Email security involves a lot of buzzwords. What do they mean?
For a glossary of common email security terms, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is ProSight Email Guard?
ProSight Email Guard is a spam filtering service and email security solution designed for small and mid-sized businesses. ProSight Email Guard combines the world-class cloud infrastructure and services of top data security companies with proven on-premises security gateway hardware to protect inbound and outbound email against spam, viruses and other email-borne threats and also offers outbound data protection via content filtering and encryption. In addition, ProSight Email Guard's centralized monitoring, management and reporting tools help you administer and troubleshoot your email system and define and enforce corporate email policy.

Back to top

What is the danger of email-based attacks?
About 70% of email is spam. 3% of emails have malicious attachments. 91% of successful hacks begin with email attacks. Spam lowers productivity. Viruses and advanced persistent threats (APTs) can steal and information and money, and shut down your network. Poorly secured email systems can violate government regulatory requirements and industry standards and expose you to litigation.

Back to top

What is the architecture of ProSight Email Guard's security solution?
ProSight Email Guard uses a hybrid architecture that includes cloud-based resources as well as on-premises email security gateway hardware. The Cloud Protection Layer prevents 95% of spam and the vast majority of viruses and other malware from ever reaching your security perimeter. The on-premises security gateway appliance provides deep, multi-level inspection for inbound threats including spam embedded within images. The security gateway also offers spam and virus protection, policy based content filtering, rate control, and cloud-assisted encryption for outbound email. In addition, ProSight Email Guard's architecture provides centralized web-based administration with comprehensive monitoring  and reporting plus options for role-based management delegation. A cloud-based Update Center enables zero-hour defense against newly discovered threats and keeps the Cloud Protection Layer and the security gateway up to date without management intervention. For a detailed discussion of ProSight Email Guard's architecture, see Email Guard technology and architecture.

Back to top

Why does ProSight Email Guard use a hybrid design with cloud services and on-premises hardware?
The combination of cloud-based and on-premises resources used by ProSight Email Guard provides better security, performance and resilience than would be possible with a one-dimensional architecture. For zero-hour security, the cloud-based Update Center provides 24x7x365 monitoring of worldwide threats, develops defenses, and distributes updates in real time to ProSight Email Guard's local security gateway appliance. In addition, the Cloud Protection Layer blocks the vast majority of spam and malware before it ever reaches your security perimeter, which enhances both security and system performance. Security and performance are also improved by the ability of the purpose-built local gateway to perform deep analysis of email traffic, including image scanning, before traffic reaches your email server. To stabilize performance, the local security gateway offers rate control for inbound and outbound email. For resilience, ProSight Email Guard's Cloud Protection Layer offers spooling. If your local data center goes down, spooling allows you to store all your inbound email in the cloud for up to 96 hours or direct it to an alternative destination while you fix the problem.

Back to top

What email-based threats does ProSight Email Guard block?
The ProSight Email Guard security gateway provides consecutive security filters that include Denial of Service (DoS) and security protection, rate control, IP reputation analysis, sender authentication, recipient verification, virus protection, user-specified policy enforcement, signature analysis, intent analysis, image analysis, Bayesian analysis, and spam rules scoring. This results in fast, comprehensive email protection against spam, viruses, spoofing, phishing, directory harvest, and spyware attacks. For a glossary of these and other terms used in email security, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Progent's role in delivering the ProSight Email Guard solution?
Progent can help you plan your ProSight Email Guard deployment, recommend security gateway hardware appropriate for your expected workloads and security requirements, configure your gateway, integrate ProSight Email Guard with Exchange Server or any other email platform, define and configure policies for inbound spam and outbound content filtering, set up and test outbound encryption, design and implement a high-availability solution that can include clustered security gateways, set up an efficient management system that takes advantage of delegated administration, and provide training, ongoing consulting support and troubleshooting services.

Progent's Microsoft-certified consultants can provide Microsoft System Center Operations Manager consulting so you can monitor your entire email and network infrastructure and resolve potential problems before they impact network productivity. Progent's Cisco-certified CCIE network consultants can help you design, build and troubleshoot a network infrastructure that supports both the on-premises and cloud-based resources that make up your ProSight Email Guard ecosystem. Progent's CISSP-certified cybersecurity consultants can help you plan and validate a cohesive security environment that protects your business against email-borne, web-based and internal threats and that complies with government regulations, industry standards, and your own corporate policies.

Back to top

Why is it important to filter outbound email?
Outbound filtering provides two major benefits: data loss protection (DLP) and reputation protection. DLP stops sensitive information from leaking out of your business via careless emails. Leaked data can result in regulatory infractions, identity theft, and loss of competitive advantage. It can also lead to litigation. The ProSight Email Guard security gateway includes pre-defined content filters such as HIPAA, credit card numbers, and Social Security Numbers. ProSight Email Guard also allows you to create custom content filtering policies covering specified keywords, categories, or character sets. Content filtering policies can be configured to block, quarantine or encrypt messages automatically.

Outbound filtering can also block spam and viruses sent by internal computers that have been compromised, which is a serious vulnerability in BYOD (Bring Your Own Device) environments. Organizations which allow spam and viruses to be sent out can be placed on block lists, or "blacklisted". This loss of reputation can hurt productivity and profits.

Back to top

Why can't my firewall stop spam or Directory Harvest Attacks?
Conventional firewalls offer little or no protection against spam or Directory Harvest Attacks. Inbound email often passes through the firewall to your email server without regard for message content, message size or address, creating an opportunity for spam and viruses to enter and making your email system vulnerable to directory harvesting.

Back to top

How does ProSight Email Guard support email encryption?
ProSight Email Guard utilizes a cloud-based Message Center to handle the encryption and delivery of outbound email. Administrators can establish multiple policies for determining which emails are automatically encrypted. These are then sent securely over TLS to the Message Center where they are encrypted using AES-256 and stored for retrieval. The Message Center sends the intended recipient a notice that includes a URL to visit in order to retrieve the encrypted email. Once establishing a password, the recipient can read the encrypted message. Any replies are also encrypted at the Message Center. In addition, Email Guard includes a plug-in for Exchange Server which lets users choose to encrypt individual emails. For more details about how ProSight Email Guard encrypts outbound email, visit Email Guard technology and architecture.

Back to top

Is ProSight Email Guard difficult to manage?
ProSight Email Guard includes a browser-based management portal designed to be easy to use for administrators in small and mid-size organizations. The portal's dashboard offers centralized monitoring and control of hardware, services, policies and configurations, and keeps extensive health and performance statistics on inbound and outbound email. You can easily track by day or hour the number of inbound and outbound messages blocked, quarantined, and rate controlled; the inbound messages tagged and allowed; and the outbound messages sent, redirected, and encrypted. Granular policy control includes delegated domain administration, delegated help desk role, and individual user policy control. For more information about ProSight Email Guard's cloud-based management features, see Email Guard technology and architecture.

Back to top

What email platforms are supported by ProSight Email Guard?
ProSight Email Guard works with any on-premises email platform but offers some enhanced features when used with Microsoft Exchange Server, such as the Outlook client encryption add-in and the Exchange LDAP Accelerator.

Back to top

How does ProSight Email Guard impact email performance?
The hybrid architecture of ProSight Email Guard leverages the massive scale of cloud-based resources and the power of purpose-built gateway hardware to off-load almost all the work of email protection from the email server. On-premises gateways are available in a variety of models that offer performance that ranges from entry level to enterprise class, and gateways can be clustered for improved performance, as well as higher availability. You can configure ProSight Email Guard to deliver the performance you need, and you can easily expand your deployment as your needs grow.

Back to top

How does ProSight Email Guard avoid blocking legitimate email through false positives?
A false positive is a legitimate email quarantined as spam. The default policy configurations in ProSight Email Guard have a false positive rate of 0.01%, which is low by industry standards. Administrators have options to adjust the aggressiveness of ProSight Email Guard's spam filtering with techniques such as threshold scoring, but the surest way to prevent false positives is to build "allow lists" or "whitelists" that specify legitimate senders. ProSight Email Guard permits users to control spam scoring, Bayesian analysis, and allow lists at the personal level.

Back to top

How can I get help now with email security?
If your organization needs online or onsite help with any aspect email security:
Call 800-993-9400 or visit Contact Progent.

Back to top

Also See:



An index of content::

  • 24 Hour Jobs Available Microsoft MCA Consultant Sonoma County Microsoft MCTS Consultant Telecommuting Job Petaluma California
  • 24-Hour Alpharetta Lockbit Ransomware Forensics Alpharetta-Roswell, GA Alpharetta Sodinokibi Crypto-Ransomware Forensics Analysis Alpharetta-Johns Creek
  • 24-Hour Microsoft Certified Partner System Repair Curitiba Curitiba, Brazil Small Business IT Consultant
  • 24/7 Zero Trust Cybersecurity Consultants 24-7 Identity Authentication IT Consultants
  • 24x7x365 Installation SQL Indianapolis Indiana SQL Computer Outsourcing Consultants
  • After Hours Microsoft Exchange Server 2007 Server Administration Portland - Gresham Exchange Server 2016 Repairing Portland, OR
  • Emergency Consultant Email Guard DLP
  • Award Winning Lawrence Crypto-Ransomware Cleanup and Data Restore Lawrence MA Lawrence-Manchester Lawrence NotPetya Ransomware Operational Recovery
  • Barueri-Alphaville Ransomware System-Rebuild Barueri-Alphaville Avaddon Crypto-Ransomware Cleanup Barueri
  • Baton Rouge Offsite Workforce Integration Consulting Baton Rouge, Capital Park, America At Home Workforce Consulting and Support Services - Baton Rouge - Support Consulting Experts Baton Rouge, LA
  • Best Microsoft Exchange 2019 Specialists Engineer Microsoft Exchange 2016
  • Chicago Network Consulting MS Certified Chicago-Cook County Support Specialist
  • Cisco Network Outsource Florianopolis, SC Cisco Professional Services Centro de Florianópolis
  • Cisco Server Consulting Silicon Valley, CA Cisco Networking Company Silicon Valley
  • Ciudad de México, Miguel Hidalgo Windows Server 2012 Networking Firms Ciudad de México, Venustiano Carranza Software Support Microsoft Windows Server 2019
  • Consulting Expertise for Jersey City IT Service Providers Jersey City Consulting Services for Jersey City IT Support Providers Jersey City Newport Centre
  • El Paso Locky Ransomware Mitigation El Paso, Fort Bliss 24x7 El Paso Sodinokibi Crypto-Ransomware Business-Recovery El Paso, TX
  • Exchange 2003 Server Server Troubleshoot Expert New York JFK Airport Exchange 2010 Server Computer Consultancy White Plains
  • Firewall Protect Sacramento - North Highlands, USA Award Winning Firewall Firewall Setup Sacramento
  • Garland Remote Workers Infrastructure Expertise Garland Centerville Garland Teleworkers Integration Assistance Dallas County
  • Georgia Atlanta Nephilim Ransomware Forensics Atlanta MongoLock Ransomware Forensics Investigation Atlanta Georgia

  • Computer Consultants Microsoft Financial Software
    Onsite Technical Support Dynamics GP Power BI

    Progent can help you plan and implement a smooth move to Dynamics GP so that you preserve your data, improve your security, modernize your management reporting, take full advantage of Microsoft Office support, and reduce productivity disruption by creating and executing a sensible migration plan. Progent can also help educate new Microsoft Dynamics GP users so you don't lose productivity. Progent can enhance your financial reports and management analytics by providing Crystal Reports help, FRx programming, and Microsoft Excel support. Progent's background with Microsoft .NET technology, Microsoft SQL Server solutions, and designing with VBasic, XML and other platforms make it possible to create specialized business applications and eCommerce programs that work transparently with Microsoft Dynamics GP 2010/Great Plains 2010.

  • Glendale Locky Ransomware Negotiation Support Garland, TX Glendale Maze Crypto-Ransomware Settlement Negotiation Consultants Dallas Fort Worth Metroplex
  • IP address management Consultants ProSight IT asset documentation management Consultants
  • Information Technology Consultants Cisco Delaware - Wilmington, DE, Dover, DE, Newark, DE Cisco Networking Support
  • Engineers ProSight Email Virus Filtering
  • Lawrence-Hillsborough County, Massachusetts Lawrence Crypto-Ransomware Ryuk Preparedness Testing Lawrence Ransomware Malware Audit Lawrence, MA-Nashua, NH

  • Designers Windows 8.1 DirectAccess
    Windows 8.1 Wireless Support

    Microsoft Windows 8.1 is designed to run on computers from smartphones and slates to engineering workstations. An abundance of new and improved features, such as its touchscreen interface and signature tile user interface, offer a broad selection of benefits for organizations who know how to put them to work. Progent's Windows experts can help get your business up to speed with Windows 8.1 and make sure you derive significant competitive advantage from the operating system's many new and enhanced technologies.

  • Locky Ransomware Hot Line Oxford Ransomware Data Recovery Oxford
  • Manhattan Beach-Redondo Beach, CA 24x7x365 Manhattan Beach Sodinokibi Ransomware System-Rebuild Manhattan Beach Hermes Ransomware Cleanup Manhattan Beach CA
  • Microsoft, Cisco and Security Certified Experts Nashville-Franklin Integration Firms Computer Consulting Services Nashville-Franklin

  • Remote Troubleshooting Branch Offices
    Branch Office IT Consultant

    Years of experience delivering Microsoft support and Cisco technology consulting has allowed Progent to develop a unique ability for serving branch offices that require IT help with the flexibility common to with small firms but which offers professional communications, thorough documentation, and adherence to enterprise IT protocols. If your enterprise maintains a branch office situated anywhere in California or any region covered by Progent's consultants, Progent can provide a broad range of on-premises and off-site network support services and system architecture expertise.

  • MongoLock Ransomware Hot Line Waltham Massachusetts, U.S.A. Locky Ransomware Hot Line

  • SCOM 2012 On-site Support
    Microsoft SCOM 2012 Remote Support Services

    Progent's Microsoft-certified consultants have more than 10 years of experience planning, implementing, optimizing and troubleshooting SCOM environments and can provide companies of any size expert remote or on-premises consulting services for System Center 2012 Operations Manager. Progent can help your company to plan a topology for SCOM 2012 servers that provides the responsiveness and resilience needed to watch over your IT resources effectively, whether your infrastructure are on-premises, in the cloud, or a hybrid environment. Progent can also help you to install and set up Microsoft SCOM 2012 management packs based on industry best practices for tracking network fabric and Microsoft and 3rd-party applications and services. Also, Progent can provide responsive online or on-premises troubleshooting to assist you to fix critical problems detected by Microsoft SCOM 2012.

  • Montgomery Nephilim Ransomware Operational Recovery Montgomery Mobile Montgomery Ransomware Malware Repair Montgomery

  • SentinelOne Endpoint Virus Immunization Consulting
    SentinelOne Singularity Complete Integration Consulting

    Progent is a dealer and consulting firm for SentinelOne's Singularity product family, a subscription-based, cloud-first threat management solution that includes machine learning technology and expert services to deliver cutting-edge endpoint detection and response (EDR).

  • Oklahoma City, Tulsa, Norman, OK CISSP Secure CISSP Network Consultants
  • Online Support Services Gentoo Linux, Sun Solaris, UNIX Broomfield, US Suse Linux, Sun Solaris, UNIX Technical Support Services

  • Remote Windows 2000 Computer Consultants
    Consulting Microsoft Windows 2000

    Progent's certified Windows 2000 Server consultants offer network help and IT consulting services for the complete family of .NET Servers, Windows Server 2000, and Windows Server 2003. Progent's Windows Server 2000 integration, update, and troubleshooting services include system planning, installation, documentation, local and off-site technical support, Help Desk outsourcing, expert security consulting, turn-key outsourcing, and cost-effective co-sourcing.

  • Open Positions MCSE Consulting Berkeley California Pinole, Crocket CA Microsoft MCTS Consultant Job Opportunities
  • Portland Microsoft Dynamics GP Training Experts Portland Microsoft Dynamics GP (Great Plains) Supplier near Portland - Reporting Development
  • Remote Workforce Consulting Experts near San Jose - Infrastructure Consulting Experts San Jose 24-7 Work at Home Employees Guidance in San Jose - Setup Consultants San Jose
  • Remote Workforce San Antonio Consultants - Cybersecurity Solutions Consulting San Antonio Remote Workforce Consulting Services near San Antonio - Endpoint Security Solutions Guidance South Texas San Antonio
  • SentinelOne Virus Recovery Experts Consultants SentinelOne Singularity Complete Integration Technology Professional
  • SharePoint Server 2010 Help and Support Schaumburg, Illinois, United States Schaumburg-Carol Stream, Illinois, United States Microsoft SharePoint Online Consulting
  • Shreveport NotPetya Crypto-Ransomware Recovery Caddo Parish Louisiana Shreveport NotPetya Ransomware System-Restore Caddo Parish Louisiana
  • Consulting ProSight Email Content Filtering Policies
  • Sonoma County Telecommuters Petaluma Consulting and Support Services - Help Desk Outsourcing Guidance Remote Workforce Petaluma Consultants - Call Desk Outsourcing Consulting Experts Sonoma CA
  • Specialist ProSight Network Health Review ProSight Remote Network Infrastructure Monitoring Specialists

  • Non-stop Network Specialist
    Fully Redundant Internet Network Professional

    Progent's Disaster Recovery/Business Continuity specialists have extensive experience helping small and mid-size organizations to minimize network downtime by providing cost-effective remote consulting support for disaster recovery/business continuity (DR/BC) planning, fault-tolerant network infrastructure, backup/restore solutions, and transparent system maintenance. Progent's business continuity consultants can assist your company to develop and test a sensible business continuity strategy that matches your business goals and IT budget. Progent's disaster recovery specialists can help you to architect, deploy, and manage fault-tolerant technologies such as non-stop Internet connectivity, virtualized servers, fail-over clustering, network load balancing, continual online backup, and geographically dispersed hot backup centers.

  • Support Firm Windows 2008 Server New York City-Chelsea, NY Windows Server 2019 Support Consultant Midtown Manhattan, New York
  • São Paulo São Paulo Telecommuters Cloud Technology Consulting Services At Home Workforce São Paulo Guidance - Cloud Integration Technology Consulting and Support Services Sao Paulo
  • Tech Support Remote Help Desk McKinney, Collin County Microsoft and Apple Migration Consulting McKinney, Collin County
  • Professionals ProSight Email Guard Content Filtering Service
  • Technology Consulting Small Business 100 AP Small Business WAP100 AP Troubleshooting
  • After Hours Specialists Email Guard DLP
  • Urgent Remote Workers Consulting in Dayton - Management Solutions Guidance Dayton Ohio Dayton Work from Home Employees Dayton Assistance - Endpoint Management Tools Consulting Experts
  • Vancouver Crypto Repair Support Services British Columbia Vancouver Ryuk Crypto Repair
  • Vermont - Burlington, VT, Rutland, VT, Montpelier, VT Solutions Provider Vermont Outsourcing
  • Virtual Server Technology Technology Professional Server Consolidation Consultant
  • Windows Server 2019 Network Recovery Chandler, AZ Consultancy Firm Windows Server 2016 Maricopa County Arizona
  • Windows Server Consultants Melbourne Urgent Microsoft Windows Server 2019 Tech Support For Small Business
  • Winston-Salem MS Dynamics GP-Great Plains Customization Consultant Forsyth County North Carolina, US Forsyth County North Carolina Microsoft Dynamics GP-Great Plains Winston-Salem Supplier - Customization Support Services

  • Penetration Testing Network Consultant
    Technology Consulting Services Cybersecurity Pen Testing

    Stealth penetration checking is a key component of any overall IT system security strategy. Progent's security experts can run extensive intrusion tests without the awareness of your organization's internal IT staff. Stealth penetration testing uncovers whether existing security defense systems such as intrusion incident alerts and event history analysis are correctly configured and consistently observed. Progent can provide continuous autonomous penetration testing to map your internal and external attack surface and to identify ways that exploitable vulnerabilities, improper configurations, harvested credentials, skipped patches, and unsound product defaults can be combined by threat actors into the multi-front attacks typical of the latest versions of ransomware.

  • Urgent ProSight Email Content Filtering Consultant
  • Zero Downtime Branch office Connections Consultancy After Hours Microsoft Expert Engineer High Availability Interoffice Connectivity

  • Firewall Setup SIEM
    Security Auditor GIAC

    GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of computer security professionals. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified information assurance specialists can provide expertise with all of the security capabilities addressed under GIAC certification such as auditing network vulnerability, security incident handling, traffic analysis, web-based services security and security information and event management (SIEM) solutions.


    © 2002-2024 Progent Corporation. All rights reserved.