ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes SentinelOne's next generation behavior analysis technology to defend physical and virtual endpoints against modern malware attacks like ransomware and email phishing, which routinely get by legacy signature-matching AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to manage the entire threat progression including blocking, infiltration detection, containment, remediation, and post-attack forensics. Top features include one-click rollback using Windows VSS and automatic system-wide immunization against newly discovered threats. Progent is a certified SentinelOne Partner. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Endpoint Protection and Exchange Filtering
    Progent's ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge technologies incorporated within one agent accessible from a unified console. Progent's security and virtualization experts can help you to design and configure a ProSight ESP deployment that addresses your company's unique needs and that allows you demonstrate compliance with legal and industry information security regulations. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate action. Progent can also assist you to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.

  • ProSight Data Protection Services (DPS): Backup and Recovery Services
    Progent has partnered with advanced backup technology providers to create ProSight Data Protection Services (DPS), a family of management offerings that provide backup-as-a-service (BaaS). ProSight DPS products automate and track your backup operations and enable non-disruptive backup and rapid recovery of critical files, apps, images, and virtual machines. ProSight DPS lets your business recover from data loss caused by equipment failures, natural disasters, fire, malware like ransomware, human error, malicious insiders, or software glitches. Managed services available in the ProSight Data Protection Services product line include ProSight DPS Ataro VM Backup, ProSight Ataro Office 365 Total Backup, ProSight ECHO Backup based on Barracuda dedicated hardware, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent service representative can assist you to determine which of these fully managed services are most appropriate for your network.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for smaller businesses to map out, track, reconfigure and debug their networking hardware like routers and switches, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Incorporating cutting-edge Remote Monitoring and Management technology, WAN Watch makes sure that infrastructure topology diagrams are kept current, copies and manages the configuration information of almost all devices connected to your network, tracks performance, and sends notices when potential issues are discovered. By automating complex management processes, ProSight WAN Watch can cut hours off ordinary chores such as network mapping, reconfiguring your network, locating appliances that need important software patches, or identifying the cause of performance issues. Find out more details about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progent’s server and desktop remote monitoring service that incorporates advanced remote monitoring and management (RMM) technology to keep your IT system operating at peak levels by checking the health of critical assets that power your information system. When ProSight LAN Watch uncovers a problem, an alert is transmitted immediately to your designated IT staff and your assigned Progent engineering consultant so that all potential issues can be addressed before they have a chance to disrupt productivity. Find out more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. With the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Since the system is virtualized, it can be moved immediately to a different hosting environment without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard information related to your network infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or warranties. By cleaning up and managing your IT infrastructure documentation, you can save as much as half of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you’re planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require as soon as you need it. Read more about ProSight IT Asset Management service.

  • Progent Active Defense Against Ransomware: Machine Learning-based Ransomware Identification and Cleanup
    Progent's Active Defense Against Ransomware is an endpoint protection (EPP) service that incorporates cutting edge behavior-based machine learning technology to defend endpoints and physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching AV tools. Progent ASM services safeguard on-premises and cloud resources and provides a unified platform to automate the complete malware attack lifecycle including protection, detection, mitigation, cleanup, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ransomware defense and recovery services.

  • Outsourced/Co-managed Help Center: Help Desk Managed Services
    Progent's Call Center services allow your IT group to offload Call Center services to Progent or split responsibilities for Help Desk services transparently between your internal support group and Progent's extensive roster of IT support engineers and subject matter experts (SMEs). Progent's Shared Service Desk provides a smooth supplement to your corporate support resources. End user access to the Service Desk, provision of support services, issue escalation, ticket creation and updates, efficiency metrics, and maintenance of the service database are consistent regardless of whether issues are resolved by your in-house IT support group, by Progent's team, or by a combination. Find out more about Progent's outsourced/shared Help Center services.

  • Patch Management: Patch Management Services
    Progent's support services for patch management offer organizations of any size a versatile and cost-effective solution for assessing, validating, scheduling, implementing, and documenting updates to your dynamic IT system. In addition to optimizing the security and reliability of your IT network, Progent's patch management services permit your in-house IT team to concentrate on more strategic projects and tasks that derive the highest business value from your network. Read more about Progent's patch management support services.

  • ProSight Duo Multi-Factor Authentication: Access Security, Endpoint Remediation, and Secure Single Sign-on (SSO)
    Progent's Duo MFA managed services utilize Cisco's Duo cloud technology to defend against compromised passwords by using two-factor authentication (2FA). Duo enables one-tap identity verification with Apple iOS, Google Android, and other personal devices. With 2FA, when you sign into a protected application and give your password you are requested to verify your identity on a device that only you have and that uses a different ("out-of-band") network channel. A broad selection of devices can be used as this second means of authentication such as a smartphone or wearable, a hardware token, a landline telephone, etc. You may register multiple verification devices. For details about Duo two-factor identity authentication services, refer to Cisco Duo MFA two-factor authentication services for access security.
Download Progent's 10 Benefits of Managed IT Services White Paper
To view a white paper explaining why managed services are rapidly takingthe place of the traditional break/fix model of IT support for small and mid-size organizations, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost way for small and mid-size businesses to obtain an unbiased assessment of the overall health of their information system. Powered by a selection of the top remote monitoring and management (RMM) platforms in the industry, and supervised by Progent's certified group of information technology professionals, ProSight Network Audits help you see how closely the configuration of your essential infrastructure devices adhere to leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and deliver instant ROI such as a more manageable Active Directory environment. Both also come with a year of advanced remote network monitoring and management. Benefits can include simpler network management, improved compliance with information security requirements, more efficient utilization of network assets, quicker problem resolution, more dependable backup and restore, and increased uptime. Read more about Progent's ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service based on a brief interview with a Progent information assurance expert. The interview is designed to assess your company's preparedness either to defend against ransomware or recover quickly after an attack by a ransomware strain such as Ryuk, Maze, Sodinokibi, Netwalker, DopplePaymer, Conti or Nephilim. Progent will work with you directly to collect information concerning your current security profile and backup procedures, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can follow best practices to deploy an efficient security and backup/recovery system that reduces your vulnerability to ransomware and aligns with your company's requirements. For details, visit The ProSight Ransomware Preparedness Report Service.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • 24-7 Antispam Help and Support Anti-Virus Support and Help
  • 24-7 Jersey City Telecommuters Infrastructure Expertise Jersey City Cedar Knolls Carlstadt Work from Home Employees Jersey City Expertise - Integration Consulting Services Jersey City, NJ
  • 24-7 Telecommuters Valencia Guidance - Network Security Systems Consulting Experts Valencia-Santa Clarita, California Telecommuters Valencia Consulting and Support Services - Network Security Solutions Consulting
  • 24/7 Mexico City Ransomware Cleanup Services Mexico City Immediate 24-7 Mexico City Crypto-Ransomware Removal Consulting
  • 24x7 Colorado - Denver, CO, Colorado Springs, CO, Aurora, CO, Lakewood, CO Online Support Services Immediate Denver, Colorado Online Support Services
  • 24x7x365 Waltham Ransomware DopplePaymer Preparedness Testing Waltham-Brightone, MA, United States Waltham Ransomware Nephilim Preparedness Audit
  • Addison-Richardson Dynamics GP (Great Plains) Addison Premier Partner - Database Development Dynamics GP (Great Plains) Vender - Addison - Reporting Consulting Addison-Lewisville, TX
  • At Home Workers Consulting near Liverpool - Connectivity Solutions Consulting and Support Services Liverpool At Home Workers Liverpool Consulting - Integration Solutions Expertise Liverpool
  • At Home Workforce Fort Worth Consulting - Video Conferencing Technology Assistance Fort Worth Teleworkers Voice/Video Conferencing Technology Consulting Experts Fort Worth Texas
  • At Home Workforce Guidance nearby Campinas - Collaboration Technology Consultants Campinas, Sao Paulo, Brazil Campinas Campinas Work at Home Employees Collaboration Solutions Consulting
  • Best Microsoft Windows Server 2016 Small Business IT Support Firms Windows Server 2012 Manager Naples-Bonita Springs, Florida
  • Best Work from Home Conferencing Professional Remote Workforce Video Conferencing Support and Integration
  • Biggest Consulting Windows 7 Upgrade Top Quality Windows 7 Upgrade Professional
  • Biggest Omaha Ransomware DopplePaymer Readiness Audit Omaha Nebraska Omaha Nebraska Omaha Crypto-Ransomware Consultation
  • BlackBerry BES Server System Consulting Services San Mateo BlackBerry Desktop Manager Technology Consultant Half Moon Bay CA
  • BlackBerry Redirector Network Help Sorocaba, Sao Paulo Information Technology Outsourcing BlackBerry Smartphone
  • Boise Lockbit Ransomware System-Rebuild Boise Eagle Boise, ID, United States Boise DopplePaymer Ransomware Cleanup
  • 24/7/365 Professional Email Quarantine
  • Buffalo Consulting Experts for Computer Support Organizations Buffalo, United States Buffalo, Erie County Top Consultants for IT Support Organizations in Buffalo - Temporary Support Staff Assistance
  • Buffalo Teleworkers Help Desk Augmentation Consultants Buffalo Buffalo, NY Buffalo At Home Workforce Help Desk Augmentation Consulting Experts
  • CISSP Security Consultancy Uberlândia, Minas Gerais Firewall information Systems Audit Uberlândia, MG
  • Chicago Consulting for Network Service Organizations Oak Park, IL Consulting Expertise for Chicago Computer Support Providers Oak Park, IL
  • Cisco CCIE Integration Specialists Urgent Network IT Specialists Salt Lake City Utah
  • Cisco Certified Small Business Wireless Access Point Technology Consulting Small Business WAP351 Network Consulting

  • Troubleshooting Linux
    Support Debian Linux

    Progent's Linux consulting services provide small and mid-size companies and software developers help with administering and maintaining Linux systems that coexist with Microsoft-powered networks. Progent can give your business contact with Linux experts, consulting professionals premier by Microsoft and Cisco, and security experts with CISA and CISSP credentials. This broad array of expertise offers you a convenient single source to show you how to build and manage a protected and reliable mixed-platform network and communications environment that allows Linux and Microsoft coexistence by integrating MS Windows with major Linux derivatives including RedHat Linux, SUSE, CentOS, Ubuntu Linux, PCLOS, fedora Linux, Gentoo, Mandriva Linux, Debian-GNU, and Slackware Linux.

  • Consultant Services Cisco Sacramento - Folsom Small Business Computer Consulting Cisco
  • Database Applications Consulting Consulting Services Database Application Development
  • Cloud-managed Email Security Professionals
  • Dayton Centerville Trotwood Exchange 2010 Server Computer Consultation Business Computer Server Companies Microsoft Exchange 2010 Dayton Centerville Trotwood
  • Dynamics GP (Great Plains) Partner nearby Sorocaba - Upgrades Development Sorocaba Sorocaba MS Dynamics GP Reseller nearby Sorocaba - Setup Expert
  • Emergency Remote Workers Consultants in Eugene - Setup Guidance Eugene Springfield Eugene, OR At Home Workforce Consulting and Support Services - Eugene - Setup Assistance
  • Excel PivotTable Programmer Microsoft 365 Excel Power Pivot Programming Firm
  • Exchange 2010 Online Support Services Exchange 2010 Planning Troubleshooting

  • 24/7 System Consulting Services Cisco VoIP
    Best Cisco Router Experts

    Progent can assist you to utilize Cisco's networking products to create a robust basis for your local, private cloud, or hybrid-cloud data center and improve operations in key areas including resource consolidation, security and compliance, versatility, reliability, and recoverability.

  • 24-7 ProSight Email Guard Content Filtering Consultancy
  • Fort Lauderdale IT Staffing Temps Support Fort Lauderdale Weston Margate Supplemental IT Staffing Services Consulting Support Fort Lauderdale Weston Margate
  • Immediate Microsoft SharePoint Technical Support Omaha Nebraska, United States Microsoft SharePoint Server 2010 Integration Services Omaha Nebraska
  • Largest At Home Workforce Guidance nearby Beverly Hills - Backup/Recovery Technology Consulting Experts Beverly Hills-Century City, California Remote Workers Consulting Services near me in Beverly Hills - Backup/Restore Technology Consulting Beverly Hills California
  • Lawrence Offsite Workforce Cloud Systems Consulting and Support Services Lawrence At Home Workers Lawrence Assistance - Cloud Integration Technology Consulting Experts Lawrence-Lowell
  • Lima At Home Workers Infrastructure Assistance San Isidro District Remote Workforce Consulting and Support Services nearby Lima - Infrastructure Consulting and Support Services
  • Londrina Cisco Implementation Services Cisco Computer Consultants Londrina, PR
  • Microsoft Certified Partner Implementation Services Barueri-Alphaville-Cotia Barueri-Alphaville-Cotia Outsourced IT Services
  • Microsoft SQL Server 2016 Consulting Company Remote Network Installation Microsoft SQL 2008 Charleston Mount Pleasant
  • Modesto Crypto-Ransomware Readiness Report Modesto Ransomware Egregor Vulnerability Testing Modesto California

  • Cisco ASA Firewall with Firepower Support Outsourcing
    Remote Consulting Cisco Firepower 9300 Series Firewalls

    Progent's Cisco-certified CCIE network engineers can assist you to manage your existing PIX or ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent can also help your business to plan, deploy, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services

  • ProSight Email Denial of Service Protection Consulting
  • Naples Locky Ransomware Settlement Negotiation Guidance Naples-Bonita Springs, Florida Naples Crypto-Ransomware Negotiation Consulting Naples
  • Nashville Remote Workforce Management Tools Consulting and Support Services Nashville Tennessee Remote Workforce Assistance - Nashville - Management Systems Consulting Services Nashville Goodlettsville, United States

  • 24x7 Microsoft Office 2003 Computer Service Companies
    Microsoft Office 2003 Networking Group

    Progent’s IT outsourcing packages provide budget-friendly network support for small businesses. Whether it includes planning system infrastructure, setting up an internal Help Desk or using an outside one, deploying a new email system, monitoring your network, or building a web-based eCommerce solution, outsourcing your IT technical services can reduce expenses and minimize risks, permitting IT service expenses to grow in a more moderate and controlled fashion than is possible by building up a large, all-purpose in-house IT organization. Progent’s Outsourcing White Paper and datasheets explain how Progent can enable you to build a protected and robust system foundation for your critical applications powered by Microsoft Windows including Office XP, Office 2003, and Microsoft Office 2000.

  • Oklahoma City At Home Workers Oklahoma CIty Consulting Experts - Management Systems Consultants Remote Workers Assistance near Oklahoma CIty - Management Solutions Consulting Oklahoma City
  • Orlando Staffing Support Services Orange County Florida Supplemental Staffing Support Services Consulting Specialist Orange County Florida
  • Part Time Jobs Security Consulting Arlington, Dallas, Fort Worth CISSP Engineer Contract Job Opportunities Arlington Texas
  • Remote Workers Consultants in Sorocaba - Help Desk Augmentation Consulting and Support Services Sorocaba, Sao Paulo At Home Workers Consulting near Sorocaba - Help Desk Augmentation Consulting Experts
  • Reno, Nevada IT Outsource Reno, NV Design Companies
  • SQL Network Consultant Florida SQL IT Outsourcing Group Jacksonville Florida

  • Windows Server Update Services Professional
    24 Hour Consultant Services Microsoft SUS

    Microsoft Windows Server Update Services enables IT administrators to deploy and track the latest Microsoft patches and security releases to Windows Server 2000, Windows Server 2003, and Microsoft Windows XP platforms. By using Microsoft WSUS, IT staff can fully and easily manage the distribution of patches that are published through Microsoft Update to servers and workstations in a company. Progent can assist you with complex details of the initial configuration of Microsoft SUS such as designing the Microsoft WSUS deployment, configuring user's workstations, defining the Group Policy parameters, and ensuring your Microsoft WSUS Group Policy Object is linked to an Active Directory container appropriate for your system environment.

  • Savannah, GA Microsoft SQL 2008 Small Business IT Consulting Firms 24/7 Integration Group Microsoft SQL Server 2016 Savannah
  • Consulting Email Quarantine
  • Small Office IT Consultants New Haven, CT New Haven Information Technology Consulting Firms
  • Snatch Ransomware Hot Line Lambert International Airport STL, United States St Louis, MO Egregor Ransomware Hot Line

  • Online Help BlackBerry BES Server
    BlackBerry Wireless Computer Consultants

    Progent can provide the services of RIM BlackBerry-certified consultants who can assist small companies to design, administer, and troubleshoot BlackBerry solutions affordably and successfully, eliminating the need for an in-house BlackBerry expert and minimizing the expense and hassle of supporting a mobile workforce. Progent's BlackBerry specialists offer in-depth experience cooperating with Progent's Microsoft-certified experts, Cisco CCIE-certified network engineers, and CISA and GIAC-certified security engineers. This wide range of knowledge, in conjunction with Progent's efficient remote service delivery model, offers small businesses an efficient solution for integrating BlackBerry devices and software productively into their information network.

  • Stockton MongoLock Ransomware Forensics Tracy CA Stockton Nephilim Crypto-Ransomware Forensics Analysis Stockton, CA
  • São José dos Campos At Home Workers Help Desk Call Center Solutions Expertise Sao Jose dos Campos-Taubaté Remote Workers São José dos Campos Guidance - Help Desk Call Center Augmentation Consulting Experts
  • Teleworkers Consulting Services in Minnetonka - Cloud Integration Solutions Assistance Minnetonka Minnesota Minnetonka-Eden Prairie, U.S.A. Offsite Workforce Minnetonka Guidance - Cloud Systems Assistance

  • SharePoint Web Parts Network Consultant
    Computer Consulting SharePoint Web Parts

    Progent's Microsoft consultants can provide affordable online support and development services to help your business to design, implement, administer, and troubleshoot Microsoft SharePoint 2010 environments that can involve web sites able to function as intranets, extranets, document management tools, blogs, data marts, business analytics, enterprise search engines, workflows, and other tools to support and enhance collaboration. Progent can show you how to combine SharePoint 2010 with Microsoft SQL Server and with other databases and with Microsoft's popular desktop programs like Excel, Word, PowerPoint, and Visio. Progent can assist your business to upgrade from earlier versions of SharePoint or move a multi-vendor mix of web technologies into a unified and easy-to-manage SharePoint 2010 solution.

  • Teleworkers Guidance in Alpharetta - VoIP Systems Consulting Experts Alpharetta Offsite Workforce Assistance near Alpharetta - IP Voice Systems Consulting and Support Services Alpharetta
  • Top Quality Teleworkers Consulting and Support Services near me in Uberlândia - Endpoint Management Systems Consulting Experts Uberlândia Uberlândia At Home Workforce Management Tools Consulting and Support Services
  • Top Rated SCCM 2012 Device Management Remote Support Services Online Support Services SCCM 2012 Patch Management
  • Top Rated Work from Home Employees Cambridge Consulting and Support Services - Set up Guidance Cambridge Top Offsite Workforce Expertise nearby Cambridge - Integration Solutions Consulting Cambridgeshire
  • VPN Online Consulting Consulting Services Remote Access

  • iPhone Citrix Remote Troubleshooting
    iPhone and SQL Server integration Remote Technical Support

    Progent offers affordable online assistance to assist your business to design, configure, and fix any aspect of your iPhone and Windows integration solution and is available for short-term jobs to help you get past specific technical roadblocks or long-term engagements to help you finish large-scale projects on schedule and within budget. Progent has experience in local, cloud-centric, or hybrid networks and can help you create or support a resilient, protected and scalable infrastructure that aligns with your mode of computing. Progent can also provide remote and onsite training for individuals or groups to help manage and use your iOS devices in a safe, collaborative ecosystem that maximizes the business value of your information system.

  • Washington DopplePaymer Crypto-Ransomware Operational-Recovery Washington District of Columbia Washington Lockbit Crypto-Ransomware Mitigation

  • © 2002-2022 Progent Corporation. All rights reserved.