Software Details
- Essential protection while virtually eliminating the need to manage hardware and software on site
- Increases employee productivity while reducing the risk of security breaches
- Enables rapid implementation delivers predictable costs and reduces total cost of ownership
- Reduces complexity
- Enables businesses to enforce acceptable usage policies reduce data loss and maintain regulatory compliance
- Ensures the highest quality of service
Know your gear
Accurate and effective email spam and virus filter.
Accurate and effective email spam and virus filter
•Built upon big intelligence combined with multi-layered security, including Skeptic. The service is designed to protect against 99% of spam (95% double byte characters) and 100% protection from known and unknown viruses as defined in the SLA.
Skeptic scanning provides defense against spam, malware, phishing and targeted attacks
•Able to detect new and sophisticated targeted attacks through detailed and predictive analysis.
Link following technology examines URLs
•Protection against phishing, spear phishing and targeted attacks, link following will scan links in emails to test if sites contain malicious content.
Dependable service from the cloud
•More than a decade has been spent delivering and continuously developing a highly accurate, effective cloud service for securing and managing your email. It is backed by a comprehensive and meaningful service level agreement and supported by a global team of email security experts available and accessible 24/7.
Privacy and control
•Granular policy-based encryption and advanced content filtering and data loss prevention technologies that make it easier to protect and control sensitive data.
•Built upon big intelligence combined with multi-layered security, including Skeptic. The service is designed to protect against 99% of spam (95% double byte characters) and 100% protection from known and unknown viruses as defined in the SLA.
Skeptic scanning provides defense against spam, malware, phishing and targeted attacks
•Able to detect new and sophisticated targeted attacks through detailed and predictive analysis.
Link following technology examines URLs
•Protection against phishing, spear phishing and targeted attacks, link following will scan links in emails to test if sites contain malicious content.
Dependable service from the cloud
•More than a decade has been spent delivering and continuously developing a highly accurate, effective cloud service for securing and managing your email. It is backed by a comprehensive and meaningful service level agreement and supported by a global team of email security experts available and accessible 24/7.
Privacy and control
•Granular policy-based encryption and advanced content filtering and data loss prevention technologies that make it easier to protect and control sensitive data.