ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes SentinelOne's cutting edge behavior-based machine learning tools to defend physical and virtual endpoint devices against modern malware assaults like ransomware and email phishing, which routinely escape traditional signature-matching AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to address the entire threat lifecycle including blocking, identification, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows VSS and real-time network-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, reseller, and integrator. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Endpoint Protection and Microsoft Exchange Filtering
    ProSight Enhanced Security Protection managed services deliver affordable in-depth security for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge technologies packaged within a single agent managed from a single console. Progent's security and virtualization consultants can assist you to design and implement a ProSight ESP environment that addresses your company's specific requirements and that allows you achieve and demonstrate compliance with government and industry data protection standards. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate action. Progent's consultants can also help you to set up and test a backup and restore solution like ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup and Disaster Recovery Services
    Progent has partnered with advanced backup/restore technology companies to create ProSight Data Protection Services, a portfolio of management offerings that provide backup-as-a-service (BaaS). ProSight DPS products manage and monitor your data backup operations and enable non-disruptive backup and rapid restoration of critical files/folders, applications, system images, plus VMs. ProSight DPS lets you protect against data loss resulting from hardware failures, natural disasters, fire, malware like ransomware, human error, malicious insiders, or application glitches. Managed backup services available in the ProSight DPS portfolio include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup using Barracuda dedicated hardware, and ProSight DPS MSP360 Hybrid Backup. Your Progent consultant can assist you to determine which of these managed backup services are most appropriate for your network.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is a network infrastructure management service that makes it simple and inexpensive for smaller organizations to map, track, enhance and debug their connectivity hardware like routers and switches, firewalls, and access points plus servers, client computers and other networked devices. Using cutting-edge RMM technology, ProSight WAN Watch makes sure that network maps are always updated, copies and manages the configuration of virtually all devices on your network, monitors performance, and sends notices when issues are discovered. By automating complex management activities, WAN Watch can knock hours off common tasks such as making network diagrams, reconfiguring your network, locating appliances that need important updates, or isolating performance problems. Find out more about ProSight WAN Watch infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progent's server and desktop monitoring service that incorporates advanced remote monitoring and management (RMM) technology to help keep your network running efficiently by tracking the state of critical computers that power your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your designated IT management staff and your Progent consultant so that all looming issues can be addressed before they have a chance to impact your network. Find out more about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host configured and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Since the system is virtualized, it can be moved easily to an alternate hardware solution without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and safeguard information about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or domains. By cleaning up and managing your network documentation, you can save as much as half of time spent searching for critical information about your network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether you're making improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Learn more about ProSight IT Asset Management service.

  • Active Protection Against Ransomware: Machine Learning-based Ransomware Detection and Cleanup
    Progent's Active Protection Against Ransomware is an endpoint protection (EPP) service that incorporates next generation behavior analysis technology to defend endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which routinely get by traditional signature-matching AV products. Progent Active Security Monitoring services protect on-premises and cloud resources and provides a single platform to manage the entire malware attack progression including blocking, identification, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ransomware defense and cleanup services.

  • Outsourced/Co-managed Service Desk: Call Center Managed Services
    Progent's Help Center services permit your information technology team to outsource Support Desk services to Progent or split responsibilities for Service Desk support transparently between your internal support resources and Progent's extensive roster of IT service engineers and subject matter experts. Progent's Shared Help Desk Service provides a smooth extension of your internal network support team. Client interaction with the Help Desk, delivery of support services, escalation, trouble ticket creation and updates, performance measurement, and maintenance of the service database are cohesive regardless of whether issues are resolved by your in-house support organization, by Progent's team, or a mix of the two. Find out more about Progent's outsourced/co-managed Call Desk services.

  • Patch Management: Patch Management Services
    Progent's managed services for software and firmware patch management offer businesses of all sizes a flexible and affordable solution for assessing, testing, scheduling, implementing, and documenting software and firmware updates to your ever-evolving IT network. In addition to maximizing the security and functionality of your IT network, Progent's patch management services allow your IT staff to focus on line-of-business initiatives and activities that deliver the highest business value from your information network. Find out more about Progent's patch management support services.

  • ProSight Duo Multi-Factor Authentication: Access Security, Endpoint Remediation, and Secure Single Sign-on
    Progent's Duo authentication managed services utilize Cisco's Duo cloud technology to defend against password theft by using two-factor authentication (2FA). Duo enables single-tap identity verification on iOS, Android, and other personal devices. With 2FA, whenever you sign into a protected application and enter your password you are asked to confirm who you are via a device that only you possess and that uses a different ("out-of-band") network channel. A broad range of devices can be utilized as this added means of ID validation such as a smartphone or watch, a hardware/software token, a landline telephone, etc. You can designate multiple verification devices. To find out more about Duo identity validation services, refer to Cisco Duo MFA two-factor authentication (2FA) services for access security.

  • ProSight Reporting: Real-time and In-depth Reporting for Ticketing and Network Monitoring Applications
    ProSight Reporting is an expanding suite of in-depth reporting tools designed to work with the industry's top ticketing and network monitoring applications such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and utilizes color coding to highlight and contextualize critical issues like spotty support follow-up or endpoints with missing patches. By exposing ticketing or network health problems clearly and in near-real time, ProSight Reporting improves network value, lowers management overhead, and saves money. For more information, see ProSight Reporting for ticketing and network monitoring applications.
Download Progent's 10 Benefits of Managed IT Services White Paper
To download a white paper explaining why managed services are rapidly takingthe place of the traditional break/fix model of network support for small and mid-size companies, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits are a quick and low-cost alternative for small and mid-size organizations to obtain an objective evaluation of the overall health of their information system. Powered by some of the leading remote monitoring and management tools in the industry, and supervised by Progent's certified team of information technology experts, ProSight Network Audits show you how closely the configuration of your essential network devices conform to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver immediate ROI such as a more manageable Active Directory environment. Both versions also come with a year of state-of-the-art remote network monitoring and management. Advantages can include simpler management, better compliance with data security standards, more efficient utilization of network resources, quicker troubleshooting, more reliable backup and recovery, and higher availability. See more about Progent's ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service based on a brief interview with a Progent information assurance expert. The interview is intended to help evaluate your organization's preparedness either to defend against ransomware or recover rapidly after an assault by a ransomware variant like Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), DopplePaymer, Snatch or Nephilim. Progent will work with you directly to collect information concerning your existing cybersecurity posture and backup system, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can follow industry best practices to build a cost-effective AV and backup/recovery environment that minimizes your exposure to a ransomware attack and aligns with your company's requirements. For more information, refer to The ProSight Ransomware Preparedness Report Service.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to help organizations to carry out the urgent first phase in mitigating a ransomware attack by putting out the fire. Progent's online ransomware expert can help businesses to locate and quarantine infected servers and endpoints and guard undamaged assets from being penetrated. If your system has been penetrated by any strain of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, visit Progent's Ransomware 24x7 Hot Line.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • 24-Hour Cisco System Consultants Praia Grande, Sao Paulo Cisco Professional Services

  • .NET Visual Studio Contract Development
    VB.NET Development Companies

    Progent's application developers have worked for two decades with .NET tools and the Visual Studio development environment and are able to create or modernize .NET apps rapidly and at low cost.

  • 24-Hour Computer Service Providers Exchange Louisiana - New Orleans, LA, Baton Rouge, LA, Shreveport, LA, Metairie, LA Emergency Remote Consulting Exchange New Orleans, LA
  • 24-Hour MS Dynamics GP-Great Plains Supplier - Bellevue - Upgrades Development Bellevue, WA MS Dynamics GP Reseller in Bellevue - Reporting Programming and Support Bellevue, WA
  • After Hours Cisco PIX Firewall Migration IT Consultants Consultants Cisco Security

  • Microsoft SBS Server Specialists
    Integration Services Small Business Server 2011

    Microsoft Small Business Server (SBS) is a low-cost suite of server products that provides the foundation for a feature-rich but easy-to-manage information. The inter-connectivity demands of the Microsoft .NET components included with Small Business Server calls for an IT expert with hands-on background and extensive experience in designing and implementing cohesive end-to-end information technology systems. Progent's Microsoft-certified experts have extensive backgrounds with the technologies built into Microsoft SBS 2011 and Microsoft SBS 2008. This expertise ensures you success in installing, managing, and troubleshooting network environments based on the Microsoft SBS line of servers and programs.

  • After Hours Dynamics GP Monterey VAR - Recovery Development Emergency Monterey Microsoft Dynamics GP Upgrades Experts Monterey
  • At Home Employees Endpoint Management Network Engineer Immediate Remote Workforce Endpoint Management Technical Consultant
  • ProSight Email Zero Hour Protection Consultancy
  • At Home Workers Ottawa Consulting and Support Services - Collaboration Solutions Consulting and Support Services Ontario Work at Home Employees Assistance near me in Ottawa - Collaboration Solutions Consulting
  • At Home Workforce Consulting Experts near me in Uberlândia - Solutions Assistance Largest Work from Home Employees Uberlândia Consulting - Set up Expertise Uberlândia, MG
  • Baltimore, MD Baltimore Teleworkers Endpoint Security Systems Consulting Offsite Workforce Consulting and Support Services near me in Baltimore - Endpoint Security Systems Consulting Baltimore, U.S.A.
  • Belo Horizonte Locky Crypto-Ransomware Forensics Investigation Belo Horizonte, Estado de Minas Gerais Belo Horizonte MongoLock Ransomware Forensics
  • Best Consulting Urgent Network Oceanside, San Diego County 24/7 Emergency Phone Support Small Business Computer Consulting Oceanside Fallbrook
  • Boston Maze Ransomware Negotiation Help Boston Lockbit Ransomware Settlement Guidance Boston, MA
  • CISSP Network Security Evaluation Security Cybersecurity Contractors Houston, San Antonio, Dallas-Fort-Worth, TX
  • CISSP Security Consultancies Information systems Security Outsourcing Firewall Sacramento-Rancho Cordova, United States
  • Catalyst 9162 Access Point Integration Services Catalyst 802.11ax AP Upgrade Specialists
  • Check Point ZoneAlarm Compliance Audit Check Point Software Security Audit Services
  • Cincinnati Ohio, U.S.A. Cisco Computer Network Consulting company Cisco Technical Consultants Cincinnati, OH
  • Cisco Migration Firm Atlanta, GA, Augusta, GA, Columbus, GA, Savannah, GA Cisco Networking Consultants Georgia
  • 24/7/365 Consult Email Polymorphic Virus Protection
  • Columbus Georgia Work at Home Employees Consulting Experts near me in Columbus - Backup/Recovery Technology Guidance Work from Home Employees Columbus Expertise - Backup/Restore Technology Consulting Services Muscogee County Georgia
  • Consulting Microsoft Exchange 2000 Upgrade Consulting Exchange 2000
  • Corpus Christi Texas Corpus Christi Microsoft Dynamics GP Customization Expert Corpus Christi, United States Corpus Christi Dynamics GP (Great Plains) Training Consultants
  • Cuyahoga County Ohio Cleveland At Home Workforce Help Desk Call Center Solutions Consulting Experts At Home Workers Cleveland Consultants - Help Desk Outsourcing Consultants Cleveland, America
  • ProSight Spam Filtering Consultant
  • Cybersecurity Organization Security West Palm Beach Emergency Technical Support Services CISSP West Palm Beach-Lake Worth, Florida
  • Dayton Remote Workers Integration Consultants Dayton, OH Remote Workforce Dayton Consulting Services - Integration Consultants
  • Egregor Ransomware Hot Line Fort Myers Urgent Hermes Ransomware Hot Line Fort Myers Florida
  • Emergency Cambridge Dharma Crypto-Ransomware Cleanup Huntingdon 24x7 Cambridge Ryuk Crypto-Ransomware Cleanup Experts Cambridge
  • Emergency SharePoint Computer Consultants SharePoint Server 2013 IT Services

  • Hornetsecurity Altaro VM Backup and vSphere Support and Setup
    Altaro VM Backup Management IT Services

    Altaro VM Backup software from Hornetsecurity provides small organizations a dependable and affordable solution for backing up and recovering Hyper-V and VMware-powered VMs. Altaro VM Backup can be used for on-premises, remote, multi-site, and cloud-hosted environments and also enables cost-effective cloud backup to Microsoft Azure Block Blob storage. Altaro VM Backup defends against ransomware attacks by leveraging Immutable Cloud Storage. This produces tamper-proof backup data that cannot be erased or modified by anyone including root users. Progent is a certified Hornetsecurity/Altaro partner and offers a wide array of online or onsite services to assist you to plan, install, manage and troubleshoot a modern backup and disaster recovery system based on Altaro VM Backup software. With ProSight DPS Altaro VM Backup, Progent delivers a fully managed backup/recovery service based on Altaro VM Backup technology.

  • Exchange 2007 Edge Server Integration Support Troubleshooting Exchange Server 2007

  • After Hours Project Web Access Development Companies
    Programmer Microsoft 365 Project

    Progent's Microsoft-certified consultants offer advanced expertise in implementing, managing and troubleshooting all versions of Project, Microsoft Project Server, and Microsoft Project Online and can provide a wide range of affordable online consulting services based on industry best practices to assist organizations of any size to receive all the advantages of this powerful project management solution. Support services available from Progent include solution planning, installation and migration, setting up safe file and status sharing among local and offsite users, network optimization, and customized webinar training.

  • Exchange Computer Support Firms Detroit, Grand Rapids, Warren, MI Exchange Providers Michigan - Detroit, MI, Grand Rapids, MI, Warren, MI, Lansing, MI
  • Expertise for Network Service Companies nearby Austin - Transparent Short-Term IT Support Augmentation Austin Texas Specialists for IT Support Providers nearby Austin - Seamless Short-Term IT Support Augmentation Travis County Texas

  • iPhone Integration Professionals
    802.11ax Migration Online Consulting

    Progent's Wireless Consulting Services offer a convenient, affordable option for companies of any size to configure, manage, monitor and troubleshoot the latest wireless network technology. For 802.11n and the latest 802.11ac wireless networks, Progent can show you how to design and deploy hardware such as Cisco's Aironet and Meraki wireless access points and wireless controllers. For mobile email and online applications, Progent supports Apple IOS iPhones, Apple iPads, Google Androids, and Windows smartphones and tablets.

  • Fargo Nephilim Ransomware Remediation Fargo Spora Ransomware Recovery Fargo ND
  • Greensboro, Guilford County Greensboro Spora Ransomware Negotiation Help Greensboro NotPetya Ransomware Settlement Negotiation Services Greensboro North Carolina
  • IT Services Firewall Concord Martinez CA Security Audits Firewall
  • Email Intent Analysis Engineers
  • MOM 2007 Configuration Microsoft System Center Operations Manager Specialists

  • SCDPM 2012 Reporting Integration Services
    SCDPM 2012 Security and Compliance Network Engineer

    Progent's Microsoft-certified consultants can provide remote or in-person expertise to help organizations of all sizes to plan, deploy, manage, and repair a backup-and-restore solution built around System Center 2012 Data Protection Manager (SCDPM 2012). Progent can help you to migrate from earlier versions of SCDPM or from another backup platform, and Progent can optimize your SCDPM 2012 deployment for onsite, cloud, or hybrid datacenters. Progent offers as-needed support for resolving especially challenging issues, or comprehensive project management services. Progent can also assist you to incorporate Data Protection Manager into a comprehensive disaster recovery strategy.

  • Manaus, AM Manaus At Home Workers Endpoint Security Systems Consulting Remote Workforce Consultants near me in Manaus - Endpoint Security Solutions Consulting Experts Manaus

  • SQL Server 2016 Standard Consulting
    SQL Server SSAS Technical Consultant

    Microsoft SQL Server 2016 introduces significant improvements in performance, scale, security and compliance, high-availability, mobile computing integration, plus built-in business intelligence. Innovations include PolyBase for handling relational and non-relational databases in one appliance for big data applications, Hadoop support, Dynamic Data Masking, Mobile Report Publisher, and seamless control over local and cloud operations and services. Progent's Microsoft-certified consulting team can provide remote and onsite support to assist organizations of all sizes to deploy, manage or troubleshoot any edition of SQL Server 2016. Progent can also help you to integrate SQL Server 2016 with other core Microsoft technologies including Windows Server, Exchange, SharePoint, Microsoft Dynamics CRM, Skype for Business, and System Center Operations Manager (SCOM).

  • ProSight Spam Filtering Consultancy
  • Mesa Phoenix Cisco CCIE Voice Network Engineer Contract Mesa, Maricopa County Cisco CCSP Network Support Subcontractor Job

  • 64-bit Server Computer Engineer
    64-bit Upgrade On-site Support

    Progent's Microsoft-expert consultants can help you to enhance your application servers or desktops from 32 bits to 64 bits. Progent can help your company to understand the costs and advantages of migrating to 64-bit computing, plan an affordable migration process that reduces operational interruptions, and offer economical, professional online help to aid you to install 64-bit operating systems and application software on your existing computers.

  • Microsoft Dynamics GP Dealer - Fresno - Database Consulting Fresno Madera MS Dynamics GP-Great Plains Premier Partner - Fresno - Business Intelligence Programming and Support California Central Valley
  • Microsoft SQL 2008 Technical Support Sao Jose dos Campos SQL 2014 IT Management Sao Jose dos Campos
  • Minneapolis Crypto-Ransomware Attack Mitigation Minneapolis DopplePaymer Crypto-Ransomware Repair
  • Mobile Ransomware Negotiation Help Mobile County Alabama Mobile Conti Crypto-Ransomware Negotiation Support
  • Naples Ryuk Crypto-Ransomware Settlement Negotiation Consultantsn Naples Naples Ransomware Negotiation Expertise Naples
  • Newark Dharma Ransomware Data-Recovery Top Newark Phobos Ransomware System-Restore Newark, NJ
  • Offsite Workforce Guidance - Skokie - Security Solutions Consulting and Support Services Skokie-Buffalo Grove Skokie Telecommuters Security Solutions Guidance Skokie-Northbrook, IL
  • Offsite Workforce Mesa Consulting Services - Video Conferencing Technology Consulting Maricopa County Arizona Mesa Telecommuters Video Conferencing Technology Consulting Mesa, Maricopa County
  • Offsite Workforce San Rafael Consulting - Conferencing Technology Expertise Marin County San Rafael Offsite Workforce Voice/Video Conferencing Solutions Expertise San Rafael California, USA
  • Petaluma MongoLock Ransomware System-Restore Petaluma Immediate Petaluma Egregor Ransomware Data-Recovery Sonoma County
  • Pleasanton At Home Workers Support Consulting and Support Services Pleasanton California Work from Home Employees Pleasanton Consulting Services - Connectivity Expertise Pleasanton, CA

  • MOM 2007 Integration
    Help and Support Microsoft System Center Operations Manager

    Even if your company has a minimal network support staff and a limited IT budget, your information network can still have the same high availability and performance that once needed a substantial in-house service organization. Progent's 24x7 Network Support Services for small businesses combine the expertise of skilled Microsoft-expert and Cisco-certified IT professionals, the latest network management products for 24x7 monitoring and alerts, and cost-effective service programs such as a help desk call center to keep your vital network applications and servers operating.

  • Ransomware Cleanup and Restore Marin County Lockbit Ransomware Hot Line
  • Ransomware Cryptoworm Recovery Sheffield Ransomware Cleanup and Recovery Leeds-Sheffield
  • Red Hat Linux, Solaris, UNIX Consultants Omaha, NE Open Now Fedora Linux, Solaris, UNIX Specialists Omaha Nebraska
  • Remote Workers Expertise - Colorado Springs - Voice/Video Conferencing Technology Consulting and Support Services El Paso County Colorado Work from Home Employees Consulting and Support Services nearby Colorado Springs - Voice/Video Conferencing Technology Consulting Colorado Springs, El Paso County, United States
  • Remote Workers Hialeah Consultants - Integration Consulting and Support Services Hialeah South Florida Remote Workforce Consultants near Hialeah - Solutions Expertise Hialeah South Florida
  • Remote Workforce Consulting and Support Services nearby Boston - Voice/Video Conferencing Systems Assistance Boston Massachusetts Boston Teleworkers Conferencing Technology Consultants
  • Remote Workforce Tampa Consultants - Cloud Integration Solutions Assistance Tampa, Hillsborough County Tampa Florida Tampa Remote Workers Cloud Systems Assistance

  • Amazon MWS development Contract Programmer
    Amazon MWS programming Programming Company

    Amazon Marketplace Web Service is an integrated collection of APIs that allows Amazon sellers to improve the efficiency of their business processes by automating crucial sales activities including listings, orders, payments, inbound and outbound fulfillment, and finances. By tapping into Amazon's extensive online ecosystem and automating their sales, merchants can expand their reach, reduce their operating costs, improve response time to customers, and increase their profits. Progent's Amazon Marketplace Web Service developers can collaborate with your development team and provide programming, workflow integration, project management support, and training so you can cut development time and speed up your return on investment.

  • Ryuk Online Ransomware Data-Recovery Services Toronto Ontario Toronto Lockbit Ransomware System-Rebuild Toronto
  • SCOM 2016 Computer Consultants System Center 2016 Data Protection Manager Information Technology Consulting
  • ProSight Email Spyware Protection Professionals
  • SQL Computer Consultants Virginia Beach, Virginia, U.S.A. Virginia Beach, Norfolk, Chesapeake, VA Top Ranked SQL Tech Support For Small Business
  • Saddle Brook Remote Workforce Support Consulting Services Saddle Brook, NJ Remote Workforce Expertise in Saddle Brook - Integration Consulting Saddle Brook, New Jersey

  • Fortinet 6301 Series Firewalls Online Troubleshooting
    Fortinet FortiGate Firewalls Support and Setup

    Fortinet next-generation firewalls (NGFWs) are industry leaders in offering best-in-class throughput for SSL inspection. Progent's Fortinet firewall experts can help your business to integrate your Fortinet FortiGate security appliances to protect your digital resources at the enterprise edge, within the data center core, at branches, and in the cloud.

  • Sandy Springs Phobos Ransomware Rollback Sandy Springs-Marietta Sandy Springs Ryuk Ransomware Remediation Experts Sandy Springs-Cobb County, Georgia

  • Amazon Web Services enterprise hybrid cloud solutions Integration
    Contract Programming Firm Amazon EC2 AMI

    Progent offers affordable remote consulting to assist companies to access Amazon Web Services (AWS) cloud services such as Elastic Compute Cloud (EC2) for virtual machine hosting, Amazon Simple Storage Service (Amazon S3) for scalable high-performance storage, and Amazon Glacier for value-priced long-term archiving. Progent can help you with every phase of Amazon AWS migration and troubleshooting including requirements analysis, preparedness evaluation, system design, pilot testing, deployment, administration, performance tuning, software license management, backup/restore solutions, and security and compliance. Progent offers advanced expertise with firewall configuration and VPN connections and can help you create all-cloud or hybrid cloud ecosystems that efficiently integrate Amazon AWS resources. Progent offers as-needed consulting to assist you to overcome complex technical issues or Progent can provide project management outsourcing or co-sourcing to help you migrate to the Amazon AWS platform on time and on budget.

  • Service Exchange Lakeland, FL, United States IT Consultants Exchange 2016
  • Support and Help Suse Linux, Sun Solaris, UNIX Oxford, Oxfordshire Suse Linux, Solaris, UNIX Network Consultant Oxford
  • Tech Windows Server 2016 Praia Grande, São Paulo Praia Grande, Sao Paulo 24/7 Small Office Network Consultant Windows Server 2016
  • Technology Professional NetApp MetroCluster Troubleshooting NetApp MetroCluster Troubleshooting Engineers
  • Teleworkers Consulting and Support Services near me in Omaha - Endpoint Security Systems Consulting Omaha, Douglas County At Home Workforce Consulting - Omaha - Cybersecurity Systems Assistance

  • Microsoft Certified Partner MOM 2007 Engineer
    Online Consulting Operations Manager

    Progent's Microsoft-certified consulting experts have more than 10 years of background planning, implementing, enhancing and fixing System Center Operations Manager environments and offer organizations of all sizes advanced remote or onsite consulting services for System Center 2012 Operations Manager. Progent can help your company to plan a topology for Microsoft SCOM 2012 servers that provides the responsiveness and resilience needed to watch over your datacenter effectively, whether your infrastructure are on-premises, in the cloud, or a mixed solution. Progent can also help you to import and set up Microsoft SCOM 2012 management packs according to industry best practices for tracking network infrastructure as well as both Microsoft and third-party apps and services. In addition, Progent can deliver responsive remote or onsite technical support to help you to remediate critical problems uncovered by Microsoft SCOM 2012.

  • Toledo, OH IT Staff Augmentation for IT Support Organizations Short-Term Network Support Staffing Services Expertise Toledo, United States
  • Largest Email Guard DLP Consulting
  • Top Ranked Security Firewall Configuration Indianapolis, IN, Fort Wayne, IN, Gary, IN, Evansville, IN, South Bend, IN Network Security Auditing CISSP Indianapolis, IN, Fort Wayne, IN, Gary, IN, Evansville, IN, South Bend, IN

  • 24x7x365 SCCM 2016 Endpoint Protection Support Services
    SCCM 2016 Mobile Device Management Remote Consulting

    System Center Configuration Manager 2016 automates application and device provisioning at scale, centralizes security and compliance settings management, inventories network resources, protects against company data leakage, performs health monitoring, allows secure self service, and offers a common control mechanism for managing multi-operating system networks running on-prem, cloud-centric, or hybrid deployment models. Progent's Microsoft-certified Configuration Manager 2016 consulting team and Azure cloud experts can help your organization with any facet of designing, implementing, using and repairing a SCCM 2016 deployment for on-premises, cloud-based, or hybrid networks.

  • ProSight Email Encryption Consultant
  • Walnut Creek Ransomware Nephilim Preparedness Audit Pittsburgh California Walnut Creek Crypto-Ransomware Hermes Susceptibility Review Concord
  • Wi-Fi IP phone integration Online Help wireless VoIP phone integration Online Consulting
  • Windows Recovery Services Rhode Island Providence, Warwick, Cranston, RI Windows Small Business Network Consulting Firms
  • Windows Server 2016 Server Support Schaumburg-Carol Stream Schaumburg-Wheeling Information Technology Consulting Firm Windows Server 2016
  • Work at Home Employees Santiago Consulting - Backup Solutions Consulting Experts Vitacura, Metropolitan Region Work from Home Employees Consulting and Support Services nearby Santiago - Data Protection Systems Consulting Services Vitacura, Metropolitan Region

  • Top Identity Authentication Information Technology Consulting
    MFA and Single Sign-on (SSO) Specialist

    Progent's Duo managed services utilize Cisco's Duo cloud technology to protect against password theft by using two-factor authentication (2FA). Duo supports single-tap identity verification with Apple iOS, Android, and other personal devices.

  • Work at Home Employees Southfield Consulting - Call Desk Augmentation Assistance Southfield-Novi Remote Workforce Southfield Guidance - Call Desk Outsourcing Consulting Experts Southfield-Farmington Hills, MI
  • Work from Home Employees Belo Horizonte Guidance - Infrastructure Consulting Experts Belo Horizonte, MG Telecommuters Expertise near me in Belo Horizonte - Infrastructure Consultants Belo Horizonte, MG
  • Work from Home Employees Boise Consulting Services - Security Systems Guidance Boise 24x7 At Home Workforce Boise Expertise - Cybersecurity Solutions Consulting Services Boise
  • Work from Home Employees Chattanooga Consulting Experts - Backup/Restore Technology Consulting Experts Chattanooga, Hamilton County Biggest Chattanooga Telecommuters Data Protection Solutions Consultants Chattanooga, TN
  • Work from Home Employees Mobile Consulting Services - Setup Assistance Mobile, United States Remote Workers Mobile Assistance - Setup Assistance Mobile

  • After Hours Services Microsoft Entra Domain Services
    MS Certified Microsoft Azure hybrid cloud solutions Specialists

    Progent can help you to plan and implement an efficient move from onsite Active Directory to cloud-based Microsoft Entra ID (formerly called Azure Actve Directory) or to a hybrid solution that uses Microsoft Entra Domain Services and Microsoft Entra Connect to unify identity services across onsite and Azure assets.

  • domain management Professional Technology Professional IT documentation management

  • © 2002-2024 Progent Corporation. All rights reserved.