Email security involves a lot of buzzwords. What do they mean?
For a glossary of common email security terms, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Email Guard?
Email Guard is a spam filtering service and email security solution designed for small and mid-sized businesses. Email Guard combines the world-class cloud infrastructure and services of top data security companies with proven on-premises security gateway hardware to protect inbound and outbound email against spam, viruses and other email-borne threats and also offers outbound data protection via content filtering and encryption. In addition, Email Guard's centralized monitoring, management and reporting tools help you administer and troubleshoot your email system and define and enforce corporate email policy.

Back to top

What is the danger of email-based attacks?
About 70% of email is spam. 3% of emails have malicious attachments. 91% of successful hacks begin with email attacks. Spam lowers productivity. Viruses and advanced persistent threats (APTs) can steal and information and money, and shut down your network. Poorly secured email systems can violate government regulatory requirements and industry standards and expose you to litigation.

Back to top

What is the architecture of Email Guard's security solution?
Email Guard uses a hybrid architecture that includes cloud-based resources as well as on-premises email security gateway hardware. The Cloud Protection Layer prevents 95% of spam and the vast majority of viruses and other malware from ever reaching your security perimeter. The on-premises security gateway appliance provides deep, multi-level inspection for inbound threats including spam embedded within images. The security gateway also offers spam and virus protection, policy based content filtering, rate control, and cloud-assisted encryption for outbound email. In addition, Email Guard's architecture provides centralized web-based administration with comprehensive monitoring  and reporting plus options for role-based management delegation. A cloud-based Update Center enables zero-hour defense against newly discovered threats and keeps the Cloud Protection Layer and the security gateway up to date without management intervention.

For a detailed discussion of Email Guard's architecture, see Email Guard technology and architecture.

Back to top

Why does Email Guard use a hybrid design with cloud services and on-premises hardware?
The combination of cloud-based and on-premises resources used by Email Guard provides better security, performance and resilience than would be possible with a one-dimensional architecture. For zero-hour security, the cloud-based Update Center provides 24x7x365 monitoring of worldwide threats, develops defenses, and distributes updates in real time to Email Guard's local security gateway appliance. In addition, the Cloud Protection Layer blocks the vast majority of spam and malware before it ever reaches your security perimeter, which enhances both security and system performance. Security and performance are also improved by the ability of the purpose-built local gateway to perform deep analysis of email traffic, including image scanning, before traffic reaches your email server. To stabilize performance, the local security gateway offers rate control for inbound and outbound email. For resilience, Email Guard's Cloud Protection Layer offers spooling. If your local data center goes down, spooling allows you to store all your inbound email in the cloud for up to 96 hours or direct it to an alternative destination while you fix the problem.

Back to top

What email-based threats does Email Guard block?
The Email Guard security gateway provides consecutive security filters that include Denial of Service (DoS) and security protection, rate control, IP reputation analysis, sender authentication, recipient verification, virus protection, user-specified policy enforcement, signature analysis, intent analysis, image analysis, Bayesian analysis, and spam rules scoring. This results in fast, comprehensive email protection against spam, viruses, spoofing, phishing, directory harvest, and spyware attacks. For a glossary of these and other terms used in email security, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Progent's role in delivering the Email Guard solution?
Progent can help you plan your Email Guard deployment, recommend security gateway hardware appropriate for your expected workloads and security requirements, configure your gateway, integrate Email Guard with Exchange Server or any other email platform, define and configure policies for inbound spam and outbound content filtering, set up and test outbound encryption, design and implement a high-availability solution that can include clustered security gateways, set up an efficient management system that takes advantage of delegated administration, and provide training, ongoing consulting support and troubleshooting services.

Progent's Microsoft-certified consultants can provide Microsoft System Center Operations Manager consulting so you can monitor your entire email and network infrastructure and resolve potential problems before they impact network productivity. Progent's Cisco-certified CCIE network consultants can help you design, build and troubleshoot a network infrastructure that supports both the on-premises and cloud-based resources that make up your Email Guard ecosystem. Progent's CISSP-certified cybersecurity consultants can help you plan and validate a cohesive security environment that protects your business against email-borne, web-based and internal threats and that complies with government regulations, industry standards, and your own corporate policies.

Back to top

Why is it important to filter outbound email?
Outbound filtering provides two major benefits: data loss protection (DLP) and reputation protection. DLP stops sensitive information from leaking out of your business via careless emails. Leaked data can result in regulatory infractions, identity theft, and loss of competitive advantage. It can also lead to litigation. The Email Guard security gateway includes pre-defined content filters such as HIPAA, credit card numbers, and Social Security Numbers. Email Guard also allows you to create custom content filtering policies covering specified keywords, categories, or character sets. Content filtering policies can be configured to block, quarantine or encrypt messages automatically.

Outbound filtering can also block spam and viruses sent by internal computers that have been compromised, which is a serious vulnerability in BYOD (Bring Your Own Device) environments. Organizations which allow spam and viruses to be sent out can be placed on block lists, or "blacklisted". This loss of reputation can hurt productivity and profits.

Back to top

Why can't my firewall stop spam or Directory Harvest Attacks?
Conventional firewalls offer little or no protection against spam or Directory Harvest Attacks. Inbound email often passes through the firewall to your email server without regard for message content, message size or address, creating an opportunity for spam and viruses to enter and making your email system vulnerable to directory harvesting.

Back to top

How does Email Guard support email encryption?
Email Guard utilizes a cloud-based Message Center to handle the encryption and delivery of outbound email. Administrators can establish multiple policies for determining which emails are automatically encrypted. These are then sent securely over TLS to the Message Center where they are encrypted using AES-256 and stored for retrieval. The Message Center sends the intended recipient a notice that includes a URL to visit in order to retrieve the encrypted email. Once establishing a password, the recipient can read the encrypted message. Any replies are also encrypted at the Message Center. In addition, Email Guard includes a plug-in for Exchange Server which lets users choose to encrypt individual emails. For more details about how Email Guard encrypts outbound email, visit Email Guard technology and architecture.

Back to top

Is Email Guard difficult to manage?
Email Guard includes a browser-based management portal designed to be easy to use for administrators in small and mid-size organizations. The portal's dashboard offers centralized monitoring and control of hardware, services, policies and configurations, and keeps extensive health and performance statistics on inbound and outbound email. You can easily track by day or hour the number of inbound and outbound messages blocked, quarantined, and rate controlled; the inbound messages tagged and allowed; and the outbound messages sent, redirected, and encrypted. Granular policy control includes delegated domain administration, delegated help desk role, and individual user policy control. For more information about Email Guard's cloud-based management features, see Email Guard technology and architecture.

Back to top

What email platforms are supported by Email Guard?
Email Guard works with any on-premises email platform but offers some enhanced features when used with Microsoft Exchange Server, such as the Outlook client encryption add-in and the Exchange LDAP Accelerator.

Back to top

How does Email Guard impact email performance?
The hybrid architecture of Email Guard leverages the massive scale of cloud-based resources and the power of purpose-built gateway hardware to off-load almost all the work of email protection from the email server. On-premises gateways are available in a variety of models that offer performance that ranges from entry level to enterprise class, and gateways can be clustered for improved performance, as well as higher availability. You can configure Email Guard to deliver the performance you need, and you can easily expand your deployment as your needs grow.

Back to top

How does Email Guard avoid blocking legitimate email through false positives?
A false positive is a legitimate email quarantined as spam. The default policy configurations in Email Guard have a false positive rate of 0.01%, which is low by industry standards. Administrators have options to adjust the aggressiveness of Email Guard's spam filtering with techniques such as threshold scoring, but the surest way to prevent false positives is to build "allow lists" or "whitelists" that specify legitimate senders. Email Guard permits users to control spam scoring, Bayesian analysis, and allow lists at the personal level.

Back to top

How can I get help now with email security?
If your organization needs online or onsite help with any aspect email security:
Call 800-993-9400 or visit Contact Progent.

Back to top

Also See:



An index of content::

  • 64-bit Migration Consult 64-bit Processing Consultant Services
  • Email Quarantine Services
  • Addison-Carrollton, Texas Addison Dharma Crypto-Ransomware Remediation Addison Ryuk Online Ransomware Data-Recovery Consultants

  • Dynamics GP/Great Plains Consultant
    Consulting Services Dynamics GP Software

    Progent's Microsoft certified experts offer a range of support services for Microsoft Dynamics GP (formerly Great Plains). Microsoft Dynamics GP/Great Plains is a financial and business analysis package built, like all Microsoft accounting solutions, on the expandable and familiar platform of Microsoft Windows technology. Microsoft Dynamics GP offers a cost-effective solution for controlling and integrating accounting, e-commerce, supply chain, manufacturing, project accounting, field service, and human resources. Dynamics GP is simple to deploy and integrate, and with its modular design you can purchase only the functions you currently need, with the option to expand clients and enlarge capabilities in the future. Progent's Microsoft Dynamics GP consulting engineers can help you deploy, configure and administer the current release of Microsoft Dynamics GP or migrate smoothly from an earlier version.

  • Appleton-Green Bay, WI Work at Home Employees Consulting and Support Services in Appleton - Backup/Restore Systems Consulting Experts At Home Workforce Consulting and Support Services nearby Appleton - Backup/Restore Solutions Guidance Appleton WI
  • At Home Workers Expertise near Cincinnati - Data Protection Systems Consulting Experts Hamilton County Ohio Hamilton County Ohio, United States Work from Home Employees Cincinnati Consulting Experts - Backup/Restore Solutions Consulting
  • Cisco Outsourcing IT Support Praia Grande, Santos Consulting Team Cisco Praia Grande, São Paulo
  • Email Intent Analysis Specialists
  • Cisco Small Business Computer Consulting Services Baton Rouge Louisiana Cisco Small Business Computer Consulting Companies Baton Rouge Louisiana
  • Cleveland, OH Outsourced IT Services 24/7 Cleveland-Cuyahoga County Technical Support Companies
  • Consulting Services for Hartford Network Support Companies Hartford County Connecticut Consultants for Hartford Network Support Firms Hartford Manchester Southington New Britain
  • Contract Network Engineering Remote Support Jobs Independent Cisco CCNA Contractor Full-Time Job
  • Dharma Ransomware Hot Line Fargo-Bismarck, ND Ryuk Ransomware Hot Line Fargo-Williston
  • Durham Offsite Workforce Cybersecurity Systems Consulting Durham, NC Remote Workforce Guidance nearby Durham - Cybersecurity Solutions Assistance Raleigh Durham Cary
  • England London Work from Home Employees Help Desk Call Center Solutions Guidance 24-Hour Telecommuters Consultants nearby London - Help Desk Augmentation Consulting Experts London

  • Automated Desktop Management IT Consultant
    Top ProSight Remote Monitoring and Reporting Remote Troubleshooting

    ProSight LAN Watch is Progent's server and endpoint monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to keep your IT system operating at peak levels by checking the state of vital assets that power your information system. When ProSight LAN Watch uncovers an issue, an alert is sent automatically to your specified IT management staff and your assigned Progent consultant so that any potential problems can be resolved before they have a chance to disrupt productivity.

  • Fedora Linux, Solaris, UNIX Integration Oxford 24-7 Gentoo Linux, Solaris, UNIX Network Consultants Oxford, England
  • Fort Lauderdale Lockbit Ransomware Remediation Fort Lauderdale Tamarac Fort Lauderdale DopplePaymer Crypto-Ransomware System-Rebuild Fort Lauderdale, FL, United States
  • Fort Wayne Security Firm Security Firewall Network Security Testing Fort Wayne, IN
  • Georgia On-site Technical Support Security Consulting Companies Georgia
  • Houston Dynamics GP-Software Reporting Help Texas Medical Center, Houston Best Dynamics GP Houston Gold Partner - Database Consultant Energy Corridor, Houston

  • Microsoft 365 Consulting
    Microsoft 365 Android Integration Integration

    Progent can assist your business to understand the wealth of subscription options available with Microsoft 365, previously called Office 365, and configure your network with Microsoft 365 so you realize maximum business value. Progent offers expertise with multi-vendor environments that include Windows, macOS, and Linux software. Progent can also assist you to build and manage hybrid networks that transparently combine on-premises and cloud resources.

  • IT Services Cisco ASA Firewall with Firepower Remote Technical Support Cisco Firepower NGFW Firewalls

  • Protecting Juniper Junos J-Web
    Juniper Junos Management Security Services

    Progent's Juniper-authorized network engineer can assist you to design and implement Juniper Firewall and VPN platforms, enhance and troubleshoot your infrastructure, and upgrade smoothly from outdated equipment to the latest versions. Progent's Junos OS consultants can provide support for Juniper's flagship network operating system to help you to streamline the administration and strengthen the protection of your Juniper VPN appliances and routers. Progent also has extensive background maintaining Juniper's NetScreen OS and ScreenOS operating system productss and can help organizations maintain environments that incorporate a combination of Juniper's OS platforms.

  • Jackson, Hinds County Manage Small Business Network Emergency Maintenance Microsoft Computer

  • Top Ranked Exchange 2019 Hybrid Deployment Online Support
    Consultant Services Exchange 2019 Upgrade

    Progent can help you in any facet of your upgrade to Exchange 2019 including deploying Windows Server 2019 Core as a host for Exchange; planning high availability infrastructure for an on-premises, Microsoft cloud connected or hybrid deployment; migrating mailboxes; designing and configuring Hyper-V; setting up hardware load balancing (HLB); building Database Availability Groups (DAGs) with MCDB caching; integrating with Skype for Business 2019 for cloud voicemail; setting up collaboration with SharePoint Server or SharePoint Online; preparing firewalls; integration with Microsoft 365; and configuring Outlook clients.

  • ProSight Email Spoofing Protection Engineer
  • King County Washington Bellevue Crypto Remediation King County Washington Crypto-Ransomware Removal Experts
  • Livermore Exchange Server 2016 Computer Firms Microsoft Exchange 2016 Small Business Computer Consulting Group
  • Madison Baraboo CISA Consultant Contractor Career Cisco CCDP Network Consultant Madison Baraboo
  • Microsoft Computer Computer Network Consulting company Vallejo, Benicia, United States Vallejo, Benicia Urgent Network Migration Help
  • Microsoft Computer Network Installation McKinney Network Outsource Small Business Network McKinney
  • Microsoft Exchange 2010 Computer Consultancy Edison-Princeton, New Jersey Exchange Network Administration Edison-Princeton, New Jersey
  • Email Outbound Content Filtering Consultant Services
  • Microsoft Forefront TMG 2010 Configuration Forefront TMG Firewall Professional
  • Email Bayesian Analysis Consultancy
  • Microsoft MCSA Remote Consulting Freelancing Job Microsoft MCP Remote Engineer Job Cleveland
  • Email Polymorphic Virus Protection Specialist
  • Microsoft and Cisco Information Technology Consulting Firms Denton County Texas Microsoft Network Small Business IT Outsourcing Carrollton Texas

  • Zero Trust Security Remote Troubleshooting
    Identity Verification On-site Support

    Progent's Duo managed services incorporate Cisco's Duo technology to defend against compromised passwords through the use of two-factor authentication. Duo enables one-tap identity verification with Apple iOS, Google Android, and other personal devices.

  • Microsoft and Cisco Server Setup Topeka Tecumseh Help Desk Network Recovery Topeka Tecumseh
  • Missouri - Kansas City, MO, Saint Louis, MO, Springfield, MO, Independence, MO Linux Support and Integration UNIX Online Consulting Kansas City Missouri
  • Napa, CA Napa Ransomware Cleanup Experts Napa Crypto-Ransomware Mitigation Consultants Yountville, Rutherford
  • Naples Phobos Ransomware Cleanup Naples, United States Naples Netwalker Crypto-Ransomware Data-Recovery Naples
  • Network Consult Microsoft Office System Microsoft Consultancy Services Group
  • Network Designers Connecticut - Bridgeport, CT, New Haven, CT, Hartford, CT, Stamford, CT Connecticut Remote Consulting

  • SQL 2008 Analysis Services Professionals
    Remote Support Services Microsoft SQL Server 2008

    Microsoft SQL Server 2008 offers indispensable, familiar tools to computer experts and network users, lessening the complexity of designing, integrating, administering, and accessing company information and analytical programs on platforms ranging from handheld devices to corporate information networks. The sophistication and interconnectivity demands of Microsoft SQL Server 2008 require an IT consultant with hands-on expertise and wide knowledge in designing and building information-based, comprehensive business IT solutions. The knowledge and experience of Progent's Microsoft-certified engineering staff, with an average of more than 10 years of professional work supporting Microsoft technology, assures you success in designing, deploying and managing Microsoft SQL Server 2008 solutions that are seamlessly integrated with the Microsoft .NET platform.

  • New Orleans Network Services New Orleans Small Business Outsourcing
  • NotPetya ransomware recovery Consulting Spora ransomware recovery Consulting Services
  • Offsite Managed Data Backup/Recovery Services Support Services BDR and Business Continuity Solutions Consultant Services
  • Offsite Workforce Mobile Assistance - Infrastructure Consulting Mobile, AL Remote Workers Expertise in Mobile - Integration Expertise Mobile Alabama
  • Open Now Microsoft 365 hybrid solutions for Exchange Remote Technical Support Microsoft 365 mail flow Troubleshooting
  • Pleasanton Remote Workforce Voice/Video Conferencing Solutions Guidance Livermore California Pleasanton Work from Home Employees Voice/Video Conferencing Technology Consulting Experts
  • RIM BlackBerry Server Consultant Reston VA BlackBerry BES Server Small Business Computer Consultants Reston-Ashburn, United States
  • Remote Workers Consultants near me in Jundiaí - Backup/Restore Technology Assistance At Home Workers Jundiaí Assistance - Backup/Recovery Solutions Consulting Services Jundiai, State of São Paulo
  • Rio de Janeiro State Rio de Janeiro Phobos Ransomware Settlement Negotiation Help Rio de Janeiro Ransomware Settlement Negotiation Expertise Rio de Janeiro, RJ
  • Saddle Brook Ransomware MongoLock Preparedness Audit Saddle Brook-Moonachie, New Jersey Saddle Brook-Teterboros Saddle Brook Crypto-Ransomware Ryuk Readiness Consultation
  • Schaumburg Crypto-Ransomware Repair Consultants Schaumburg-Carol Stream, Illinois, U.S.A. After Hours Schaumburg Emergency Crypto-Ransomware Removal Consultants Schaumburg-Des Plaines, IL
  • Email Quarantine Consultant
  • Scottsdale, Maricopa County At Home Workforce Guidance near me in Scottsdale - IP Voice Solutions Consulting and Support Services Scottsdale Work from Home Employees VoIP Solutions Consulting Services Scottsdale, Maricopa County
  • SharePoint Server 2010 Support Outsourcing Information Technology Consulting Microsoft SharePoint Server 2013 Monroe County New York
  • Slackware Linux, Solaris, UNIX Online Troubleshooting Louisville International Airport SDF Jefferson County Kentucky Mandrake Linux, Solaris, UNIX Setup and Support
  • Small Business IT Consulting Company Microsoft SQL Server 2017 SQL Server 2012 Outsourcing Companies

  • SCDPM 2012 Security and Compliance Remote Technical Support
    Emergency SCDPM 2012 Troubleshooting Online Troubleshooting

    Progent's Microsoft-certified consultants offer online or in-person expertise to help companies of any size to plan, implement, administer, and troubleshoot a backup-and-restore system based on System Center 2012 Data Protection Manager (SCDPM 2012). Progent can help you to migrate from older releases of SCDPM or from another backup platform, and Progent can integrate your Data Protection Manager deployment for onsite, cloud-based, or hybrid datacenters. Progent can provide occasional help for resolving especially challenging problems, or full project management services. Progent can also help your business to incorporate Data Protection Manager into an enterprise-class disaster recovery plan.

  • Small Office IT Support Exchange 2010 Server Twin Cities, Minnesota Twin Cities, Minnesota Microsoft Exchange Computer Consulting Company
  • Solaris-Windows Upgrade Help Upgrade Consultants Solaris to Windows

  • Azure Active Directory FIDO2 Network Consulting
    Consultant Services Azure Active Directory FIDO2

    Progent can help you to design and carry out an efficient move from onsite Active Directory to cloud-based Microsoft Entra ID (formerly called Azure Actve Directory) or to a hybrid solution that uses Microsoft Entra Domain Services and Microsoft Entra Connect to unify identity and access management across onsite and cloud assets.

  • Sun Solaris Technology Consulting Services Omaha, NE Urgent Help and Support Redhat
  • Suse Linux, Solaris, UNIX IT Consulting San Diego-University Red Hat Linux, Solaris, UNIX Computer Consultant La Jolla, CA, United States
  • Sydney-Randwick Outsourcing IT Outsourcing Sydney, NSW
  • São Paulo Ransomware Malware Susceptibility State of Sao Paulo São Paulo Crypto-Ransomware Hermes Susceptibility Report
  • The Woodlands Supplemetary IT Staffing Support Services The Woodlands, Texas The Woodlands Staffing Help
  • Top Ranked Debian Linux, Sun Solaris, UNIX Technical Support Services Computer Consulting Debian Linux, Solaris, UNIX Lakeland-Lakeland, Florida
  • Urgent Network Services Tempe Surprise Avondale El Mirage Immediate Urgent Network Network Providers Tempe
  • Urgent Telecommuters Recife Consulting Experts - Voice/Video Conferencing Technology Expertise Recife, Boa Viagem Recife Work from Home Employees Voice/Video Conferencing Technology Consulting Services Recife

  • Microsoft Certified Partner Windows Server 2019 and SQL Server Outsourcing
    Windows Server 2019 Windows Defender ATP Computer Consultants

    Progent's Microsoft-certified Windows Server 2019 consultants can help your organization to plan and carry out a cost-effective migration to Windows Server 2019 using your current system architecture or a new cloud-based or hybrid model. Microsoft Windows Server 2019 offers significant improvements in capacity, performance, manageability, virtualization, security and compliance, hybrid on-prem plus cloud deployments, availability, and Linux support.

  • Windows Server 2016 Computer Consultancy Companies Hartford, CT Award Winning Windows Server 2016 Remote Troubleshooting Hartford, CT
  • Work at Home Employees Assistance near me in Sorocaba - Backup/Recovery Technology Consulting Experts Sorocaba At Home Workforce Backup/Recovery Systems Consultants
  • Work at Home Employees Consulting and Support Services - Knoxville - Endpoint Management Tools Consulting Services Knoxville Offsite Workforce Consultants - Knoxville - Management Solutions Guidance Knoxville

  • © 2002-2025 Progent Corporation. All rights reserved.