ProSight Email Guard Spam and Content Filtering ConsultantsThe vast majority of email is spam, and the vast majority of successful cyber attacks begin with malicious email. Protecting your email, both incoming and outgoing, should be a top priority for any business. Progent has developed partnerships with developers of the industry's most advanced email security technology in order to provide small and mid-size organizations ProSight Email Guard, an affordable multi-tiered email security solution that incorporates cloud resources and local gateway hardware to deliver comprehensive protection against spam, viruses, DoS attacks, and other email-borne malware. ProSight Email Guard's on-premises security gateway enables advanced features such as email encryption, outbound content policy enforcement, and data leakage protection to keep sensitive and private information going beyond your firewall. ProSight Email Guard's content filtering also helps keep your business off block lists by intercepting outbound spam and viruses.

Progent's email security experts can assist you to plan and implement your ProSight Email Guard solution, help you decide which email security gateway device or devices are right for your situation, configure your email gateway, set up ProSight Email Guard to work with Microsoft Exchange or any other email system, define policies for bi-directional email filtering, install outbound email encryption, design a robust network architecture that can feature clustered email security gateways, set up cloud-based management with delegated administration, and provide training, continuing consulting expertise, and as-needed technical support.

Major Features of ProSight Email Guard
ProSight Email Guard is an end-to-end solution for protecting inbound and outbound email. ProSight Email Guard includes these major features:

  • Spam Filtering uses heuristic-intelligence to analyze IP addresses and message content
  • Zero-hour Virus Defense provides multi-level scanning and real-time updates
  • Pre-filtering in the Cloud blocks most email-borne threats before they reach your security perimeter
  • Local Email Gateway Appliance is purpose-built for in-depth bi-directional filtering
  • Cloud-based Management supports delegated administration rights to spread responsibility for policy and configuration control
  • Outbound Email Filtering offers policy-based Content Filtering for Data Loss Prevention (DLP) and Data Leakage Protection and stops outbound spam and malware
  • Email Encryption utilizes 256-bit key Advanced Encryption Standard (AES) and automatically protects policy-compliant outbound email
  • Rate Monitoring and Control blocks spambots and throttles outbound email rate based on IP address/destination address
  • DoS Attack Defense prevents your network from being overwhelmed by malicious spam
  • DHA protection protects email addresses from being stolen and sold by spammers
  • Low Rate of False Positives scores an industry-low of 0.01% before optimization
  • Inside-the-Perimeter Email Protection with Microsoft Exchange protects the email that remains inside your security perimeter and never reaches your gateway
ProSight Email Guard uses an efficient and effective hybrid design model that deploys both cloud and on-premises resources to deliver leading-edge security, throughput, and ease of management in a solution that fits the budgets of small and mid-sized organizations.

ProSight Email Guard enhances the availability of your email environment thanks to the hardened, geo-dispersed datacenters that support the platform's cloud infrastructure. With 99.999 percent uptime, this cloud-based ecosystem can deliver far higher availability than the email infrastructure that small or mid-size businesses can afford to build or maintain. If your on-premises email server or in-house network stops working, Progent's Microsoft-certified consultants and Cisco-certified network experts can provide immediate online assistance to get back on line fast.

Inbound Email Security
Inbound email protected by ProSight Email Guard arrives via the Cloud Protection Layer, which utilizes world-class datacenters and advanced computing grids to filter out 95% of spam and the majority of email that carries malware. The email that passes through this initial line of defense then undergoes in-depth inspection by a local security gateway appliance that performs multi-tier inspection including optical character recognition (OCR) analysis to detect image-based spam. Both the Cloud Protection layer and the email security gateway are kept up to date continuously by the Update Center, a cloud-based technology center staffed round the clock by security professionals to provide zero-hour defense against new threats. For disaster recovery scenarios, the Cloud Protection Layer can provide email spooling, which can cache your inbound email for as long as 96 hours or re-route it to a temporary destination while you repair local datacenter.

ProSight Email Guard's Inbound Email Protection

ProSight Email Guard offers in-depth zero-hour protection for inbound email

Outbound Email Security
ProSight Email Guard's outbound filtering offers data leakage protection and clocks outgoing spam and malware, which helps keep your company off email black lists. Policy-based content filtering keeps users from unknowingly or intentionally divulging sensitive or private information contained in email messages. Leaked information can violate regulatory mandates and result in identity theft, litigation, or loss of intellectual property. The ProSight Email Guard security gateway comes with a set of pre-configured content filters such as HIPAA compliance and Social Security and credit card numbers. You can also create custom filtering policies based on specified keywords, categories, or other factors. Filtering policies can cause affected emails to be automatically blocked, quarantined or encrypted.

ProSight Email Guard's Outound Email Protection

ProSight Email Guard's outbound protection stops data leakage and blocks outbound spam and malware

Outbound Email Encryption
ProSight Email Guard uses a cloud-based Message Center to encrypt and deliver outbound email. You can configure multiple policies for deciding which emails should be encrypted, and the entire process is handled automatically. The on-premises security gateway sends email to be encrypted to the Message Center using a secure TLS connection. There the messages are encrypted using the advanced AES-256 standard and stored for retrieval. The Message Center sends a notice to the recipient and includes a web link that permits the recipient to retrieve the decrypted email. Any replies are also encrypted at the Message Center.

Email Guard's Outound Encryption

ProSight Email Guard offers policy-based encryption for outbound email

A plug-in available for Microsoft Exchange makes it possible to encrypt emails individually. For details about ProSight Email Guard outbound email encryption, refer to ProSight Email Guard technology and architecture.

What Threats Can ProSight Email Guard Defend Against?
ProSight Email Guard's cloud-based filtering resources, technology centers, and email security gateway appliances use a variety of open source tools and proprietary techniques developed by Progent's partners to protect against spam and other email-based threats. Anti-spam/virus techniques and the threats that can be blocked include:

Techniques Used Threats Blocked
IP Reputation Analysis
Sender Authentication
Recipient Verification
Predictive Sender Profiling
Virus Databases
Pre-Defined and Custom Policies
Rate Control
Signature Analysis
Intent Analysis
Image Analysis
Bayesian Analysis
Spam Rules Scoring Thresholds
Spam
Viruses
Trojans
Worms
Polymorphic Viruses
Spoofing Phishing
Denial of Service (DoS) Attacks
Directory Harvest Attacks (DHAs)
Spyware

For a glossary of email security terms, visit Glossary of Terms Related to Spam Filtering Technology.

How Progent Can help You with ProSight Email Guard
Progent's certified email integration and security consultants can help you design a complete email security solution that defends against email-based attacks and helps you comply with government and industry security requirements. Progent can assist you to implement an efficient deployment of ProSight Email Guard, optimize your system according to your business needs, institute auditing and reporting processes based on best practices, educate your end users on how to avoid malware propagation, and develop sound policies for email security and content. In addition, Progent's Cisco CCIE-certified consultants can help you plan, implement and troubleshoot a robust on-premises network infrastructure to support your email solution and efficiently integrate your local IT resources with ProSight Email Guard's cloud-based resources and services.

Download the ProSight Email Guard Datasheet
To view or download the ProSight Email Guard datasheet, click: ProSight Email Guard Spam and Email Content Filtering Datasheet (94 Kb PDF file).

Other Managed Services and Network Auditing Packages Available from Progent
In addition to ProSight Email Guard, Progent's ProSight suite of network monitoring and management services includes other value-priced services that cover major facets of network management including endpoint security, cloud-based backup/restore, network infrastructure management, virtual server hosting, and IT asset documentation management. By partnering with leading technology innovators, Progent can offer small and mid-size organizations the advantages of the same world-class remote monitoring technology used by global enterprises. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes SentinelOne's cutting edge behavior-based analysis technology to defend physical and virtual endpoints against new malware attacks like ransomware and email phishing, which routinely get by traditional signature-based AV tools. ProSight ASM protects local and cloud-based resources and offers a single platform to manage the complete threat lifecycle including protection, detection, mitigation, remediation, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Physical and Virtual Endpoint Security and Exchange Email Filtering
    ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer security for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, endpoint control, and web filtering through cutting-edge tools packaged within a single agent managed from a unified console. Progent's security and virtualization consultants can assist you to design and configure a ProSight ESP environment that addresses your company's unique needs and that helps you demonstrate compliance with legal and industry information protection standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate attention. Progent's consultants can also assist you to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.

  • ProSight Data Protection Services: Managed Backup and Disaster Recovery Services
    Progent has partnered with advanced backup/restore technology companies to create ProSight Data Protection Services (DPS), a family of subscription-based management outsourcing plans that deliver backup-as-a-service. ProSight DPS services automate and track your backup processes and enable transparent backup and fast recovery of vital files, applications, system images, and virtual machines. ProSight DPS helps your business avoid data loss caused by hardware breakdown, natural calamities, fire, malware like ransomware, human error, ill-intentioned employees, or software bugs. Managed services available in the ProSight Data Protection Services product family include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight DPS ECHO Backup based on Barracuda purpose-built hardware, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent consultant can help you to determine which of these fully managed services are best suited for your network.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for smaller businesses to map out, monitor, enhance and troubleshoot their networking appliances like routers and switches, firewalls, and wireless controllers plus servers, printers, client computers and other networked devices. Using cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch makes sure that infrastructure topology maps are kept current, copies and manages the configuration information of virtually all devices on your network, monitors performance, and sends alerts when issues are detected. By automating time-consuming management processes, ProSight WAN Watch can cut hours off ordinary chores such as network mapping, reconfiguring your network, finding devices that require important software patches, or resolving performance problems. Learn more about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that incorporates advanced remote monitoring and management technology to help keep your network running at peak levels by tracking the health of critical assets that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is transmitted automatically to your specified IT personnel and your Progent engineering consultant so any looming problems can be resolved before they can impact productivity. Learn more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host configured and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported easily to an alternate hardware environment without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and protect data about your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be alerted automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as half of time wasted searching for critical information about your network. ProSight IT Asset Management features a common repository for storing and sharing all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether you're making enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Read more about Progent's ProSight IT Asset Management service.

  • Progent Active Protection Against Ransomware: Machine Learning-based Ransomware Identification and Cleanup
    Progent's Active Protection Against Ransomware is an endpoint protection (EPP) service that utilizes next generation behavior-based machine learning technology to defend endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily get by traditional signature-matching anti-virus products. Progent Active Security Monitoring services safeguard local and cloud resources and provides a single platform to automate the entire malware attack lifecycle including filtering, identification, mitigation, cleanup, and forensics. Top features include single-click rollback using Windows VSS and automatic system-wide immunization against new attacks. Find out more about Progent's ransomware protection and cleanup services.

  • Progent's Outsourced/Shared Help Desk: Support Desk Managed Services
    Progent's Help Desk managed services permit your IT team to outsource Help Desk services to Progent or divide activity for Service Desk support transparently between your in-house support resources and Progent's extensive roster of IT service engineers and subject matter experts (SMEs). Progent's Co-managed Help Desk Service offers a smooth extension of your core network support staff. End user interaction with the Service Desk, provision of support services, escalation, trouble ticket creation and tracking, efficiency metrics, and management of the support database are cohesive whether issues are taken care of by your in-house support resources, by Progent's team, or both. Read more about Progent's outsourced/co-managed Help Desk services.

  • Patch Management: Software/Firmware Update Management Services
    Progent's managed services for patch management offer organizations of any size a versatile and cost-effective alternative for assessing, validating, scheduling, applying, and documenting updates to your dynamic IT network. Besides optimizing the security and reliability of your IT network, Progent's patch management services free up time for your IT staff to concentrate on more strategic initiatives and activities that deliver maximum business value from your network. Read more about Progent's patch management support services.

  • ProSight Duo Two-Factor Authentication: ID Confirmation, Endpoint Policy Enforcement, and Protected Single Sign-on
    Progent's Duo MFA services utilize Cisco's Duo cloud technology to defend against password theft through the use of two-factor authentication. Duo supports single-tap identity confirmation with iOS, Google Android, and other personal devices. Using Duo 2FA, whenever you sign into a secured application and enter your password you are requested to confirm who you are via a device that only you possess and that is accessed using a separate network channel. A broad range of out-of-band devices can be used as this second form of ID validation such as an iPhone or Android or wearable, a hardware token, a landline telephone, etc. You can register multiple verification devices. To find out more about Duo identity authentication services, go to Duo MFA two-factor authentication (2FA) services for access security.

  • ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Platforms
    ProSight Reporting is a growing suite of in-depth reporting tools created to integrate with the industry's top ticketing and network monitoring platforms such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and utilizes color coding to surface and contextualize key issues such as inconsistent support follow-up or endpoints with missing patches. By identifying ticketing or network health concerns clearly and in near-real time, ProSight Reporting enhances network value, lowers management hassle, and saves money. For details, visit ProSight Reporting for ticketing and network monitoring platforms.
Download Progent's 10 Benefits of Managed IT Services White Paper
To view a white paper describing why managed services are rapidly takingthe place of the old break/fix model of IT support outsourcing for small and mid-size organizations, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost way for small and medium-size organizations to obtain an objective evaluation of the health of their network. Based on some of the leading remote monitoring and management tools in the industry, and overseen by Progent's certified team of information technology professionals, ProSight Network Audits show you how closely the configuration of your essential network assets adhere to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide instant ROI such as a more manageable Active Directory (AD) environment. Both versions also include a year of state-of-the-art remote network monitoring and management (RMM). Advantages can include simpler management, better compliance with government and industry security regulations, more efficient utilization of IT resources, faster troubleshooting, more reliable backup and recovery, and higher availability. Read more about ProSight Network Audits network infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service centered on a brief phone discussion with a Progent information assurance consultant. The interview is intended to help assess your company's ability either to defend against ransomware or recover rapidly after an assault by a ransomware variant such as Ryuk, Maze, Sodinokibi, Netwalker, DopplePaymer, LockBit or Nephilim. Progent will consult with you personally to collect information about your current antivirus tools and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can apply best practices to build an efficient AV and backup/recovery environment that minimizes your exposure to ransomware and meets your business requirements. For more information, refer to Progent's ProSight Ransomware Preparedness Report Service.

Contact Progent for Email Solutions
If you want to find out more about using Progent's ProSight Email Guard managed services or if you need Progent's help to troubleshoot or enhance your email system, call 800-993-9400 or visit Contact Progent.



An index of content::

  • 24 Hour OS X Security IT Consultant Apple Macintosh Network Security Consultants
  • Email Allow Lists Consultant Services
  • 24-Hour Telecommuters Consulting near Omaha - Data Protection Technology Consulting Services Omaha, Douglas County 24/7/365 Omaha Work from Home Employees Data Protection Systems Consulting
  • 24/7 Offsite Workforce Lower Manhattan Consultants - Conferencing Solutions Consultants Lower Manhattan, New York Lower Manhattan Work from Home Employees Conferencing Solutions Consultants New York City-East Village, New York
  • 24/7 Sarasota, Florida Consolidation Sarasota, Florida Support Group
  • 24/7/365 At Home Workforce Assistance nearby Tukwila - Setup Consulting Tukwila, WA Top Quality At Home Workforce Tukwila Consulting and Support Services - Infrastructure Consulting Services Tukwila Washington, USA
  • 24x7 Long Beach At Home Workers Cloud Integration Technology Expertise Long Beach California Work from Home Employees Consultants near me in Long Beach - Cloud Integration Systems Consulting Experts Long Beach California
  • After Hours Monterey County Network Consult Monterey, California Network System Support Consultant
  • At Home Workers Guidance - Bellevue - Cloud Technology Expertise Bellevue Bellevue Telecommuters Cloud Integration Technology Consulting Services King County Washington
  • BlackBerry Smartphone Contractor Las Vegas Nevada Las Vegas, Clark County BlackBerry Synchronization Information Technology Outsourcing Company
  • Cisco Computer Installation Jacksonville, FL, Miami, FL, Saint Petersburg, FL, Orlando, FL Cisco Computer Service Companies Florida
  • Computer Expert Exchange Server 2010 Microsoft Exchange Server 2013 Tech Support For Small Business Campinas
  • Connecticut Implementation Services Connecticut - Bridgeport, CT, New Haven, CT, Hartford, CT, Stamford, CT Networking Specialist
  • Email Scoring Thresholds Consultancy
  • Firewall Evaluation Oklahoma Firewall Compliance Audit
  • Fresno At Home Workforce Cloud Solutions Consulting Fresno, CA Fresno Teleworkers Cloud Technology Consulting Services
  • Garland Ransomware Forensics Garland Texas 24x7x365 Garland Maze Ransomware Forensics Investigation Dallas Fort Worth Metroplex
  • Lakeland Ransomware File-Recovery Lakeland-Plant City, Florida Lakeland Ryuk Ransomware Malware Removal
  • Largest Help Desk Consultant Home Based Jobs California Central Valley, U.S.A. Microsoft Consultant Contractor Job Davis California
  • Microsoft Exchange Information Technology Outsourcing Companies Exchange Server 2016 Consultancy Firm
  • NYC Emergency Lower Manhattan Ransomware Cleanup Ransomware Remediation Services Lower Manhattan-SoHo, NY
  • Nashville Information Technology Outsourcing Companies Nashville, TN Migration Help
  • Professionals ProSight Email Spoofing Protection
  • Network Consulting Firms Florida IT Consultant Maine
  • Offsite Workforce Montreal Consulting Experts - Conferencing Systems Consulting and Support Services Montreal, Quebec Montreal Telecommuters Conferencing Systems Guidance
  • Omaha Nebraska, United States System Consultant Windows Windows Computer Network Support Firms Nebraska, United States
  • Remote Workers Barra da Tijuca Consulting and Support Services - Endpoint Management Systems Expertise Barra Barra da Tijuca, Estado do Rio de Janeiro 24/7/365 Barra da Tijuca At Home Workforce Management Tools Assistance
  • Remote Workforce Edmonton Consulting - Setup Guidance Alberta Edmonton Work at Home Employees Integration Expertise Edmonton
  • Ribeirao Preto, State of São Paulo Teleworkers Ribeirão Preto Consulting - Connectivity Solutions Consulting Experts Ribeirão Preto, São Paulo Work from Home Employees Ribeirão Preto Consulting Experts - Connectivity Solutions Consulting
  • SQL 2012 Networking Company Limeira, Campinas Campinas Microsoft SQL 2008 On-site IT Support
  • SQL Server 2019 Computer Network Support Company Consulting Services Firm Microsoft SQL Server 2017 Fargo-Cass County, North Dakota
  • Short-Term IT Support Staffing Support Expertise Southfield, MI, United States Short-Term IT Staffing Support Consulting Specialist Southfield-Plymouth, Michigan

  • CISM Security Services
    Emergency CISM Security Management Consultant

    Progent offers the services of CISM Premier security consultants. The Certified Information Security Manager (CISM) committee describes the core capabilities and worldwide standards of skill that IT security professionals are expected to master. It provides business management the assurance that consultants who have qualified for their CISM credential possess the background and knowledge to provide effective security administration and consulting services.

  • Small Business IT Outsourcing Firms Small Business Small Office Support Outsourcing Services

  • Windows and UNIX Professional
    Windows and Solaris Technology Consulting

    If your company operates a UNIX, Linux, or Sun Solaris network or a multi-OS computer system, Progent's CISM and ISSAP-premier consultants can help your whole organization in a wide array of security areas including security administration procedures, security design and strategies, connection management products and techniques, applications development security, operations security, hardware security, communications, network and web security, and business continuity planning. CISM and ISSAP define the core competencies and worldwide standards of knowledge that information security managers are required to possess. These accreditations provide IT management the confidence that consultants who have achieved their CISM, CISSP or ISSAP certification have demonstrated the background and knowledge to deliver effective security management and consulting help.

  • Teleworkers Niterói Consulting and Support Services - Cybersecurity Systems Consulting Niterói At Home Workforce Guidance near Niterói - Cybersecurity Solutions Assistance
  • Windows Server 2012 R2 Technical Support Firm Windows Server 2016 Small Business IT Outsourcing Firm
  • Windows Server 2016 IT Outsourcing Firm New England Windows 2008 Server Small Business Networking New England

  • © 2002-2022 Progent Corporation. All rights reserved.