incloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments

Similar documents
Protection Service with Continuity

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Cloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Security with FailSafe

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

IronPort C100 for Small and Medium Businesses

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA

GFI product comparison: GFI MailEssentials vs. McAfee Security for Servers

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Understanding the Pipeline

Symantec Security.cloud

IBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31

SAYRE AREA SCHOOL DISTRICT TECHNOLOGY TIPS SPAM SASD PROOFPOINT BASICS ON HOW

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5

Hosted Exchange for Business. Connect, collaborate and share

SolarWinds Mail Assure

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

MOBILE LIVE SHARE SMS FAX

Step 2 - Deploy Advanced Security for Exchange Server

Cisco s Appliance-based Content Security: IronPort and Web Security

Symantec ST Symantec Messaging Gateway Download Full Version :

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Comparing Management Systems that Protect Against Spam, Viruses, Malware and Phishing Attacks

Stay connected to your market and employees! Advanced Solution - Product info ebrochure

Security Gap Analysis: Aggregrated Results

Microsoft Office 365 TM & Zix Encryption

Step 1 - Set Up Essentials for Office 365

Using Centralized Security Reporting

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Report on ESET NOD 32 Antivirus

Lotus Protector for Mail Security

IronPort X1000 Security System

Dataprise Managed Anti-Spam Console

How to Configure Esva for Office365

Consolidated Hygiene and Encryption Service E-Hub. Slide 1

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

Barracuda Security Service User Guide

Centralizing Services on a Cisco Content (M-Series) Security Management Appliance

Centralized Policy, Virus, and Outbreak Quarantines

TOTAL CONTROL SECURITY END USER GUIDE

Office 365: Secure configuration

The Eight Components of a Strong Cyber Security Defense System

Sophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

On the Surface. Security Datasheet. Security Datasheet

Service Description Safecom Simple Mail Relay Version 3.5

SERVICE LEVEL AGREEMENT

Please review the SECURE GATEWAY Administrator Guides prior to engaging the AT&T Managed Security Services Support Center.

Configuring Gmail (G Suite) with Cisco Cloud Security

Step 1 - Set Up Essentials for Office 365

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

with Advanced Protection

GFI product comparison: GFI MailEssentials vs. LogicNow - Control

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

The Interactive Guide to Protecting Your Election Website

Google Message Discovery

Exam : ST Title : Symantec Mail Security 8300 Series (STS) Version : Demo

Panda Security. Protection. User s Manual. Protection. Version PM & Business Development Team

Symantec Protection Suite Add-On for Hosted Security

BEST PRACTICES FOR PERSONAL Security

Setting up Microsoft Office 365

IBM SmartCloud Notes (SCN) Mail Routing

Office 365 Integration Guide Software Version 6.7

SERVICE LEVEL AGREEMENT

Using Trustwave SEG Cloud with Exchange Online

Layer by Layer: Protecting from Attack in Office 365

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

Modern attacks and malware

Corrigendum 3. Tender Number: 10/ dated

You should not have any other MX records for your domain name (subdomain MX records are OK).

M86 MailMarshal SMTP USER GUIDE. Software Version: 6.9.9

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

A Ready Business rises above infrastructure limitations. Vodacom Power to you

itg CloudBase is a suite of fully managed Cloud Services from Backup to Hosting ready to support your business onwards and upwards into the future.

You can find more information about the service at

MX Control Console. Administrative User Manual

At a Glance: Symantec Security.cloud vs Microsoft O365 E3

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage

How to Configure Office 365 for Inbound and Outbound Mail

Deployment Guides. Help Documentation

Sales Training

Late Addition #1 EXECUTIVE DOCUMENT SUMMARY

Symantec Small Business Solutions

Unit 2 Assignment 2. Software Utilities?

Connecting to Mimecast

Best Practices. Kevin Chege

End-to-End Encryption for Everybody?

Gateways. Kevin Chege

2 User Guide. Contents

PROOFPOINT CLOUD SERVICES WHAT S INSIDE: 1 OVERVIEW 2 FEATURES 3 OVERVIEW 4 ARCHIVING FEATURES

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Transcription:

Data Sheet incloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments Why Hosted Spam? Reasons to Buy: Internal Anti-Spam solutions are inconvenient for businesses. Most have High iinstallation and maintenance efforts with unreliable filters detecting desired emails Corruptive emails on internal mail servers are a burden to the company internet connection and the infrastructure. Significant costs are incurred managing preventative policies. Reduces capital expenditure Let incloudone manage technology whilst you focus on managing your business All our Hosted Solutions are kept in state-of-the-art Data centers providing peace of mind your data is protected and providing the highest availability against traditional offerings All desired emails are delivered normally without user intervention Managed service Re-routing of all inbound & outbound mails through incloudone dedicated servers All mails pass through an elaborate filtering system ensuring you only receive the mails you want, the rest stay with us. All managed spam filters are being operated in redundant secure data centers Solution acts as a protective barrier in front of customer infrastructure Detection of spam, viruses, phishing mails and other malware are detected before reaching client IT infrastructure Our filters are being updated within 60 seconds and adjusted automatically Full encrypted service ensuring complete Data protection of customer mails Review of spam mail by users at desired frequency, then released if required No software, no hardware, no maintenance, no subsequent administrative work for your IT

Data Sheet Advantages at a glance Affordable, easy to use for single or multi-user environments 99.9% spam detection guaranteed with less than 0.0004% false positives Two independent virus filters Active protection from DoS (Denial of Service) attacks Automated e-mail and spam statistics No volume limit for e-mails and attachments Transport encryption via TLS (Transport Layer Security) Central mail relay Centralized management with 24/7 monitoring Fixed costs Full 24/7 e-mail and phone support Operated through redundant, highly secured data centers No software, no hardware, no maintenance, no subsequent administrative work for your IT

E-Mail Processing: Single Step Migration If you are the owner of a mail domain (YouName@YourCompany.com), we will (by your order) change the record in the internet's address book that points your mail server. (Technically spoken: change of the MX-record in the domain name service or DNS). Starting at this point, e-mails to your domain will be directed to incloudone s servers, which then check and forward clean mails to your own e-mail server. There is nothing more that you need to do.

Transformation Process: Your e-mails are processed in three steps: 1. Block The BLOCK function takes care of those messages that - with the highest probability possible - are obviously Spam. In these cases our systems break the connection with the sending server giving an error message and a reason. The vast majority of incoming mails (currently > 99%) is actually being blocked and not transmitted to quarantine, where it would be a burden for your employees. False positive rate at this point is extremely low at less than 1 per 1 billion mails. 2. Active Analysis E-mails that have been accepted once and been identified as Spam subsequently are collected in quarantine. Users receive a daily message about recently added E-Mails in quarantine, formatted as a list. Users can order delivery of e-mails on that list to their inboxes by a simple mouse click. Users can also access the quarantine area by using a Web Interface. Thanks to the BLOCK function, the quarantine area will stay compact. The user keeps the overview, is in control and can subsequently deliver messages that have been marked as Spam. 3. Virus Checks Known Viruses: Viruses that are already known and detected are being completely blocked and not transmitted to the user. Unknown Viruses: New and unknown viruses are being identified by the early warning system s outbreak detection.

Create your own Bundle Call our Sales Hotline 0800 0546 111