ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progent's server and desktop remote monitoring service that uses advanced remote monitoring and management techniques to help keep your network running at peak levels by checking the health of critical assets that power your business network. When ProSight LAN Watch uncovers an issue, an alarm is sent immediately to your specified IT management personnel and your assigned Progent consultant so that all potential issues can be addressed before they have a chance to disrupt productivity. Find out more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized businesses to diagram, track, optimize and debug their connectivity appliances such as switches, firewalls, and access points as well as servers, client computers and other devices. Incorporating state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch ensures that infrastructure topology maps are kept updated, captures and manages the configuration information of almost all devices connected to your network, monitors performance, and sends alerts when issues are discovered. By automating complex management activities, ProSight WAN Watch can knock hours off common chores such as making network diagrams, reconfiguring your network, locating appliances that need critical updates, or resolving performance issues. Learn more details about ProSight WAN Watch infrastructure management consulting.

  • ProSight Reporting: Real-time and In-depth Reporting for Ticketing and Network Monitoring Platforms
    ProSight Reporting is a growing suite of real-time reporting tools created to work with the industry's top ticketing and remote network monitoring platforms including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and utilizes color coding to highlight and contextualize critical issues like spotty support follow-up or machines with missing patches. By identifying ticketing or network health concerns concisely and in near-real time, ProSight Reporting improves network value, lowers management hassle, and saves money. For more information, visit ProSight Reporting for ticketing and network monitoring applications.

  • ProSight Data Protection Services: Managed Backup and Recovery Services
    Progent has worked with leading backup technology providers to create ProSight Data Protection Services, a family of subscription-based management offerings that provide backup-as-a-service. ProSight DPS services manage and track your backup processes and allow transparent backup and fast restoration of vital files, apps, system images, plus VMs. ProSight DPS lets your business recover from data loss resulting from hardware failures, natural calamities, fire, malware such as ransomware, human mistakes, ill-intentioned employees, or software bugs. Managed backup services in the ProSight DPS product family include ProSight Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup based on Barracuda dedicated hardware, and ProSight MSP360 Cloud and On-prem Backup. Your Progent service representative can help you to determine which of these fully managed backup services are most appropriate for your network.

  • ProSight Duo Multi-Factor Authentication: ID Confirmation, Endpoint Remediation, and Secure Single Sign-on (SSO)
    Progent's Duo authentication services utilize Cisco's Duo technology to defend against stolen passwords through the use of two-factor authentication (2FA). Duo supports one-tap identity verification with iOS, Android, and other out-of-band devices. With Duo 2FA, when you log into a secured online account and give your password you are requested to confirm your identity via a device that only you have and that uses a different network channel. A broad range of devices can be utilized as this added form of authentication such as a smartphone or wearable, a hardware/software token, a landline telephone, etc. You may designate several validation devices. For more information about Duo identity validation services, visit Duo MFA two-factor authentication (2FA) services for access security.

  • Progent's Outsourced/Shared Call Desk: Help Desk Managed Services
    Progent's Call Center services enable your IT group to offload Support Desk services to Progent or divide responsibilities for support services transparently between your internal support group and Progent's extensive pool of certified IT service technicians, engineers and subject matter experts (SMEs). Progent's Co-managed Help Desk Service offers a smooth extension of your corporate support staff. User interaction with the Service Desk, delivery of support services, issue escalation, ticket generation and tracking, performance metrics, and management of the support database are consistent regardless of whether incidents are taken care of by your core IT support organization, by Progent's team, or by a combination. Read more about Progent's outsourced/shared Service Center services.

  • Progent Active Defense Against Ransomware: AI-based Ransomware Detection and Cleanup
    Progent's Active Defense Against Ransomware is an endpoint protection solution that utilizes next generation behavior-based machine learning technology to defend endpoints and physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which easily escape traditional signature-based anti-virus tools. Progent Active Security Monitoring services safeguard local and cloud resources and provides a unified platform to automate the complete threat progression including protection, infiltration detection, containment, cleanup, and forensics. Key capabilities include one-click rollback using Windows VSS and real-time system-wide immunization against new attacks. Find out more about Progent's ransomware protection and cleanup services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and safeguard information about your network infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT documentation, you can save up to half of time wasted searching for critical information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether you're making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you require as soon as you need it. Read more about Progent's ProSight IT Asset Management service.

  • Patch Management: Software/Firmware Update Management Services
    Progent's managed services for software and firmware patch management provide businesses of all sizes a versatile and affordable alternative for evaluating, validating, scheduling, implementing, and documenting updates to your dynamic IT system. Besides maximizing the protection and functionality of your computer environment, Progent's patch management services free up time for your IT staff to focus on line-of-business initiatives and tasks that deliver maximum business value from your network. Find out more about Progent's software/firmware update management services.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates SentinelOne's next generation behavior analysis technology to defend physical and virtual endpoints against new malware attacks like ransomware and email phishing, which routinely get by legacy signature-matching anti-virus tools. ProSight ASM protects local and cloud resources and provides a single platform to automate the entire malware attack lifecycle including blocking, infiltration detection, mitigation, cleanup, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, reseller, and integrator. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Protection and Microsoft Exchange Email Filtering
    ProSight Enhanced Security Protection managed services deliver economical in-depth security for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint control, and web filtering via leading-edge technologies incorporated within a single agent managed from a single console. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP deployment that meets your company's specific needs and that helps you achieve and demonstrate compliance with government and industry information security standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent's consultants can also help you to install and test a backup and restore solution such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host set up and managed by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the applications. Since the system is virtualized, it can be ported easily to a different hardware solution without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.
Download Progent's 10 Benefits of Managed IT Services White Paper
To download a white paper explaining why managed services are rapidly takingthe place of the old break/fix model of IT support for small and mid-size organizations, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost alternative for small and mid-size businesses to obtain an objective assessment of the health of their IT system. Based on a selection of the top remote monitoring and management (RMM) platforms in the industry, and supervised by Progent's certified group of IT experts, ProSight Network Audits show you how closely the deployment of your core network assets adhere to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide immediate benefits such as a cleaner Active Directory system. Both versions also come with a year of cutting-edge remote network monitoring and management (RMM). Benefits can include simpler network management, better compliance with government and industry security regulations, more efficient utilization of network assets, quicker troubleshooting, more dependable backup and recovery, and higher availability. Read more information about Progent's ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is a low-cost service built around a brief phone interview with a Progent backup/recovery expert. The fact-finding interview is intended to assess your organization's ability either to block ransomware or recover quickly after an attack by a ransomware strain such as Ryuk, Maze, Sodinokibi, Netwalker, Phobos, Snatch or Egregor. Progent will work with you directly to gather information about your current antivirus tools and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can apply best practices to create a cost-effective security and backup system that minimizes your exposure to ransomware and aligns with your company's needs. For additional information, visit Progent's ProSight Ransomware Preparedness Report Service.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to assist you to complete the urgent first step in mitigating a ransomware assault by stopping the bleeding. Progent's online ransomware engineer can help you to identify and quarantine infected servers and endpoints and guard clean resources from being compromised. If your system has been penetrated by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, visit Progent's Ransomware 24x7 Hot Line.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • 24-Hour Exchange Software Consulting Firm Santa Cruz California Microsoft Exchange System Consulting Aptos, CA

  • Apple iPad Configuration
    iPhone Consultants

    Progent's consultants offer Apple macOS and OS X users a range of services including workstation support, Apple macOS and OS X expertise, Mac integration with Windows environments, Microsoft Entourage and email help, security services, and custom education. Progent can help businesses to migrate to macOS from OS X or other earlier editions of Apple OS X and Progent can offer expertise with Apple macOS and Mac OS X application software. Progent's specialists in Apple technology can also assist your business with iPhone integration and Apple iPad management, or moving to iCloud. For computer environments built exclusively on Mac OS X or for networks incorporating a mix of Mac, Linux and Windows powered servers and workstations, Progent's Apple, Cisco, and Microsoft consultants have the experience and depth to deal with the complexity of planning, configuring and maintaining a network infrastructure that is available, safe, fast and able to achieve your company's business goals.

  • 24-Hour Waltham Snatch Crypto-Ransomware Settlement Experts Waltham-Burlington Waltham Massachusetts Waltham Nephilim Ransomware Negotiation Expertise
  • After Hours Newark, New Jersey Computer Help Professionals Newark, New Jersey
  • After Hours Online Support Hornetsecurity 365 Total Backup Hornetsecurity Altaro 365 Total SharePoint Backup Remote Troubleshooting
  • Alaska Server Support Anchorage, Juneau, Fairbanks, AK Software Security Consultant
  • Albuquerque New Mexico, US Albuquerque Offsite Workforce Collaboration Systems Consulting and Support Services Emergency Offsite Workforce Albuquerque Consulting and Support Services - Collaboration Technology Consulting Albuquerque New Mexico
  • Alpharetta Supplemental IT Support Staffing Support Expertise Temporary IT Staffing for Network Service Teams Alpharetta-Fulton County, Georgia
  • At Home Workers Manhattan Beach Consulting - Cloud Integration Solutions Consulting Experts Manhattan Beach-El Segundo Telecommuters Manhattan Beach Expertise - Cloud Solutions Consulting Experts Manhattan Beach-El Segundo, CA
  • At Home Workforce Consulting Services near Pasadena - Voice/Video Conferencing Technology Assistance Pasadena Baytown Missouri City Work at Home Employees Consulting nearby Pasadena - Voice/Video Conferencing Systems Consulting Experts
  • Award Winning Access to External Support Databases Migration Help Microsoft Solutions Framework Project Methodology Network Design
  • Biggest Jabber and SIP trunk Information Technology Consulting Top Quality Jabber and Expressway Support Services
  • Brooklyn Upgrade Brooklyn Tech
  • Caddo Parish Louisiana Windows 2019 Server Systems Support 24 Hour Windows Server 2012 Integration Firm Caddo Parish Louisiana

  • Consultant External Security Inventory
    Consult Security Inventory

    Progent offers small organizations a pair of ultra-affordable security evaluation scanning packages that include, at a preset fee, remotely administered inventory scans of your network security profile which are evaluated by certified information security specialists who interpret the data collected by the remote scan, present objective evaluations of your current network security, and make suggestions for enhancements. Progent has developed two non-overlapping security evaluation scanning packages for external and internal security scanning that are priced to meet the budgetary realities of small businesses while providing enterprise-quality evaluations of your network's vulnerability to attack.

  • Cleveland Microsoft MCITP Remote Engineer Contractor Job Network Remote Support Job Opportunity Cleveland, Cuyahoga County

  • Professionals Hybrid cloud integration
    Microsoft Certified Partner Microsoft Azure hybrid cloud solutions Specialist

    Progent offers advanced online consulting to help companies connect their information networks with leading public clouds including Microsoft Azure and Amazon AWS. Progent can help you to design and administer hybrid environments that support Windows and Linux operating systems and applications in both cloud-centric solutions or in hybrid network models that seamlessly combine local resources as well as public cloud services. To help you to incorporate cloud services with networks, Progent can provide a variety of cloud migration support services such as Microsoft Azure enterprise hybrid cloud planning and integration consulting, Amazon AWS cloud integration, and Amazon Web Marketing Service development and troubleshooting. Progent has more than two decades of background providing advanced consulting services online, and Progent can make sure you complete your cloud migration initiatives quickly and affordably.

  • Columbus Consulting Support for IT Support Companies Consulting Services for IT Support Companies near Columbus - Seamless Short-Term IT Support Augmentation Columbus, GA

  • Fault Tolerant Load Balancing IT Services
    Fault Tolerant Load Balancing IT Consultants

    Progent offers high availability load balancing consulting covering network load balancing, load balanced applications, LAN/WAN backbone routing, and content dispatching technology including Cisco Content Engine. High availability load balancing providers for which Progent offers consulting services include Microsoft Windows 2003 Server Network Load Balancing Manager, Citrix Access Suite and Presentation Server, Cisco CSS, Cisco Content Engine and LocalDirector 400 series, and F5 Networks BIG-IP.

  • 24/7/365 Email Link Protection Consultant Services
  • Computer Consulting Services Cisco Panama City Cisco Support Companies
  • Consulting Expertise for Network Support Firms nearby Vacaville - Seamless Short-Term Support Team Augmentation Vacaville California Fairfield, US Consulting Support for IT Support Providers in Vacaville - Seamless Short-Term Support Staff Help
  • Desktop Engineer Full-Time Jobs Newark, CA Top Microsoft MCP Support Contractor Fremont
  • Detroit Locky Ransomware Cleanup Detroit, Wayne County Detroit Crypto-Ransomware Business Restoration Detroit, Wayne County, USA
  • Flexential Colocation Center Consult Flexential Internet Data Center Services
  • Fort Lauderdale, FL Ransomware System Rebuild NotPetya Ransomware Hot Line Fort Lauderdale Tamarac
  • Hartford, CT Ransomware Rebuild Hartford Netwalker Ransomware Hot Line
  • Hybrid IT Network Consultancy Remote IT Consultants Hybrid IT Network

  • ProSight Network Infrastructure Management Technology Consulting Services
    IP Address Management Technology Consulting

    Progent's ProSight WAN Watch is a network infrastructure management service that makes it simple and inexpensive for small and mid-sized businesses to map out, monitor, reconfigure and troubleshoot their networking hardware such as routers, firewalls, and wireless controllers plus servers, endpoints and other devices. Incorporating state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch makes sure that infrastructure topology maps are always current, captures and manages the configuration information of virtually all devices connected to your network, monitors performance, and generates alerts when issues are detected. By automating complex network management processes, WAN Watch can cut hours off common tasks like network mapping, expanding your network, finding devices that require important updates, or resolving performance problems.

  • IT Staff Augmentation for IT Support Organizations Porto Alegre-Gravataí Porto Alegre Temporary IT Staffing Help Porto Alegre, State of Rio Grande do Sul
  • Immediate Columbus Ryuk Crypto-Ransomware Documentation Columbus Georgia Columbus Ryuk Ransomware Forensics Investigation
  • Londrina Dynamics GP Upgrades Consultants Londrina Microsoft Dynamics GP-Great Plains Upgrades Support Londrina, Estado do Paraná
  • MS Dynamics GP Oklahoma CIty Vender - Business Intelligence Development Oklahoma County Microsoft Dynamics GP Oklahoma CIty VAR - SQL Server Outsourcing Oklahoma City, Tinker Air Force Base

  • Aironet Wave 2 Wi-Fi AP Technology Consulting
    Consulting Aironet 1700 Access Point

    Progent's Cisco CCIE-certified wireless network infrastructure experts can provide online or on-premises configuration and troubleshooting services to help your organization to design, implement, upgrade, tune, manage and debug Aironet wireless AP deployments of any size or topology. Progent's Cisco wireless controller experts can also assist you to combine your wireless ecosystem with your wired network infrastructure and cloud-based resources to build a seamless enterprise-wide connectivity solution that is simple to manage and scale. Progent also can provide affordable wireless site surveys to assist you to determine the most efficient selection, placement and setup of Aironet wireless APs to accommodate your unique workplace layout, building structure, and expected workloads.

  • Manhattan Beach At Home Workers Video Conferencing Solutions Consulting Experts Manhattan Beach-El Segundo, CA, USA Offsite Workforce Manhattan Beach Consulting - Voice/Video Conferencing Technology Consulting
  • Melbourne, VIC Melbourne Remote Workforce Cloud Integration Systems Consultants At Home Workers Consulting Experts - Melbourne - Cloud Integration Solutions Consulting Experts Melbourne
  • Microsoft Computer Network Consultant Bridgeport Support Firms Help Desk Bridgeport, Fairfield County
  • Microsoft SQL Server Server Setup Jundiai, State of São Paulo SQL Server Network Support Consultants Jundiai
  • Microsoft SharePoint Server 2007 Troubleshooting Rio de Janeiro, RJ Rio de Janeiro Microsoft SharePoint Server Technology Consulting Services
  • Microsoft Teams with SharePoint Online Consultants Specialists Microsoft Teams PSTN Gateway
  • Microsoft VoIP Consultants Microsoft VoIP Professionals
  • Minneapolis Ryuk Ransomware Forensics Analysis Minneapolis Minnesota Minneapolis Ransomware Forensics Investigation Minneapolis Minnesota

  • Engineers HP Lights-Out 100c Remote Management Card
    24/7/365 Dell DRAC Consultants

    Remote management cards give IT administrators full control of a server without the need for a personal presence. Through remote management cards, all console screen information plus keyboard and mouse functionality are transferred to a remote session to an IT professional who can be situated anywhere in the world. Progent's Microsoft and Cisco certified engineers can help you to plan, deploy, and support a high-availability business network that includes remote server management cards and Progent can utilize these remote management cards to provide efficient off-site technical help. Progent is familiar with a variety of remote management cards including Aten remote management cards, American Megatrends MegaRAC remote server management cards, Dell DRAC cards, HP Lights-Out 100c remote server management cards, and Peppercon eRIC remote management cards.

  • ProSight Email Zero Hour Protection Professional
  • Monterey Offsite Workforce Endpoint Security Systems Consulting and Support Services Pacific Grove Work at Home Employees Guidance in Monterey - Security Systems Expertise Pacific Grove
  • Montgomery, AL Consulting Experts for Montgomery IT Service Organizations Consulting Experts for Montgomery IT Service Companies Montgomery Mobile

  • Emergency Amazon S3 integration Contract Programmer
    Programming Company Amazon AWS enterprise hybrid cloud solutions

    Progent offers affordable online consulting to help businesses of any size to integrate Amazon Web Services (AWS) cloud services such as Elastic Compute Cloud (EC2) for virtual machine hosting, Amazon Simple Storage Service (Amazon S3), and Amazon Glacier. Progent can help you with every aspect of Amazon AWS integration including requirements analysis, readiness evaluation, architectural design, testing, deployment, centralized administration, performance optimization, software license management, backup/restore solutions, and security.

  • Montreal Work at Home Employees Connectivity Solutions Consulting Experts Montreal, Quebec Montreal Remote Workers Consulting in Montreal - Integration Solutions Consulting
  • Consultancy ProSight Email Denial of Service Protection
  • Online Help Microsoft Activesync Wireless Information Technology Consulting
  • Polk County Iowa Offsite Workforce Assistance near me in Des Moines - Collaboration Solutions Consulting and Support Services Remote Workers Des Moines Consulting Experts - Collaboration Systems Consulting Services Des Moines, Polk County

  • Online Support Services Call Center Management Services
    Call Desk Outsourcing Services Remote Technical Support

    Progent's Co-managed Help Desk service allows your IT organization to split responsibilities for Help Desk support seamlessly between your IT staff and Progent's large roster of seasoned technical support technicians and matter experts (SMEs). Progent's Help Desk Co-management service is a collaborative support solution built around ConnectWise Manage, the top shared PSA platform for handling end-user service requests, ticket lifecycle, responsibility, progress tracking, and metrics.

  • Remote Workforce Naples Consultants - Collaboration Solutions Assistance Naples-Bonita Springs, Florida Work at Home Employees Expertise - Naples - Collaboration Systems Assistance Naples-North Naples
  • SQL Network Administration Virginia 24-7 SQL Tech Virginia
  • SQL Server Upgrade Savannah, GA SQL 2012 On-site IT Support Savannah Garden City, USA
  • SentinelOne Endpoint Protection Consultancy SentinelOne Endpoint Protection Consultant

  • Microsoft Experts Computer Engineer Office SharePoint Server 2016
    Outsourcing Microsoft Office SharePoint Server 2013

    Progent's Microsoft-certified consultants offer small and midsize businesses computer consulting, support, and repair services for Microsoft SharePoint Portal Server 2003. Microsoft Office SharePoint Portal Server is an enterprise portal platform for efficiently connecting people, groups and data. SharePoint Portal Server provides a central location for your workers or clients to access, manage, share and manipulate relevant information, documents, and software and to communicate with one another. It allows faster and more intelligent decisions, more effective access across teams and more streamlined business processes. The primary objective of SharePoint Server is to gather together, in a productive way, all of the diverse sources of information available inside and outside an organization. Windows SharePoint Services connect employees, clients, teams and projects with the information they've created in a manner that makes data easy to locate, retrieve and apply.

  • Slackware Linux, Sun Solaris, UNIX Computer Consultant 24/7 Debian Linux, Sun Solaris, UNIX Consulting Services Jundiai

  • Aironet Wireless Access Point Support Outsourcing
    Aironet 4800 Access Point Engineer

    Progent's Cisco certified Wi-Fi consultants offer affordable remote and on-premises help for both legacy and modern Wave 2 Aironet wireless access points and Progent can assist your business to plan and maintain Wi-Fi solutions that include indoor and outside/ruggedized Aironet access points.

  • Snatch Ransomware Hot Line Santos, São Paulo Lockbit Ransomware Hot Line

  • Consultants Google Cloud Backup
    Professionals Google Cloud AI Building Blocks

    Progent offers affordable remote and onsite consulting to help organizations of any size to migrate any portion of their critical network infrastructure to Google Cloud Platform (GCP). This can save management hassle and hardware costs and allow access to Google's cutting edge AI and machine learning tools. Progent can assist you with every aspect of Google Cloud Platform migration and troubleshooting including needs analysis, readiness assessment, system design and review, pilot testing, deployment, centralized administration, performance tuning, licensing management, disaster recovery mechanisms, and security.

  • Southlake At Home Workforce Help Desk Call Center Outsourcing Guidance Southlake-Irving, TX At Home Workforce Southlake Consulting and Support Services - Call Desk Outsourcing Consulting Southlake-Bedford, United States
  • Spartanburg-Greer, South Carolina, U.S.A. Spartanburg WannaCry Ransomware Operational Recovery Spartanburg Maze Ransomware Rollback Spartanburg-Greer, South Carolina, U.S.A.
  • Telecommuters Eugene Consulting Experts - VoIP Technology Consulting Experts Eugene Springfield Eugene At Home Workers IP Voice Solutions Consultants Eugene, Lane County, United States
  • Teleworkers Assistance nearby Alpharetta - Cloud Solutions Consulting and Support Services Alpharetta-Johns Creek Work at Home Employees Consultants near Alpharetta - Cloud Technology Consultants Alpharetta-Johns Creek

  • Information Technology Consulting Fortinet FortiGate Firewalls
    Fortinet 200 Series Firewalls Network Consulting

    Fortinet next-generation firewalls (NGFWs) are industry leaders in delivering top performance for SSL inspection. Progent's Fortinet firewall experts can assist your business to configure your Fortinet FortiGate security appliances to safeguard your IT assets at the network edge, within the data center core, at branches, and at the cloud edge.

  • Uniondale Sodinokibi Crypto-Ransomware Business-Recovery Uniondale-Long Island Uniondale MongoLock Crypto-Ransomware Repair Uniondale-Hempstead
  • Work at Home Employees Bellevue Expertise - Call Desk Augmentation Consulting Bellevue, WA Bellevue, United States Bellevue At Home Workforce Help Desk Call Center Augmentation Consulting Services

  • Hornetsecurity Altaro M365 OneDrive Backup Support and Help
    Technical Support Hornetsecurity Altaro 365 Total SharePoint Backup

    Progent is a certified Hornetsecurity/Altaro partner and can plan, install, and manage an implementation of 365 Total Backup to preserve your Microsoft 365 mailboxes, files residing within your organization's OneDrive Accounts and SharePoint sites, user and group Teams Chats, plus files on Windows-powered laptops and desktops.

  • Top ProSight Email Spoofing Protection Engineer
  • Work at Home Employees Clearwater Consultants - Voice/Video Conferencing Solutions Expertise Clearwater, FL, United States Immediate Clearwater Work from Home Employees Video Conferencing Technology Guidance Clearwater St Petersburg
  • Cloud Protection for Email Specialists
  • Work from Home Employees Consultants in Skokie - Video Conferencing Systems Guidance Skokie-Lincolnshire, America 24 Hour Skokie Work at Home Employees Voice/Video Conferencing Systems Consulting Experts
  • Work from Home Employees Consultants nearby Albany - Endpoint Security Systems Consulting Experts Albany, USA Work at Home Employees Albany Consultants - Cybersecurity Systems Consulting Experts Albany-Troy, New York

  • © 2002-2025 Progent Corporation. All rights reserved.