Email security involves a lot of buzzwords. What do they mean?
For a glossary of common email security terms, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Email Guard?
Email Guard is a spam filtering service and email security solution designed for small and mid-sized businesses. Email Guard combines the world-class cloud infrastructure and services of top data security companies with proven on-premises security gateway hardware to protect inbound and outbound email against spam, viruses and other email-borne threats and also offers outbound data protection via content filtering and encryption. In addition, Email Guard's centralized monitoring, management and reporting tools help you administer and troubleshoot your email system and define and enforce corporate email policy.

Back to top

What is the danger of email-based attacks?
About 70% of email is spam. 3% of emails have malicious attachments. 91% of successful hacks begin with email attacks. Spam lowers productivity. Viruses and advanced persistent threats (APTs) can steal and information and money, and shut down your network. Poorly secured email systems can violate government regulatory requirements and industry standards and expose you to litigation.

Back to top

What is the architecture of Email Guard's security solution?
Email Guard uses a hybrid architecture that includes cloud-based resources as well as on-premises email security gateway hardware. The Cloud Protection Layer prevents 95% of spam and the vast majority of viruses and other malware from ever reaching your security perimeter. The on-premises security gateway appliance provides deep, multi-level inspection for inbound threats including spam embedded within images. The security gateway also offers spam and virus protection, policy based content filtering, rate control, and cloud-assisted encryption for outbound email. In addition, Email Guard's architecture provides centralized web-based administration with comprehensive monitoring  and reporting plus options for role-based management delegation. A cloud-based Update Center enables zero-hour defense against newly discovered threats and keeps the Cloud Protection Layer and the security gateway up to date without management intervention.

For a detailed discussion of Email Guard's architecture, see Email Guard technology and architecture.

Back to top

Why does Email Guard use a hybrid design with cloud services and on-premises hardware?
The combination of cloud-based and on-premises resources used by Email Guard provides better security, performance and resilience than would be possible with a one-dimensional architecture. For zero-hour security, the cloud-based Update Center provides 24x7x365 monitoring of worldwide threats, develops defenses, and distributes updates in real time to Email Guard's local security gateway appliance. In addition, the Cloud Protection Layer blocks the vast majority of spam and malware before it ever reaches your security perimeter, which enhances both security and system performance. Security and performance are also improved by the ability of the purpose-built local gateway to perform deep analysis of email traffic, including image scanning, before traffic reaches your email server. To stabilize performance, the local security gateway offers rate control for inbound and outbound email. For resilience, Email Guard's Cloud Protection Layer offers spooling. If your local data center goes down, spooling allows you to store all your inbound email in the cloud for up to 96 hours or direct it to an alternative destination while you fix the problem.

Back to top

What email-based threats does Email Guard block?
The Email Guard security gateway provides consecutive security filters that include Denial of Service (DoS) and security protection, rate control, IP reputation analysis, sender authentication, recipient verification, virus protection, user-specified policy enforcement, signature analysis, intent analysis, image analysis, Bayesian analysis, and spam rules scoring. This results in fast, comprehensive email protection against spam, viruses, spoofing, phishing, directory harvest, and spyware attacks. For a glossary of these and other terms used in email security, see Glossary of Terms Related to Spam Filtering Technology.

Back to top

What is Progent's role in delivering the Email Guard solution?
Progent can help you plan your Email Guard deployment, recommend security gateway hardware appropriate for your expected workloads and security requirements, configure your gateway, integrate Email Guard with Exchange Server or any other email platform, define and configure policies for inbound spam and outbound content filtering, set up and test outbound encryption, design and implement a high-availability solution that can include clustered security gateways, set up an efficient management system that takes advantage of delegated administration, and provide training, ongoing consulting support and troubleshooting services.

Progent's Microsoft-certified consultants can provide Microsoft System Center Operations Manager consulting so you can monitor your entire email and network infrastructure and resolve potential problems before they impact network productivity. Progent's Cisco-certified CCIE network consultants can help you design, build and troubleshoot a network infrastructure that supports both the on-premises and cloud-based resources that make up your Email Guard ecosystem. Progent's CISSP-certified cybersecurity consultants can help you plan and validate a cohesive security environment that protects your business against email-borne, web-based and internal threats and that complies with government regulations, industry standards, and your own corporate policies.

Back to top

Why is it important to filter outbound email?
Outbound filtering provides two major benefits: data loss protection (DLP) and reputation protection. DLP stops sensitive information from leaking out of your business via careless emails. Leaked data can result in regulatory infractions, identity theft, and loss of competitive advantage. It can also lead to litigation. The Email Guard security gateway includes pre-defined content filters such as HIPAA, credit card numbers, and Social Security Numbers. Email Guard also allows you to create custom content filtering policies covering specified keywords, categories, or character sets. Content filtering policies can be configured to block, quarantine or encrypt messages automatically.

Outbound filtering can also block spam and viruses sent by internal computers that have been compromised, which is a serious vulnerability in BYOD (Bring Your Own Device) environments. Organizations which allow spam and viruses to be sent out can be placed on block lists, or "blacklisted". This loss of reputation can hurt productivity and profits.

Back to top

Why can't my firewall stop spam or Directory Harvest Attacks?
Conventional firewalls offer little or no protection against spam or Directory Harvest Attacks. Inbound email often passes through the firewall to your email server without regard for message content, message size or address, creating an opportunity for spam and viruses to enter and making your email system vulnerable to directory harvesting.

Back to top

How does Email Guard support email encryption?
Email Guard utilizes a cloud-based Message Center to handle the encryption and delivery of outbound email. Administrators can establish multiple policies for determining which emails are automatically encrypted. These are then sent securely over TLS to the Message Center where they are encrypted using AES-256 and stored for retrieval. The Message Center sends the intended recipient a notice that includes a URL to visit in order to retrieve the encrypted email. Once establishing a password, the recipient can read the encrypted message. Any replies are also encrypted at the Message Center. In addition, Email Guard includes a plug-in for Exchange Server which lets users choose to encrypt individual emails. For more details about how Email Guard encrypts outbound email, visit Email Guard technology and architecture.

Back to top

Is Email Guard difficult to manage?
Email Guard includes a browser-based management portal designed to be easy to use for administrators in small and mid-size organizations. The portal's dashboard offers centralized monitoring and control of hardware, services, policies and configurations, and keeps extensive health and performance statistics on inbound and outbound email. You can easily track by day or hour the number of inbound and outbound messages blocked, quarantined, and rate controlled; the inbound messages tagged and allowed; and the outbound messages sent, redirected, and encrypted. Granular policy control includes delegated domain administration, delegated help desk role, and individual user policy control. For more information about Email Guard's cloud-based management features, see Email Guard technology and architecture.

Back to top

What email platforms are supported by Email Guard?
Email Guard works with any on-premises email platform but offers some enhanced features when used with Microsoft Exchange Server, such as the Outlook client encryption add-in and the Exchange LDAP Accelerator.

Back to top

How does Email Guard impact email performance?
The hybrid architecture of Email Guard leverages the massive scale of cloud-based resources and the power of purpose-built gateway hardware to off-load almost all the work of email protection from the email server. On-premises gateways are available in a variety of models that offer performance that ranges from entry level to enterprise class, and gateways can be clustered for improved performance, as well as higher availability. You can configure Email Guard to deliver the performance you need, and you can easily expand your deployment as your needs grow.

Back to top

How does Email Guard avoid blocking legitimate email through false positives?
A false positive is a legitimate email quarantined as spam. The default policy configurations in Email Guard have a false positive rate of 0.01%, which is low by industry standards. Administrators have options to adjust the aggressiveness of Email Guard's spam filtering with techniques such as threshold scoring, but the surest way to prevent false positives is to build "allow lists" or "whitelists" that specify legitimate senders. Email Guard permits users to control spam scoring, Bayesian analysis, and allow lists at the personal level.

Back to top

How can I get help now with email security?
If your organization needs online or onsite help with any aspect email security:
Call 800-993-9400 or visit Contact Progent.

Back to top

Also See:



An index of content::

  • 24 Hour Offsite Workforce Consulting Experts nearby Barueri-Alphaville - Network Security Solutions Consulting and Support Services Barueri Barueri-Alphaville Teleworkers Security Solutions Consulting Barueri
  • 24-7 Reno Hermes Ransomware Business-Recovery Reno, NV Reno Crypto-Ransomware Operational-Recovery Reno, United States
  • Email Link Protection Consultant
  • 24/7/365 Telecommuting Job CISA Consulting San Antonio Computer Remote Consultant Work From Home Job South Texas San Antonio
  • Email Outbound Content Filtering Specialist
  • After Hours San Francisco Consultants for Network Support Providers Consulting Services for San Francisco Network Service Providers SF Bay Area
  • Augusta Aiken Consultant Microsoft SharePoint 2010 Augusta, Richmond County, US Microsoft SharePoint Server 2010 Network Consulting
  • Barueri-Alphaville Crypto-Ransomware Settlement Negotiation Guidance Barueri-Alphaville Maze Ransomware Settlement Negotiation Guidance Barueri

  • Integration Windows Server 2012 R2 Security
    Immediate Windows Server 2012 R2 Storage Spaces Computer Consultants

    Progent's Microsoft-certified professionals can assist you to evaluate the benefits of Windows Server 2012 R2 for your company, create pilot systems and rollout plans, tune your infrastructure for on-premises, multi-location, private or public cloud-based, and partial-cloud environments, train your IT management staff, develop a corporate-wide security strategy, streamline IT administration, assist with creating applications, and build and validate a disaster recovery/business continuity plan.

  • BlackBerry Software Server Administration Montgomery Alabama BlackBerry Smartphone Migration Montgomery Alabama, America
  • Carlsbad, CA Teleworkers Consultants near Carlsbad - Conferencing Solutions Assistance Carlsbad Work at Home Employees Conferencing Systems Consulting and Support Services Carlsbad-Solana Beach, California
  • Cleveland Computer Network Providers Cleveland-Cuyahoga County Service Providers
  • Computer Consulting Contractor Jobs San Rafael Novato, Larkspur Microsoft MCP Support Career
  • Denver-Lakewood Network Recovery Denver Server Consultant
  • Design Cisco Edison-Somerset, New Jersey Edison Integration Company Cisco
  • DopplePaymer Ransomware Hot Line Seattle Kirkland Everett, WA Nephilim Ransomware Hot Line Seattle Bainbridge Island Issaquah, America

  • Forefront Network Inspection System Consulting
    Forefront Threat Management Gateway Technology Consulting

    Forefront TMG 2010 builds on the proven security technologies of ISA Server and offers a centrally administered Internet gateway that acts as a one-server platform for an array of security functions including an application layer and network layer firewall, URL monitoring and filtering, antimalware, IPS, reputation services, Virtual Private Network control, plus HTTP/HTTPS inspection. Microsoft Forefront TMG 2010 provides advanced web security logging and reporting features, allows custom reports powered by Microsoft SQL Server, works with Active Directory to streamline authentication, and can be installed as a virtual machine to cut costs and improve recoverability. Progent's Microsoft consultants can help your company to plan and execute test and production implementations; interface Forefront Threat Management Gateway with Windows Server 2008 R2, Active Directory, Microsoft SQL Server, Exchange Server 2010, and SharePoint 2010; set up Microsoft Forefront Threat Management Gateway 2010 to operate on a virtual server with Microsoft Windows Hyper-V; and provide continuing consulting and troubleshooting. Progent can also assist your organization to migrate economically to Forefront Threat Management Gateway 2010 from ISA Server.

  • Exchange Migration Consultant Services Exchange Migration Technology Professional
  • Exchange System Consulting Services Louisville, Lexington, Owensboro, KY Guru Exchange Louisville, KY, Lexington, KY, Owensboro, KY, Bowling Green, KY

  • Colbolt Linux On-site Technical Support
    Ubuntu Linux Technology Professional

    Progent's Linux support experts provide small and mid-size businesses and developers help with administering and maintaining Linux systems that operate with Microsoft-based networks. Progent can give your organization access to Linux experts, consulting professionals premier by Microsoft and Cisco, and security experts with CISA and CISSP credentials. This wide range of expertise offers you a convenient single consulting firm to help you create and maintain a protected and reliable mixed-platform network and communications solution that supports Linux and Microsoft interoperability by integrating MS Windows with leading Linux platforms including RedHat Linux, SUSE, CentOS Linux, Ubuntu, PCLOS, fedora, Gentoo, Mandriva Linux, Debian-GNU, and Slackware.

  • Honolulu Downtown Network Assessment Microsoft Windows Server 2019 Windows Server 2012 R2 Networking Consultant Honolulu, Waikiki
  • Best ProSight Email Security Gateway Consultancy
  • IT Consultants SharePoint Portal Server 2007 Windows SharePoint 2007 Services Specialist
  • Immediate Exchange Server 2010 Migration Midland County Texas Microsoft Exchange 2010 Engineers

  • Online Help Cisco VPN
    CCIE Expert Certified VPN Technology Consulting Services

    Cisco's security and offsite access solutions for small to mid-size companies represent a complete range of easy-to-administer protection hardware and software to help you protect your entire information system. Cisco's VPN product family includes switches, firewalls, intrusion detection systems, and VPN solutions. Progent's professional staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert (CCIE) and CCNP certifications who can help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your corporate objectives.

  • Kansas City Teleworkers Collaboration Solutions Assistance Wyandotte County Kansas Remote Workforce Kansas City Consultants - Collaboration Systems Consulting Experts Kansas City Kansas
  • Email Virus Signature Consultant Services
  • Largest Remote Workforce Guidance in Oklahoma CIty - Help Desk Outsourcing Consulting Experts Oklahoma City Shawnee Telecommuters Consulting Experts near me in Oklahoma CIty - Call Desk Augmentation Expertise Oklahoma City Shawnee
  • Lexington-Fayette IT Staffing Support Services Lexington Blue Grass Airport LEX Supplemental IT Staffing Support Services Consulting Expertise Lexington Blue Grass Airport LEX, USA
  • MS Dynamics GP-Great Plains Supplier - Glendale - Upgrade Development Garland Texas MS Dynamics GP Glendale Premier Partner - Migration Programming and Support Garland Texas
  • Manchester Egregor Crypto-Ransomware Forensics Analysis Manchester-Sheffield, England Manchester Maze Crypto-Ransomware Forensics Analysis Sheffield-Manchester
  • ProSight Outbound Email Filtering Consultant
  • Microsoft Windows 2003 Cluster Server Configuration Microsoft Certified Windows Cluster Online Help
  • Midtown Manhattan Avaddon Crypto-Ransomware Forensics Analysis Midtown Manhattan, New York Midtown Manhattan Avaddon Ransomware Forensics New York City-Hells Kitchen, New York
  • Minneapolis Ransomware Spora Preparedness Report Twin Cities, Minnesota Minneapolis Ransomware Snatch Readiness Testing Minneapolis
  • Montgomery Teleworkers Endpoint Security Solutions Assistance Montgomery County, Alabama Teleworkers Montgomery Consulting and Support Services - Network Security Systems Consulting Experts Montgomery Alabama
  • Norfolk MongoLock Ransomware Settlement Negotiation Support Norfolk Virginia Beach Norfolk Virginia Beach Norfolk Crypto-Ransomware Settlement Expertise
  • NotPetya Ransomware Hot Line Oakland, CA Ryuk Ransomware Hot Line Oakland, CA
  • Offsite Workforce Montgomery Consultants - Collaboration Technology Consulting and Support Services Montgomery County, Alabama After Hours Offsite Workforce Guidance near me in Montgomery - Collaboration Systems Guidance
  • Oklahoma City, Oklahoma Computer Support Consultants Design Consultants OKC, Oklahoma
  • Online Troubleshooting Windows Phoenix, AZ Immediate Windows Software Outsourcing Consultant Arizona
  • Private Cloud Integration Consultant Private Cloud Hosting Services Professional

  • Top Engineers VMware VCDX
    Engineers VMware Site Recovery Manager Failback

    VMware's popular Site Recovery Manager (SRM) is an extension to VMware vCenter that lets you orchestrate, automate and test a consistent runbook for recovering services rapidly after an outage. SRM provides centrally controlled and automated recovery, application mobility, plus non-intrusive site relocation, failback and site re-protect. SRM also supports transparent testing for site recovery, upgrades and fixes and can generate audit reports to confirm complete service restoration, validate SLAs and prove disaster recovery compliance. Progent can provide the skills of a VCDX certified VMware SRM consultant to help you to design, configure, test and manage a DR system based on VMware Site Recovery Manager.

  • Roseville Egregor Crypto-Ransomware Negotiation Guidance Roseville WannaCry Crypto-Ransomware Settlement Negotiation Consulting Roseville-Rocklin, CA
  • Roseville, CA Ransomware Hot Line Lockbit Ransomware Hot Line Roseville-Placer County, CA
  • SQL Server 2017 Standard Professional Online Consulting SQL Server 2017 Migration
  • ProSight Email Guard Content Filtering Engineer
  • San Mateo Microsoft Dynamics GP Migration Experts San Carlos, CA MS Dynamics GP Vendor near San Mateo - Business Intelligence Experts San Mateo, CA
  • ProSight Email Guard Content Filtering Services
  • Santa Catarina Microsoft SQL 2014 Small Business IT Consulting Firm Joinville, SC Small Business IT Outsourcing Services Microsoft SQL 2014
  • Security Intrusion Detection Webster, TX Firewall Cybersecurity Company
  • Small Business Network Consulting Cisco Tracy CA Technical Support Organizations Cisco Lathrop, Ripon CA
  • Subcontractor Jobs Telecommuting Network Consultants Microsoft Certified Telecommuter Jobs
  • Consultant Services ProSight Email Guard Content Filtering
  • Teleworkers Modesto Consultants - Cloud Integration Technology Consulting Experts Waterford, Newman, Hughson CA Modesto Remote Workforce Cloud Systems Consulting Ceres, CA
  • Teleworkers Sorocaba Consulting Services - Collaboration Solutions Consulting and Support Services Sorocaba, State of Sao Paulo Sorocaba Top Quality Sorocaba Work from Home Employees Collaboration Systems Consulting
  • Top Ranked Email Outbound Content Filtering Services
  • Top Ranked Home Based Cisco Consulting Contract Jobs Work from Microsoft Consultants Telecommuter Job
  • Toronto-Mississauga Information Technology Consulting Firm Microsoft Certified Expert Toronto, Ontario Network Support Companies
  • Urgent The Woodlands Locky Crypto Cleanup Montgomery County The Woodlands Crypto-Ransomware Repair Montgomery County
  • Windows Server 2008 Hyper-VI On-site Technical Support Microsoft Expert Integration Support Windows Server 2008 Security

  • 24-7 Technology Consulting Services Postini
    Subscription Antivirus

    E-Mail Guard is Progent's economical antispam and antivirus managed service that gives small businesses world-class protection against spam, viruses, DHA attacks, and other forms of e-mail-based assaults on computer systems. E-Mail Guard is powered by Postini's perimeter management technology, a sophisticated suite of web-managed spam filtering and virus defense services that ward off email assaults before they are able to breech the network firewall. Perimeter Manager also allows administrators track and manage their email application, irrespective of server platform, hardware technology, or geographic location.

  • Work at Home Employees Consulting near Shreveport - Integration Consulting Experts Shreveport Bossier City Shreveport Remote Workers Setup Consulting Services Shreveport Louisiana
  • iOS patch management Services VoIP phones patch management Consulting Services

  • © 2002-2024 Progent Corporation. All rights reserved.