ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates SentinelOne's cutting edge behavior-based analysis technology to defend physical and virtual endpoints against modern malware assaults like ransomware and email phishing, which routinely evade traditional signature-based AV products. ProSight ASM protects on-premises and cloud resources and provides a unified platform to manage the entire malware attack progression including blocking, detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Protection and Exchange Email Filtering
    ProSight Enhanced Security Protection services offer economical in-depth protection for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers firewall protection, penetration alarms, device management, and web filtering through leading-edge tools packaged within a single agent managed from a unified control. Progent's data protection and virtualization experts can assist your business to plan and implement a ProSight ESP environment that addresses your organization's specific requirements and that helps you prove compliance with government and industry data security standards. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require urgent attention. Progent can also help you to install and verify a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.

  • ProSight Data Protection Services (DPS): Backup and Recovery Services
    Progent has partnered with advanced backup/restore software providers to create ProSight Data Protection Services, a family of subscription-based management offerings that provide backup-as-a-service (BaaS). ProSight DPS services manage and monitor your data backup processes and enable non-disruptive backup and fast restoration of critical files/folders, apps, images, and Hyper-V and VMware virtual machines. ProSight DPS lets you protect against data loss resulting from hardware breakdown, natural calamities, fire, cyber attacks such as ransomware, human error, ill-intentioned employees, or software glitches. Managed backup services in the ProSight Data Protection Services portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup using Barracuda purpose-built hardware, and ProSight MSP360 Cloud and On-prem Backup. Your Progent expert can help you to identify which of these fully managed services are most appropriate for your IT environment.

  • ProSight WAN Watch: Network Infrastructure Management
    Progent's ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for smaller businesses to map, track, reconfigure and troubleshoot their connectivity appliances like routers and switches, firewalls, and wireless controllers as well as servers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch ensures that infrastructure topology maps are kept current, copies and displays the configuration information of almost all devices connected to your network, tracks performance, and sends notices when issues are detected. By automating time-consuming management and troubleshooting processes, WAN Watch can knock hours off common tasks such as making network diagrams, reconfiguring your network, locating appliances that require critical updates, or isolating performance issues. Learn more about ProSight WAN Watch network infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that incorporates advanced remote monitoring and management techniques to keep your network running at peak levels by checking the health of critical assets that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is sent automatically to your specified IT management staff and your assigned Progent engineering consultant so any looming issues can be addressed before they have a chance to disrupt productivity. Find out more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Since the environment is virtualized, it can be moved immediately to a different hardware environment without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and protect data related to your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSLs ,domains or warranties. By updating and managing your network documentation, you can eliminate as much as half of time spent searching for vital information about your IT network. ProSight IT Asset Management features a common location for holding and sharing all documents related to managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether you're planning enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you require the instant you need it. Read more about Progent's ProSight IT Asset Management service.

  • Progent Active Protection Against Ransomware: Machine Learning-based Ransomware Detection and Remediation
    Progent's Active Defense Against Ransomware is an endpoint protection managed service that incorporates next generation behavior machine learning tools to defend endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely evade traditional signature-matching anti-virus tools. Progent ASM services safeguard on-premises and cloud-based resources and provides a single platform to address the complete malware attack progression including filtering, detection, mitigation, cleanup, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new attacks. Learn more about Progent's ransomware protection and cleanup services.

  • Outsourced/Co-managed Service Desk: Help Desk Managed Services
    Progent's Call Desk managed services permit your information technology team to offload Help Desk services to Progent or split responsibilities for Help Desk services seamlessly between your in-house support resources and Progent's extensive pool of IT service technicians, engineers and subject matter experts. Progent's Co-managed Service Desk provides a smooth supplement to your internal support team. End user access to the Service Desk, provision of support services, escalation, trouble ticket creation and updates, efficiency metrics, and maintenance of the service database are consistent regardless of whether issues are resolved by your core network support organization, by Progent's team, or a mix of the two. Read more about Progent's outsourced/shared Call Center services.

  • Progent's Patch Management: Software/Firmware Update Management Services
    Progent's managed services for software and firmware patch management provide businesses of all sizes a flexible and cost-effective alternative for evaluating, validating, scheduling, implementing, and tracking updates to your ever-evolving information network. In addition to optimizing the protection and functionality of your computer environment, Progent's software/firmware update management services permit your IT staff to focus on line-of-business initiatives and tasks that derive the highest business value from your network. Learn more about Progent's software/firmware update management services.

  • ProSight Duo Two-Factor Authentication: Identity Validation, Endpoint Remediation, and Secure Single Sign-on (SSO)
    Progent's Duo authentication managed services incorporate Cisco's Duo cloud technology to protect against compromised passwords by using two-factor authentication. Duo supports one-tap identity verification with iOS, Android, and other personal devices. With 2FA, whenever you sign into a secured application and enter your password you are asked to verify who you are via a unit that only you possess and that uses a separate network channel. A broad range of devices can be used as this added form of authentication including an iPhone or Android or wearable, a hardware token, a landline phone, etc. You may designate several verification devices. For more information about Duo identity authentication services, go to Duo MFA two-factor authentication services for access security.

  • ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Applications
    ProSight Reporting is an expanding family of in-depth reporting tools created to integrate with the top ticketing and remote network monitoring programs such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and features color coding to highlight and contextualize key issues such as inconsistent support follow-up or machines with missing patches. By exposing ticketing or network health problems clearly and in near-real time, ProSight Reporting enhances productivity, lowers management hassle, and saves money. For details, see ProSight Reporting for ticketing and network monitoring platforms.
Download Progent's 10 Benefits of Managed IT Services White Paper
To view a white paper describing why managed services are quickly takingthe place of the old break/fix model of network support outsourcing for small and mid-size businesses, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable alternative for small and mid-size businesses to obtain an unbiased evaluation of the overall health of their network. Based on some of the leading remote monitoring and management platforms available, and overseen by Progent's certified group of IT experts, ProSight Network Audits show you how closely the configuration of your core network devices adhere to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant ROI such as a cleaner Active Directory (AD) environment. Both also include a year of cutting-edge remote network monitoring and management. Advantages can include lower-cost network management, better compliance with data security standards, higher utilization of IT assets, quicker problem resolution, more dependable backup and recovery, and increased uptime. Learn more information about Progent's ProSight Network Audits network infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service centered on a brief interview with a Progent backup/recovery consultant. The interview is designed to help assess your organization's ability either to defend against ransomware or recover rapidly following an attack by a ransomware strain like Ryuk, Maze, Sodinokibi, Netwalker, Phobos, LockBit or Egregor. Progent will work with you personally to gather information concerning your existing cybersecurity posture and backup procedures, and Progent will then deliver a written Basic Security and Best Practices Report detailing how you can follow best practices to build a cost-effective AV and backup environment that reduces your vulnerability to ransomware and aligns with your business needs. For details, see The ProSight Ransomware Preparedness Report.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to assist organizations to carry out the urgent first phase in responding to a ransomware assault by stopping the bleeding. Progent's remote ransomware engineer can help businesses to identify and isolate infected servers and endpoints and guard undamaged resources from being compromised. If your system has been penetrated by any version of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • 24-7 Anchorage IT Staffing Temps Help Anchorage, AK Anchorage IT Staffing Help Anchorage Dimond Center
  • 24-Hour Campinas Hermes Ransomware Negotiation Consultants Immediate Campinas Nephilim Crypto-Ransomware Settlement Negotiation Experts Campinas, Elias Fausto
  • 24x7x365 Sydney Spora Ransomware Forensics Analysis Sydney Sydney Nephilim Ransomware Forensics Investigation Sydney
  • ASA 5500-X Firewall Technology Consulting Services ASA Firewall Online Consulting

  • Professional SQL 2008 Analysis Services
    SQL 2008 Reporting Services Consultant Services

    Progent's Microsoft-Certified SQL Server engineers offer a range of support services to help small companies to design, implement, manage, and troubleshoot MS SQL 2008 solutions in order to gain the maximum business advantage from this advanced relational database platform. In addition, Progent offers help with system infrastructure, enterprise-wide security, and custom software programming to increase the business benefit of your SQL Server 2008 investment.

  • After Hours Barueri-Alphaville Ryuk Ransomware Virus Restoration Barueri, SP 24/7 Barueri-Alphaville Conti Ransomware System-Rebuild State of São Paulo
  • At Home Workforce Downers Grove Consulting Services - Collaboration Systems Consultants Downers Grove Work at Home Employees Collaboration Technology Consultants Downers Grove-DuPage County, Illinois
  • Barra da Tijuca, Jacarepaguá Barra da Tijuca Work from Home Employees Solutions Consultants Remote Workers Barra da Tijuca Guidance - Connectivity Guidance

  • Shared Help Desk Ticketing Economics Online Support
    Supplemental Call Center Cost Savings Computer Engineer

    Progent's Helpdesk management and co-management services help organizations to reduce costs, enhance output, and adapt quickly to fast-changing business conditions.

  • BlackBerry BES Express Engineers BES Express Consultant Services
  • BlackBerry Email Technical Support Company Kansas City, MO BlackBerry Desktop Manager Consulting Services Company Kansas City, Jackson County
  • BlackBerry Exchange Computer Consulting Services BlackBerry Small Business IT Consulting Firms Chattanooga
  • Brasília Work from Home Employees Backup Systems Consulting and Support Services Brasilia Top Remote Workers Assistance in Brasília - Backup Technology Consulting Services
  • Email Image Spam Protection Technology Professional
  • Consulting Expertise for Southlake Network Support Organizations Southlake-Grapevine , TX, United States Southlake-Flower Mound Open Now Expertise for IT Support Companies near me in Southlake - Temporary Support Staff Expansion
  • Consulting for Computer Support Providers near me in Irving - Transparent Temporary IT Support Assistance Irving, Dallas County Irving Dallas Plano Consultants for Irving Network Support Organizations
  • Dynamics GP (Great Plains) VAR nearby Shreveport - Training Development Shreveport Bossier City MS Dynamics GP (Great Plains) Gold Partner in Shreveport - Recovery Support Caddo Parish Louisiana
  • Exchange 2019 IT Service Midtown Manhattan-Greenwich Village 24-Hour Microsoft Exchange Network Consulting Companies NYC

  • 24x7 Network Management Soultions Small Business IT Consulting Group
    Network Management Soultions Outsourcing

    Progent's Cisco-Premier network management consultants can help you to run Cisco's network management utilities alongside a variety of specialized third-party products to create a comprehensive network management strategy to keep your network running smoothly, conserve expensive resources, protect your data, recover rapidly from device breakdown or malicious attacks, and enable you to expand or repurpose valuable resources intelligently and affordably as your business grows.

  • Hayward, CA, United States Ransomware Cleanup and Restore Ransomware Cryptoworm Recovery Berkeley, USA

  • Juniper Junos os Security Firms
    Remote Firewall Network Install Juniper Junos Network and Security Manager

    Progent's Juniper-certified network engineers can help you utilize Junos OS and the Junos platform of network management applications to configure, administer, and monitor Junos-powered devices; migrate to the Junos OS operating system from other Juniper software platforms such as ScreenOS; and upgrade your Juniper routers, switches, and gateways to the latest version of Junos OS.

  • Immediate Remote Workforce Consulting and Support Services nearby Manchester - Security Systems Consulting and Support Services Manchester, NH Hillsborough County New Hampshire Manchester Teleworkers Endpoint Security Systems Consultants
  • Information Technology Consulting CISSP Charleston, SC Firewall Security Companies Charleston

  • Microsoft Office 2000 Network Outsource
    Small Business IT Outsourcing Microsoft Windows

    Progent's IT outsourcing support offerings for small companies include planning Server 2003, .NET Server, and BackOffice systems, coordinating migrations Windows XP, Windows Server 2003, Active Directory, and Microsoft Exchange Server 2003, Help Desk Call Center, remote and on-site troubleshooting, fixing chronic IT issues, and creating a comprehensive security plan. Progent can show you how to enhance system reliability and throughput via fault-tolerant configuration, resilient network topology, and proactive server monitoring. Progent also offers project management help for major upgrades and can assist with needs definition, resource inventory, bill of materials development, vendor qualification, procurement coordination, and full documentation. Progent's IT outsourcing service also includes training for office productivity software such as Office XP.

  • Las Vegas, NV Offsite Workforce Las Vegas Expertise - Backup/Recovery Technology Consultants Top Rated At Home Workers Las Vegas Assistance - Backup/Recovery Systems Guidance
  • Lima Crypto-Ransomware Hermes Vulnerability Report Lima, La Molina Lima Ransomware NotPetya Preparedness Assessment
  • Lincoln Seward County Lincoln Urgent Ransomware Repair Consultants Lincoln Crypto Repair Lincoln, Lancaster County

  • Award Winning ISA 2004 Firewall Technology Consulting Services
    ISA Server Consultancy

    Progent's Microsoft-certified Forefront TMG and Internet Security and Acceleration Server 2006 experts can help you to plan, install, and support a configuration of Forefront TMG or Internet Security and Acceleration Server 2006 on your network that provides the firewall security, performance and manageability that your business requires.

  • ProSight Email Directory Harvest Protection Professionals
  • Louisville Work at Home Employees Infrastructure Guidance Louisville, KY Louisville Louisville Remote Workforce Integration Guidance
  • Network Security Consulting Microsoft SQL 2014 Lubbock Preston Smith Airport LBB, U.S.A. Manager Microsoft SQL 2014 Lubbock
  • Engineers ProSight Email Encryption
  • New Orleans Crypto-Ransomware Cleanup Experts New Orleans Urgent New Orleans Egregor Crypto-Ransomware Business Recovery Louis Armstrong Airport MSY
  • Offsite Workforce Assistance near me in Chicago - VoIP Systems Expertise Chicago West Side, U.S.A. Chicago Offsite Workforce IP Voice Technology Expertise
  • Offsite Workforce Expertise nearby Fresno - Call Desk Solutions Consulting California Central Valley, United States At Home Workers Guidance - Fresno - Help Desk Augmentation Expertise
  • Porto Alegre-Canoas Porto Alegre DopplePaymer Crypto-Ransomware System-Restore Porto Alegre, Estado do Rio Grande do Sul Porto Alegre Nephilim Crypto-Ransomware Cleanup
  • Remote Workers Addison Consulting and Support Services - Voice/Video Conferencing Systems Consultants Addison-Richardson Addison-Carrollton, Texas Addison Work at Home Employees Conferencing Systems Guidance
  • Remote Workers Consulting and Support Services - Vitória - Collaboration Solutions Consultants Vitoria Vitória At Home Workforce Collaboration Solutions Consultants Jardim da Penha, Vitoria
  • Remote Workforce Consultants - Omaha - Management Tools Consulting Experts Omaha Omaha Work at Home Employees Management Systems Consulting Experts Omaha Council Bluffs
  • Reston, Virginia Work at Home Employees Consulting nearby Reston - Cybersecurity Solutions Consulting and Support Services Offsite Workforce Consulting and Support Services nearby Reston - Security Systems Consultants Reston-Sterling, VA
  • San Jose Ryuk Online Crypto-Ransomware Recovery Consultants San Jose - Sana Clara San Jose NotPetya Ransomware Removal San Jose
  • Scottsdale At Home Workforce Network Security Solutions Consulting Scottsdale Arizona At Home Workers Consulting and Support Services in Scottsdale - Endpoint Security Systems Assistance Scottsdale Tempe Paradise Valley
  • Small Business Small Business IT Consultant Midsize Office Outsourced IT Services
  • Specialist El Cerrito Hercules Troubleshoot
  • Tatuapé Guarulhos Remote Workforce Data Protection Systems Assistance Guarulhos Work at Home Employees Backup Technology Guidance
  • Top Cisco Network Consulting Firms Columbus, OH, Cleveland, OH, Cincinnati, OH, Toledo, OH, Arkon, OH Cisco IT Management Ohio - Columbus, OH, Cleveland, OH, Cincinnati, OH, Toledo, OH
  • Top Liverpool Ryuk Ransomware Infection Business-Recovery Case Study Liverpool, UK Liverpool Crypto-Ransomware Remediation Birkenhead, Britain
  • Top Quality Offsite Workforce Expertise near me in Vitória - Cloud Solutions Consultants Jardim da Penha, Vitoria Immediate Teleworkers Consulting Services near me in Vitória - Cloud Integration Systems Consultants Jardim da Penha
  • Ventura County California 24/7 Network Architect Cisco CCIE Microsoft and Cisco Consulting Service Firm
  • Work from Home Employees Beverly Hills Consulting - Security Solutions Assistance Beverly Hills-West Hollywood Beverly Hills Telecommuters Endpoint Security Systems Consulting Services Beverly Hills-West Hollywood

  • MongoLock ransomware recovery Specialists
    Emergency Consultancy ransomware cleanup and restore

    Progent's ransomware experts can help your business to evaluate your ransomware defenses, monitor and protect your network, help with negotiating a settlement with a hacker, and rebuild an information system victimized by a ransomware variant like Ryuk, Maze, Sodinokibi, DopplePaymer, LockBit or Nephilim.

  • Work from Home Employees Broomfield Consulting Services - Help Desk Call Center Augmentation Consultants Broomfield-Thornton, Colorado Broomfield At Home Workers Help Desk Outsourcing Assistance Broomfield-Louisville, Colorado, United States

  • © 2002-2024 Progent Corporation. All rights reserved.