ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progent's server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management technology to help keep your network running efficiently by checking the state of critical assets that drive your information system. When ProSight LAN Watch uncovers an issue, an alert is transmitted automatically to your designated IT personnel and your assigned Progent engineering consultant so that any looming problems can be resolved before they have a chance to disrupt productivity. Find out more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight LAN Watch with NinjaOne RMM: Centralized RMM Solution for Networks, Servers, and Desktops
    ProSight LAN Watch with NinjaOne RMM software offers a centralized, cloud-driven solution for monitoring and managing your client-server infrastructure by offering an environment for streamlining common time-consuming tasks. These include health monitoring, patch management, automated repairs, endpoint configuration, backup and restore, anti-virus defense, secure remote access, standard and custom scripts, resource inventory, endpoint status reports, and troubleshooting help. When ProSight LAN Watch with NinjaOne RMM uncovers a serious issue, it sends an alert to your designated IT personnel and your assigned Progent technical consultant so that emerging issues can be fixed before they interfere with your network. Learn more details about ProSight LAN Watch with NinjaOne RMM server and desktop monitoring consulting.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progent's ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for smaller businesses to map out, track, enhance and troubleshoot their networking hardware such as routers, firewalls, and access points plus servers, client computers and other networked devices. Incorporating cutting-edge RMM technology, ProSight WAN Watch makes sure that infrastructure topology maps are kept current, captures and manages the configuration information of almost all devices on your network, tracks performance, and generates alerts when potential issues are discovered. By automating tedious network management activities, WAN Watch can cut hours off ordinary chores like network mapping, expanding your network, finding appliances that need critical updates, or identifying the cause of performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Applications
    ProSight Reporting is an expanding family of real-time and in-depth reporting plug-ins designed to integrate with the leading ticketing and network monitoring programs including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and utilizes color coding to highlight and contextualize key issues such as inconsistent support follow-through or endpoints with missing patches. By exposing ticketing or network health concerns concisely and in near-real time, ProSight Reporting enhances network value, reduces management overhead, and saves money. For details, visit ProSight Reporting for ticketing and network monitoring applications.

  • ProSight Data Protection Services (DPS): Backup and Recovery Services
    Progent has partnered with advanced backup/restore software providers to produce ProSight Data Protection Services (DPS), a family of offerings that deliver backup-as-a-service (BaaS). ProSight DPS products automate and monitor your data backup operations and allow non-disruptive backup and fast restoration of critical files, applications, system images, and virtual machines. ProSight DPS helps you recover from data loss caused by hardware breakdown, natural calamities, fire, cyber attacks such as ransomware, user mistakes, ill-intentioned employees, or application glitches. Managed backup services available in the ProSight Data Protection Services product line include ProSight Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup using Barracuda dedicated hardware, and ProSight DPS MSP360 Hybrid Backup. Your Progent consultant can assist you to determine which of these managed backup services are most appropriate for your IT environment.

  • ProSight Duo Multi-Factor Authentication: Access Security, Endpoint Remediation, and Protected Single Sign-on (SSO)
    Progent's Duo MFA service plans incorporate Cisco's Duo technology to protect against password theft through the use of two-factor authentication (2FA). Duo enables one-tap identity verification on iOS, Google Android, and other out-of-band devices. With 2FA, whenever you sign into a protected online account and enter your password you are asked to verify your identity via a unit that only you possess and that uses a different network channel. A wide range of devices can be utilized as this added means of authentication including a smartphone or watch, a hardware token, a landline phone, etc. You can designate multiple validation devices. To find out more about ProSight Duo two-factor identity authentication services, go to Duo MFA two-factor authentication services.

  • Outsourced/Co-managed Service Desk: Help Desk Managed Services
    Progent's Support Desk services enable your information technology team to offload Help Desk services to Progent or divide responsibilities for Service Desk support seamlessly between your internal support team and Progent's extensive pool of IT service technicians, engineers and subject matter experts. Progent's Shared Help Desk Service provides a transparent extension of your core IT support team. Client interaction with the Service Desk, delivery of support, issue escalation, trouble ticket creation and updates, performance measurement, and maintenance of the service database are cohesive whether incidents are resolved by your internal support group, by Progent's team, or by a combination. Find out more about Progent's outsourced/co-managed Service Center services.

  • Active Defense Against Ransomware: AI-based Ransomware Detection and Cleanup
    Progent's Active Protection Against Ransomware is an endpoint protection service that incorporates cutting edge behavior-based machine learning tools to guard endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely escape legacy signature-matching anti-virus tools. Progent ASM services protect on-premises and cloud-based resources and offers a unified platform to manage the entire malware attack progression including filtering, detection, mitigation, remediation, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Learn more about Progent's ransomware protection and cleanup services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and safeguard data about your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or warranties. By updating and managing your network documentation, you can eliminate as much as 50% of time spent trying to find critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether you're planning improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more about ProSight IT Asset Management service.

  • Progent's Patch Management: Patch Management Services
    Progent's support services for patch management provide organizations of all sizes a flexible and affordable alternative for assessing, validating, scheduling, implementing, and tracking software and firmware updates to your dynamic IT network. In addition to optimizing the security and functionality of your IT environment, Progent's patch management services allow your IT staff to concentrate on line-of-business projects and activities that deliver the highest business value from your network. Learn more about Progent's software/firmware update management services.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection service that utilizes SentinelOne's cutting edge behavior-based analysis tools to guard physical and virtual endpoint devices against modern malware assaults like ransomware and email phishing, which easily escape legacy signature-matching AV products. ProSight ASM protects local and cloud resources and provides a unified platform to address the entire malware attack progression including blocking, identification, containment, remediation, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Endpoint Protection and Microsoft Exchange Email Filtering
    ProSight Enhanced Security Protection managed services offer affordable in-depth protection for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint control, and web filtering through leading-edge technologies packaged within one agent accessible from a unified console. Progent's data protection and virtualization experts can help your business to design and configure a ProSight ESP environment that addresses your organization's unique requirements and that helps you achieve and demonstrate compliance with legal and industry information security standards. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for immediate attention. Progent's consultants can also help you to install and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the client owns the data, the operating system platforms, and the applications. Because the system is virtualized, it can be moved easily to a different hardware solution without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
Download Progent's 10 Benefits of Managed IT Services White Paper
To download a white paper describing why managed services are rapidly replacing the old break/fix model of network support for small and mid-size organizations, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and medium-size organizations to obtain an unbiased evaluation of the health of their information system. Based on some of the top remote monitoring and management (RMM) platforms available, and supervised by Progent's certified team of information technology experts, ProSight Network Audits help you see how closely the configuration of your core network devices conform to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and provide instant benefits such as a more manageable Active Directory environment. Both also come with a year of state-of-the-art remote network monitoring and management (RMM). Advantages can include simpler management, improved compliance with government and industry security regulations, higher utilization of IT assets, quicker problem resolution, more reliable backup and recovery, and less downtime. Read more information about Progent's ProSight Network Audits IT infrastructure assessment.

The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service based on a brief discussion with a Progent backup/recovery consultant. The fact-finding interview is designed to evaluate your company's ability to defend against ransomware or recover quickly after an attack by a ransomware variant like Ryuk, Maze, Sodinokibi, Netwalker, Phobos, Snatch or Nephilim. Progent will consult with you personally to collect information about your existing AV defense and backup/recovery procedures, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can follow best practices to create an efficient security and backup/recovery environment that reduces your vulnerability to a ransomware attack and aligns with your business needs. For additional information, refer to The ProSight Ransomware Preparedness Report.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to guide organizations to complete the urgent first steps in responding to a ransomware attack by stopping the bleeding. Progent's remote ransomware engineer can assist businesses to locate and isolate breached servers and endpoints and guard undamaged assets from being penetrated. If your network has been penetrated by any strain of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, see Progent's Ransomware 24x7 Hot Line.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • After Hours Hermes Ransomware Hot Line Hartford Hartford Connecticut Locky Ransomware Hot Line

  • Top MSP360 Desktop Backup Configuration
    MSP360 VM Backup Remote Technical Support

    Progent can help you to create, implement and manage a backup plan based on MSP360 Backup software to protect your IT resources residing on any major public cloud. Progent can provide end-to-end monitoring and management to prevent data loss resulting from human miscues, software errors, ill-intentioned insiders, and external attacks such as ransomware.

  • At Home Workers Dallas Expertise - Cloud Technology Assistance Dallas - Irving Texas, America Dallas At Home Workforce Cloud Integration Solutions Consulting Services Dallas
  • Automated Desktop Inventory Online Technical Support Professionals Server Monitoring
  • Award Winning Salt Lake City Maze Ransomware Operational-Recovery Salt Lake City, Tooele County Summit County Utah Salt Lake City Ryuk Ransomware Mitigation
  • Bernalillo County New Mexico Albuquerque Nephilim Ransomware File-Recovery Albuquerque Conti Crypto-Ransomware Rollback Albuquerque
  • Best Immediate Alexandria Crypto-Ransomware Repair Alexandria Emergency Alexandria Ransomware Repair Experts Alexandria, VA
  • BlackBerry Email Tech Petaluma California, U.S.A. Petaluma, CA BlackBerry Software Tech Consultants
  • Brasília, Distrito Federal Brasília Ransomware Negotiation Consultants Brasília Sodinokibi Ransomware Settlement Negotiation Experts Brasília
  • Broomfield-Boulder Emergency SharePoint 2010 Network Consultants Remote Consulting SharePoint 2010 Broomfield, CO
  • CISSP Audit Firewall Cybersecurity Consultancy Sydney
  • CISSP Certified Expert Kansas City, MO Management Missouri On-Call Services
  • Clearwater, FL Support Group Clearwater, FL Outsourcing Technology
  • Columbus, Cleveland, Cincinnati, OH Consultant Services Ohio - Columbus, OH, Cleveland, OH, Cincinnati, OH, Toledo, OH Network Repair Service
  • Email Bayesian Analysis Consultants
  • Consulting Services SharePoint Server 2019 Denver Golden Triangle Microsoft SharePoint 2013 Online Technical Support Denver Colorado
  • Exchange 2019 Professional Services Corpus Christi Texas Exchange Networking Specialist
  • Florianópolis Remote Workforce Video Conferencing Technology Guidance Florianópolis Florianópolis Work at Home Employees Conferencing Solutions Consulting Experts Florianópolis, Estado de Santa Catarina
  • Glendale California Firewall Compliance Auditor Security Cybersecurity Firm
  • Harrisburg 24 Hour Security Security Services Security Security Organization Harrisburg, PA
  • Indianapolis International Airport IND, America Remote Workforce Expertise near me in Indianapolis - Integration Consulting Experts Remote Workers Consulting and Support Services - Indianapolis - Infrastructure Consulting Marion County Indiana
  • Ipanema, Rio de Janeiro Offsite Workforce Assistance - Ipanema - Cloud Systems Consulting Services 24x7x365 Teleworkers Ipanema Consulting and Support Services - Cloud Technology Consulting Experts Rio de Janeiro
  • Juniper J Series Firewall Technology Consulting Services Juniper J Series Firewall Technical Support Services
  • Largest Lakeland Crypto-Ransomware WannaCry Susceptibility Consultation Lakeland Lakeland Ransomware WannaCry Vulnerability Audit Lakeland, Florida
  • Lync Server 2013 VoIP Consultancy 24 Hour Lync Server 2013 Back End Server Consulting Services
  • Microsoft Network Implementation Services Manchester Manchester, Hillsborough County, United States Urgent Network Computer Network Specialist

  • 24-7 Cisco Migration Company
    Cisco Architecture Network Installation

    Progent's Cisco CCIE network experts can assist you to set up, manage, upgrade and troubleshoot Cisco products. Progent offers Cisco, Meraki and Nexus switch expertise, ASA firewall expertise, Meraki and Aironet Wi-Fi access point support, Cisco VoIP phone expertise, and CUCM/CallManager software support.

  • ProSight Email Guard Outbound Email Encryption Consultants
  • Microsoft SQL Server 2017 Computer Companies Fort Wayne Indiana Microsoft SQL 2008 Professional Services Fort Wayne International Airport FWA
  • Microsoft SharePoint 2010 Onsite Technical Support Valencia California, US Valencia, California Microsoft SharePoint Server Consultant Services
  • Microsoft SharePoint 2010 Specialists St. Paul, MN Microsoft SharePoint 2013 Consultants St Paul-Oakdale, MN

  • System Center 2016 and Intune Outsourcing
    System Center 2016 Disaster Recovery Network Engineer

    Microsoft System Center 2016 provides major improvements in the management of hybrid cloud environments through comprehensive integration with Windows Server 2016 servers, Windows 10 clients; seamless integration of mixed-OS environments that include various Linux distributions, Microsoft Hyper-V and VMware vSphere; and better cloud support such as tighter integration with Microsoft Intune for iPhone and Android smartphone management plus built-in integration with Microsoft Operations Management Suite for cloud-enhanced analytics. Progent's Microsoft-certified consulting staff can provide world-class remote and on-premises expertise for all components of System Center 2016 including Operations Manager, Configuration Manager, Virtual Machine Manager (SCVMM), Data Protection Manager, Orchestrator, and Service Manager (SCSM). Progent can assist organizations of any size to plan and configure a new implementation of Microsoft System Center 2016, expand or tune an existing one, migrate smoothly from a previous version of System Center, or troubleshoot your System Center environment.

  • Microsoft and Cisco Computer Tech Midland Odessa Computer Support Company Cisco CCIE Midland Texas
  • Monterrey At Home Workers Collaboration Systems Consultants Santa Catarina Work at Home Employees Consulting near Monterrey - Collaboration Technology Consultants
  • Offsite Workforce Consulting - Savannah - Help Desk Solutions Consulting Services Savannah, Chatham County Teleworkers Expertise near Savannah - Call Desk Solutions Consultants Savannah, GA
  • Offsite Workforce VoIP Professionals Support Remote Workforce IP Voice
  • Parsippany Critical Ransomware Removal Services Parsippany-Morris County, NJ Parsippany WannaCry Crypto Identification and Removal Parsippany-Morris Plains

  • HP Data Protector Professional
    Deduplication Consultants

    Progent can provide affordable remote access to engineers skilled in a broad array of utilities and services that deliver solutions for protecting Windows, Mac, and Linux/UNIX servers and workstations plus notebooks and handhelds. Progent offers expertise for leading data protection products such as Acronis, Barracuda Backup, Altaro VM Backup, Backup Exec, BackupAssist Software, CrashPlan PRO, Double-Take, Mozy, Retrospect for Macintosh, Time Machine, VMware Data Recovery (VDR), and Solaris FLARs. Progent's consultants can assist your company to implement, enhance, or troubleshoot backup/restore systems for a variety of topologies including local, edge to datacenter, cloud, or hybrid.

  • Pittsburgh, Allegheny County CISSP Consulting Services Consulting Security Pittsburgh
  • Email Polymorphic Virus Protection Engineers
  • Remote Workers Guidance in Austin - Call Desk Solutions Assistance Austin-Bergstrom Airport AUS Work at Home Employees Consultants - Austin - Help Desk Call Center Outsourcing Expertise
  • Remote Workforce Assistance near Edmonton - Video Conferencing Systems Consulting Alberta Work from Home Employees Assistance near Edmonton - Conferencing Systems Consultants
  • Reseller Program for Computer Consulting Specialists Network Support Resale Programs IT Consultant

  • Cisco VoIP Outsourcing Services
    Outsourcing Firm Cisco VoIP

    Progent's Cisco CCIE network infrastructure experts can assist you to set up, manage, upgrade and troubleshoot Cisco products. Progent offers Cisco, Meraki and Nexus switch consulting, ASA firewall support, Meraki and Aironet Wi-Fi access point expertise, Cisco VoIP phone consulting, and CUCM/CallManager software support.

  • Ribeirão Preto At Home Workforce Ribeirão Preto Assistance - IP Voice Solutions Consulting and Support Services Telecommuters Expertise - Ribeirão Preto - IP Voice Systems Consulting and Support Services Ribeirão Preto
  • SQL Server 2019 Outsourcing Firm Cheltenham Outsource Microsoft SQL Server
  • Salt Lake City Work from Home Employees Cloud Integration Technology Guidance Salt Lake City Ogden Clearfield Salt Lake City Ogden Clearfield After Hours Salt Lake City Remote Workers Cloud Integration Solutions Consulting and Support Services
  • San Juan Telecommuters Infrastructure Consultants Top San Juan Work at Home Employees Integration Consulting Experts
  • San Lorenzo, CA Desktop Engineer Employment Microsoft MCTS Support Jobs Hayward
  • Small Office Network Consultant Cisco Cisco Network Specialists Leeds

  • Immediate UNIX with Windows IT Consultant
    Windows and Solaris Engineer

    Progent can assist your company to design and implement a smooth transition from a UNIX-powered IT environment to a network powered by MS Windows and suited for supporting Microsoft's familiar office productivity products, business applications, and developer tools. Progent's UNIX, Windows and Cisco consultants and software development specialists can assist you to guard your data and minimize business disruption by designing an efficient migration strategy that preserves your existing assets in UNIX software and infrastructure. UNIX-to-Windows transition support expertise offered by Progent include analysis of existing infrastructure, transition planning and validation, MS Exchange migration expertise, information and application software migration, and processor and mass storage transition and consolidation.

  • Software Outsourcing Consultant Edmonton, AB Microsoft, Cisco and Security Certified Experts Edmonton System Support
  • Support Organizations Exchange Kansas City, MO, US Exchange Computer Specialists Missouri, US
  • Email Anti-fraud Intelligence Professionals
  • Support and Integration Gentoo Linux Redhat Linux Professionals

  • CISSP Certified Security Amazon Marketplace Web Service programming Programming Firms
    Amazon MWS development Developer Firms

    Amazon Marketplace Web Service (Amazon MWS) is a library of APIs that enables Amazon sellers to streamline their business processes by automating key sales activities such as listings, orders, payments, fulfillment, and finances. By leveraging Amazon's extensive online ecosystem and automating their sales processes, merchants can broaden their reach, lower their cost of sales, accelerate reaction time to customers, and add to their profits. Progent's Amazon Marketplace Web Service (Amazon MWS) consultants can work with your development team and provide programming, workflow integration, project management support, and mentoring to help you shorten development time and costs and expedite your ROI.

  • Tampa Bay IT Staff Augmentation for Network Service Teams IT Staffing Temps for Network Service Organizations Tampa Bay
  • Telecommuters Expertise near me in Addison - Cloud Systems Consulting Services Addison-Richardson Addison Remote Workers Cloud Integration Technology Consultants Addison-Carrollton, Texas
  • Telecommuters Reston Guidance - Collaboration Systems Consulting Experts Reston-Sterling Telecommuters Reston Guidance - Collaboration Solutions Consultants Reston Virginia
  • Teleworkers Las Vegas Consultants - Data Protection Systems Consulting and Support Services Las Vegas After Hours Las Vegas Teleworkers Backup/Restore Systems Consulting Las Vegas McCarran International Airport LAS

  • IT Services for Network Service Providers Online Troubleshooting
    Biggest Computer Consultant Consulting for Service Providers

    Progent's Support Program for IT Service Providers lets you use Progent's information technology engineers while retaining your own service brand as a seamless arm of your network services staff.

  • Top Teleworkers Assistance nearby Tampa - Help Desk Solutions Guidance At Home Workforce Consulting near me in Tampa - Call Desk Outsourcing Consulting Tampa Florida, United States

  • CISM Security Security Security Assessment Technology Professional
    Cybersecurity Evaluation Consult

    Progent's accredited security and compliance experts can oversee cybersecurity audits of company-wide security to validate your company's cybersecurity profile adherence to key industry security standards. Progent can provide subscription-based managed services for security monitoring and response, on-demand network-wide security reviews, and focused security assessments for critical areas of cybersecurity such as Active Directory or cloud applications. Progent's certified security engineers can also carry out comprehensive security audits to determine your company's compliance with important industry security standards such as HIPAA, PCI, and ISO.

  • Urgent SentinelOne Active Security Monitoring Consultants SentinelOne Singularity XDR Professionals
  • Vancouver , British Columbia 24-Hour Vancouver Crypto-Ransomware Detection Vancouver Maze Crypto-Ransomware Cleanup
  • Waltham Telecommuters Collaboration Technology Consulting Waltham-Bedford, MA Work at Home Employees Consultants in Waltham - Collaboration Solutions Consultants Waltham-Newton, MA
  • Windows Server 2022 Windows Defender ATP Specialist Windows Server 2022 Disaster Recovery Remote Technical Support
  • Work at Home Employees Pleasanton Consulting Services - Network Security Systems Consultants Dublin, CA Pleasanton, CA Pleasanton Offsite Workforce Network Security Solutions Consultants
  • Yolo County Small Business Computer Consulting Services Davis Technician

  • Desktop Monitoring Integration Services
    Desktop Monitoring On-site Technical Support

    ProSight LAN Watch with NinjaOne RMM is Progent's network, server and endpoint monitoring service that incorporates state-of-the-art 24x7 remote monitoring and management technology to help keep your IT system running efficiently by checking the health of vital devices.


    © 2002-2025 Progent Corporation. All rights reserved.