ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progent's server and desktop monitoring service that incorporates advanced remote monitoring and management technology to help keep your IT system operating efficiently by tracking the state of vital assets that power your business network. When ProSight LAN Watch detects a problem, an alert is transmitted immediately to your specified IT staff and your Progent engineering consultant so any looming issues can be addressed before they can impact productivity. Find out more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight LAN Watch with NinjaOne RMM: Unified RMM Solution for Networks, Servers, and Workstations
    ProSight LAN Watch with NinjaOne RMM software offers a centralized, cloud-based platform for managing your client-server infrastructure by providing tools for performing common tedious jobs. These can include health monitoring, update management, automated remediation, endpoint configuration, backup and recovery, A/V protection, secure remote access, standard and custom scripts, asset inventory, endpoint profile reports, and troubleshooting help. If ProSight LAN Watch with NinjaOne RMM uncovers a serious issue, it transmits an alarm to your designated IT staff and your Progent consultant so that emerging problems can be fixed before they interfere with productivity. Learn more details about ProSight LAN Watch with NinjaOne RMM server and desktop monitoring consulting.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is an infrastructure management service that makes it easy and affordable for smaller organizations to map, monitor, optimize and troubleshoot their connectivity hardware such as routers, firewalls, and wireless controllers as well as servers, endpoints and other networked devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that network diagrams are always current, captures and manages the configuration of almost all devices connected to your network, tracks performance, and generates alerts when issues are detected. By automating complex management processes, ProSight WAN Watch can knock hours off common chores such as network mapping, expanding your network, locating appliances that require critical updates, or resolving performance issues. Learn more details about ProSight WAN Watch infrastructure management consulting.

  • ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Applications
    ProSight Reporting is an expanding family of real-time and in-depth management reporting utilities designed to work with the industry's top ticketing and remote network monitoring programs including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and utilizes color coding to highlight and contextualize key issues such as spotty support follow-up or machines with out-of-date AVs. By exposing ticketing or network health concerns clearly and in near-real time, ProSight Reporting enhances network value, reduces management overhead, and saves money. For more information, see ProSight Reporting for ticketing and network monitoring applications.

  • ProSight Data Protection Services: Managed Backup and Disaster Recovery Services
    Progent has partnered with leading backup/restore software companies to create ProSight Data Protection Services, a family of subscription-based offerings that deliver backup-as-a-service (BaaS). ProSight DPS services manage and track your data backup processes and allow transparent backup and fast restoration of vital files, applications, system images, and virtual machines. ProSight DPS helps your business recover from data loss resulting from hardware breakdown, natural disasters, fire, malware like ransomware, user error, ill-intentioned employees, or software bugs. Managed backup services available in the ProSight DPS product family include ProSight Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup using Barracuda purpose-built hardware, and ProSight MSP360 Cloud and On-prem Backup. Your Progent service representative can assist you to determine which of these managed services are best suited for your network.

  • ProSight Duo Two-Factor Authentication: Identity Validation, Endpoint Remediation, and Secure Single Sign-on
    Progent's Duo authentication service plans incorporate Cisco's Duo technology to protect against password theft by using two-factor authentication. Duo enables one-tap identity confirmation on Apple iOS, Android, and other out-of-band devices. Using Duo 2FA, when you log into a secured online account and enter your password you are requested to confirm your identity via a device that only you possess and that uses a different network channel. A broad selection of out-of-band devices can be utilized as this added form of ID validation including a smartphone or wearable, a hardware/software token, a landline telephone, etc. You may register several verification devices. To find out more about ProSight Duo identity validation services, see Cisco Duo MFA two-factor authentication (2FA) services.

  • Progent's Outsourced/Shared Help Desk: Call Center Managed Services
    Progent's Support Desk services permit your information technology staff to outsource Call Center services to Progent or split responsibilities for Service Desk support transparently between your internal network support staff and Progent's extensive roster of IT service engineers and subject matter experts. Progent's Shared Service Desk provides a smooth extension of your internal support organization. Client interaction with the Service Desk, delivery of technical assistance, escalation, trouble ticket generation and updates, performance measurement, and management of the support database are cohesive whether incidents are resolved by your core support staff, by Progent's team, or by a combination. Find out more about Progent's outsourced/shared Call Center services.

  • Active Defense Against Ransomware: Machine Learning-based Ransomware Identification and Remediation
    Progent's Active Defense Against Ransomware is an endpoint protection managed service that incorporates next generation behavior-based analysis tools to defend endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus products. Progent Active Security Monitoring services safeguard local and cloud resources and provides a single platform to manage the complete threat progression including blocking, detection, mitigation, cleanup, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ransomware defense and cleanup services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and safeguard data about your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can save up to half of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you're planning improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you require as soon as you need it. Read more about Progent's ProSight IT Asset Management service.

  • Patch Management: Patch Management Services
    Progent's managed services for patch management offer organizations of any size a versatile and affordable alternative for evaluating, validating, scheduling, implementing, and tracking software and firmware updates to your ever-evolving IT network. In addition to maximizing the protection and functionality of your computer environment, Progent's patch management services permit your IT team to concentrate on more strategic initiatives and tasks that deliver maximum business value from your information network. Read more about Progent's patch management services.

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes SentinelOne's cutting edge behavior analysis technology to guard physical and virtual endpoints against modern malware attacks such as ransomware and email phishing, which routinely get by legacy signature-matching anti-virus tools. ProSight ASM safeguards local and cloud resources and provides a unified platform to manage the complete malware attack progression including blocking, detection, containment, cleanup, and forensics. Key capabilities include single-click rollback with Windows VSS and real-time network-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, reseller, and integrator. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Endpoint Security and Microsoft Exchange Email Filtering
    Progent's ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer protection for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint control, and web filtering via leading-edge technologies packaged within a single agent accessible from a unified control. Progent's data protection and virtualization experts can help you to design and implement a ProSight ESP deployment that addresses your company's unique needs and that helps you demonstrate compliance with government and industry information security standards. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for immediate action. Progent can also help your company to set up and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Because the environment is virtualized, it can be ported easily to a different hosting solution without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.
Download Progent's 10 Benefits of Managed IT Services White Paper
To view a white paper explaining why managed services are rapidly takingthe place of the traditional break/fix model of network support for small and mid-size organizations, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable alternative for small and mid-size organizations to obtain an unbiased assessment of the overall health of their network. Based on a selection of the top remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's world-class team of information technology experts, ProSight Network Audits help you see how well the deployment of your essential network devices adhere to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate benefits like a cleaner Active Directory environment. Both also come with a year of state-of-the-art remote network monitoring and management. Benefits can include easier network management, improved compliance with government and industry security requirements, higher utilization of IT resources, faster troubleshooting, more dependable backup and recovery, and less downtime. See more about ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service based on a brief phone discussion with a Progent backup/recovery expert. The interview is intended to help evaluate your organization's preparedness either to counter ransomware or recover rapidly after an attack by a ransomware variant such as Ryuk, Maze, Sodinokibi, Netwalker, Phobos, LockBit or Egregor. Progent will consult with you directly to collect information concerning your existing AV defense and backup/recovery procedures, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can follow industry best practices to create a cost-effective AV and backup system that reduces your vulnerability to ransomware and meets your business needs. For additional information, refer to The ProSight Ransomware Preparedness Report.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to assist organizations to take the time-critical first steps in mitigating a ransomware assault by putting out the fire. Progent's online ransomware expert can assist businesses to locate and isolate breached servers and endpoints and guard undamaged resources from being penetrated. If your network has been penetrated by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, visit Progent's Ransomware 24x7 Hot Line.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • 24-7 Hartford At Home Workforce Help Desk Solutions Consulting Experts Hartford Enfield Bristol Farmington Hartford Offsite Workforce Help Desk Outsourcing Consulting Experts Hartford Connecticut
  • 24-7 Small Business Network Management Services Consultant Services Specialists Small Business Managed IT services
  • 24-Hour SQL Server 2017 Monitoring IT Consulting 24 Hour SQL Server 2017 Always On Availability Groups Troubleshooting
  • Best Email Encryption Key Management Engineers
  • 24x7 Ontario Crypto Removal Consultants Ontario, San Bernardino County 24x7 Ontario Ryuk CryptoLocker Removal Ontario, San Bernardino County
  • ProSight Email Spyware Protection Engineers
  • 24x7x365 At Home Workforce Sydney Consultants - Cloud Systems Consulting Work at Home Employees Sydney Consulting and Support Services - Cloud Integration Systems Expertise Sydney, NSW

  • Services Documentation IT Consultant
    24 Hour Technology Consulting Services Services Documentation

    Progent uses an enterprise-class support reporting system that records and formats detailed documentation for all billed support activities. Unlike many freelance consultants or small support organizations who provide minimal documentation or specifics of tasks done, every service delivered by Progent is tracked by full documentation. Every Progent staff member has use of the support documentation sent by each consultant to each customer. The practice of documenting and archiving service activity results in more efficient support and eliminates a slew of typical misfortunes such as when a support client is effectively held captive to a consultant who won't let go of vital service information.

  • Akron Egregor Crypto-Ransomware Forensics Akron Akron Ransomware Forensics Analysis Akron, OH
  • Alameda Networking Support Piedmont IT Consulting
  • Email Reputation Analysis Consultant Services
  • At Home Workers Consulting Services - Long Beach - Set up Expertise Long Beach, CA Immediate Long Beach Work from Home Employees Set up Expertise
  • At Home Workers Jersey City Consulting Services - Connectivity Expertise Jersey City Secaucus Remote Workforce Assistance near me in Jersey City - Connectivity Solutions Expertise Jersey City, NJ
  • At Home Workers Sacramento Consulting Experts - Setup Consulting Services Sacramento - Folsom Sacramento Remote Workforce Setup Consultants Sacramento CA

  • SQL 2008 Reporting Services Consultancy
    SQL 2008 Reporting Services Consulting Services

    Microsoft SQL Server 2008 delivers powerful, familiar tools to computer professionals and network users, reducing the complexity of designing, integrating, administering, and using company data and database applications on platforms ranging from mobile devices to enterprise data networks. The sophistication and interconnectivity demands of Microsoft SQL Server 2008 require a network consultant with real-world experience and broad knowledge in designing and building information-based, comprehensive business technology applications. The knowledge and experience of Progent's Microsoft-certified engineering staff, with an average of more than 10 years of professional work involving Microsoft integration, assures you success in designing, configuring and managing Microsoft SQL Server 2008 solutions that are seamlessly integrated with the Microsoft .NET environment.

  • At Home Workforce Consulting - Palo Alto - IP Voice Solutions Consulting Experts Palo Alto Top Ranked Remote Workforce Palo Alto Consulting Services - IP Voice Systems Consultants Palo Alto
  • At Home Workforce Consulting and Support Services near Spokane - Backup Solutions Consulting and Support Services Spokane Teleworkers Backup/Recovery Systems Assistance Spokane Washington, U.S.A.
  • At Home Workforce Downers Grove Consulting and Support Services - Voice/Video Conferencing Technology Consulting Services Downers Grove-Elmhurst, Illinois Work at Home Employees Consultants near Downers Grove - Voice/Video Conferencing Systems Consulting Services Downers Grove, IL

  • Security Firms ISSAP Certified
    CISSP-ISSAP Cybersecurity Architecture Consulting Services

    Progent's ISSAP Certified security experts, or Information Systems Security Architecture Professionals, are consultants who have earned ISSAP Certification as a result of rigorous testing and significant work with information security design. ISSAP security experts possess comprehensive knowledge of access control systems and methodologies, phone system and network protection, cryptography, requirements analysis, business continuity and DRP, and physical security. Progent's ISSAP-certified security specialists can assist your business with all phases of secure network architecture.

  • Award Winning Microsoft SharePoint Server 2013 Consultant Services South Hampton Roads SharePoint Server 2007 Remote Troubleshooting Chesapeake, South Hampton Roads
  • Best Consulting Services for IT Service Providers near me in Eugene - Seamless Temporary Staff Help Eugene Oregon Expertise for Network Service Providers in Eugene - Seamless Short-Term IT Support Expansion

  • Engineer SQL 2008 Reporting Services
    Microsoft SQL 2008 Server IT Consultants

    Microsoft SQL Server 2008 offers indispensable, familiar tools to computer professionals and information workers, reducing the difficulty of creating, deploying, managing, and accessing company data and database programs in environments ranging from handheld devices to corporate data systems. The sophistication and interconnectivity requirements of Microsoft SQL Server 2008 call for an IT consulting firm with real-world expertise and wide knowledge in planning and building data-driven, comprehensive business IT applications. The knowledge and experience of Progent's Microsoft-certified technical team, with an average of more than 10 years of background involving Microsoft technology, assures you success in planning, configuring and managing Microsoft SQL Server 2008 solutions that are well integrated with the Microsoft .NET environment.

  • Biggest Maze ransomware hot line Consulting Services Consultant DopplePaymer ransomware hot line
  • Birmingham Crypto-Ransomware Forensics Investigation Birmingham Birmingham MongoLock Ransomware Forensics Analysis Coventry
  • BlackBerry Software Service Providers Brighton BlackBerry Smartphone Assessment Brighton
  • Calgary Remote Workforce Network Security Systems Guidance Alberta Calgary Remote Calgary Remote Workforce Security Solutions Consulting Experts
  • Chatsworth NotPetya Crypto-Ransomware System-Rebuild Chatsworth-Chatsworth, California 24/7 Chatsworth Ransomware Recovery Chatsworth-Calabasas, CA
  • Cisco Network Design Consultant Detroit Motor City Consulting Team Cisco
  • Corpus Christi Kingsville Consulting for Corpus Christi Network Support Providers Corpus Christi Kingsville Corpus Christi Consulting Services for IT Support Companies
  • Emergency Microsoft Dynamics GP Partner nearby Buffalo - Training Consultants Buffalo, Erie County Dynamics GP (Great Plains) Supplier - Buffalo - Customization Development Erie County New York
  • Engineer Progent Backup Management Outsourcing Consultant Backup Management Outsourcing
  • Exchange 2019 and Windows Server 2019 Help and Support 24x7x365 Remote Consulting Exchange 2019 Microsoft 365 Integration
  • Houston Ryuk Crypto-Ransomware Forensics Investigation Houston Downtown Houston Hermes Crypto-Ransomware Forensics Investigation Westchase, Houston
  • Award Winning Email Guard Data Loss Prevention Services
  • IT Consulting System Center 2016 Outsourcing System Center 2016 and NetApp Integration
  • Immediate Exchange Server 2010 On-site Support Harris County Exchange 2003 Server Consolidate Webster, TX
  • Email Outbound Content Filtering Consultancy
  • Jacksonville Florida Jacksonville DopplePaymer Crypto-Ransomware Repair Top Jacksonville Conti Crypto-Ransomware Rollback Jacksonville, Duval County
  • Email Image Spam Protection Professional
  • Jundiai Systems Consultant BlackBerry Wireless Jundiaí Award Winning BlackBerry Exchange Small Office Network Consulting Services

  • 24/7 Professionals SentinelOne Endpoint Virus Immunization
    SentinelOne Singularity XDR Services

    Progent is a dealer and consulting firm for SentinelOne's Singularity product family, a subscription-based, cloud-centric threat management solution that incorporates machine learning technology and expert services to deliver cutting-edge endpoint detection and response (EDR).

  • Knoxville Remote Workers Endpoint Management Tools Consulting Experts Knoxville Best Work from Home Employees Knoxville Consulting Experts - Management Tools Consulting and Support Services
  • Largest Work at Home Employees Consulting and Support Services near me in Jersey City - Data Protection Solutions Consultants Jersey City At Home Workers Jersey City Expertise - Backup Solutions Consulting Services
  • ProSight Email Spyware Protection Consult
  • Londrina Teleworkers Management Solutions Expertise Paraná Offsite Workforce Guidance in Londrina - Management Tools Consultants Paraná, Maringá
  • Los Angeles Spora Ransomware System-Rebuild Los Angeles, CA Los Angeles DopplePaymer Crypto-Ransomware System-Restore Santa Monica
  • Mandrake Linux, Sun Solaris, UNIX Computer Consulting Reno, NV Debian Linux, Sun Solaris, UNIX On-site Technical Support Reno, Washoe County
  • ProSight Email Denial of Service Protection Technology Professional
  • Mexico City Sodinokibi Crypto-Ransomware Forensics Mexico City, Azcapotzalco Mexico City MongoLock Ransomware Forensics Mexico City, La Magdalena Contreras
  • Microsoft SharePoint Server 2010 Online Troubleshooting Albuquerque New Mexico SharePoint Technology Consulting Services Bernalillo County New Mexico
  • Microsoft SharePoint Server 2013 IT Consultants Estado do Rio Grande do Sul SharePoint 2010 Setup and Support
  • Midland Remote Workforce Cloud Solutions Assistance Midland Texas Work from Home Employees Consulting Services in Midland - Cloud Systems Consulting Services Midland County Texas
  • Midland, TX, United States Conti Ransomware Hot Line 24/7 Ransomware System Rebuild Midland County TX
  • Nagios for Linux Engineer Remote Consulting Nagios
  • Niterói Ransomware Hermes Preparedness Assessment Icarai, Niterói Niterói Ransomware Ryuk Vulnerability Consultation Icarai, Niterói
  • Online Support Services SharePoint 2010 Recife, Pernambuco SharePoint 2010 Remote Support Services Recife, State of Pernambuco
  • Online Wireless Site Survey Remote Technical Support 802.11x Wi-Fi Site Survey Consulting Services

  • Sun Solaris Remote Services
    Engineer Linux Online

    Progent provides national online phone support and troubleshooting services for businesses who operate UNIX, Linux, or Sun Solaris networks or whose IT systems feature a combination of UNIX and Microsoft Windows technology. Remote IT help offers optimum leverage for your IT dollar by protecting user efficiency and shortening the time charged for network analysis and repair. Sophisticated remote access tools and experienced technicians and engineers combine to enable Progent to handle the majority of network problems without wasting time and money by going to your location. In the vast majority of cases your IT issues can be remediated over the phone or via a mix of phone support and online access. Progent can make available Cisco CCIE network experts and CISSP premier security professionals to assist you with the toughest system problems.

  • Open Now Consulting Experts for IT Service Organizations near Midtown Manhattan - Seamless Temporary Support Team Augmentation New York City-East Village 24x7x365 Midtown Manhattan Consulting Experts for IT Service Companies NYC-Chelsea, NY

  • 24-7 SQL Server 2017 Enterprise IT Consulting
    SQL Server 2017 Data Mining Online Troubleshooting

    Progent's Microsoft-certified SQL Server 2017 experts can assist your organization to design and implement a cost-effective migration from your current SQL Server databases and applications to SQL Server 2017.

  • Outsourced Programming Microsoft Dynamics Power BI Consultants Dynamics GP FRx
  • Outsourcing SMS Server Upgrade Microsoft SMS Server Consulting Services
  • Pasadena Integration Consultant Emergency Phone Support Installer Small Business Network Pasadena, Los Angeles County
  • Porto Alegre Crypto-Ransomware Operational Restoration Porto Alegre DopplePaymer Crypto-Ransomware Removal Porto Alegre-Novo Hamburgo
  • Porto Alegre Work from Home Employees Cloud Technology Consulting and Support Services Porto Alegre-Gravataí Telecommuters Expertise nearby Porto Alegre - Cloud Technology Consultants Rio Grande do Sul State
  • Ransomware Protection Services Specialists Ransomware Defense

  • Emergency Specialists CRISC Certified Risk and Information Systems Control Auditor
    CRISC Certified Risk and Information Systems Control Auditor Consulting Services

    Progent offers the services of a CRISC-certified risk management expert to help you to plan and implement an enterprise risk management solution following leading practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines.

  • Remote Support Services Red Hat Linux, Sun Solaris, UNIX Bakersfield, America Bakersfield, USA Suse Linux, Sun Solaris, UNIX Network Engineer
  • Rockville-Bethesda, Maryland Rockville WannaCry Crypto-Ransomware Negotiation Services Rockville Ransomware Settlement Guidance Rockville-North Bethesda, MD
  • SQL Small Business Network Consultants Atlanta, GA, Augusta, GA, Columbus, GA, Savannah, GA SQL Technology Providers Georgia
  • Short-Term Network Support Staffing Support Services Consulting Support Greensboro Winston-Salem High Point Supplemental Network Support Staffing Support Consulting Expertise Winston-Salem
  • Small Office Computer Consulting Edmonton Edmonton-Spruce Grove Canada Upgrading
  • Small Office IT Consultants Microsoft SQL Server 2017 Montgomery Mobile Microsoft SQL Server 2017 Technology Consultant Montgomery County, Alabama
  • Software Consulting Firm Microsoft SQL Server 2017 Tampa Bay Microsoft SQL 2008 Information Technology Consulting Firms Tampa Bay
  • Supplemental Staffing Support Consulting Short Term IT Staffing for Computer Support Groups Knoxville, Knox County
  • Technology Consulting Company Access to External Support Databases Company-wide Standards for Best Practices Networking Organization
  • Telecommuters Consulting Experts nearby Nashville - Connectivity Solutions Assistance Nashville Nashville Goodlettsville Remote Workforce Consulting and Support Services nearby Nashville - Solutions Consulting Experts
  • 24/7 Email Scoring Thresholds Consultants
  • Temporary IT Staffing Services Consulting Experts Lambert International Airport STL IT Staff Temps for IT Service Groups
  • Top Mesa Maze Crypto-Ransomware Rollback Mesa Phoenix Top Quality Mesa Netwalker Crypto-Ransomware Recovery Mesa Arizona
  • Email Polymorphic Virus Protection Services
  • Top Quality Dynamics GP (Great Plains) Supplier near Walnut Creek - Installation Consultant MS Dynamics GP-Software Walnut Creek Reseller - Database Consultant Walnut Creek Contra Costa County

  • Consultant Services 802.11 Wireless LAN
    Cisco Certified WiFi 6/6E Consulting Services

    Progent can show you how to design, deploy, manage, and troubleshoot an efficient Wi-Fi network architecture, recommend sensible technology, and configure wireless access points, bridges, antennas, wireless controllers, and various wireless products. Progent can also help you build a thorough 802.11ac wireless system security plan that is well aligned with the security plan for your entire corporate network.

  • Vacaville Dharma Crypto-Ransomware Negotiation Help Solano County Suisun City CA Vacaville Dharma Ransomware Negotiation Consulting
  • Virginia Beach Crypto-Ransomware Lockbit Readiness Testing Virginia Beach Norfolk Newport News Virginia Beach Crypto-Ransomware Sodinokibi Readiness Consultation Virginia Beach South Hampton Roads

  • Online Wireless Site Survey Integration Support
    Consulting Services Online Wireless Site Survey

    Progent's Wi-Fi site survey services assist you to design, install and troubleshoot a Wi-Fi LAN customized for your facilities, offering your business a wireless solution that delivers the reception, performance, capacity, QoS, security, and hand-off ability your business requires. Wi-Fi survey services from Progent include remote predictive analysis for planning a Wi-Fi LAN and on-premises site survey services for validating, tuning, and troubleshooting an operational wireless LAN.

  • Virtual Office Microsoft Consultant Remote Support Job 24/7 Home Based Network Professional Jobs
  • ProSight Email Guard Content Filtering Service Consultant
  • Work at Home Employees Consulting and Support Services near me in Santa Monica - Collaboration Systems Consultants Santa Monica Telecommuters Collaboration Systems Consultants Santa Monica-Marina Del Rey, California
  • Email Allow Lists Consult
  • Work from Home Employees Curitiba Guidance - Help Desk Solutions Consulting Curitiba Remote Workforce Help Desk Call Center Outsourcing Consulting Experts Curitiba
  • Emergency ProSight Email Spoofing Protection Engineers

  • © 2002-2025 Progent Corporation. All rights reserved.