Email Filtering and Archiving

Controlling spam is a significant challenge for administrators. IT professionals are consistently reporting that more than 50% of incoming email (in some cases – 90%) is comprised of unsolicited spam. Even worse, spam can contain malware or phishing links that can introduce unwanted infection into the enterprise. Prosecuting offenders are largely fails so the problem continues unabated.

It’s possible to manage spam levels by implementing software and hardware filters that identify and block unwanted content before it enters the enterprise. There  is also a large increase in demand for businesses to comply with varying regulations that require them to monitor inbound and outbound email. Securite solutions use a wide variety of products and services that identify & block spam, assist with compliance for inbound and outbound email and neutralise malware, spyware and other email carried threats.

  • Mimecast and Securite
  • Proofpoint and Securite
  • Forcepoint and Securite
  • Forcepoint and Securite

Mimecast Integrated Cloud Suite

Securite partners with Mimecast

Mimecast Secure Email Gateway uses sophisticated, multi-layered detection engines and intelligence to protect email data and employees from malware, spam, advanced threats and zero-day attacks. Mimecast’s threat intelligence and adaptive network are constantly improving defenses to eliminate new and advanced threats. Malware attacks are eliminated by reviewing every URL for threats and ensure spam and and content that breaches policy doesn’t reach your network. Administrators can set policies centrally and secure data so risks posed by compliance and policy violations whether in an on-premises, cloud or hybrid environment are mitigated.
Secure Email Gateway Cloud or On-Premise
Email Archiving
Discover a single, secure and accessible cloud archive for your business’ most important information. If you need a secure, dependable and highly scalable solution to meet growing information management challenges Mimecast Enterprise Information Archiving delivers unified and secure archiving of emails and files from a tightly integrated cloud platform. It supports rapid access to content for compliance, comprehensive eDiscovery and litigation readiness as well as granular and intuitive user search.

  • Instantly protects valuable intellectual property
  • Delights users and speeds workflows
  • Delivers comprehensive compliance, eDiscovery and litigation support
  • Reduces cost and complexity

Business Continuity
Mimecast Mailbox Continuity provides uninterrupted access to live and historic email and attachments from the Mimecast Cloud using everyday tools like Outlook for Windows, the web and mobile applications. This provides employees access to email from any location on any endpoint.

  • Instant failover and failback reduces RPO & RTO for email to near zero
  • Immediate admin initiated switch-over when an event occurs, keeps end users happy and productive
  • Automatic synchronisation of mailboxes after an event lowers confusion without straining IT
  • Access to email through Outlook for Windows or any email client means employees can continue working without interruption
  • Management of continuity events directly from the Mimecast Administration Console gives complete control of failover events and outages
  • No hardware or software to purchase or maintain lowers IT overhead

Data Sheet

TRITON AP-EMAIL Email Filtering

Add the power of Triton Email Protection
Advanced Threats blend Web and email elements deployed via multi-stage attacks to probe for the weakest vector. This strategy offers the defender multiple opportunities to stop those attacks before possible breaches occur.
TRITON AP-EMAIL secures the communication channel most often used in the early stages of an attack to identify targeted threats as well as high-risk users. It mitigates the risk posed by Insider Threats while empowering mobile workers and easing the safe adoption of new technologies like Microsoft Office 365™. We live in a cloud-first world, with bold advances in technology constantly changing the ways we communicate and collaborate. Email still remains the backbone of productivity and it demands strong protection to prevent interruption to staff productivity or possible flow-on effects.
TRITON AP-EMAIL gives you the security you need by protecting you against multi-stage advanced threats that often exploit email to penetrate your IT environment. It applies real-time behavioural sandboxing (AKA quarantining), enterprise-grade DLP and other advanced defense technologies to identify targeted attacks, high-risk users and insider threats. TRITON AP-EMAIL monitors outbound email to prevent data leaks of sensitive information, and it protects your organisation by helping you to safely adopt technologies like Microsoft Office 365™.

Securite partners with Forcepoint for Triton Email

TRITON AP-EMAIL is powered by TRITON ACE and ThreatSeeker® Intelligence Cloud, which work together in real time to accurately identify and classify network traffic, apply policies and detect threats. Unified management and reporting streamline work for your security team, giving them the context and insights they need to minimise attack dwell times and prevent exfiltration of your data. The common TRITON APX architecture also makes it simple to deploy TRITON AP-EMAIL separately or in any combination with TRITON AP-WEB, TRITON AP-DATA and TRITON AP-ENDPOINT.

  • Cloud, on-premise or hybrid deployment
  • Enterprise-grade DLP protection
  • Highly accurate, real-time identification and classification of threats using TRITON ACE
  • Real-time threat intelligence from the Forcepoint ThreatSeeker Intelligence Cloud, which gives visibility into current global cyber threat activity
  • Unified management, reporting and dashboards across all TRITON APX products
  • Advanced options for email encryption, archiving, image analysis and more

ResourcesData Sheet

Proofpoint Next Generation Email Security

Proofpoint Email Protection provides the tools you need to keep your people safe from email threats. Secure and control inbound and outbound email with the easy-to-use, cloud-based solution protects from today’s email bound threats.
Industry-Leading Service Delivery

  • 99.999% service availability
  • 99% blocked or redirected spam
  • 100% virus protection
  • Less than 1 minute email latency

Threat Prevention
Effective threat protection starts with accurate detection. Email Protection uses multiple layers of technology to accurately detect threats, including malicious content and malware.
Multilayered Content Analysis
Email Protection uses several techniques to protect against both known and emerging threats. Signature-based detection prevents known threats while dynamic reputation analysis continually assesses local and global IP addresses to determine whether to accept, reject or throttle email connections. Together, these features help protect you at the first signs of malicious activity.
Protection from malware-free threats
Email Protection detects threats that don’t involve malware, such as credential phishing and impostor email. It assesses the reputation of the sender by analysing a multitude of email attributes, including the sender/recipient relationship, headers, and content. Impostor email—also known as business email compromise or CEO fraud—is a fast-growing threat that can cause huge losses.
Granular Filtering and Control
Accurate Email Classification and Quarantine helps to protect against email threats and other unwanted messages in just about any language with multilingual analysis. Email classifiers divide incoming email into separate quarantines by type and gives you granular control over a wide range of email attributes.

Policy Creation
Email Protection supports the demands of the largest global enterprises because our policy engine gives you complete flexibility with custom rules at the international, country, group and user level. With our deep content inspection you can easily enforce your acceptable-use policies.
Email Continuity
If you’re moving to cloud-based inbox platforms such as Microsoft Office 365 service outages can be a concern. With guaranteed uptime Proofpoint SLA’s you can continue to send and receive email when mail servers are unavailable. This helps increase productivity and guarantees no reputation damage if services are lost in circumstances beyond your control.
Visibility with Advanced Reporting and Search Tools
Message Tracing powered by a powerful search engine helps administrators track and locate emails and quickly pinpoint hard-to-find log data based on dozens of search criteria.
Get more than 60 real-time reports for detailed visibility into mail flow and trends that helps you to proactively address issues and trends as they emerge.
End User Controls
Give your people self-service control over their email preferences;

  • Quarantines
  • Safe and block lists
  • Bulk mail delivery
  • You can even allow users to opt in or out of various spam policies. All end-user services are easy to brand allowing providing familiarity for end-users who access these tools. And with support for numerous languages, you can deploy them globally.

Data Sheet