Email security involves a lot of buzzwords. What do they mean?
For a glossary of common email security terms, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Email Guard?
Email Guard is a spam filtering service and email security solution designed for small and mid-sized businesses. Email Guard combines the world-class cloud infrastructure and services of top data security companies with proven on-premises security gateway hardware to protect inbound and outbound email against spam, viruses and other email-borne threats and also offers outbound data protection via content filtering and encryption. In addition, Email Guard's centralized monitoring, management and reporting tools help you administer and troubleshoot your email system and define and enforce corporate email policy.

Back to top

What is the danger of email-based attacks?
About 70% of email is spam. 3% of emails have malicious attachments. 91% of successful hacks begin with email attacks. Spam lowers productivity. Viruses and advanced persistent threats (APTs) can steal and information and money, and shut down your network. Poorly secured email systems can violate government regulatory requirements and industry standards and expose you to litigation.

Back to top

What is the architecture of Email Guard's security solution?
Email Guard uses a hybrid architecture that includes cloud-based resources as well as on-premises email security gateway hardware. The Cloud Protection Layer prevents 95% of spam and the vast majority of viruses and other malware from ever reaching your security perimeter. The on-premises security gateway appliance provides deep, multi-level inspection for inbound threats including spam embedded within images. The security gateway also offers spam and virus protection, policy based content filtering, rate control, and cloud-assisted encryption for outbound email. In addition, Email Guard's architecture provides centralized web-based administration with comprehensive monitoring  and reporting plus options for role-based management delegation. A cloud-based Update Center enables zero-hour defense against newly discovered threats and keeps the Cloud Protection Layer and the security gateway up to date without management intervention.

For a detailed discussion of Email Guard's architecture, see Email Guard technology and architecture.

Back to top

Why does Email Guard use a hybrid design with cloud services and on-premises hardware?
The combination of cloud-based and on-premises resources used by Email Guard provides better security, performance and resilience than would be possible with a one-dimensional architecture. For zero-hour security, the cloud-based Update Center provides 24x7x365 monitoring of worldwide threats, develops defenses, and distributes updates in real time to Email Guard's local security gateway appliance. In addition, the Cloud Protection Layer blocks the vast majority of spam and malware before it ever reaches your security perimeter, which enhances both security and system performance. Security and performance are also improved by the ability of the purpose-built local gateway to perform deep analysis of email traffic, including image scanning, before traffic reaches your email server. To stabilize performance, the local security gateway offers rate control for inbound and outbound email. For resilience, Email Guard's Cloud Protection Layer offers spooling. If your local data center goes down, spooling allows you to store all your inbound email in the cloud for up to 96 hours or direct it to an alternative destination while you fix the problem.

Back to top

What email-based threats does Email Guard block?
The Email Guard security gateway provides consecutive security filters that include Denial of Service (DoS) and security protection, rate control, IP reputation analysis, sender authentication, recipient verification, virus protection, user-specified policy enforcement, signature analysis, intent analysis, image analysis, Bayesian analysis, and spam rules scoring. This results in fast, comprehensive email protection against spam, viruses, spoofing, phishing, directory harvest, and spyware attacks. For a glossary of these and other terms used in email security, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Progent's role in delivering the Email Guard solution?
Progent can help you plan your Email Guard deployment, recommend security gateway hardware appropriate for your expected workloads and security requirements, configure your gateway, integrate Email Guard with Exchange Server or any other email platform, define and configure policies for inbound spam and outbound content filtering, set up and test outbound encryption, design and implement a high-availability solution that can include clustered security gateways, set up an efficient management system that takes advantage of delegated administration, and provide training, ongoing consulting support and troubleshooting services.

Progent's Microsoft-certified consultants can provide Microsoft System Center Operations Manager consulting so you can monitor your entire email and network infrastructure and resolve potential problems before they impact network productivity. Progent's Cisco-certified CCIE network consultants can help you design, build and troubleshoot a network infrastructure that supports both the on-premises and cloud-based resources that make up your Email Guard ecosystem. Progent's CISSP-certified cybersecurity consultants can help you plan and validate a cohesive security environment that protects your business against email-borne, web-based and internal threats and that complies with government regulations, industry standards, and your own corporate policies.

Back to top

Why is it important to filter outbound email?
Outbound filtering provides two major benefits: data loss protection (DLP) and reputation protection. DLP stops sensitive information from leaking out of your business via careless emails. Leaked data can result in regulatory infractions, identity theft, and loss of competitive advantage. It can also lead to litigation. The Email Guard security gateway includes pre-defined content filters such as HIPAA, credit card numbers, and Social Security Numbers. Email Guard also allows you to create custom content filtering policies covering specified keywords, categories, or character sets. Content filtering policies can be configured to block, quarantine or encrypt messages automatically.

Outbound filtering can also block spam and viruses sent by internal computers that have been compromised, which is a serious vulnerability in BYOD (Bring Your Own Device) environments. Organizations which allow spam and viruses to be sent out can be placed on block lists, or "blacklisted". This loss of reputation can hurt productivity and profits.

Back to top

Why can't my firewall stop spam or Directory Harvest Attacks?
Conventional firewalls offer little or no protection against spam or Directory Harvest Attacks. Inbound email often passes through the firewall to your email server without regard for message content, message size or address, creating an opportunity for spam and viruses to enter and making your email system vulnerable to directory harvesting.

Back to top

How does Email Guard support email encryption?
Email Guard utilizes a cloud-based Message Center to handle the encryption and delivery of outbound email. Administrators can establish multiple policies for determining which emails are automatically encrypted. These are then sent securely over TLS to the Message Center where they are encrypted using AES-256 and stored for retrieval. The Message Center sends the intended recipient a notice that includes a URL to visit in order to retrieve the encrypted email. Once establishing a password, the recipient can read the encrypted message. Any replies are also encrypted at the Message Center. In addition, Email Guard includes a plug-in for Exchange Server which lets users choose to encrypt individual emails. For more details about how Email Guard encrypts outbound email, visit Email Guard technology and architecture.

Back to top

Is Email Guard difficult to manage?
Email Guard includes a browser-based management portal designed to be easy to use for administrators in small and mid-size organizations. The portal's dashboard offers centralized monitoring and control of hardware, services, policies and configurations, and keeps extensive health and performance statistics on inbound and outbound email. You can easily track by day or hour the number of inbound and outbound messages blocked, quarantined, and rate controlled; the inbound messages tagged and allowed; and the outbound messages sent, redirected, and encrypted. Granular policy control includes delegated domain administration, delegated help desk role, and individual user policy control. For more information about Email Guard's cloud-based management features, see Email Guard technology and architecture.

Back to top

What email platforms are supported by Email Guard?
Email Guard works with any on-premises email platform but offers some enhanced features when used with Microsoft Exchange Server, such as the Outlook client encryption add-in and the Exchange LDAP Accelerator.

Back to top

How does Email Guard impact email performance?
The hybrid architecture of Email Guard leverages the massive scale of cloud-based resources and the power of purpose-built gateway hardware to off-load almost all the work of email protection from the email server. On-premises gateways are available in a variety of models that offer performance that ranges from entry level to enterprise class, and gateways can be clustered for improved performance, as well as higher availability. You can configure Email Guard to deliver the performance you need, and you can easily expand your deployment as your needs grow.

Back to top

How does Email Guard avoid blocking legitimate email through false positives?
A false positive is a legitimate email quarantined as spam. The default policy configurations in Email Guard have a false positive rate of 0.01%, which is low by industry standards. Administrators have options to adjust the aggressiveness of Email Guard's spam filtering with techniques such as threshold scoring, but the surest way to prevent false positives is to build "allow lists" or "whitelists" that specify legitimate senders. Email Guard permits users to control spam scoring, Bayesian analysis, and allow lists at the personal level.

Back to top

How can I get help now with email security?
If your organization needs online or onsite help with any aspect email security:
Call 800-993-9400 or visit Contact Progent.

Back to top

Also See:

An index of content::

  • 24 Hour Cisco Small Office Computer Consultants Buffalo Cisco Migration Consultants Buffalo, NY

  • Remote Access Consultant Services
    VPN Help and Support

    Cisco's network security and remote connection products for small companies provide a complete line of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and CCNP certifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, Cisco Aironet and Meraki Wi-Fi access points, and other Cisco security technologies that fit most closely with your company goals.

  • 24/7 CISSP Protection Mission Viejo-San Clemente Best Cybersecurity Companies Firewall Mission Viejo-Dana Point, CA
  • After Hours CISSP Computer Security Charlotte Security Cybersecurity Companies Charlotte, Mecklenburg County

  • Cisco Certified Experts Network Design and Consulting Texas
    New Jersey Service

    Progentís Technical Response Center (TRC) provides national extended hours remote troubleshooting for information systems based on Windows and Cisco technology. Progent's Microsoft and Cisco-Certified service experts provide after-hours telephone help and remote direct computer connection to troubleshoot and repair network problems rapidly and affordably. The scope of IT experience available from Progent's staff of country-wide support professionals makes it possible to escalate even the toughest problems to appropriate experts as needed. For urgent problems, the TRC endeavors to answer your request for service within one hour.

  • Arkansas SharePoint System Support 24x7x365 SharePoint Small Business Outsourcing IT Little Rock Arkansas
  • Austin At Home Workers IP Voice Technology Consultants Austin, Travis County Austin Remote Workforce VoIP Solutions Expertise Austin-Bergstrom Airport AUS
  • Boise, Idaho Network Architect Firms Boise-Ada County Technical Consultant
  • Cisco IT Service Provider Memphis, TN Tennessee Cisco Information Technology Outsourcing

  • Microsoft Certified Expert Windows Server 2012 R2 Support and Help
    Windows Server 2012R2 Data Deduplication Online Help

    Progent's Microsoft-certified professionals can assist you to evaluate the advantages of Windows Server 2012 R2 for your company, create pilot environments and migration plans, tune your network infrastructure for local, multi-location, cloud-based, and partial-cloud datacenters, train your IT support staff, create an enterprise-wide security plan, streamline network administration, assist with application development, and build and test a disaster recovery/business continuity plan.

  • Cisco IT Specialists Sioux Falls, Rapid City, Aberdeen, SD Cisco Consolidation Sioux Falls, Rapid City, Aberdeen, SD

  • Consultant Database Applications
    Consultancy Database Development

    Progent's Microsoft-certified database application developers can provide small and midsize businesses remote support for popular RDBMS platforms such as MS SQL Server, Oracle, MySQL, and Microsoft Access. Consulting support available from Progent include installation and integration, application architecture and coding, administration support, synchronization solutions, storage management, tuning, migration, information security, backup and recovery options, problem solving, and training.

  • Cisco Virtual Private Network Specialist VPN IT Consulting
  • Cisco Voice over IP Consultants Cisco NSS3000 Network Storage Systems Consultant Services
  • Cisco and Microsoft Certified Experts Clearwater Small Business Specialist 24/7 Clearwater Upgrading
  • Computer Consulting Services Windows Server 2012 24-Hour Small Business Computer Consultants Windows Beverly Hills-Bel Air, California
  • Email Virus Fingerprint Consult
  • Computer Outsourcing Consultant Cisco Washington District of Columbia Cisco Installation
  • Consolidate Microsoft SQL Server 2016 Manchester New Hampshire Security Consulting Group Microsoft SQL Server 2016
  • Consulting Windows Server 2012 R2 Hyper-V 3.0 Microsoft Hyper-V 3.0 Server Consolidation Consultant Services
  • Dallas - Irving Texas Offsite Workforce Consulting near Dallas - Integration Consulting Services Dallas, TX Dallas At Home Workforce Solutions Consulting Experts

  • 24x7x365 SCOM 2012 Fabric Monitoring Onsite Technical Support
    Operations Manager Migration Specialist

    Progent's Microsoft-certified consulting experts have over 10 years of experience designing, deploying, enhancing and repairing Microsoft SCOM solutions and offer companies of any size expert online or on-premises consulting services for Microsoft SCOM 2012. Progent can help your company to plan an architecture for Microsoft SCOM 2012 servers that delivers the responsiveness and resilience required to monitor your datacenter efficiently, whether your datacenters are onsite, cloud-based, or a hybrid environment. Progent can also assist you to import and set up System Center 2012 Operations Manager management packs based on leading practices for monitoring network fabric as well as both Microsoft and third-party applications and services. In addition, Progent can provide responsive online or on-premises technical support to assist you to remediate serious issues uncovered by SCOM 2012.

  • Double Take Replication Manager Support and Integration Consultants DoubleTake Carbonite Availability
  • Emergency Cisco Computer Outsourcing Newark, NJ Top IT Outsourcing Group Cisco Newark New Jersey
  • Emergency New Mexico Computer Network Specialists 24-7 New Mexico Consultancies
  • Emergency Phone Support Server Consultant Ventura California Ventura Camarillo Newbury Park Microsoft Computer Small Office Computer Consulting
  • Engineer Citrix virtual Windows desktops Top Citrix XenDesktop virtual desktops On-site Support
  • Engineer Microsoft Lync Presence Consultants Lync Server 2013 and Cisco UC
  • Firepower Management Center Network Consultant 24x7 Cisco Firepower Management Integration Services
  • Huntington Beach Southern California Exchange Server 2013 Small Business Network Consulting Services MCSE Expert Certified Exchange Server 2019 Computer Network Service Company Huntington Beach California
  • IT Consultants Red Hat Linux, Solaris, UNIX Lexington-Fayette Slackware Linux, Solaris, UNIX Support Services Lexington Blue Grass Airport LEX
  • IT Services Microsoft SharePoint Server 2007 Hartford County Connecticut Microsoft SharePoint 2013 Support Outsourcing Hartford Enfield Bristol Farmington
  • Lync Server 2013 and SharePoint Technology Professional Lync Server 2013 and Cisco UC Technology Professional
  • Email Bayesian Analysis Consulting Services
  • MCSE MCSA MCDBA MCIPT MCA Remote Engineer Careers Minneapolis Cisco CCIE Storage Networking Network Engineer Telecommuting Job Minneapolis Hennepin County

  • Network Security Test Juniper Junos CLI
    Juniper Junos Security Team

    Progent's Juniper-authorized network consultants can help your company to plan and deploy Juniper Firewall/VPN platforms, optimize and troubleshoot your network infrastructure, and migrate smoothly from outdated products to current releases. Progent's Junos OS consultants can offer support for Juniper's premier network control software to help you to simplify the administration and improve the protection of your Juniper VPN appliances and routers. Progent also has extensive background maintaining Juniper's NetScreen OS and ScreenOS software productss and can assist organizations maintain environments that incorporate a combination of Juniper's OS platforms.

  • Manhattan Beach Work from Home Employees Infrastructure Expertise Manhattan Beach-Hawthorne Manhattan Beach Telecommuters Setup Consulting Experts Manhattan Beach California
  • Specialists ProSight Email Content Filtering Policies
  • Memphis, TN Firewall Network Security Audit Evaluation CISSP Memphis Bartlett Germantown Collierville
  • Microsoft Exchange Design Firm Inglewood, CA Consultancy Firm Microsoft Network Inglewood, CA
  • Morgan Hill Network Integration Morgan Hill Small Business IT Outsourcing Firms
  • New York - New York City, NY, Buffalo, NY, Rochester, NY, Syracuse, NY Network Support Company New York City, COUNTY1, New York Tech Services
  • Newport Beach Windows Server 2019 Network Service Windows Server 2012 R2 Networking Consultancy Services Newport Beach
  • Pasadena At Home Workers Endpoint Management Tools Guidance Pasadena, TX 24-7 Pasadena Teleworkers Endpoint Management Systems Guidance Harris County Texas
  • ProSight Endpoint Security Outsourcing Computer Virus Forensics Support
  • Providence, RI, Warwick, RI, Cranston, RI, CITY4, RI Sun Solaris Online Help Rhode Island - Providence, RI, Warwick, RI, Cranston, RI Solaris Support and Setup
  • SQL Technical Support Companies Wichita, Overland Park, Kansas City, KS SQL On-Call Services Wichita, Sedgwick County, Kansas

  • Private Cloud Virtual Datacenter Hosting Consulting Services
    ProSight Virtual Hosting Consulting

    Progent's ProSight Virtual Hosting service offers complete hosting of a small or mid-size organization's production servers in a solution that delivers the highest level of dependability and expandability and is also easy to transfer to any data center. ProSight Virtual Hosting services are based on mature virtualization platforms that enable small businesses with mixed- platform IT systems to economize significantly on the expense of capital equipment, system maintenance, and network management while achieving world-class fault tolerance and an unprecedented level of vendor independence.

  • San Rafael-Sausalito Implementation Services San Rafael-Corte Madera Computer Installation
  • Security Security Team Anchorage Dimond Center Firewall Security Firms Anchorage Muldoon Mall
  • SharePoint Online Consulting 24-Hour Microsoft SharePoint Server 2013 IT Consultant
  • ProSight Spam Filtering Services Consultant
  • Small Business Network Support and Integration Professional Small Office Network
  • Small Office Computer Consulting Services Windows Server 2012 R2 Network Design and Configuration Windows Server 2016
  • St Paul, Ramsey County At Home Workers Consulting Experts near St. Paul - Collaboration Solutions Consulting St. Paul Remote Workers Collaboration Solutions Expertise St Paul-Eagan

  • Help Desk Call Center Network Consulting
    Emergency Network Support Help Desk Online Support

    The Contact Center support delivery structure used by Progent's Technical Response Center gives small businesses an affordable alternative to reliance on freelance service individuals by offering broad expertise accessible to numerous support groups, optional 24x7 access to emergency help, fast escalation to appropriate engineers for handling the most intractable issues, support consistency and dependability, quick follow-up overseen by veteran support managers, a selection of convenient ways for requesting service tasks, plus excellent progress visibility enabled by ticket updates and available via a web-based portal.

  • Stamford At Home Workers Integration Consulting and Support Services Stamford Norwalk Shelton Offsite Workforce Stamford Expertise - Infrastructure Consulting Services Stamford
  • Support and Help Redhat Kansas - Wichita, KS, Overland Park, KS, Kansas City, KS, Topeka, KS Computer Engineer Redhat Kansas - Wichita, KS, Overland Park, KS, Kansas City, KS, Topeka, KS

  • Technology Professional Citrix for Hyper-V
    Citrix Essentials Consult

    Progent's Citrix consultants can help your organization to evaluate the business benefits of the various versions of Essentials for Hyper-V, help you to use Citrix administration tools with your Microsoft Hyper-V environment, and show you how you can deploy Citrix Essentials for Hyper-V to enhance the responsiveness, uptime, flexibility, and fault tolerance of your virtualized network while lowering the cost of resources and operations and simplifying administrative processes.

  • Email Virus Signature Professionals
  • Technical Services SQL Washington District of Columbia SQL Small Business IT Outsourcing Washington District of Columbia
  • Top Ranked ProSight Email Security Technology Professional
  • Tracy CA Consulting Experts for Stockton Network Support Providers Lathrop, Ripon CA Consulting Expertise for Stockton Network Support Companies
  • Windows Server 2012 R2 Integration Specialist Brooklyn Windows Server 2016 Service Providers Brooklyn, New York
  • Windows Server 2019 and SCVMM Configuration Open Now Windows Server 2019 Hybrid Configuration Consulting
  • Work from Home Employees Consulting Experts nearby Stockton - Connectivity Solutions Consulting and Support Services Stockton Manteca, CA Offsite Workforce Assistance in Stockton - Connectivity Solutions Assistance
  • Top Rated Consultant ProSight Email Guard Outbound Email Encryption

  • © 2002-2020 Progent Corporation. All rights reserved.