ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes SentinelOne's next generation behavior-based machine learning technology to defend physical and virtual endpoints against new malware assaults such as ransomware and email phishing, which routinely escape traditional signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and offers a single platform to address the complete malware attack lifecycle including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Protection and Exchange Filtering
    ProSight Enhanced Security Protection (ESP) services offer economical multi-layer security for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge technologies incorporated within one agent accessible from a unified console. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP environment that meets your company's unique needs and that helps you prove compliance with government and industry data protection regulations. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent attention. Progent can also assist you to install and test a backup and restore solution like ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.

  • ProSight Data Protection Services (DPS): Managed Backup and Recovery Services
    Progent has partnered with advanced backup software providers to create ProSight Data Protection Services (DPS), a portfolio of subscription-based offerings that provide backup-as-a-service (BaaS). ProSight DPS services manage and track your backup processes and allow transparent backup and rapid restoration of important files/folders, applications, images, plus VMs. ProSight DPS lets your business avoid data loss resulting from hardware breakdown, natural calamities, fire, malware such as ransomware, human mistakes, malicious employees, or application bugs. Managed services in the ProSight Data Protection Services product line include ProSight DPS Altaro VM Backup, ProSight 365 Total Backup (formerly Altaro 365 Backup), ProSight ECHO Backup based on Barracuda purpose-built storage, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent consultant can assist you to identify which of these managed services are best suited for your IT environment.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progent's ProSight WAN Watch is an infrastructure management service that makes it easy and affordable for small and mid-sized businesses to map out, monitor, reconfigure and debug their networking appliances like routers and switches, firewalls, and wireless controllers plus servers, printers, client computers and other devices. Incorporating cutting-edge RMM technology, WAN Watch makes sure that network maps are always updated, copies and manages the configuration information of virtually all devices on your network, tracks performance, and generates notices when issues are detected. By automating complex management and troubleshooting activities, WAN Watch can knock hours off ordinary tasks such as making network diagrams, reconfiguring your network, finding appliances that need important software patches, or identifying the cause of performance problems. Learn more details about ProSight WAN Watch infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that incorporates advanced remote monitoring and management technology to keep your IT system running efficiently by checking the health of vital assets that drive your information system. When ProSight LAN Watch detects a problem, an alarm is transmitted automatically to your designated IT personnel and your assigned Progent engineering consultant so that all potential problems can be resolved before they can disrupt your network. Find out more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected Tier III data center on a fast virtual host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be moved easily to an alternate hardware environment without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard information about your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or domains. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as half of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether you're making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need when you need it. Read more about Progent's ProSight IT Asset Management service.

  • Active Defense Against Ransomware: AI-based Ransomware Identification and Remediation
    Progent's Active Defense Against Ransomware is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning tools to guard endpoints and servers and VMs against new malware assaults such as ransomware and email phishing, which easily evade traditional signature-matching AV products. Progent Active Security Monitoring services protect on-premises and cloud-based resources and provides a unified platform to address the entire threat lifecycle including filtering, infiltration detection, mitigation, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Learn more about Progent's ransomware protection and recovery services.

  • Outsourced/Co-managed Help Center: Call Center Managed Services
    Progent's Help Center managed services enable your information technology team to offload Help Desk services to Progent or divide responsibilities for Help Desk services seamlessly between your in-house support group and Progent's extensive roster of IT service engineers and subject matter experts (SMEs). Progent's Co-managed Service Desk offers a transparent supplement to your corporate support group. End user access to the Service Desk, delivery of support, problem escalation, trouble ticket creation and updates, performance measurement, and management of the support database are consistent regardless of whether incidents are resolved by your corporate network support group, by Progent, or both. Find out more about Progent's outsourced/shared Call Desk services.

  • Progent's Patch Management: Patch Management Services
    Progent's managed services for patch management offer organizations of any size a flexible and cost-effective alternative for assessing, validating, scheduling, implementing, and tracking software and firmware updates to your ever-evolving information network. In addition to optimizing the security and functionality of your IT environment, Progent's patch management services permit your in-house IT staff to concentrate on line-of-business initiatives and activities that derive the highest business value from your information network. Find out more about Progent's patch management support services.

  • ProSight Duo Multi-Factor Authentication: ID Confirmation, Endpoint Remediation, and Secure Single Sign-on
    Progent's Duo authentication service plans utilize Cisco's Duo technology to defend against password theft by using two-factor authentication (2FA). Duo supports single-tap identity verification with iOS, Google Android, and other out-of-band devices. Using Duo 2FA, whenever you log into a protected online account and give your password you are asked to confirm your identity via a unit that only you possess and that uses a different ("out-of-band") network channel. A wide selection of devices can be used for this added means of ID validation including a smartphone or watch, a hardware token, a landline telephone, etc. You may register multiple validation devices. To learn more about ProSight Duo two-factor identity validation services, go to Cisco Duo MFA two-factor authentication services for access security.

  • ProSight Reporting: Real-time and In-depth Reporting for Ticketing and Network Monitoring Applications
    ProSight Reporting is a growing line of in-depth management reporting utilities designed to work with the leading ticketing and remote network monitoring programs such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and utilizes color coding to highlight and contextualize key issues like spotty support follow-up or endpoints with missing patches. By identifying ticketing or network health problems clearly and in near-real time, ProSight Reporting enhances network value, lowers management hassle, and saves money. For details, visit ProSight Reporting for ticketing and network monitoring platforms.
Download Progent's 10 Benefits of Managed IT Services White Paper
To download a white paper explaining why managed services are quickly replacing the traditional break/fix model of IT support outsourcing for small and mid-size businesses, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost alternative for small and mid-size organizations to get an unbiased assessment of the health of their network. Powered by a selection of the top remote monitoring and management (RMM) tools in the industry, and overseen by Progent's world-class team of IT professionals, ProSight Network Audits show you how well the deployment of your essential network assets adhere to best practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant benefits like a more manageable Active Directory environment. Both versions also come with a year of advanced remote network monitoring and management. Benefits can include simpler network management, better compliance with data security regulations, higher utilization of network assets, quicker troubleshooting, more dependable backup and restore, and higher availability. Read more information about ProSight Network Audits network infrastructure assessment.

The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is a low-cost service centered on a phone interview with a Progent backup/recovery expert. The fact-finding interview is designed to assess your organization's ability to counter ransomware or recover rapidly after an attack by a ransomware variant like Ryuk, Maze, Sodinokibi, Mailto (aka Netwalker), Phobos, Snatch or Egregor. Progent will work with you personally to collect information about your existing antivirus tools and backup/recovery system, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can follow industry best practices to build a cost-effective AV and backup/recovery system that minimizes your exposure to ransomware and meets your business requirements. For additional information, see Progent's ProSight Ransomware Preparedness Report Service.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to assist you to carry out the time-critical first step in mitigating a ransomware attack by putting out the fire. Progent's online ransomware engineer can help you to locate and isolate breached devices and guard undamaged assets from being penetrated. If your system has been penetrated by any strain of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For details, visit Progent's Ransomware 24x7 Hot Line.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • 24-7 Network Assessment Vacaville, California Vacaville Computer Network Specialists
  • 24-7 Offsite Workforce Infrastructure Support Outsourcing Top Ranked At Home Workforce Infrastructure Troubleshooting
  • 24-Hour Microsoft SharePoint Server 2010 Online Support Services Greater London, Great Britain Microsoft SharePoint Server 2013 Network Consulting London, Great Britain
  • Alpharetta-Johns Creek, Georgia Teleworkers Alpharetta Guidance - Management Tools Consulting Experts At Home Workforce Alpharetta Consulting and Support Services - Endpoint Management Solutions Expertise Alpharetta
  • At Home Workers Consultants near me in Cincinnati - Integration Consulting Cincinnati Milford Work from Home Employees Cincinnati Guidance - Infrastructure Consulting Services Cincinnati Ohio
  • At Home Workers Guidance - Harrisburg - Infrastructure Consulting Harrisburg-Hazelton, Pennsylvania Harrisburg-Hazelton, PA, US Harrisburg Work at Home Employees Setup Consultants
  • Email Allow Lists Consultant Services
  • At Home Workforce Chesapeake Expertise - Backup/Restore Systems Consulting and Support Services Chesapeake, VA Teleworkers Chesapeake Assistance - Backup/Restore Solutions Consulting Chesapeake
  • Baltimore Maryland Consultants for Network Service Firms in Baltimore - Transparent Temporary IT Support Augmentation Baltimore Consulting Services for IT Service Providers Baltimore Towson
  • BlackBerry Professional Software Specialists BlackBerry Software Small Business IT Support Lakeland
  • BlackBerry Synchronization Small Business IT Support Firms BlackBerry Smartphone Information Technology Consultants
  • BlackBerry Wireless Tech Outsourcing Brasilia Brasilia BlackBerry BES Migrations
  • Broomfield Nephilim Crypto-Ransomware Cleanup Broomfield Broomfield Maze Ransomware Mitigation Broomfield CO

  • WatchGuard Firebox M690 Firewall Security Firms
    WatchGuard Firebox T25 Firewall Security Evaluation

    Progent offers consulting services for WatchGuard Firewall security appliances including the WatchGuard Firebox and XTM lines of Firewalls and the Firebox SSL VPN Gateway. Progent's WatchGuard consultants can show you how to select, deploy, and manage a WatchGuard Firewall appliance that fits your security needs and budget. Progent can help you to maintain outdated WatchGuard firewall appliances or upgrade smoothly to current WatchGuard firewall solutions.

  • Chattanooga Dynamics GP-Great Plains Training Consultant Chattanooga, TN, United States Chattanooga Dynamics GP Customization Consultant Chattanooga Tennessee
  • Cisco Support Consultants Miami-Dade County Florida Migrations Cisco Downtown Miami
  • Columbus, OH, Cleveland, OH, Cincinnati, OH, Toledo, OH, Arkon, OH IT Service Providers Best Ohio installation and Administration

  • CCNP Expert Certified Catalyst 6800 Switch Information Technology Consulting
    Engineer Catalyst 2900 Switch

    With Catalyst switches for small and medium-sized businesses, Cisco enables companies to gain all the benefits of bringing intelligent services to their networks. Cisco's Catalyst switch technology makes it possible to deploy capabilities that make your IT network highly robust to handle time-critical requirements, expandable to support growth, secure enough to guard confidential data, and designed for differentiating and controlling traffic flows to optimize system operations. Progent's CCIE and CCNP certified engineers can show you how to pick out and integrate Cisco switches appropriate for your business. Also, Progent's CISM and CISA certified security specialists can show you how to develop a comprehensive protection plan and set up Catalyst switches so they help enforce your security policies. Cisco Catalyst switching products that Progent supports include the Cisco Catalyst 2940 switches, Cisco Catalyst 3750 switches, Catalyst 4500 switches, and Cisco Catalyst 6500 switches.

  • Engineers Email Allow Lists
  • Consultants QTS Data Center QTS/Heracles Colocation Center Consulting Services
  • Debian Linux, Solaris, UNIX Integration Support Lima, San Borja Redhat Linux, Solaris, UNIX Consulting
  • Dynamics GP Reston Vender - Database Programming and Support Reston-Dulles, VA Reston-Chantilly, VA Microsoft Dynamics GP Reston Premier Partner - Implementation Support Services
  • Dynamics GP-Great Plains Premier Partner - Recife - Business Intelligence Outsourcing Best Dynamics GP-Great Plains Dealer - Recife - Setup Outsourcing Recife, PE
  • Exchange Online Archiving Professionals Microsoft 365 integration with on-premises environments Information Technology Consulting

  • Microsoft Teams security Engineer
    Microsoft Teams DLP Consultancy

    Progent can help your organization to design a migration to Microsoft Teams from Skype for Business and configure, manage, and troubleshoot a cloud-based or hybrid deployment of Teams. Progent can help you to integrate Teams with Office and Microsoft 365 apps, Exchange Online, SharePoint, and your PBX.

  • Google Cloud VPN Consulting Services Consultant Services Google GCP hybrid cloud integration
  • IT Services Wireless AP Support Services Catalyst Wi-Fi 6 and Wi-Fi 6E AP Planning
  • 24x7 Email Link Protection Consultant Services
  • Jacksonville Ryuk Ransomware Infection System-Rebuild Jacksonville Ryuk Crypto-Ransomware Malware Business-Recovery Example Jacksonville Florida
  • Email Intent Analysis Services
  • MS Dynamics GP Hialeah Vendor - Database Consultant Hialeah, FL Hialeah MS Dynamics GP-Software Customization Expert
  • Microsoft Augusta-Richmond County, Georgia Professional Services Immediate Microsoft Expert Augusta-Richmond County Technical Consulting
  • Microsoft Expert Windows Server 2008 Security Setup and Support Microsoft Windows 2008 R2 Online Troubleshooting
  • Microsoft SharePoint Server Support Services Chandler, AZ SharePoint Server 2007 Technology Consulting Services Chandler, Maricopa County
  • Microsoft Support Part-Time Job Walnut Creek Contra Costa County Positions Computer Consulting Walnut Creek California
  • Monterey County Small Office Computer Consultants Migration Help Salinas
  • Montgomery, AL BlackBerry Remote Support Services Montgomery Huntsville Remote BlackBerry Synchronization Network Integration
  • Network Management Services Cisco Alaska, United States Manage Cisco Anchorage, Juneau, Fairbanks, AK
  • Network Support Company Cisco New Hampshire - Manchester, NH, Nashua, NH, Concord, NH, New England, America Cisco Technology Consulting New Hampshire
  • Norfolk Teleworkers Collaboration Solutions Consulting Experts Norfolk Virginia Beach Top Ranked Norfolk Remote Workers Collaboration Solutions Consulting Norfolk Virginia
  • Omaha Remote Workers Help Desk Outsourcing Consulting Services Omaha, United States At Home Workers Omaha Consulting - Help Desk Augmentation Consulting Experts Douglas County Nebraska
  • Consulting Services ProSight Email Zero Hour Protection
  • Raleigh Spora Ransomware Rollback Raleigh Wake Forest Garner Cary Raleigh Nephilim Crypto-Ransomware Rollback Raleigh
  • Remote Workers Palo Alto Consulting Services - Collaboration Solutions Consulting Palo Alto California 24-Hour Palo Alto Work from Home Employees Collaboration Technology Expertise Atherton CA
  • Ribeirão Preto Telecommuters Video Conferencing Technology Consulting Services Remote Workforce Guidance near Ribeirão Preto - Voice/Video Conferencing Technology Assistance São José do Rio Preto
  • SQL Server 2012 Server Administration Edmonton Microsoft SQL Server 2016 Integration Consulting
  • SQL Server 2014 Computer Consultancy Firms SQL Server 2014 Information Technology Consulting Firms
  • SQL Server 2019 System Consulting Services Brighton, UK Brighton SQL Server 2014 IT Support
  • Salinas, CA Exchange Server 2019 Consultants Computer Network Support Firms Exchange 2010 Server
  • San Antonio Airport SAT Best San Antonio At Home Workers IP Voice Solutions Consulting Experts Remote Workers Guidance near me in San Antonio - IP Voice Systems Consulting Services San Antonio
  • San Bernardino Ransomware Infection Readiness Review San Bernardino, CA San Bernardino Redlands San Bernardino Crypto-Ransomware DopplePaymer Readiness Testing
  • San Diego Ransomware Sodinokibi Susceptibility Checkup San Diego County California San Diego Ransomware Hermes Susceptibility Review San Diego
  • San Jose Remote Workforce Data Protection Technology Guidance Silicon Valley, California, United States San Jose Telecommuters Backup/Recovery Systems Guidance Silicon Valley, California
  • San Mateo Offsite Workforce Endpoint Management Solutions Assistance Half Moon Bay CA San Mateo Telecommuters Endpoint Management Tools Consultants San Carlos, CA
  • Santa Cruz County Technicians 24-7 Microsoft Certified Partner Scotts Valley IT Specialists
  • Santa Monica Egregor Crypto-Ransomware Negotiation Consultants Santa Monica-Culver City Santa Monica Dharma Crypto-Ransomware Settlement Support Santa Monica-Pacific Palisades, California
  • Server Consulting Microsoft Windows Server 2016 Clearwater, Pinellas County Windows 2019 Server Outsourcing Pinellas County Florida
  • SharePoint 2010 Support and Help Cleveland, Cuyahoga County SharePoint Support and Help Cleveland, OH
  • Small and Midsize Business Networking Specialist Small and Midsize Business Network Companies
  • Small and Midsize Office Network Services Migration Help Small and Midsize Business
  • Southlake Conti Crypto-Ransomware Recovery Southlake-Euless, TX Southlake Netwalker Crypto-Ransomware Business-Recovery Southlake-Irving, TX
  • Spokane Locky Ransomware Damage Assessment and Restoration Spokane Washington Spokane, US Spokane Crypto Recovery
  • St. Paul Hermes Ransomware Repair St Paul-Bloomington, Minnesota St. Paul Sodinokibi Crypto-Ransomware Recovery St Paul-Inver Grove Heights, MN
  • Support Outsourcing Exchange Server 2010 Exchange 2010 Upgrade Setup and Support
  • Tech Support For Small Business Microsoft Windows Columbia South Carolina Top Rated Microsoft and Apple Tech Services Columbia
  • Telecommuters Consulting Services nearby Chesapeake - Integration Expertise Chesapeake, South Hampton Roads Chesapeake Work at Home Employees Set up Consulting Chesapeake, South Hampton Roads

  • ProSight Reporting Network Infrastructure Monitoring On-site Technical Support
    24 Hour ProSight Reporting Infrastructure Management Engineer

    ProSight Reporting is an expanding suite of real-time reporting tools created to integrate with the leading ticketing and remote network monitoring programs such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne.

  • Teleworkers Consulting - Reston - Video Conferencing Solutions Consulting and Support Services Reston-Dulles, VA, United States Reston Teleworkers Voice/Video Conferencing Solutions Assistance Reston-Dulles, Virginia, United States

  • CCIE Expert Certified Small and Midsize Office Computer Systems Consulting
    Small and Midsize Office Tech Services

    Progent is a leading innovator in cost-effectively providing world-class network help to small companies. Progent's achievement in handling the IT service requirements of the historically underserved small business sector is the cumulative result of major technical and operational innovations that have eliminated a great deal of the conventional expenses out of administering IT support, added unprecedented professional skill into the IT service system, and dramatically accelerated the repair cycle.

  • Top Quality Cincinnati NotPetya Ransomware Cleanup Cincinnati, Hamilton County Cincinnati, Hamilton County 24x7x365 Emergency Cincinnati Crypto Recovery Services
  • 24/7 ProSight Email Guard Content Filtering Service Engineers
  • Top Ranked Windows Server 2019 Cybersecurity Remote Support Services Windows Server 2019 Encrypted Networks Consultants

  • Cisco Firepower 1000 Series Firewalls Support
    Open Now Cisco ASA 5500-X with Firepower Remote Support

    Cisco's Firepower Next Generation Firewalls deliver a significant performance improvement compared to Cisco's popular ASA 5500-X security appliances and offer centralized management of modern security features like application visibility and control, next-generation intrusion protection (NGIPS) with intelligent prioritization of risks, advanced malware protection (AMP), DDoS mitigation, and multi-node sandboxing. Progent's Cisco CCIE firewall experts can assist you to plan and carry out a smooth migration to Firepower firewalls from Cisco's from ASA 5500-X, ASA 5500, or PIX appliances and help you enhance Firepower appliances with Cisco's cloud-based services to create and centrally control IT ecosystems that span branch offices, data centers, and cloud resources.

  • Top Rated Alexandria Lockbit Ransomware Mitigation Alexandria, VA, United States Alexandria Alexandria Ryuk Ransomware Virus Business-Recovery
  • Top SQL Server 2014 Tech Consultant Capitola, CA Microsoft SQL Server 2017 Consultancies Scotts Valley CA
  • Vacaville Remote Workforce Video Conferencing Systems Guidance Vacaville California Fairfield Vacaville Telecommuters Voice/Video Conferencing Technology Consulting Services

  • Microsoft Experts Remote Technical Support SCDPM 2012 and Windows Server 2012
    SCDPM 2012 Backup and Recovery Remote Support

    Progent's Microsoft-certified consultants can provide online or in-person support to help organizations of all sizes to plan, implement, manage, and repair a backup solution based on System Center 2012 Data Protection Manager. Progent can assist you to upgrade from earlier releases of Data Protection Manager or from another backup system, and Progent can integrate your Data Protection Manager implementation for onsite, cloud-based, or hybrid datacenters. Progent offers occasional support for resolving particularly challenging problems, or comprehensive project management services. Progent can also help your business to incorporate SCDPM 2012 into a comprehensive disaster recovery strategy.

  • Work from Home Employees Fort Lauderdale Consulting Experts - Management Systems Guidance Broward County Florida Fort Lauderdale Weston Margate At Home Workers Guidance - Fort Lauderdale - Management Systems Consulting Services

  • © 2002-2024 Progent Corporation. All rights reserved.