Email security involves a lot of buzzwords. What do they mean?
For a glossary of common email security terms, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Email Guard?
Email Guard is a spam filtering service and email security solution designed for small and mid-sized businesses. Email Guard combines the world-class cloud infrastructure and services of top data security companies with proven on-premises security gateway hardware to protect inbound and outbound email against spam, viruses and other email-borne threats and also offers outbound data protection via content filtering and encryption. In addition, Email Guard's centralized monitoring, management and reporting tools help you administer and troubleshoot your email system and define and enforce corporate email policy.

Back to top

What is the danger of email-based attacks?
About 70% of email is spam. 3% of emails have malicious attachments. 91% of successful hacks begin with email attacks. Spam lowers productivity. Viruses and advanced persistent threats (APTs) can steal and information and money, and shut down your network. Poorly secured email systems can violate government regulatory requirements and industry standards and expose you to litigation.

Back to top

What is the architecture of Email Guard's security solution?
Email Guard uses a hybrid architecture that includes cloud-based resources as well as on-premises email security gateway hardware. The Cloud Protection Layer prevents 95% of spam and the vast majority of viruses and other malware from ever reaching your security perimeter. The on-premises security gateway appliance provides deep, multi-level inspection for inbound threats including spam embedded within images. The security gateway also offers spam and virus protection, policy based content filtering, rate control, and cloud-assisted encryption for outbound email. In addition, Email Guard's architecture provides centralized web-based administration with comprehensive monitoring  and reporting plus options for role-based management delegation. A cloud-based Update Center enables zero-hour defense against newly discovered threats and keeps the Cloud Protection Layer and the security gateway up to date without management intervention.

For a detailed discussion of Email Guard's architecture, see Email Guard technology and architecture.

Back to top

Why does Email Guard use a hybrid design with cloud services and on-premises hardware?
The combination of cloud-based and on-premises resources used by Email Guard provides better security, performance and resilience than would be possible with a one-dimensional architecture. For zero-hour security, the cloud-based Update Center provides 24x7x365 monitoring of worldwide threats, develops defenses, and distributes updates in real time to Email Guard's local security gateway appliance. In addition, the Cloud Protection Layer blocks the vast majority of spam and malware before it ever reaches your security perimeter, which enhances both security and system performance. Security and performance are also improved by the ability of the purpose-built local gateway to perform deep analysis of email traffic, including image scanning, before traffic reaches your email server. To stabilize performance, the local security gateway offers rate control for inbound and outbound email. For resilience, Email Guard's Cloud Protection Layer offers spooling. If your local data center goes down, spooling allows you to store all your inbound email in the cloud for up to 96 hours or direct it to an alternative destination while you fix the problem.

Back to top

What email-based threats does Email Guard block?
The Email Guard security gateway provides consecutive security filters that include Denial of Service (DoS) and security protection, rate control, IP reputation analysis, sender authentication, recipient verification, virus protection, user-specified policy enforcement, signature analysis, intent analysis, image analysis, Bayesian analysis, and spam rules scoring. This results in fast, comprehensive email protection against spam, viruses, spoofing, phishing, directory harvest, and spyware attacks. For a glossary of these and other terms used in email security, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Progent's role in delivering the Email Guard solution?
Progent can help you plan your Email Guard deployment, recommend security gateway hardware appropriate for your expected workloads and security requirements, configure your gateway, integrate Email Guard with Exchange Server or any other email platform, define and configure policies for inbound spam and outbound content filtering, set up and test outbound encryption, design and implement a high-availability solution that can include clustered security gateways, set up an efficient management system that takes advantage of delegated administration, and provide training, ongoing consulting support and troubleshooting services.

Progent's Microsoft-certified consultants can provide Microsoft System Center Operations Manager consulting so you can monitor your entire email and network infrastructure and resolve potential problems before they impact network productivity. Progent's Cisco-certified CCIE network consultants can help you design, build and troubleshoot a network infrastructure that supports both the on-premises and cloud-based resources that make up your Email Guard ecosystem. Progent's CISSP-certified cybersecurity consultants can help you plan and validate a cohesive security environment that protects your business against email-borne, web-based and internal threats and that complies with government regulations, industry standards, and your own corporate policies.

Back to top

Why is it important to filter outbound email?
Outbound filtering provides two major benefits: data loss protection (DLP) and reputation protection. DLP stops sensitive information from leaking out of your business via careless emails. Leaked data can result in regulatory infractions, identity theft, and loss of competitive advantage. It can also lead to litigation. The Email Guard security gateway includes pre-defined content filters such as HIPAA, credit card numbers, and Social Security Numbers. Email Guard also allows you to create custom content filtering policies covering specified keywords, categories, or character sets. Content filtering policies can be configured to block, quarantine or encrypt messages automatically.

Outbound filtering can also block spam and viruses sent by internal computers that have been compromised, which is a serious vulnerability in BYOD (Bring Your Own Device) environments. Organizations which allow spam and viruses to be sent out can be placed on block lists, or "blacklisted". This loss of reputation can hurt productivity and profits.

Back to top

Why can't my firewall stop spam or Directory Harvest Attacks?
Conventional firewalls offer little or no protection against spam or Directory Harvest Attacks. Inbound email often passes through the firewall to your email server without regard for message content, message size or address, creating an opportunity for spam and viruses to enter and making your email system vulnerable to directory harvesting.

Back to top

How does Email Guard support email encryption?
Email Guard utilizes a cloud-based Message Center to handle the encryption and delivery of outbound email. Administrators can establish multiple policies for determining which emails are automatically encrypted. These are then sent securely over TLS to the Message Center where they are encrypted using AES-256 and stored for retrieval. The Message Center sends the intended recipient a notice that includes a URL to visit in order to retrieve the encrypted email. Once establishing a password, the recipient can read the encrypted message. Any replies are also encrypted at the Message Center. In addition, Email Guard includes a plug-in for Exchange Server which lets users choose to encrypt individual emails. For more details about how Email Guard encrypts outbound email, visit Email Guard technology and architecture.

Back to top

Is Email Guard difficult to manage?
Email Guard includes a browser-based management portal designed to be easy to use for administrators in small and mid-size organizations. The portal's dashboard offers centralized monitoring and control of hardware, services, policies and configurations, and keeps extensive health and performance statistics on inbound and outbound email. You can easily track by day or hour the number of inbound and outbound messages blocked, quarantined, and rate controlled; the inbound messages tagged and allowed; and the outbound messages sent, redirected, and encrypted. Granular policy control includes delegated domain administration, delegated help desk role, and individual user policy control. For more information about Email Guard's cloud-based management features, see Email Guard technology and architecture.

Back to top

What email platforms are supported by Email Guard?
Email Guard works with any on-premises email platform but offers some enhanced features when used with Microsoft Exchange Server, such as the Outlook client encryption add-in and the Exchange LDAP Accelerator.

Back to top

How does Email Guard impact email performance?
The hybrid architecture of Email Guard leverages the massive scale of cloud-based resources and the power of purpose-built gateway hardware to off-load almost all the work of email protection from the email server. On-premises gateways are available in a variety of models that offer performance that ranges from entry level to enterprise class, and gateways can be clustered for improved performance, as well as higher availability. You can configure Email Guard to deliver the performance you need, and you can easily expand your deployment as your needs grow.

Back to top

How does Email Guard avoid blocking legitimate email through false positives?
A false positive is a legitimate email quarantined as spam. The default policy configurations in Email Guard have a false positive rate of 0.01%, which is low by industry standards. Administrators have options to adjust the aggressiveness of Email Guard's spam filtering with techniques such as threshold scoring, but the surest way to prevent false positives is to build "allow lists" or "whitelists" that specify legitimate senders. Email Guard permits users to control spam scoring, Bayesian analysis, and allow lists at the personal level.

Back to top

How can I get help now with email security?
If your organization needs online or onsite help with any aspect email security:
Call 800-993-9400 or visit Contact Progent.

Back to top

Also See:



An index of content::

  • 24 Hour Jundiaí Crypto-Ransomware Egregor Readiness Assessment Jundiai, SP Jundiaí Crypto-Ransomware Hermes Vulnerability Report Jundiai

  • Outsourced IT Management Services Microsoft Office 2003
    Microsoft Office 2000 Network Outsource

    Progent’s IT outsourcing packages offer affordable network support for small organizations. Whether it involves designing system architecture, creating an in-house Help Desk or outsourcing a one, deploying an updated email system, monitoring your system, or creating an on-line business application, outsourcing your IT engineering services can reduce expenses and eliminate uncertainties, permitting network support budgets to increase in a more moderate and manageable manner than is feasible by assembling a large, knowledgeable in-house network support organization. Progent’s Outsourcing White Paper and datasheets tell you how Progent can help you build a secure and robust network foundation for your critical business software powered by Windows such as Microsoft Office XP, Office 2003, and Office 2000.

  • 24-7 Cisco Access Point Network Help Computer Services Cisco Architecture
  • 24/7 Microsoft Windows Server 2016 Online Help Seattle Puget Sound Repairing Windows
  • 24x7 Santiago DopplePaymer Ransomware Recovery Santiago WannaCry Crypto-Ransomware Cleanup Santiago
  • Top Quality Professional Email Scoring Thresholds
  • After Hours Bristol WannaCry Ransomware Rollback Best Bristol Maze Ransomware Restoration Bristol
  • After Hours Remote Workers Consulting near Portland - Backup Systems Consulting Portland Telecommuters Guidance near Portland - Data Protection Solutions Consultants Portland, OR

  • Computer Engineer Meraki Outdoor APs
    Meraki Outdoor Wi-Fi Access Point Remote Support

    Progent's Cisco-Meraki Wi-Fi access point consultants can assist your organization to plan, configure, manage and debug Cisco's Meraki-based Wi-Fi networks for deployments from a small office to a campus or a multi-site enterprise. Progent can also help clients to integrate other Cisco appliances for unified management.

  • Albany NY Teleworkers Albany Consulting - IP Voice Systems Assistance Top Remote Workers Albany Consulting Experts - VoIP Systems Consulting

  • Wi-Fi Site Survey and Design Computer Engineer
    On-premises Wireless Site Survey Remote Support Services

    Progent's Wi-Fi site survey and predictive modeling assist you to plan, deploy and debug a Wi-Fi network optimized for your facilities, offering your business a wireless solution that has the coverage, performance, capacity, Quality of Service, data protection, and roaming ability your business needs. Wireless site survey services from Progent include remote predictive analysis for planning a wireless LAN and onsite site survey services for validating, optimizing, and troubleshooting a functioning wireless LAN.

  • Amazon EC2 AMI Reporting Amazon S3 integration Programming Company

  • Microsoft Windows Service Providers
    Microsoft Office 2000 IT Service Providers

    Progent applies no minimum fee and asks no monthly commitment for services delivered during normal working hours. Progent's small granularity eliminates large invoices for fast repairs so you will not be forced to permit minor problems to stay unaddressed. .

  • Amazon Marketplace Web Service programming Integration Companies Amazon Marketplace Web Service development Programming Firm
  • At Home Workforce Consulting Experts in Recife - Backup/Restore Systems Consulting At Home Workers Recife Consultants - Backup Solutions Consulting Experts Recife, PE
  • Aurora Crypto-Ransomware Readiness Consultation Aurora Batavia Aurora Ransomware Netwalker Susceptibility Review Aurora Illinois
  • Bakersfield San Joaquin Valley Bakersfield Dynamics GP-Great Plains Upgrades Support Bakersfield MS Dynamics GP (Great Plains) Migration Expert Bakersfield, CA

  • 9800-L wireless controller Support Outsourcing
    wi-fi controller Integration Services

    Cisco's Catalyst family of wireless controllers simplify the administration of wireless LANs by unifying the provisioning and management of Wi-Fi access points, tuning wireless throughput by reducing the effect of radio frequency congestion, improving wireless availability with fast auto-failover, and hardening security by detecting threats and analyzing traffic content according to user class and locale. Progent's Wi-Fi consultants can assist your business to deploy Cisco Wi-Fi controller appliances to manage Wi-Fi networks of any size. Progent can help you to administer and troubleshoot your current Cisco-based Wi-Fi environment or implement a smooth upgrade to Cisco's modern Wi-Fi controller solutions.

  • Boston Telecommuters Cloud Integration Systems Consulting and Support Services New England Remote Workforce Guidance - Boston - Cloud Integration Systems Consulting

  • Catalyst 9115 Access Point Configuration
    Catalyst 802.11ax AP Migration Online Support Services

    Progent's Cisco-certified Catalyst 802.11ax Wi-Fi 6 WAP consultants can provide affordable online and on-premises support for Catalyst Wi-Fi 6 wireless access points.

  • Chandler Hermes Crypto-Ransomware Rollback Chandler, AZ Chandler Dharma Crypto-Ransomware System-Restoration Maricopa County Arizona

  • Largest OS X Online Consultants
    Mac Online Technical Support Engineer

    Progent offers national remote phone support and troubleshooting services for companies who operate macOS and OS X networks or whose information systems feature a mix of Apple Mac and Microsoft Windows technology. Progent's consultants can provide Mac clients a variety of services including desktop assistance, migration to the current version of macOS from other earlier versions of macOS or OS X, plus help with Mac application software. Progent's specialists in Apple technology can also assist you with Apple iPhone and Apple iPad integration and management, or migrating to Apple's iCloud. Remote technical support provides maximum leverage for your IT budget by extending client productivity and shortening the hours charged for computer analysis and repair. Sophisticated remote support utilities and experienced technicians and consultants combine to enable Progent to handle the majority of IT problems without squandering time and expense by traveling to your location. In the vast majority of situations your network problems can be dealt with over the phone or via a mix of telephone help and remote network analysis. Progent can make available Cisco CCIE infrastructure experts and CISA certified security professionals to help with the toughest system issues.

  • Chesapeake Offsite Workforce Help Desk Outsourcing Assistance South Hampton Roads Chesapeake, South Hampton Roads At Home Workforce Chesapeake Consulting and Support Services - Help Desk Call Center Outsourcing Consulting
  • Cheyenne-Casper, Wyoming Top Cheyenne Lockbit Crypto-Ransomware System-Rebuild Cheyenne Wyoming Cheyenne Maze Crypto-Ransomware System-Restoration
  • Colorado Springs Maze Crypto-Ransomware Repair Colorado Springs Fort Carson Immediate Colorado Springs Ryuk Crypto-Ransomware Malware Removal Case Study Colorado Springs, United States
  • Denver Offsite Workforce Collaboration Systems Expertise Denver Golden Triangle At Home Workforce Denver Guidance - Collaboration Technology Consulting Experts Denver Golden Triangle
  • Emergency Work from Home Employees Mexico City Consulting Services - Help Desk Solutions Consulting Services Ciudad de México, Tlalpan Mexico City Work at Home Employees Call Desk Solutions Guidance Mexico City, Cuauhtémoc, CDMX
  • Firewall Cybersecurity Consultancy Phoenix Arizona Information Technology Consulting Firewall Phoenix - Paradise Valley - Tempe

  • System Center MOM Professional
    Support Outsourcing 24x7 Network

    Remote 24x7 monitoring, automated alarms, and periodic analytical reporting are vital to preserving the health of your IT system and eliminating unnecessary and expensive disruptions. Remote Monitoring and Management technology has progressed so far that companies of all sizes can get a level of protection that was once limited to large enterprises. Progent offers a variety Remote Monitoring and Management (RMM) solutions delivered as low-cost service packages created to help your company to detect and fix a most network problems before they can hurt productivity.

  • Email Virus Signature Consulting
  • Harrisburg At Home Workers IP Voice Systems Consulting and Support Services Harrisburg-Lancaster, PA, America Harrisburg-Reading Work from Home Employees Harrisburg Guidance - VoIP Technology Consulting Services

  • SQL Server 2019 Performance Tuning Onsite Technical Support
    SQL Server 2019 Support

    Progent's certified SQL Server 2019 experts can help your organization to assess the business case for migrating to SQL Server 2019 and can deliver rapid online or onsite access to consulting experts in solution planning and integration, application development, SQL Server management, and cybersecurity.

  • IT Staff Augmentation for Network Support Teams Palm Beach County Florida Temporary Network Support Staffing Support Services Consulting Expertise West Palm Beach-Lake Worth, FL
  • Indianapolis Short Term IT Staffing Support Services Indianapolis Indiana Immediate Indianapolis Staffing Help
  • Internet Access Professionals Internet Connection Consultant Services
  • Jacksonville At Home Workers VoIP Technology Expertise Jacksonville, FL Jacksonville Offsite Workforce VoIP Solutions Consultants
  • Lehigh County Pennsylvania Offsite Workforce Assistance nearby Allen - Collaboration Solutions Consulting Allen Telecommuters Collaboration Solutions Consulting and Support Services Allentown, PA
  • Mesa Consulting Services for Computer Support Organizations Maricopa County Arizona Consulting Services for Mesa Network Service Providers Mesa, AZ
  • Email Guard DLP Consultants
  • Mesa Temporary IT Staffing Help Mesa, AZ Mesa, AZ Temporary Network Support Staffing Help Expertise
  • Microsoft Dynamics GP Premier Partner nearby Ribeirão Preto - Setup Outsourcing Ribeirão Preto MS Dynamics GP (Great Plains) Customization Support Services
  • Microsoft and Apple Small Office Network Consulting Services Alexandria, VA Small Business Network Network Support Companies Alexandria
  • Milwaukee Urgent CryptoLocker Remediation Milwaukee Racine Waukesha Milwaukee 24-7 Crypto Recovery Experts Milwaukee Wisconsin
  • Network Consultant Windows Server 2016 San Francisco Bay Area Network Security Consulting Windows 2008 Server SF Bay Area
  • Offsite Workforce Consulting in Albuquerque - Setup Consultants Albuquerque Offsite Workforce Consultants nearby Albuquerque - Infrastructure Consulting Experts Kirtland Air Force Base
  • Offsite Workforce Tucson Consulting Services - Help Desk Solutions Consulting and Support Services Pima County Top Tucson At Home Workforce Help Desk Outsourcing Consulting Services Tucson, Pima County, United States

  • Consultants Dynamics GP ODBC
    Services Dynamics GP BizTalk Adapter

    Progent's seasoned application designers and programmers can help your company to create enhancements to Microsoft Dynamics GP/Great Plains that address the unique requirement of your business while retaining the benefits of Windows integration and connectivity. Progent can also provide help with a range of development technologies that can be used to create integrations with Microsoft Dynamics GP. These integration tools include Dexterity, Modifier, Visual Studio Tools for Microsoft Dynamics GP, Continuum, eConnect, Web Services for Microsoft Dynamics GP, Integration Manager and ODBC.

  • Perth IT Consulting Group Perth-Joondalup Computer Consulting Firm
  • Portland, OR Exchange Small Business IT Consulting Firm Troubleshooting Exchange Portland, Salem, Eugene, Beaverton, Hillsboro OR

  • Wireless Email Small Business Network Consulting
    Cisco Expert Outlook Guru

    Progent's Microsoft-certified consultants have two decades of experience providing electronic messaging and integrated email/telephony solutions for companies. Progent provides economical Microsoft Exchange 2007 Server support services to enhance email security and virus protection, provide fault tolerant email, and implement remote and mobile email connectivity. Progent’s Microsoft Exchange help and support offerings can assist you in planning and deploying a Microsoft Exchange upgrade or a migration from a legacy SMPT system or older Microsoft Exchange software such as Exchange 5.5 to Microsoft Exchange Server 2010.

  • Reading Windows Server 2016 Small Office Computer Consulting Services 24/7 Windows Server 2016 Small Business Network Consulting
  • Remote Exchange Setup Consultancy Services The Woodlands Microsoft Exchange Server 2013 Network Consulting
  • ProSight Email Content Filtering Specialists
  • Remote Workforce Consulting Experts in Panama City - Help Desk Call Center Augmentation Guidance Panamá Province Offsite Workforce Panama City Assistance - Call Desk Solutions Expertise

  • Juniper SSG20 Router Security Auditor
    Juniper SSG Series Firewall Technical Support

    Progent's Juniper-certified consultants can help your business plan the deployment of Juniper SSG integrated firewall/VPN products, configure security policies to match your operational requirements, set up network OS software to streamline management processes, migrate from legacy Juniper products, and troubleshoot infrastructure issues.

  • SQL Server Expert Toledo Ohio SQL 2014 Computer Tech Toledo, OH
  • Santa Cruz Ryuk Crypto-Ransomware Virus Operational-Recovery Example Santa Cruz NotPetya Ransomware System-Restore Scotts Valley CA
  • Email Scoring Thresholds Consulting
  • Santa Monica-West Los Angeles Santa Monica At Home Workforce Help Desk Call Center Outsourcing Expertise Santa Monica-Marina Del Rey, California Santa Monica Offsite Workforce Help Desk Call Center Augmentation Consultants
  • Tampa Crypto-Ransomware Sodinokibi Susceptibility Consultation Tampa St Petersburg Clearwater Tampa Ransomware Susceptibility Tampa, FL
  • Teleworkers Consulting and Support Services nearby Tampa - Collaboration Systems Consulting and Support Services Work from Home Employees Consulting nearby Tampa - Collaboration Systems Guidance Tampa Bay
  • Temporary IT Staffing for IT Support Organizations Napa, CA IT Staffing Temps for IT Service Teams Vallejo, Benicia
  • Toledo Bowling Green At Home Workforce Consulting Services near Toledo - Network Security Systems Consulting Services 24-Hour Teleworkers Consulting and Support Services - Toledo - Endpoint Security Systems Consulting Experts Toledo

  • Help and Support Shared Support Desk
    On-site Support Virtual Support Desk

    Progent’s Co-managed Call Center service allows your business to split responsibilities for Help Desk support seamlessly between your in-house IT staff and Progent's roster of seasoned desktop support technicians and subject matter experts. Progent’s Help Desk Co-management service is an advanced service desk solution based on ConnectWise Manage, the top shared professional services automation (PSA) tool for handling end-user service requests, ticketing, ownership, status tracking, and reporting.

  • Top Home Based Network Engineers Job Opportunity Home Based Virtual Office Telecommuting Microsoft Consultant

  • Outlook for Mac Help and Support
    Urgent Mac Office Support and Setup

    Microsoft Office for Mac allows Mac users to run the world's most familiar business programs. Progent's Apple-certified Mac consultants can show you how to configure Mac Office on a mixed-platform network combining Apple OS X and Windows computers so that Macintosh users can take advantage of the latest capabilities of Microsoft Word, Excel, PowerPoint and Entourage in order to share data and system resources with co-workers who use Windows. Progent's engineers have experience with both Mac and Windows technology and can support networks that combine Mac with Microsoft Windows computers with complete resource sharing, or environments which carefully limit sharing between Apple Mac and Windows users.

  • Top Rated Computer Network Support Companies BlackBerry Wireless Midtown West Clinton, NYC Greenwich Village, U.S.A. BlackBerry Desktop Manager Security Consulting Company
  • Top SharePoint Integration Specialists Wichita Kansas SharePoint Small Business Networking Wichita, KS
  • Email Black Lists Consultant Services
  • Ubuntu Linux, Solaris, UNIX Support Outsourcing Savannah Garden City 24x7 Ubuntu Linux, Solaris, UNIX Support and Help Savannah, GA
  • Urgent Ransomware Cleanup and Restore Rockville-North Bethesda, Maryland WannaCry Ransomware Hot Line Rockville-Montgomery County
  • Webster, United States Microsoft Exchange 2016 Network Support Consultant Exchange Expert Harris County, United States
  • White Paper IT Outsourcing Example IT Outsourcing Whitepaper
  • Windows Server 2008 R2 Professionals Help and Support Windows Server 2008 R2
  • Yonkers Ransomware WannaCry Preparedness Review Yonkers, Westchester County 24-7 Yonkers Crypto-Ransomware Sodinokibi Preparedness Consultation Yonkers Manhattan White Plains

  • © 2002-2022 Progent Corporation. All rights reserved.