Email security involves a lot of buzzwords. What do they mean?
For a glossary of common email security terms, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Email Guard?
Email Guard is a spam filtering service and email security solution designed for small and mid-sized businesses. Email Guard combines the world-class cloud infrastructure and services of top data security companies with proven on-premises security gateway hardware to protect inbound and outbound email against spam, viruses and other email-borne threats and also offers outbound data protection via content filtering and encryption. In addition, Email Guard's centralized monitoring, management and reporting tools help you administer and troubleshoot your email system and define and enforce corporate email policy.

Back to top

What is the danger of email-based attacks?
About 70% of email is spam. 3% of emails have malicious attachments. 91% of successful hacks begin with email attacks. Spam lowers productivity. Viruses and advanced persistent threats (APTs) can steal and information and money, and shut down your network. Poorly secured email systems can violate government regulatory requirements and industry standards and expose you to litigation.

Back to top

What is the architecture of Email Guard's security solution?
Email Guard uses a hybrid architecture that includes cloud-based resources as well as on-premises email security gateway hardware. The Cloud Protection Layer prevents 95% of spam and the vast majority of viruses and other malware from ever reaching your security perimeter. The on-premises security gateway appliance provides deep, multi-level inspection for inbound threats including spam embedded within images. The security gateway also offers spam and virus protection, policy based content filtering, rate control, and cloud-assisted encryption for outbound email. In addition, Email Guard's architecture provides centralized web-based administration with comprehensive monitoring  and reporting plus options for role-based management delegation. A cloud-based Update Center enables zero-hour defense against newly discovered threats and keeps the Cloud Protection Layer and the security gateway up to date without management intervention.

For a detailed discussion of Email Guard's architecture, see Email Guard technology and architecture.

Back to top

Why does Email Guard use a hybrid design with cloud services and on-premises hardware?
The combination of cloud-based and on-premises resources used by Email Guard provides better security, performance and resilience than would be possible with a one-dimensional architecture. For zero-hour security, the cloud-based Update Center provides 24x7x365 monitoring of worldwide threats, develops defenses, and distributes updates in real time to Email Guard's local security gateway appliance. In addition, the Cloud Protection Layer blocks the vast majority of spam and malware before it ever reaches your security perimeter, which enhances both security and system performance. Security and performance are also improved by the ability of the purpose-built local gateway to perform deep analysis of email traffic, including image scanning, before traffic reaches your email server. To stabilize performance, the local security gateway offers rate control for inbound and outbound email. For resilience, Email Guard's Cloud Protection Layer offers spooling. If your local data center goes down, spooling allows you to store all your inbound email in the cloud for up to 96 hours or direct it to an alternative destination while you fix the problem.

Back to top

What email-based threats does Email Guard block?
The Email Guard security gateway provides consecutive security filters that include Denial of Service (DoS) and security protection, rate control, IP reputation analysis, sender authentication, recipient verification, virus protection, user-specified policy enforcement, signature analysis, intent analysis, image analysis, Bayesian analysis, and spam rules scoring. This results in fast, comprehensive email protection against spam, viruses, spoofing, phishing, directory harvest, and spyware attacks. For a glossary of these and other terms used in email security, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Progent's role in delivering the Email Guard solution?
Progent can help you plan your Email Guard deployment, recommend security gateway hardware appropriate for your expected workloads and security requirements, configure your gateway, integrate Email Guard with Exchange Server or any other email platform, define and configure policies for inbound spam and outbound content filtering, set up and test outbound encryption, design and implement a high-availability solution that can include clustered security gateways, set up an efficient management system that takes advantage of delegated administration, and provide training, ongoing consulting support and troubleshooting services.

Progent's Microsoft-certified consultants can provide Microsoft System Center Operations Manager consulting so you can monitor your entire email and network infrastructure and resolve potential problems before they impact network productivity. Progent's Cisco-certified CCIE network consultants can help you design, build and troubleshoot a network infrastructure that supports both the on-premises and cloud-based resources that make up your Email Guard ecosystem. Progent's CISSP-certified cybersecurity consultants can help you plan and validate a cohesive security environment that protects your business against email-borne, web-based and internal threats and that complies with government regulations, industry standards, and your own corporate policies.

Back to top

Why is it important to filter outbound email?
Outbound filtering provides two major benefits: data loss protection (DLP) and reputation protection. DLP stops sensitive information from leaking out of your business via careless emails. Leaked data can result in regulatory infractions, identity theft, and loss of competitive advantage. It can also lead to litigation. The Email Guard security gateway includes pre-defined content filters such as HIPAA, credit card numbers, and Social Security Numbers. Email Guard also allows you to create custom content filtering policies covering specified keywords, categories, or character sets. Content filtering policies can be configured to block, quarantine or encrypt messages automatically.

Outbound filtering can also block spam and viruses sent by internal computers that have been compromised, which is a serious vulnerability in BYOD (Bring Your Own Device) environments. Organizations which allow spam and viruses to be sent out can be placed on block lists, or "blacklisted". This loss of reputation can hurt productivity and profits.

Back to top

Why can't my firewall stop spam or Directory Harvest Attacks?
Conventional firewalls offer little or no protection against spam or Directory Harvest Attacks. Inbound email often passes through the firewall to your email server without regard for message content, message size or address, creating an opportunity for spam and viruses to enter and making your email system vulnerable to directory harvesting.

Back to top

How does Email Guard support email encryption?
Email Guard utilizes a cloud-based Message Center to handle the encryption and delivery of outbound email. Administrators can establish multiple policies for determining which emails are automatically encrypted. These are then sent securely over TLS to the Message Center where they are encrypted using AES-256 and stored for retrieval. The Message Center sends the intended recipient a notice that includes a URL to visit in order to retrieve the encrypted email. Once establishing a password, the recipient can read the encrypted message. Any replies are also encrypted at the Message Center. In addition, Email Guard includes a plug-in for Exchange Server which lets users choose to encrypt individual emails. For more details about how Email Guard encrypts outbound email, visit Email Guard technology and architecture.

Back to top

Is Email Guard difficult to manage?
Email Guard includes a browser-based management portal designed to be easy to use for administrators in small and mid-size organizations. The portal's dashboard offers centralized monitoring and control of hardware, services, policies and configurations, and keeps extensive health and performance statistics on inbound and outbound email. You can easily track by day or hour the number of inbound and outbound messages blocked, quarantined, and rate controlled; the inbound messages tagged and allowed; and the outbound messages sent, redirected, and encrypted. Granular policy control includes delegated domain administration, delegated help desk role, and individual user policy control. For more information about Email Guard's cloud-based management features, see Email Guard technology and architecture.

Back to top

What email platforms are supported by Email Guard?
Email Guard works with any on-premises email platform but offers some enhanced features when used with Microsoft Exchange Server, such as the Outlook client encryption add-in and the Exchange LDAP Accelerator.

Back to top

How does Email Guard impact email performance?
The hybrid architecture of Email Guard leverages the massive scale of cloud-based resources and the power of purpose-built gateway hardware to off-load almost all the work of email protection from the email server. On-premises gateways are available in a variety of models that offer performance that ranges from entry level to enterprise class, and gateways can be clustered for improved performance, as well as higher availability. You can configure Email Guard to deliver the performance you need, and you can easily expand your deployment as your needs grow.

Back to top

How does Email Guard avoid blocking legitimate email through false positives?
A false positive is a legitimate email quarantined as spam. The default policy configurations in Email Guard have a false positive rate of 0.01%, which is low by industry standards. Administrators have options to adjust the aggressiveness of Email Guard's spam filtering with techniques such as threshold scoring, but the surest way to prevent false positives is to build "allow lists" or "whitelists" that specify legitimate senders. Email Guard permits users to control spam scoring, Bayesian analysis, and allow lists at the personal level.

Back to top

How can I get help now with email security?
If your organization needs online or onsite help with any aspect email security:
Call 800-993-9400 or visit Contact Progent.

Back to top

Also See:



An index of content::

  • 24-7 Microsoft Expert Presence Awareness Remote Technical Support 24x7x365 Microsoft Office Communications Server 2007 Specialist
  • 24x7 MCSE Expert Certified Online Technical Support Windows Server 2022 Storage Spaces Direct 24-Hour Network Consulting Windows Server 2022 Disaster Recovery
  • Ann Arbor Michigan Urgent Network Support Computer Support Consultant Cisco CCIE IT Consulting Services Ann Arbor Flint, U.S.A.
  • ProSight Spam Filtering Services Consultants
  • Appleton-Appleton, Wisconsin At Home Workers Appleton Guidance - Endpoint Management Tools Expertise Appleton Telecommuters Endpoint Management Tools Guidance Appleton-Fond du Lac, WI
  • Appleton-Sheboygan, Wisconsin Integration Firms Cisco Network Consulting Organization Cisco Appleton Wisconsin
  • At Home Workers Florianópolis Consulting and Support Services - Collaboration Technology Consulting and Support Services Telecommuters Florianópolis Expertise - Collaboration Technology Assistance
  • At Home Workers Fresno Consulting and Support Services - IP Voice Solutions Consulting Services Fresno, CA Fresno Telecommuters VoIP Systems Consulting
  • At Home Workers Rio de Janeiro Expertise - Conferencing Technology Consulting Rio de Janeiro Rio de Janeiro Telecommuters Voice/Video Conferencing Solutions Consulting and Support Services Rio de Janeiro
  • Barueri-Alphaville, Brazil installation and Administration Barueri-Alphaville, Brazil Information Technology Manager
  • ProSight Spam Filtering Services Services
  • BlackBerry Professional Software Integration Consultant Centro, Manaus Manaus BlackBerry Smartphone Phone Support

  • ProSight password management system Consulting
    IT documentation management Consultant

    ProSight IT Asset Management is a cloud-based IT documentation management service that allows you to capture, update, find and safeguard information related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted about impending expirations of SSL certificates or domains. By cleaning up and organizing your network documentation, you can save as much as 50% of time spent looking for critical information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether you're planning improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it.

  • Cisco Computer Consulting Group Napa Server Troubleshoot Expert Cisco Napa California
  • Cisco Information Technology Outsourcing Companies Cisco Small Office IT Outsourcing Cabo Frio

  • Information Technology Integrators Small Business Work at Home Integration
    24-7 Small Business Cloud Migration Small Office Network Consultant

    If you have a company information system with 10 to 50 desktop users, Progent's computer outsourcing services free your organization from over-reliance on an individual freelance consultant while giving you cost-effective and dependable access to enterprise-class technical support. By providing IT support help when you require it, offering specialized expertise for key applications, offering unique services such as automated network monitoring, and charging only for services you use, Progent gives you an economical solution for optimizing the productivity of your small office information system. Progent is the smart way for small organizations to create and support a robust and secure IT system and to have quick access to the skilled help ordinarily restricted to businesses who are able to afford a sizeable in-house IT organization.

  • Cisco Professionals Sioux Falls, SD Cisco Network Consulting Group Sioux Falls South Dakota
  • Cisco and Microsoft Fremont Troubleshooting CISM Security Security Fremont Integration Consulting
  • Computer Consulting Windows 2000 Server Windows Server 2000 Upgrade Consultants

  • Windows Server 2022 Cybersecurity Integration Support
    Windows Server 2022 Encrypted Networks Professional

    Progent's Microsoft Gold-certified Windows Server 2022 consultants can help your organization to plan and carry out a cost-effective migration to Windows Server 2022 using a self-hosted network architecture or a hybrid model that integrates cloud-hosted Windows Server Online with an on-prem implementation of Windows Server 2022.

  • Consulting Services Hosting for Virtual Servers Specialist Private Cloud Hosting
  • El Paso, Texas Network Consulting Experts El Paso, TX Small Business IT Support Firms
  • Harris County Top Support Consultant Windows Server 2012 Small Office IT Consultants Microsoft Windows Server 2019 Webster, TX
  • Largest At Home Workers Ribeirão Preto Consulting - Cybersecurity Solutions Expertise Ribeirao Preto, São Paulo Ribeirão Preto, São Paulo Offsite Workforce Ribeirão Preto Consulting and Support Services - Cybersecurity Systems Assistance

  • Specialist Barracuda Backup Verification
    Barracuda Backup Deduplication Specialist

    Barracuda Backup is a low-cost, subscription-based backup and disaster recovery service for small and medium-size businesses. A Barracuda Backup solution can incorporate a purpose-built physical appliance manufactured by Barracuda or a virtual appliance with similar features but which uses your existing storage hardware. Barracuda Backup safeguards vital company data generated locally, at one or more remote locations, or in the cloud. For disaster protection, you can replicate data to the Barracuda Cloud, to Amazon Web Services (AWS), or to any location with a Barracuda Backup appliance. Progent is a certified Barracuda partner and Progent's Barracuda Backup consulting experts can provide a broad array of consulting support services to help your business to design, integrate, operate and troubleshoot a BDR solution based on Barracuda Backup.

  • Las Vegas, NV 24 Hour Remote Workers Las Vegas Consulting - Data Protection Technology Expertise Work from Home Employees Consulting near Las Vegas - Backup/Restore Solutions Assistance Henderson Nevada

  • Microsoft Expert Computer Consultants Application Monitoring
    24x7 Network Specialist

    Remote continuous monitoring, automated alerts, and actionable reports are crucial to preserving the proper operation of your network and avoiding preventable and expensive downtime. Remote Monitoring and Management technology has progressed so far that businesses of any size can get a level of network stability that was previously reserved for large enterprises. Progent can provide several RMM solutions available as economical service packages created to help your company to detect and fix a most IT network issues before they get big enough to disrupt productivity.

  • Lawrence Sodinokibi Crypto-Ransomware Forensics Analysis Lawrence MA-Manchester NH Lawrence Lockbit Crypto-Ransomware Forensics Investigation Lawrence-Middlesex County, MA
  • Lincoln Crypto-Ransomware Removal Lincoln, NE Ransomware Removal Support Services
  • Microsoft Exchange 2016 Network Recovery Rancho Cordova, CA Exchange Server 2013 Small Business Computer Consulting Company Rancho Cordova-Sacramento
  • Napa County Tech Consultants Napa, California Small Office Computer Consulting Services
  • Offsite Workforce Monterrey Consulting Experts - Setup Consultants Santa Catarina Work from Home Employees Monterrey Consulting Experts - Setup Consultants
  • Oklahoma CIty Ransomware Cleanup and Data Recovery Oklahoma City, Tinker Air Force Base Oklahoma CIty Ransomware Prevention

  • Call Desk Sharing Troubleshooting
    Microsoft and Cisco Certified Helpdesk Sharing Computer Consulting

    Progent's Co-managed Help Desk service allows your business to split responsibilities for Help Desk support seamlessly between your in-house IT staff and Progent's nationwide pool of certified technical support technicians and subject matter experts. Progent's Help Desk Co-management service is an advanced support solution built around ConnectWise Manage, the leading shared professional services automation (PSA) tool for handling service requests, ticketing, ownership, progress tracking, and metrics.

  • Onsite Technical Support CentOS Linux, Sun Solaris, UNIX Allen County Indiana After Hours Specialists Mandrake Linux, Solaris, UNIX Fort Wayne Indiana
  • Philadelphia, Pennsylvania Network Help Philadelphia, Pennsylvania Small Business IT Outsourcing Services
  • Remote Technical Consultant BlackBerry Wireless RIM BlackBerry Exchange Online Support Services
  • Rochester, New York Network Design and Consulting 24-Hour Rochester Computer Services
  • Ryuk ransomware hot line Consultant Services ransomware cryptoworm recovery Consultants
  • SQL Server 2008 Upgrade Consulting SQL Server 2008 Upgrade Consultants
  • Security Audits Firewall Charlotte Firewall Firewall Setup
  • St. Louis Egregor Ransomware Removal St Louis Missouri St. Louis Conti Ransomware Data-Recovery St Louis

  • Top Microsoft 365 Outlook Integration Consultants
    Office 365 PowerPoint Integration Network Consultant

    Progent can assist your business to evaluate the wealth of subscription options available with Microsoft 365, formerly called Office 365, and integrate your information network with Microsoft 365 in a way that delivers top business value. Progent supports multi-vendor environments that include Windows, macOS or OS X, and Linux operating systems. Progent can also assist your business to create and manage hybrid ecosystems that transparently combine on-premises and cloud-based resources.

  • Sydney Crypto-Ransomware Data-Recovery Experts Sydney Sydney Avaddon Crypto-Ransomware Rollback
  • Telecommuters Mobile Consultants - Collaboration Systems Consulting Experts Mobile, United States 24 Hour Offsite Workforce Consulting Experts - Mobile - Collaboration Solutions Consultants Mobile, AL

  • Microsoft Windows Server 2008 R2 Consultant Services
    24/7 Windows Server 2008 Hyper-VI Remote Consulting

    Microsoft Windows Server 2008 represents an important advance in making information networks more secure and fault tolerant, easier to virtualize and manage, higher performing, and able to provide a better environment for web hosting and development. Progent can assist your company benefit fully from the improvements incorporated into Windows Server 2008 by delivering consulting, support, training, staffing, monitoring, and security expertise.

  • Telecommuters St. Louis Consulting Experts - Endpoint Management Tools Assistance St Louis Lambert International Airport STL Work from Home Employees Assistance nearby St. Louis - Endpoint Management Systems Assistance
  • ProSight Email Guard Spam Filtering Technology Professional
  • Teleworkers Consulting Services in Sarasota - IP Voice Technology Assistance Fargo-Williston, ND Remote Workers Sarasota Consulting Services - VoIP Solutions Guidance Fargo, ND
  • Top Quality Exchange 2010 Server Information Technology Support Santa Ana-Fountain Valley Top Exchange Computer Consultancy Company Santa Ana-Costa Mesa
  • Top Quality Work from Home Employees Consulting and Support Services nearby Vacaville - Help Desk Call Center Outsourcing Consulting Vacaville Solano County Offsite Workforce Vacaville Consulting - Call Desk Solutions Consulting Fairfield CA
  • Urgent On-site Technical Support Red Hat Linux, Solaris, UNIX Carlsbad Suse Linux, Solaris, UNIX Computer Consultant Carlsbad-Solana Beach
  • 24-Hour Email Virus Signature Professional
  • Windows Server 2019 integration Support and Setup Windows Server 2019 Windows Admin Center IT Consultant
  • Work from Home Employees Consulting nearby Chattanooga - Integration Assistance Hamilton County Tennessee Offsite Workforce Consulting and Support Services near me in Chattanooga - Integration Consulting Experts Chattanooga, Hamilton County
  • Work from Home Employees Kansas City Guidance - Help Desk Call Center Solutions Consulting Wyandotte County Kansas Work at Home Employees Consulting Services near me in Kansas City - Call Desk Outsourcing Expertise Kansas City, Wyandotte County

  • Juniper J Series Gateway Cybersecurity Contractor
    Juniper J Series Router Audit

    Progent's Juniper-certified network engineers can assist your organization to design and carry out the installation of Juniper J Series firewall/VPN routers, configure security policies and fault-tolerant redundancy, and provide ongoing technical consulting and troubleshooting services.


    © 2002-2024 Progent Corporation. All rights reserved.