ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes SentinelOne's next generation behavior-based machine learning technology to defend physical and virtual endpoint devices against new malware assaults like ransomware and email phishing, which routinely escape traditional signature-matching AV products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to automate the entire threat lifecycle including blocking, infiltration detection, containment, remediation, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Progent is a SentinelOne Partner, reseller, and integrator. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Security and Microsoft Exchange Email Filtering
    Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint control, and web filtering via leading-edge tools incorporated within a single agent accessible from a unified console. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP deployment that addresses your company's specific requirements and that allows you achieve and demonstrate compliance with government and industry information security standards. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent can also assist you to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.

  • ProSight Data Protection Services (DPS): Managed Backup and Recovery Services
    Progent has partnered with advanced backup/restore software companies to create ProSight Data Protection Services, a portfolio of management offerings that provide backup-as-a-service (BaaS). ProSight DPS services automate and track your data backup processes and allow transparent backup and fast restoration of important files, apps, system images, plus virtual machines. ProSight DPS helps you recover from data loss caused by equipment breakdown, natural disasters, fire, malware such as ransomware, human error, malicious insiders, or application bugs. Managed backup services available in the ProSight Data Protection Services product family include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup based on Barracuda purpose-built hardware, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent service representative can assist you to identify which of these managed backup services are most appropriate for your network.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for smaller businesses to diagram, track, reconfigure and debug their connectivity appliances such as routers and switches, firewalls, and wireless controllers plus servers, printers, client computers and other networked devices. Incorporating cutting-edge Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology maps are kept current, copies and manages the configuration of almost all devices connected to your network, tracks performance, and sends notices when potential issues are detected. By automating complex network management processes, WAN Watch can knock hours off ordinary tasks like network mapping, expanding your network, locating devices that require important software patches, or resolving performance problems. Find out more details about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progent's server and desktop monitoring service that uses state-of-the-art remote monitoring and management (RMM) technology to help keep your network operating at peak levels by tracking the state of vital computers that drive your business network. When ProSight LAN Watch detects an issue, an alarm is sent automatically to your specified IT staff and your Progent consultant so all looming issues can be resolved before they have a chance to impact productivity. Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual machine host set up and managed by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the apps. Since the system is virtualized, it can be ported immediately to a different hosting solution without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect data about your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time wasted searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you're making improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Read more about ProSight IT Asset Management service.

  • Active Defense Against Ransomware: AI-based Ransomware Detection and Cleanup
    Progent's Active Defense Against Ransomware is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning technology to guard endpoints as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which routinely escape legacy signature-based AV tools. Progent Active Security Monitoring services safeguard on-premises and cloud resources and offers a single platform to manage the complete malware attack lifecycle including filtering, detection, containment, remediation, and forensics. Key capabilities include one-click rollback with Windows VSS and real-time network-wide immunization against newly discovered threats. Read more about Progent's ransomware defense and recovery services.

  • Progent's Outsourced/Shared Help Center: Support Desk Managed Services
    Progent's Help Desk managed services allow your information technology team to offload Call Center services to Progent or divide activity for Service Desk support transparently between your internal support team and Progent's extensive roster of certified IT support technicians, engineers and subject matter experts (SMEs). Progent's Co-managed Help Desk Service offers a seamless supplement to your corporate support staff. End user access to the Help Desk, delivery of support services, issue escalation, ticket creation and updates, efficiency measurement, and maintenance of the support database are cohesive regardless of whether issues are taken care of by your corporate network support staff, by Progent, or by a combination. Learn more about Progent's outsourced/co-managed Service Center services.

  • Patch Management: Patch Management Services
    Progent's managed services for software and firmware patch management offer businesses of any size a versatile and cost-effective solution for assessing, validating, scheduling, implementing, and tracking software and firmware updates to your ever-evolving IT system. Besides maximizing the security and functionality of your computer network, Progent's patch management services free up time for your IT team to focus on line-of-business initiatives and tasks that derive the highest business value from your network. Find out more about Progent's software/firmware update management support services.

  • ProSight Duo Multi-Factor Authentication: Access Security, Endpoint Policy Enforcement, and Secure Single Sign-on (SSO)
    Progent's Duo MFA managed services utilize Cisco's Duo cloud technology to protect against compromised passwords by using two-factor authentication. Duo supports one-tap identity confirmation with iOS, Google Android, and other personal devices. With 2FA, whenever you log into a secured online account and give your password you are requested to confirm your identity on a device that only you have and that uses a different network channel. A wide selection of devices can be used as this second form of ID validation such as a smartphone or watch, a hardware token, a landline telephone, etc. You can register several validation devices. For details about ProSight Duo two-factor identity authentication services, go to Duo MFA two-factor authentication (2FA) services.
Download Progent's 10 Benefits of Managed IT Services White Paper
To view a white paper describing why managed services are quickly takingthe place of the traditional break/fix model of IT support outsourcing for small and mid-size companies, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable way for small and medium-size organizations to get an unbiased evaluation of the health of their network. Powered by some of the leading remote monitoring and management tools in the industry, and supervised by Progent's world-class group of information technology experts, ProSight Network Audits help you see how well the configuration of your essential network assets conform to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and provide instant benefits like a more manageable Active Directory (AD) environment. Both also come with a year of cutting-edge remote network monitoring and management. Advantages can include easier management, improved compliance with information security standards, more efficient utilization of network assets, faster troubleshooting, more dependable backup and recovery, and less downtime. Learn more information about Progent's ProSight Network Audits IT infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service based on a phone discussion with a Progent information assurance consultant. The interview is designed to help evaluate your organization's preparedness to defend against ransomware or recover quickly after an assault by a ransomware variant such as Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), Phobos, LockBit or Egregor. Progent will consult with you directly to collect information about your current AV defense and backup system, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can apply best practices to build a cost-effective security and backup environment that minimizes your exposure to a ransomware attack and aligns with your business needs. For additional information, visit Progent's ProSight Ransomware Preparedness Report.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • 24 Hour Meraki MR62 Access Point Network Consultant Meraki Wave 2 Wi-Fi Access Point Setup and Support
  • 24-Hour Knoxville Egregor Ransomware Remediation Knoxville Knoxville Maze Crypto-Ransomware Removal
  • 24/7/365 Network System Support Consultant Progent Management Progent's Management Networking Firm
  • 24x7 Mandrake Linux, Sun Solaris, UNIX Technical Support Services Fremont California Fedora Linux, Solaris, UNIX Network Engineer Milpitas, America
  • 24x7 Staffing for Network Support Groups Supplemetary IT Staffing for Network Service Groups
  • Allentown Bethlehem Easton Consulting for Network Service Firms - Allen - Seamless Temporary Support Team Expansion Allen Consulting Expertise for Computer Support Companies Allentown Pennsylvania
  • ProSight Email Virus Filtering Engineers
  • Anaheim Crypto-Ransomware Recovery Anaheim, CA Anaheim Ryuk CryptoLocker Identification and Remediation
  • At Home Workers Guidance near me in Reno - VoIP Solutions Consultants Reno Nevada Reno Remote Workers VoIP Technology Expertise Reno
  • ProSight Outbound Email Filtering Specialists
  • Best CCIE Expert Certified Network Support Omaha Omaha Small Office Server Support
  • Boise City Idaho Small Business IT Consulting Firm Boise City, Pocatello, Idaho Falls, ID Small Business IT Outsourcing Group
  • ProSight Email Virus Filtering Consulting Services
  • Charlotte Work from Home Employees Management Tools Consulting Charlotte North Carolina, U.S.A. Remote Workers Expertise near Charlotte - Management Systems Consulting Services
  • Denver Mile High City, United States CISSP Security Consultant Firewall Compliance Auditor Denver International Airport

  • Project Server Time Reporting Applications Consulting
    Microsoft Project Server Outsourced Programming

    Progent's Microsoft consultants can provide in-depth support in implementing, using and debugging all versions of Project Server and can provide a wide variety of cost-effective remote consulting services following industry best practices to assist organizations of all sizes to receive all the advantages of this powerful platform. Consulting support available from Progent include system planning, software configuration and upgrades, strategies for safe collaboration among local and offsite users, network infrastructure optimization, and specialized webinar training.

  • Durham Snatch Crypto-Ransomware Settlement Negotiation Help Raleigh Durham Cary Durham Ryuk Crypto-Ransomware Negotiation Consultants Durham Research Triangle, United States
  • Edmonton Hermes Ransomware Data-Recovery Edmonton, AB Edmonton Maze Ransomware Recovery

  • Expert Training Support
    Information Transfer Help and Support

    Progent is committed to information transfer from Progent's consultants to clients. By teaching clients to handle technical issues that are within their comfort zone, Progent is able to concentrate on providing hard-to-find skills where Progent has few competitors. Small companies who work with trusted independent consultants or who employ in-house IT personnel benefit when Progent passes on knowledge about critical technology and tested methodologies to make their networks more robust, protected, and productive.

  • Exchange 2003 Server installation and Administration Carlsbad-Del Mar, CA Carlsbad-Solana Beach, U.S.A. Exchange 2016 Small Business IT Consultants

  • Microsoft Experts Consultant Rates Network Support Service
    24/7/365 Network Recovery Consultant Prices

    Progent's pricing model is to charge for remote service and in-person visits per minute. Consequently, you are billed just for received services. Progent does not impose a more expensive rate for after-hours or emergency support, and within California or in regions where Progent provides on-premises support, Progent does not bill for travel except for urgent support where on-site time is less than four hours. Also, Progent imposes no service activation fee and requires no retainer for services delivered during normal business hours. Many support organizations impose substantial minimum payments or charge for each quarter hour or longer. Progent's small granularity does away with large bills for fast solutions so you won't be forced to allow simple problems to stay unaddressed.

  • Exchange Server 2019 Design Silicon Valley Biggest Integration Companies Exchange 2019 Cupertino, CA
  • Glendale Ransomware Forensics Analysis Dallas County, U.S.A. Glendale Hermes Crypto-Ransomware Forensics Investigation Garland Texas
  • Email Virus Fingerprint Professionals
  • Hillsborough County New Hampshire 24-7 At Home Workers Assistance near me in Manchester - Integration Expertise Manchester Remote Workers Solutions Consultants Manchester
  • Houston Remote Workers Management Tools Consulting Energy Corridor, Houston Offsite Workforce Houston Consulting Services - Management Tools Guidance
  • Lakeland Remote Workforce Backup/Restore Solutions Consulting Services Lakeland FL Remote Workers Consulting Experts nearby Lakeland - Data Protection Systems Consulting Experts Lakeland, United States
  • Largest Server Consulting Cisco Manchester, Hillsborough County Manchester New Hampshire Cisco Network Consulting
  • MS CRM Network Consulting Microsoft CRM Remote Troubleshooting
  • Microsoft Certified Partner BlackBerry BES Server Express Consultancy BES Express Engineer
  • Microsoft SQL Server Support and Setup Microsoft SQL Consultant
  • Microsoft SharePoint Server 2013 Professionals Salem Oregon Salem Keizer Woodburn SharePoint Server 2019 Setup and Support
  • Minneapolis IT Staffing Temps Support Services Twin Cities, Minnesota Short-Term IT Support Staffing Support Services Consulting Specialist Minneapolis Minnesota
  • Monterey At Home Workers IP Voice Solutions Consulting Experts Seaside Remote Workforce Monterey Assistance - IP Voice Technology Guidance Seaside
  • New Haven MongoLock Ransomware Data-Recovery New Haven, CT New Haven Hermes Crypto-Ransomware Business Recovery New Haven County CT, USA

  • Support and Integration 64-bit Upgrade
    Services 64-bit Migration

    Progent's Microsoft-certified consultants can help you to update your desktops from 32 to 64 bits. Progent can assist you to calculate the costs and advantages of migrating to 64-bit PC desktop computing, plan an affordable migration strategy that minimizes business interruptions, and deliver inexpensive, expert online help to aid your company to install 64-bit desktop operating systems and application software on your current computers.

  • Professionals ProSight Spam Filtering
  • Newark Ransomware Defense Essex County New Jersey Newark Newark Hermes Crypto-Ransomware Recovery
  • Online Support Supplemental Service Desk Extended Call Desk Troubleshooting
  • Photoshop CS5 Education 24-Hour InDesign Training
  • Email Block Lists Services
  • Providence, RI, Warwick, RI, Cranston, RI, CITY4, RI Exchange System Consultant Exchange Network Security Consulting
  • Ransomware Data Recovery Urgent Spora Ransomware Hot Line Federal Way, WA
  • Redhat Linux, Solaris, UNIX Technical Support Services Richmond Virginia Consultant Redhat Linux, Sun Solaris, UNIX Richmond, VA

  • ISA 2004 Enterprise Edition Server Technical Support Services
    Engineer ISA 2004 Standard Edition Server

    Progent's certified ISA Server 2004 consultants have long backgrounds with Internet Security and Acceleration Server configuring ISA Server-based security solutions for information systems with many sites, remote users, and mission-critical eCommerce applications. Progent's Microsoft Firewall consultants can assist your small business in designing and implementing an installation of ISA 2000 Server or ISA Server 2004 that supports your information security requirements without overly limiting your IT system productivity. Progent's consultants can help you migrate from Microsoft Proxy Server from Microsoft ISA 2000 to Microsoft ISA 2004 Enterprise Edition Server, ISA 2004 Standard Edition Server, or any up-to-date versions of Internet Security and Acceleration Server.

  • Remote Help Desk Internet Networking Consultants Glendale Goodyear Surprise Urgent Network Network Specialists Glendale, AZ

  • Professional Certified Cybersecurity Management
    Security Consultancy CISM

    Progent offers the expertise of CISM Certified security consultants. The Certified Information Security Manager (CISM) organization defines the basic capabilities and global standards of performance that information security managers are expected to learn. It provides business management the assurance that consultants who have qualified for their CISM certification possess the background and knowledge to deliver efficient security administration and consulting services.

  • Remote Workers Consulting and Support Services near me in Petaluma - Solutions Consulting Services Sonoma CA Petaluma Remote Workforce Connectivity Consulting Petaluma, CA
  • Remote Workers Sarasota Consulting and Support Services - Backup Solutions Consulting Services Fargo-Bismarck At Home Workforce Sarasota Consulting - Data Protection Solutions Consultants Fargo North Dakota
  • Remote Workforce Lawrence Consulting Experts - Collaboration Systems Consulting Lawrence-Hillsborough County, Massachusetts Lawrence Work at Home Employees Collaboration Technology Guidance Lawrence-Andover, MA, USA
  • Reston Phobos Crypto-Ransomware Negotiation Services Reston-Ashburn, VA Reston Crypto-Ransomware Negotiation Help Reston
  • San Francisco Teleworkers Cloud Integration Solutions Expertise Daly City, CA San Francisco Work from Home Employees Cloud Integration Technology Consultants San Francisco
  • SharePoint IT Consultants Albuquerque, Las Cruces, Santa Fe, NM, United States SharePoint Network Architect New Mexico
  • Short-Term IT Staffing Help Consultants Charleston Charleston, SC, USA Charleston Supplemetary IT Staffing Help
  • Shreveport Barksdale Air Force Base CentOS Linux, Sun Solaris, UNIX Onsite Technical Support CentOS Linux, Sun Solaris, UNIX Online Support
  • Spora Ransomware Hot Line Recife, Jaboatão dos Guararapes Ransomware Cryptoworm Recovery Recife, Pernambuco

  • Exchange Server 2003 Upgrade Technical Consultant
    Exchange Server 2003 Network Engineer

    Progent's Microsoft Premier professionals offer expert support for corporate-wide deployments of Microsoft Exchange 2007. Progent's experts can help you plan multi-location Exchange Server 2007 rollouts or upgrades and can supply onsite technicians to help enterprises with installations of Microsoft Exchange in the or any region served by Progent's engineers.

  • St. Louis Hermes Crypto-Ransomware Removal St Louis, United States St. Louis CryptoLocker Recovery St Louis St Charles Jefferson Franklin

  • 802.11x Wi-Fi Site Survey Remote Support
    Technology Consulting Wi-Fi Site Survey

    Progent's Wi-Fi site survey services assist you to design, implement and debug a Wi-Fi LAN optimized for your facilities, providing you a wireless solution that has the coverage, performance, capacity, data protection, and hand-off capability your company requires.

  • Email Encryption Key Management Consultant
  • Top Ranked Chatsworth Remote Workforce Integration Consulting Chatsworth Work at Home Employees Integration Consulting

  • Help Desk Process Configuration
    24x7 Call Center Information Technology Consulting

    The Contact Center service model adopted by Progent offers small and midsize businesses an affordable option to reliance on freelance consultants by offering broad expertise shared by multiple engineering groups, optional round-the-clock access to emergency assistance, escalation capability to world-class engineers for handling the most complex issues, support consistency and dependability, prompt follow-up overseen by seasoned support managers, a selection of easy-to-use mechanisms for requesting support jobs, plus excellent process visibility made possible by ticket updates and accessible through a web portal.

  • Vallejo, Benicia Microsoft Exchange 2010 Server Setup Microsoft Exchange Server 2007 Security Consulting Napa Valley
  • Consulting ProSight Spam Filtering Services
  • Wichita Egregor Crypto-Ransomware Negotiation Help Wichita Snatch Crypto-Ransomware Settlement Expertise Wichita Kansas
  • Windows Server 2016 Server Recovery Broomfield-Thornton, Colorado, US Windows Server 2012 Networking Consultancy Services Broomfield-Boulder, CO

  • © 2002-2022 Progent Corporation. All rights reserved.