Email security involves a lot of buzzwords. What do they mean?
For a glossary of common email security terms, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Email Guard?
Email Guard is a spam filtering service and email security solution designed for small and mid-sized businesses. Email Guard combines the world-class cloud infrastructure and services of top data security companies with proven on-premises security gateway hardware to protect inbound and outbound email against spam, viruses and other email-borne threats and also offers outbound data protection via content filtering and encryption. In addition, Email Guard's centralized monitoring, management and reporting tools help you administer and troubleshoot your email system and define and enforce corporate email policy.

Back to top

What is the danger of email-based attacks?
About 70% of email is spam. 3% of emails have malicious attachments. 91% of successful hacks begin with email attacks. Spam lowers productivity. Viruses and advanced persistent threats (APTs) can steal and information and money, and shut down your network. Poorly secured email systems can violate government regulatory requirements and industry standards and expose you to litigation.

Back to top

What is the architecture of Email Guard's security solution?
Email Guard uses a hybrid architecture that includes cloud-based resources as well as on-premises email security gateway hardware. The Cloud Protection Layer prevents 95% of spam and the vast majority of viruses and other malware from ever reaching your security perimeter. The on-premises security gateway appliance provides deep, multi-level inspection for inbound threats including spam embedded within images. The security gateway also offers spam and virus protection, policy based content filtering, rate control, and cloud-assisted encryption for outbound email. In addition, Email Guard's architecture provides centralized web-based administration with comprehensive monitoring  and reporting plus options for role-based management delegation. A cloud-based Update Center enables zero-hour defense against newly discovered threats and keeps the Cloud Protection Layer and the security gateway up to date without management intervention.

For a detailed discussion of Email Guard's architecture, see Email Guard technology and architecture.

Back to top

Why does Email Guard use a hybrid design with cloud services and on-premises hardware?
The combination of cloud-based and on-premises resources used by Email Guard provides better security, performance and resilience than would be possible with a one-dimensional architecture. For zero-hour security, the cloud-based Update Center provides 24x7x365 monitoring of worldwide threats, develops defenses, and distributes updates in real time to Email Guard's local security gateway appliance. In addition, the Cloud Protection Layer blocks the vast majority of spam and malware before it ever reaches your security perimeter, which enhances both security and system performance. Security and performance are also improved by the ability of the purpose-built local gateway to perform deep analysis of email traffic, including image scanning, before traffic reaches your email server. To stabilize performance, the local security gateway offers rate control for inbound and outbound email. For resilience, Email Guard's Cloud Protection Layer offers spooling. If your local data center goes down, spooling allows you to store all your inbound email in the cloud for up to 96 hours or direct it to an alternative destination while you fix the problem.

Back to top

What email-based threats does Email Guard block?
The Email Guard security gateway provides consecutive security filters that include Denial of Service (DoS) and security protection, rate control, IP reputation analysis, sender authentication, recipient verification, virus protection, user-specified policy enforcement, signature analysis, intent analysis, image analysis, Bayesian analysis, and spam rules scoring. This results in fast, comprehensive email protection against spam, viruses, spoofing, phishing, directory harvest, and spyware attacks. For a glossary of these and other terms used in email security, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Progent's role in delivering the Email Guard solution?
Progent can help you plan your Email Guard deployment, recommend security gateway hardware appropriate for your expected workloads and security requirements, configure your gateway, integrate Email Guard with Exchange Server or any other email platform, define and configure policies for inbound spam and outbound content filtering, set up and test outbound encryption, design and implement a high-availability solution that can include clustered security gateways, set up an efficient management system that takes advantage of delegated administration, and provide training, ongoing consulting support and troubleshooting services.

Progent's Microsoft-certified consultants can provide Microsoft System Center Operations Manager consulting so you can monitor your entire email and network infrastructure and resolve potential problems before they impact network productivity. Progent's Cisco-certified CCIE network consultants can help you design, build and troubleshoot a network infrastructure that supports both the on-premises and cloud-based resources that make up your Email Guard ecosystem. Progent's CISSP-certified cybersecurity consultants can help you plan and validate a cohesive security environment that protects your business against email-borne, web-based and internal threats and that complies with government regulations, industry standards, and your own corporate policies.

Back to top

Why is it important to filter outbound email?
Outbound filtering provides two major benefits: data loss protection (DLP) and reputation protection. DLP stops sensitive information from leaking out of your business via careless emails. Leaked data can result in regulatory infractions, identity theft, and loss of competitive advantage. It can also lead to litigation. The Email Guard security gateway includes pre-defined content filters such as HIPAA, credit card numbers, and Social Security Numbers. Email Guard also allows you to create custom content filtering policies covering specified keywords, categories, or character sets. Content filtering policies can be configured to block, quarantine or encrypt messages automatically.

Outbound filtering can also block spam and viruses sent by internal computers that have been compromised, which is a serious vulnerability in BYOD (Bring Your Own Device) environments. Organizations which allow spam and viruses to be sent out can be placed on block lists, or "blacklisted". This loss of reputation can hurt productivity and profits.

Back to top

Why can't my firewall stop spam or Directory Harvest Attacks?
Conventional firewalls offer little or no protection against spam or Directory Harvest Attacks. Inbound email often passes through the firewall to your email server without regard for message content, message size or address, creating an opportunity for spam and viruses to enter and making your email system vulnerable to directory harvesting.

Back to top

How does Email Guard support email encryption?
Email Guard utilizes a cloud-based Message Center to handle the encryption and delivery of outbound email. Administrators can establish multiple policies for determining which emails are automatically encrypted. These are then sent securely over TLS to the Message Center where they are encrypted using AES-256 and stored for retrieval. The Message Center sends the intended recipient a notice that includes a URL to visit in order to retrieve the encrypted email. Once establishing a password, the recipient can read the encrypted message. Any replies are also encrypted at the Message Center. In addition, Email Guard includes a plug-in for Exchange Server which lets users choose to encrypt individual emails. For more details about how Email Guard encrypts outbound email, visit Email Guard technology and architecture.

Back to top

Is Email Guard difficult to manage?
Email Guard includes a browser-based management portal designed to be easy to use for administrators in small and mid-size organizations. The portal's dashboard offers centralized monitoring and control of hardware, services, policies and configurations, and keeps extensive health and performance statistics on inbound and outbound email. You can easily track by day or hour the number of inbound and outbound messages blocked, quarantined, and rate controlled; the inbound messages tagged and allowed; and the outbound messages sent, redirected, and encrypted. Granular policy control includes delegated domain administration, delegated help desk role, and individual user policy control. For more information about Email Guard's cloud-based management features, see Email Guard technology and architecture.

Back to top

What email platforms are supported by Email Guard?
Email Guard works with any on-premises email platform but offers some enhanced features when used with Microsoft Exchange Server, such as the Outlook client encryption add-in and the Exchange LDAP Accelerator.

Back to top

How does Email Guard impact email performance?
The hybrid architecture of Email Guard leverages the massive scale of cloud-based resources and the power of purpose-built gateway hardware to off-load almost all the work of email protection from the email server. On-premises gateways are available in a variety of models that offer performance that ranges from entry level to enterprise class, and gateways can be clustered for improved performance, as well as higher availability. You can configure Email Guard to deliver the performance you need, and you can easily expand your deployment as your needs grow.

Back to top

How does Email Guard avoid blocking legitimate email through false positives?
A false positive is a legitimate email quarantined as spam. The default policy configurations in Email Guard have a false positive rate of 0.01%, which is low by industry standards. Administrators have options to adjust the aggressiveness of Email Guard's spam filtering with techniques such as threshold scoring, but the surest way to prevent false positives is to build "allow lists" or "whitelists" that specify legitimate senders. Email Guard permits users to control spam scoring, Bayesian analysis, and allow lists at the personal level.

Back to top

How can I get help now with email security?
If your organization needs online or onsite help with any aspect email security:
Call 800-993-9400 or visit Contact Progent.

Back to top

Also See:



An index of content::

  • 24x7 Slackware Linux, Solaris, UNIX IT Consultant Appleton-Oshkosh, WI Support and Setup Gentoo Linux, Sun Solaris, UNIX Appleton-Appleton, WI
  • At Home Workforce Consulting near Monterey - Voice/Video Conferencing Systems Consulting Monterey California Monterey, U.S.A. Offsite Workforce Assistance near Monterey - Conferencing Solutions Assistance

  • 24-7 Microsoft Windows 11 Upgrade Security Consulting Firm
    Microsoft Windows 11 Consulting Services

    Progent's Windows 11 consulting experts offer a variety of services for Windows 11 including Microsoft 365 solutions, mobile device management, telecommuter connectivity, data and identity security, automated deployment, and Help Desk Call Center support.

  • Aurora Illinois Aurora Microsoft Dynamics GP Reporting Help Microsoft Dynamics GP Solution Provider in Aurora - Reporting Expert Aurora Batavia
  • CISSP Firewall Configuration Edison-Middlesex County, New Jersey CISSP Network Consultants
  • Technology Professional Cloud-managed Email Security
  • CISSP Information Technology Consulting Firewall Secure Milwaukee County Wisconsin
  • Cambridge Dharma Crypto-Ransomware Settlement Negotiation Expertise Cambridgeshire Cambridge Crypto-Ransomware Negotiation Services Cambridge, United Kingdom

  • Emergency Remote Workers Cloud Integration Help and Support
    Offsite Workforce Cloud Integration Online Support

    Progent can help small and mid-size companies to set up their at-home workforce with transparent access to cloud applications and services.

  • Charlotte, NC Urgent Microsoft SQL Server 2017 Computer Support Consultant Microsoft SQL 2008 Network Engineers Charlotte, NC, U.S.A.
  • Chatsworth-Simi Valley, CA Phone Support Services Microsoft Exchange 2010 Specialists Exchange 2010 Server Chatsworth-Simi Valley, California
  • Chattanooga, TN Computer Service Chattanooga-Hamilton County IT Technical Support Company
  • ProSight Email Guard Content Filtering Service Consult
  • Columbus, Muscogee County At Home Workforce Consulting Experts in Columbus - IP Voice Technology Consulting Columbus, Muscogee County Offsite Workforce Consulting and Support Services near Columbus - VoIP Technology Consulting Experts

  • Internet Security and Acceleration Server On-site Technical Support
    After Hours ISA 2004 Server Online Support

    Progent's Microsoft certified consultants offer small and medium sized companies consulting services for Microsoft Forefront Threat Management Gateway and ISA Servers. Microsoft's Forefront TMG and ISA Servers contain a full featured application-layer aware firewall that can secure your business system from attack by outside and inside sources. Forefront Threat Management Gateway and ISA Server perform thorough examination of Internet protocols such as HTTP, which allows these products to uncover many attacks that can elude ordinary firewalls. The combined firewall and VPN architecture of Forefront Threat Management Gateway and ISA Server support stateful filtering and monitoring of all VPN streams. ISA Servers are the mainstay of Microsoft's system security strategy, and Progent's Microsoft-certified engineers and CISSP, CISA and CISM certified security consultants can help you enhance your network security through experienced planning and deployment of Forefront Threat Management Gateway and Microsoft ISA Servers. Progent's Microsoft-certified engineers can assist your company to configure Microsoft Forefront TMG 2010, manage and troubleshoot any version of ISA Server, or upgrade from ISA Server to Microsoft Forefront TMG.

  • Consulting Services for San Rafael Network Support Companies San Rafael, US Consulting Expertise for San Rafael Network Service Companies Mill Valley, Corte Madera CA
  • Crypto Cleanup Services Chatsworth-Northridge Chatsworth Emergency Crypto-Ransomware Recovery Help Chatsworth-Calabasas, California
  • Specialists ProSight Email Security Gateway
  • Dynamics GP App Development Reporting Professional Dynamics GP Software Development
  • Exchange Design New Jersey Exchange Small Business IT Consulting Firms New Jersey
  • Fargo Crypto-Ransomware Vulnerability Assessment Fargo-Grand Forks, North Dakota Fargo-Williston, North Dakota 24/7/365 Fargo Crypto-Ransomware Ryuk Preparedness Report
  • Fremont California 24x7 Ransomware Cleanup and Recovery Ransomware Data Recovery Fremont Alameda County
  • Harrisburg CryptoLocker Recovery Harrisburg-Lancaster, Pennsylvania, America Harrisburg 24/7 CryptoLocker Recovery
  • Houston CISSP Information Technology Consulting Security Cybersecurity Firm Houston, TX
  • IT Consultant Microsoft SBS 2003 Professionals Microsoft Small Business Server 2011
  • IT Outsourcing Information Technology Manager Henderson Boulder City Mesquite, United States Remote Help Desk Systems Consultant Henderson, Clark County
  • Immediate Microsoft MCDBA Remote Consultant Telecommuter Jobs Buffalo Microsoft MCA Engineer Job Opening Erie County New York
  • Jacksonville Ransomware DopplePaymer Susceptibility Testing Jacksonville Florida Jacksonville Ransomware Ryuk Susceptibility Consultation Duval County Florida

  • Infor SyteLine CloudSuite Process Improvement Consultants
    Infor SyteLine CloudSuite 9.01 Engineers

    Infor CloudSuite Industrial, formerly known as SyteLine, is an ERP solution that incorporates more than 25 years of background helping manufacturing and distribution organizations to manage supply chains and improve the efficiency of key business processes in order to bring products to market fast and adhere to customer schedules consistently. Progent can provide the expertise of an ERP specialist with over 20 years of background with the Infor CloudSuite Industrial/SyteLine platform. Progent offers online or onsite consulting that spans from as-needed advice to end-to-end solution planning and project management. Sample services available from Progent for CloudSuite Industrial/SyteLine include installation, upgrades, process improvement, application development, CPQ, web site integration, troubleshooting, data conversion, Amazon AWS integration, training, and DBA services.

  • Email Guard DLP Consultants
  • Lincoln-Lancaster County Small Business IT Outsourcing Services Technical Support Outsource Lincoln
  • Long Beach Long Beach At Home Workforce Collaboration Technology Consulting Long Beach At Home Workforce Collaboration Systems Consulting Experts Long Beach California, US
  • Microsoft MCA Support Jobs San Jose Airport SJC Cupertino, CA Contractor Jobs Microsoft Consulting
  • Microsoft Network Specialist Downey California Cisco CCIE Online Support Downey Lakewood Bellflower, United States
  • Microsoft Windows Small Business Server Computer Consultant Professionals Microsoft Windows Small Business Server
  • On-site Support SharePoint 2010 Colorado Springs Colorado SharePoint 2013 Network Engineer Colorado Springs, El Paso County
  • Oracle Contract Development Oracle database Coder

  • Company-wide Standards for Best Practices Onsite and Remote Support
    24-Hour Computer Network Specialist Best Practices

    Progent's staff of Microsoft and Cisco Premier Certified consultants average longer than ten years of real-world industry background, at the front lines of IT support, executing a broad variety of technical tasks for a large mix of clients. Each Progent support professional shares a proven set of personal best practices which are incorporated into shared leading practices training that Progent instills in its consulting personnel. This guarantees that you get not only expert technical help, but also a support engineer with field-tested methods for using technical knowledge to solve real-world IT problems quickly.

  • Ottawa Work from Home Employees Security Systems Consulting Services Ottawa, ON At Home Workers Ottawa Consulting Experts - Endpoint Security Systems Guidance Ontario
  • RIM BlackBerry Computer Consultancy Lynnwood BlackBerry Synchronization Server Integrators
  • Remote Help Desk Phone Support Services Riverside County California Small Business Network Business Computer Server Companies Moreno Valley California
  • Remote Support Windows 7 Evaluation Windows 7 IT Consultant
  • Remote Workers Expertise nearby Salt Lake City - Cloud Integration Technology Consulting Salt Lake City Salt Lake City Ogden Clearfield Salt Lake City Telecommuters Cloud Integration Technology Consulting Services
  • Remote Workforce Vacaville Expertise - Help Desk Call Center Augmentation Consulting Experts Fairfield CA Work at Home Employees Assistance - Vacaville - Call Desk Augmentation Consulting Experts Vacaville Solano County

  • CISSP Certified Security Analyst Consultancy
    CISSP Certified Security Consulting

    Progent's CISSP-certified network security consultants can help businesses of all sizes with any aspect of IT security. Progent can create cost-effective security systems that guard a small office against advanced malware attacks or Progent can plan, deploy, and manage a comprehensive security environment for hybrid networks that support local, online, and mobile clients accessing IT resources spread over a mix of physical sites and various clouds.

  • Richmond Richmond Hermes Ransomware Remediation Richmond, Contra Costa County Richmond Crypto-Ransomware Repair Services
  • Ryuk Remote Ransomware Removal Services Jacksonville Jacksonville Arlington 24 Hour Jacksonville WannaCry Crypto-Ransomware Data-Recovery Jacksonville Arlington, US
  • SQL 2014 Manager Allentown Pennsylvania Microsoft SQL Server 2016 Integration Specialists Allentown, PA, U.S.A.
  • Sacramento At Home Workforce Support Guidance Sacramento Airport SMF Sacramento Remote Workers Integration Solutions Guidance Sacramento - Rancho Cordova
  • San Antonio Help Center Exchange 2003 Server Exchange Server 2013 Small Business Outsourcing IT South Texas San Antonio
  • Schaumburg MongoLock Ransomware Settlement Negotiation Experts Schaumburg IL Schaumburg-Arlington Heights, IL Schaumburg Ransomware Settlement Consulting
  • Security Consulting Services Hialeah, Florida Hialeah, FL Consultancy Services Group
  • Shelby County Tennessee, USA Memphis Maze Ransomware Removal Memphis NotPetya Ransomware Restoration Memphis, TN
  • Short-Term IT Staffing Help Consulting Expertise Schaumburg, United States Schaumburg IT Staffing Help
  • Short-Term IT Staffing Support Services Consultants Maricopa County Arizona Phoenix Supplemetary IT Staffing Services
  • Small Business Access Points Specialist Small Business WAP150 IT Consulting

  • Computer Consultant Microsoft Exchange
    Microsoft Exchange 2007 Specialist

    Progent's Microsoft certified support team can help you design and implement an efficient in-place Exchange Server 2007 migration plan that minimizes productivity downtime, simplifies long-term support requirements, and makes your Exchange Server 2007 easy to administer. For complicated multi-server or multi-site upgrades, Progent offers the knowledge and experience to finish your project quickly and affordably. Progent's Microsoft Exchange Server 2007 support, repair, and consulting offerings include expertise with the integration of third-party add-ons to Microsoft Exchange 2007 Server that are in keeping with your business needs.

  • Support Services Expressway CCIE Expert Certified Technical Consultant Collaboration

  • 64-bit Upgrade Online Consulting
    64-bit Upgrade Consultant

    Progent's Microsoft-certified engineers can help your organization to update your application servers and/or workstations from 32 to 64 bits. Progent can help your company to calculate the costs and advantages of migrating to 64-bit processing, plan an affordable migration strategy that reduces operational disruptions, and deliver economical, expert online support to aid you to configure 64-bit operating systems and application programs on your current hardware.

  • Tampa Exchange Server 2013 IT Service Providers Network Repair Service Exchange Server 2019 Tampa Florida, United States

  • Hornetsecurity Altaro VM Backup Support Services
    Altaro VM Backup Immutable Cloud Storage Support Outsourcing

    Altaro VM Backup software from Hornetsecurity offers small and mid-size organizations a dependable and affordable solution for backing up and restoring Microsoft Hyper-V and VMware-based VMs. Altaro VM Backup can be deployed in on-premises, remote, multi-site, and cloud environments and also supports low-cost backup to Azure Block Blob storage. Altaro VM Backup protects against ransomware via Immutable Cloud Storage. This produces tamper-proof backup data that cannot be modified by anyone including administrators or root users. Progent is a certified Hornetsecurity/Altaro partner and offers a wide array of online or onsite services to help you to plan, install, optimize and troubleshoot a modern backup/restore solution powered by Altaro VM Backup software. With ProSight Data Protection Services Altaro VM Backup, Progent offers a managed backup/recovery service based on Altaro VM Backup technology.

  • Tampa St Petersburg Clearwater Tampa Ransomware NotPetya Vulnerability Review Tampa Ransomware MongoLock Vulnerability Assessment Tampa

  • CIO Consultants
    CIO Engineer

    Progent can supply small companies with an IT management expert who can function as a part-time Chief Information Officer. This part-time CIO can provide long-term direction to help you integrate appropriate IT products to improve business processes so they align more closely with your corporate objectives. Your company can develop and implement a well thought out IT plan without absorbing the cost of a full-time Chief Information Officer.

  • Tampa Teleworkers Collaboration Solutions Guidance Tampa Florida Telecommuters Consultants nearby Tampa - Collaboration Technology Guidance
  • Telecommuters Knoxville Guidance - Voice/Video Conferencing Systems Consulting Telecommuters Consulting near Knoxville - Video Conferencing Technology Consulting and Support Services Knoxville Farragut Oak Ridge
  • Email White Lists Specialist
  • Teleworkers Consulting Experts near me in Boise - Backup/Recovery Systems Guidance Boise, Ada County Boise Telecommuters Data Protection Solutions Consulting Services Boise, ID
  • Temporary Network Support Staffing Support Services Expertise Huntington Beach California Short-Term IT Support Staffing Support Expertise

  • Top Rated Windows, Linux, UNIX, Solaris Consultant Services
    Windows, Linux, UNIX, Solaris Integration Services

    If your office network combines Linux technology technology with Microsoft Windows, Progent can help you to incorporate your computers into a cohesive environment that permits all your operating systems to coexist for easy administration, seamless information exchange, high availability, enhanced throughput, and strong protection. Progent's Linux and MS Windows integration assistance services include IT architecture configuration and support, consulting for Windows services for UNIX, remote server monitoring and administration, online network help and troubleshooting, on-site technical support, and Help Desk Call Center outsourcing.

  • Trend Micro Scanmail Technical Consulting Email Security and Virus Protection Small Business Computer Consulting Group
  • Two-factor Authentication (2FA) Technical Support Services Two-factor Authentication (2FA) Integration Services

  • Private Cloud Services Specialist
    Virtual Server Private Cloud Hosting Professionals

    Progent's private cloud hosting enables small and midsize organizations to run mission-critical applications like SQL and Exchange from a secure Tier III data center on fault-tolerant hardware with geographically separate data backup. Progent utilizes Microsoft's Hyper-V platform for server virtualization and Data Protection Manager for backup replication and restoration. You can take advantage of Progent's private cloud hosting service to eliminate large investments in the purchase, upkeep, and operation of computer equipment and data center facilities while benefiting the highest levels of network reliability and security.

  • Uberlândia Ransomware Virus Removal Uberlândia, Minas Gerais Uberlândia Phobos Crypto-Ransomware Removal Uberlandia
  • Vacaville, CA Vacaville Maze Ransomware Operational Recovery Vacaville Sodinokibi Ransomware Data-Recovery Solano County

  • 24x7 Private Cloud Virtual Datacenter Hosting Consulting
    Private Cloud Hosting for Virtual Data Centers Engineer

    Progent's Private Cloud Hosting outsourcing offers complete hosting of a small organization's servers in an environment that gives the maximum level of dependability and scalability and is in addition easy to move to any data center. Progent's Private Cloud Hosting services are built upon mature virtualization architectures that enable small and midsize companies with mixed- platform environments to economize significantly on the expense of capital equipment, infrastructure support, and network management while benefiting from enterprise-class fault tolerance and an unmatched degree of vendor independence.


    © 2002-2025 Progent Corporation. All rights reserved.