actions be varied at different confidence levels? YES, block; tag; report only
18 18 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Security features buyers guide as stated by Systems ADMINISTRATION Can the product be automatically updated? YES, managed service. Can filters be automatically updated? YES, managed service. What are the update methods? Automatic as central managed service, no user input required. Can suspected spam be quarantined? YES, all spam quarantined for 28 days as default and avaliable online via secure web interface. If so, what type of quarantine (forward to Q mailbox / saved on device / etc.)? Stored centrally on hosted system. Accessed by web broswer. END USER INTERACTION Can users see reports individual to them? YES. Can users process messages themselves? YES, via web administration portal Can users review mail marked as spam? YES, via web administration portal Can users free messages from quarantine? YES, via web administration portal Can users set their own white lists/black lists? Yes, via web administration portal
19 SYSTEMS MANAGED SERVICE 19 Security features buyers guide as stated by Systems ADDITIONAL SECURITY FEATURES 1. Transport Layered Security (TLS) provides assurred encrypted delivery 2. Encrypted web portal ensures privacy and protection of sensitive information 3. IP access monitor and blocking for web access 4. Pro-active DNS monitoring for client records ensures mail security loopholes can't be introduced 5. Multiple datacenters containing redundant hardware means no single point of failure 6. Unique replicated data solution ensures that there is no risk of loss of any messages 7. Lock down of access to web portal to designated IP ranges, further protects against hacking. 8. Anti-Virus solution using multiple best of breed vendors to provide enhanced protection 8. True "Zero Hour" Anti-Virus technology based on Real Time Detection, negating risks of early stage viruses evading traditional scanners. 9. Comprehensive image analysis tool set to protect employees & company reputation against exchange of pornographic material % audit record of every message relayed by the service accessible by administrators and end-users if required. 11. End-user management system enables selected features to be accessed by end-users 12. Directory Harvest Protection ensures that company addresses are protected from capture and exploitation 13. Reputation Service contributes to spam detection and protects organizations from the risk of mass Distributed Denial of Service Attacks (DDoS).
20 20 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Security features buyers guide as stated by Systems ADDITIONAL SECURITY FEATURES (continued) 14. High throughput, purpose built message switching technology further contibutes to the protection of extreme mail traffic brought about by DDoS attacks. 15. Comprehensive policy based content management system enables rules to be created to control who can exchange what content with whom 16. Detailed user management system, enabling access to be granted/ denied to functions within the system 17. Graphical reporting system collecting and reporting data for up to 3 years, supports investigations into policy violations or suspicious events. 18. Event log records policy violations, login attempts and changes made to the system enabling traceability and accountability. 19. Pro-active monitoring by 24 x 7 EMS Network Operations Centre ensures that any major incidents are indentified, managed and alerted to the customer before they can do damage. 20. Monitoring mode for certain policies enables non-invasive introduction of system. List up to 30 features url :
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT Email Systems Managed Service JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Email Systems Email Systems Limited,Cart Lodge,Goodley
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT GFI Mail Essentials for Exchange/SMTP NOVEMBER 2006 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Mail Essentials for Exchange/SMTP GfI Software,
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
AlwaysMail Sector 5 Cloud E-Mail INDEX INDEX 2 SECTOR 5 COMPANY PROFILE 3 Background Company Name & Address 3 1. SECTOR 5 HOSTED E-MAIL OFFERING 4 2. MICROSOFT HOSTED EXCHANGE 5 3. HOW WE MIGRATE COMPANIES?
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
E-Mail Security on your terms SOFTSCAN With fraudulent and offensive emails delivered in vast quantities to businesses every day a foolproof email security system is essential. Setting the standards SoftScan
Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. firstname.lastname@example.org www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
Office 365 for SMB Jump Start Mod 08: Exchange Online FOPE Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall Owner & IT Consultant District Computers 1 Jump Start Schedule
Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the purpose of ScanMail emanager
Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...
WEB QUARANTINE USER GUIDE VERSION 4.3 WEB QUARANTINE USER GUIDE Version 4.3 The content of this manual is for informational use only and is subject to change without notice. Neither Norman nor anyone else
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
IBM Global Technology Services IBM Proventia Network Mail Security System Preemptive protection and spam control for your messaging infrastructure In the era of distributed workforces, virtual teams, road
Mimecast Personal Portal (MPP) End User Quick Start Guide Mimecast Personal Portal (MPP) provides email continuity and archive search services to users. This means that it is always possible to send and
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
PaperClip em 4 11/19/2007 Serial Deployment Quick Start Guide This checklist should be completed before installing the em4 Relay. Your answers with the associated screens will enable you to install and
Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
WHITE PAPER Understanding the Costs of Email Security Table of Contents Introduction.................................................................... 3 Calculating Savings.............................................................
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
FTA Computer Security Workshop Secure Email March 8, 2007 Stan Wiechert, KDOR IS Security Officer Outline of Presentation The Risks associated with Email Business Constraints Secure Email Features Some
Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...
Bizo Email Filter Service Description Service Description Bizo Email Filter Version 2.0 All Rights Reserved 2006 Copyright 2004 Business Online Limited Bizo is the trading name for Business Online Limited.
KEY SALES PITCH Long time provider of email security with large customer base XCS 170, 370 and 570 appliances integrate bi directional email threat protection and data loss prevention on a single platform.
What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies
DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 184.108.40.206.a DDoS Detection and Mitigation Features... 1 220.127.116.11 Email Monitoring Service Features... 2 18.104.22.168
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Quarantine Central for end users: FAQs About is a leading hosted email services company. Founded in 1994, was one of the first companies to offer hosted email security services to the North American market.
exchange@pam email archiving at its best Whitepaper exchange@pam and Microsoft Exchange Server 2007 C O N T E N T exchange@pam and Microsoft Exchange Server 2007 What s new in the latest Microsoft Exchange
PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu email@example.com PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER FORTINET Global Reputation Monitoring PAGE 2 Overview Fortinet s FortiGuard Security Services delivers two essential