Email security involves a lot of buzzwords. What do they mean?
For a glossary of common email security terms, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is ProSight Email Guard?
ProSight Email Guard is a spam filtering service and email security solution designed for small and mid-sized businesses. ProSight Email Guard combines the world-class cloud infrastructure and services of top data security companies with proven on-premises security gateway hardware to protect inbound and outbound email against spam, viruses and other email-borne threats and also offers outbound data protection via content filtering and encryption. In addition, ProSight Email Guard's centralized monitoring, management and reporting tools help you administer and troubleshoot your email system and define and enforce corporate email policy.

Back to top

What is the danger of email-based attacks?
About 70% of email is spam. 3% of emails have malicious attachments. 91% of successful hacks begin with email attacks. Spam lowers productivity. Viruses and advanced persistent threats (APTs) can steal and information and money, and shut down your network. Poorly secured email systems can violate government regulatory requirements and industry standards and expose you to litigation.

Back to top

What is the architecture of ProSight Email Guard's security solution?
ProSight Email Guard uses a hybrid architecture that includes cloud-based resources as well as on-premises email security gateway hardware. The Cloud Protection Layer prevents 95% of spam and the vast majority of viruses and other malware from ever reaching your security perimeter. The on-premises security gateway appliance provides deep, multi-level inspection for inbound threats including spam embedded within images. The security gateway also offers spam and virus protection, policy based content filtering, rate control, and cloud-assisted encryption for outbound email. In addition, ProSight Email Guard's architecture provides centralized web-based administration with comprehensive monitoring  and reporting plus options for role-based management delegation. A cloud-based Update Center enables zero-hour defense against newly discovered threats and keeps the Cloud Protection Layer and the security gateway up to date without management intervention. For a detailed discussion of ProSight Email Guard's architecture, see Email Guard technology and architecture.

Back to top

Why does ProSight Email Guard use a hybrid design with cloud services and on-premises hardware?
The combination of cloud-based and on-premises resources used by ProSight Email Guard provides better security, performance and resilience than would be possible with a one-dimensional architecture. For zero-hour security, the cloud-based Update Center provides 24x7x365 monitoring of worldwide threats, develops defenses, and distributes updates in real time to ProSight Email Guard's local security gateway appliance. In addition, the Cloud Protection Layer blocks the vast majority of spam and malware before it ever reaches your security perimeter, which enhances both security and system performance. Security and performance are also improved by the ability of the purpose-built local gateway to perform deep analysis of email traffic, including image scanning, before traffic reaches your email server. To stabilize performance, the local security gateway offers rate control for inbound and outbound email. For resilience, ProSight Email Guard's Cloud Protection Layer offers spooling. If your local data center goes down, spooling allows you to store all your inbound email in the cloud for up to 96 hours or direct it to an alternative destination while you fix the problem.

Back to top

What email-based threats does ProSight Email Guard block?
The ProSight Email Guard security gateway provides consecutive security filters that include Denial of Service (DoS) and security protection, rate control, IP reputation analysis, sender authentication, recipient verification, virus protection, user-specified policy enforcement, signature analysis, intent analysis, image analysis, Bayesian analysis, and spam rules scoring. This results in fast, comprehensive email protection against spam, viruses, spoofing, phishing, directory harvest, and spyware attacks. For a glossary of these and other terms used in email security, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Progent's role in delivering the ProSight Email Guard solution?
Progent can help you plan your ProSight Email Guard deployment, recommend security gateway hardware appropriate for your expected workloads and security requirements, configure your gateway, integrate ProSight Email Guard with Exchange Server or any other email platform, define and configure policies for inbound spam and outbound content filtering, set up and test outbound encryption, design and implement a high-availability solution that can include clustered security gateways, set up an efficient management system that takes advantage of delegated administration, and provide training, ongoing consulting support and troubleshooting services.

Progent's Microsoft-certified consultants can provide Microsoft System Center Operations Manager consulting so you can monitor your entire email and network infrastructure and resolve potential problems before they impact network productivity. Progent's Cisco-certified CCIE network consultants can help you design, build and troubleshoot a network infrastructure that supports both the on-premises and cloud-based resources that make up your ProSight Email Guard ecosystem. Progent's CISSP-certified cybersecurity consultants can help you plan and validate a cohesive security environment that protects your business against email-borne, web-based and internal threats and that complies with government regulations, industry standards, and your own corporate policies.

Back to top

Why is it important to filter outbound email?
Outbound filtering provides two major benefits: data loss protection (DLP) and reputation protection. DLP stops sensitive information from leaking out of your business via careless emails. Leaked data can result in regulatory infractions, identity theft, and loss of competitive advantage. It can also lead to litigation. The ProSight Email Guard security gateway includes pre-defined content filters such as HIPAA, credit card numbers, and Social Security Numbers. ProSight Email Guard also allows you to create custom content filtering policies covering specified keywords, categories, or character sets. Content filtering policies can be configured to block, quarantine or encrypt messages automatically.

Outbound filtering can also block spam and viruses sent by internal computers that have been compromised, which is a serious vulnerability in BYOD (Bring Your Own Device) environments. Organizations which allow spam and viruses to be sent out can be placed on block lists, or "blacklisted". This loss of reputation can hurt productivity and profits.

Back to top

Why can't my firewall stop spam or Directory Harvest Attacks?
Conventional firewalls offer little or no protection against spam or Directory Harvest Attacks. Inbound email often passes through the firewall to your email server without regard for message content, message size or address, creating an opportunity for spam and viruses to enter and making your email system vulnerable to directory harvesting.

Back to top

How does ProSight Email Guard support email encryption?
ProSight Email Guard utilizes a cloud-based Message Center to handle the encryption and delivery of outbound email. Administrators can establish multiple policies for determining which emails are automatically encrypted. These are then sent securely over TLS to the Message Center where they are encrypted using AES-256 and stored for retrieval. The Message Center sends the intended recipient a notice that includes a URL to visit in order to retrieve the encrypted email. Once establishing a password, the recipient can read the encrypted message. Any replies are also encrypted at the Message Center. In addition, Email Guard includes a plug-in for Exchange Server which lets users choose to encrypt individual emails. For more details about how ProSight Email Guard encrypts outbound email, visit Email Guard technology and architecture.

Back to top

Is ProSight Email Guard difficult to manage?
ProSight Email Guard includes a browser-based management portal designed to be easy to use for administrators in small and mid-size organizations. The portal's dashboard offers centralized monitoring and control of hardware, services, policies and configurations, and keeps extensive health and performance statistics on inbound and outbound email. You can easily track by day or hour the number of inbound and outbound messages blocked, quarantined, and rate controlled; the inbound messages tagged and allowed; and the outbound messages sent, redirected, and encrypted. Granular policy control includes delegated domain administration, delegated help desk role, and individual user policy control. For more information about ProSight Email Guard's cloud-based management features, see Email Guard technology and architecture.

Back to top

What email platforms are supported by ProSight Email Guard?
ProSight Email Guard works with any on-premises email platform but offers some enhanced features when used with Microsoft Exchange Server, such as the Outlook client encryption add-in and the Exchange LDAP Accelerator.

Back to top

How does ProSight Email Guard impact email performance?
The hybrid architecture of ProSight Email Guard leverages the massive scale of cloud-based resources and the power of purpose-built gateway hardware to off-load almost all the work of email protection from the email server. On-premises gateways are available in a variety of models that offer performance that ranges from entry level to enterprise class, and gateways can be clustered for improved performance, as well as higher availability. You can configure ProSight Email Guard to deliver the performance you need, and you can easily expand your deployment as your needs grow.

Back to top

How does ProSight Email Guard avoid blocking legitimate email through false positives?
A false positive is a legitimate email quarantined as spam. The default policy configurations in ProSight Email Guard have a false positive rate of 0.01%, which is low by industry standards. Administrators have options to adjust the aggressiveness of ProSight Email Guard's spam filtering with techniques such as threshold scoring, but the surest way to prevent false positives is to build "allow lists" or "whitelists" that specify legitimate senders. ProSight Email Guard permits users to control spam scoring, Bayesian analysis, and allow lists at the personal level.

Back to top

How can I get help now with email security?
If your organization needs online or onsite help with any aspect email security:
Call 800-993-9400 or visit Contact Progent.

Back to top

Also See:

An index of content::

  • 24-7 Server Help RIM BlackBerry Tulsa Oklahoma BlackBerry Small Business Computer Consulting Company
  • 24-Hour ProSight Virtual Hosting Consult ProSight Private Cloud Hosting Services Services
  • 24x7 Aironet 3700 Access Point Integration Support Integration Services Aironet 1500 Access Point

  • CISA Certified Security Expert Database Application Development Specialists
    Immediate Cisco and Microsoft Database Programming Technical Support

    Progent's Microsoft-certified relational database developers can provide businesses of any size online DBA and programming services for popular RDBMS products including Microsoft SQL Server, Oracle, MySQL, and Microsoft Access. Services offered by Progent include installation and integration, database architecture and coding, administration support, replication and synchronization strategies, capacity planning, performance optimization, data migration, information security, backup/restore systems, problem solving, and training.

  • 24x7x365 Durham Work from Home Employees Setup Guidance Durham North Carolina Durham, NC Telecommuters Consulting nearby Durham - Integration Consulting Services
  • After Hours Technical Support CISSP Louisville Forensics Services Firewall Jefferson County Kentucky
  • Alexandria Remote Workers Management Solutions Consulting Alexandria Virginia At Home Workforce Alexandria Assistance - Endpoint Management Solutions Consulting Services Alexandria
  • Email Allow Lists Engineer
  • Apple Mac and Windows coexistence Information Technology Consulting Remote Specialists Apple Mac and Windows coexistence
  • At Home Workers Expertise near me in Valencia - Voice/Video Conferencing Systems Expertise Valencia-Sylmar, CA Valencia Remote Workforce Video Conferencing Solutions Consulting and Support Services
  • Augusta-Richmond County IT Staffing Temps Help Augusta-Richmond County Short Term IT Staffing Services Augusta Aiken
  • Award Winning Work from Home Employees Consulting near me in San Antonio - Security Systems Consulting Experts San Antonio, TX Teleworkers Consulting Services nearby San Antonio - Network Security Solutions Consulting San Antonio Airport SAT
  • Beverly Hills California Exchange Server 2010 Computer Support Companies Beverly Hills-Bel Air, California Microsoft Exchange 2010 Network Specialists
  • Brooklyn At Home Workers Voice/Video Conferencing Systems Assistance Brooklyn, New York Biggest Brooklyn Offsite Workforce Conferencing Systems Expertise
  • Broomfield, CO Network Specialist Top Rated Security Consulting Broomfield-Louisville
  • CISSP Network Security Auditor Cheyenne CISSP Security Organization Cheyenne
  • Cisco Computer Network Support Company Rohnert Park, CA Open Now Cisco Small Business Computer Consulting Services Santa Rosa California
  • Cisco Small Business IT Outsourcing Firms Norfolk, VA Cisco Small Business IT Consultant
  • Cisco Support Outsourcing Services Burlingame, CA Remote Networking Specialist Cisco
  • Cisco Technology Consultants Downtown Dallas Cisco Computer Consultation Downtown Dallas
  • Cisco and Microsoft Certified Experts Huntsville Small Business IT Consultant Huntsville, Alabama Support Group
  • ProSight Email Security Gateway Consultancy
  • Compensation for Telecommuting Network Consultants Freelancing Job Compensation for Computer Consulting Full-Time Jobs

  • Intune Policy Settings Support and Integration
    Microsoft Enterprise Mobility Suite Integration Services

    Progent's Intune consultants can help you to assess the business case for adopting Intune for administering your portable computers including notebooks, smartphones, and tablets based on Windows, iOS, and Google Android. Progent can assist you to define security and compliance policies, set up pilot systems to confirm the benefits of Microsoft Intune for your network, install Intune throughout your IT ecosystem, combine Intune with SCCM for unified change management, and troubleshoot your Intune solution.

  • Configuration Services Consulting Hourly Price Consulting Hourly Price Network Recovery
  • Consulting Expertise for Network Service Providers near Stockton - Transparent Short-Term Staff Help Expertise for Network Service Organizations nearby Stockton - Seamless Short-Term Support Staff Help Stockton, CA
  • Dynamics GP VBA Technology Professional Dynamics GP Customization Engineer
  • Email Allow Lists Engineer
  • Emergency Cisco Information Technology Outsourcing Lakeland-Plant City, Florida Lakeland, Florida Cisco Onsite Technical Support
  • Exchange 2019 IT Service Providers Reston VA Manage Exchange Server 2013 Reston-Fairfax, VA
  • Forsyth County North Carolina Winston-Salem Telecommuters Collaboration Solutions Assistance Work at Home Employees Winston-Salem Consulting Services - Collaboration Solutions Consulting and Support Services Forsyth County North Carolina
  • Greensboro Piedmont Triad Greensboro Work at Home Employees VoIP Technology Consultants 24-7 Work at Home Employees Greensboro Assistance - IP Voice Systems Consultants Greensboro Winston-Salem
  • Honolulu, Oahu Outsourced IT Support Honolulu Information Technology Consulting Group
  • Immediate Denver Remote Workers Backup/Recovery Systems Expertise Denver Colorado Denver Colorado At Home Workers Denver Consulting and Support Services - Data Protection Solutions Expertise

  • At Home Workers Cloud Integration IT Consulting
    Remote Work from Home Cloud Integration IT Consultant

    Progent can help small and medium-size businesses to provide their remote employees with transparent integration with cloud services.

  • Information systems Security Outsourcing Firewall San Francisco Bay Area San Francisco US Security Team Security
  • Jersey City Secaucus Jersey City Work from Home Employees Collaboration Technology Consulting Services Remote Workers Jersey City Guidance - Collaboration Technology Consultants
  • Knoxville Farragut Oak Ridge Knoxville Work from Home Employees Management Systems Guidance Knoxville At Home Workforce Endpoint Management Tools Consulting Experts
  • Mandrake Linux, Solaris, UNIX Consultant Services Houston, TX Mandrake Linux, Sun Solaris, UNIX Consulting Harris County Texas
  • Miami Beach Remote Workers Cybersecurity Solutions Consultants Miami Beach, Florida Miami Beach At Home Workforce Cybersecurity Systems Consulting Services Miami Beach

  • Meraki Switch Stacking Technical Support
    Meraki Switch Integration Consultant

    Cisco's Meraki line of access and distribution switches are intended for sites that go from branch offices to campuses. Progent's Cisco-certified consultants offer cost-effective online expertise to help your company to design and implement an efficient network architecture that incorporates Meraki switches, streamline network monitoring and administration with Meraki's cloud-centric management architecture, configure policies to ensure security and compliance, create and validate a disaster recovery plan, and troubleshoot issues associated with any aspect of your Meraki deployment. Progent can also assist you to connect Meraki switches with Cisco's Nexus or Catalyst data center switches and with Meraki wireless APs to build a unified networking infrastructure.

  • ProSight Email Guard Spam Filtering Services Consult
  • Microsoft Partner Migration Consultant Migration Companies Microsoft Certified
  • Microsoft SQL 2008 Information Technology Consulting Fort Worth 24/7/365 SQL Server 2019 Network Engineer Fort Worth North Texas
  • Napa, CA Providers Napa, California Information Technology Consulting Companies
  • Networking Specialist SharePoint Utah - Salt Lake City, UT, West Valley City, UT, Provo, UT, Sandy, UT Salt Lake City, West Valley City, Provo, Sandy, Orem SharePoint On-site and Remote Support
  • Consulting Services Email Link Protection
  • Parsippany, NJ Consulting Firms After Hours Parsippany-Troy Hills Computer Network Consulting company
  • ProSight Remote Server Management Network Consultant Desktop Monitoring and Reporting Consulting
  • Remote CCNP Expert Certified On-site Support Meraki MR18 Access Point 24 Hour Meraki Outdoor Wi-Fi AP Network Consulting
  • SQL Server 2019 Service Provider Orlando-Kissimmee Computer Network Providers Microsoft SQL Server 2016

  • ASA 5580 Firewall Technical Consultant
    24-Hour Cisco ASA 5500 Firewall Upgrade Remote Consulting

    Progent's Cisco certified network infrastructure consultants can help you to maintain older PIX 500 or ASA 5500 firewalls or transition to Cisco ASA 5500-X security appliances. Progent can also assist you to set up, manage, upgrade and troubleshoot Cisco ASA 5500-X security appliances with Firepower Services.

  • SharePoint Server 2019 Computer Consultants Norfolk Virginia Microsoft SharePoint Server 2013 Network Engineer Norfolk Chesapeake
  • ProSight Email Encryption Consultants
  • Small Business Network Consultants Windows Server 2016 Technical Support Group Windows Server 2016
  • Southfield-Plymouth Microsoft Dynamics GP-Software Premier Partner in Southfield - Training Support Southfield Dynamics GP (Great Plains) Upgrade Consultant Southfield MI

  • Windows Server 2016 Integration Online Support Services
    Windows Server 2016 Security and Compliance Support and Setup

    Progent's Windows Server 2016 disaster recovery experts can help your organization to design a disaster recovery system built around Microsoft's most advanced Failover Clustering tools such as Cluster OS Rolling Upgrade for non-disruptive migration to Windows Server 2016, Storage Replica for crash-consistent recovery, Storage Spaces Direct for enterprise-class network-attached storage using low-cost hardware, VM Load Balancing for improving the speed and fault-tolerance of Failover Clusters while reducing capital investment and operational expenses, and Cloud Witness for easy, economical creation of a failover cluster quorum witness.

  • Spartanburg Work from Home Employees Network Security Solutions Expertise Spartanburg-Greenville, SC Spartanburg Work from Home Employees Security Solutions Consulting Services Spartanburg-Greer, South Carolina
  • Sun Solaris Network Consulting Specialist UNIX
  • Sunnyvale Network Assessments Small Business Network Consultants Sunnyvale

  • Best ProSight Spam Filtering Services Engineers
    Consult Email Quarantine

    Progent's ProSight Email Guard solution uses the services and infrastructure of leading data security companies to provide web-based management and comprehensive protection for all your inbound and outbound email. The powerful architecture of Email Guard combines cloud-based filtering with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a further layer of analysis for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, DLP, and encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall.

  • Telecommuter Jobs Network Support Roseville, CA Biggest Microsoft Consulting Full-Time Job
  • Telecommuters Consulting Services - Anchorage - Backup/Recovery Solutions Consultants Ted Stevens Airport Anchorage ANC At Home Workforce Consulting and Support Services nearby Anchorage - Backup/Restore Solutions Consulting Experts Ted Stevens Airport Anchorage ANC
  • Telecommuters Houston Consulting Services - Cloud Integration Systems Expertise Harris County Texas Telecommuters Houston Consulting - Cloud Systems Consultants Houston Downtown
  • Temporary Staffing Support Consultants Lambert International Airport STL St. Louis IT Staff Augmentation Support Services
  • ProSight Email Guard Spam and Virus Filtering Service Professionals
  • UCS server Professionals Unified Contact Center Express (Unified CCX) Online Consulting
  • UNIX Consulting Services Solaris Outsourcing
  • Windows Network Management Services Top Windows Small Business Network Consulting Companies Virginia Beach, VA
  • ProSight Email Content Filtering Service Engineers
  • Windows Server 2016 Consulting Team Windows Network Repair Service Charleston South Carolina

  • Windows and UNIX Consultancy
    UNIX, Windows Consultant Services

    If your business runs a UNIX, Linux, or Solaris network or a multi-OS IT environment, Progent's CISM and ISSAP-premier security specialists can assist your entire enterprise in a wide array of security topics including security management practices, security architecture and strategies, access management products and methodology, applications development security, operations security, hardware security, telecommunications, infrastructure and web security, and workplace recovery preparedness. CISM and ISSAP stipulate the fundamental skills and international standards of performance that information security managers are expected to master. These accreditations offer executive management the confidence that consultants who have earned their CISA or CISSP certification have the background and knowledge to deliver world-class security management and engineering services.

    © 2002-2020 Progent Corporation. All rights reserved.