ESET® MAIL SECURITY FOR IBM Domino

Protect your users’ emails, the number one threat vector

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mail Security for IBM Domino

Additional layer of real-time email protection against targeted attacks, phishing and malware perfectly complementing ESET’s overlapping layers of security protection with:

Checkmark icon

Anti-malware

Checkmark icon

Anti-spam

Checkmark icon

Anti-phishing

Checkmark icon

On-demand database scan


Multilayered protection

The first layer works with our proprietary antispam technology, which filters spam messages with almost 100% accuracy as shown by 3rd party testing. The second layer is our antimalware scanner, which detects suspicious attachments.

Proprietary technology

ESET Mail Security solutions use in-house developed anti-spam, anti-phishing and host server protection, combining machine learning, big data and human expertise into one, award-winning mail security platform.

Flexible and scalable

ESET Mail Security enables component-based installation, providing admin with an opportunity to select only a certain component of the solution. Also, ESET Mail Security allows exclusion of specific objects or processes from on-access scanning, thus minimizing interference with the process to improve backup speed and process integrity.

Use cases

PROBLEM

Users are constantly targeted via phishing campaigns that may contain other malicious components.

SOLUTION

  • Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
  • Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
  • ESET Mail Security uses a sophisticated parser that searches message body and subject line to identify malicious links.
  • Any email containing malicious files or links is quarantined and prevented from being received by the users.
Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 million customer base

The ESET difference

Antispam

Using our own proprietary award-winning engine, spam is prevented from ever reaching your users’ mailboxes. Includes SPF and DKIM validation, backscatter protection and SMTP protection.

Antimalware

Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.

Anti-phishing protection

Prevents users from accessing web pages known for phishing by parsing messages body and subjects to identify URLs. URLs are then compared against the phishing database and rules to decide whether they are good or bad.

On-demand database scan

On-demand database scanner provides option to choose the targets to scan. Also, you can use the scheduler to run the database scan at a specific time or at an event.

Rules

ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with filtered emails.

Mail quarantine manager

Admin can inspect objects in this special IBM Domino database and decide to delete or release them. This feature offers simple management of emails quarantined by the transport agent.

ESET MAIL SECURITY FOR IBM DOMINO

Make an enquiry

Leave us your contact details to receive an offer tailored for your company´s needs.

Try before you buy

Why not download a free trial license with absolutely no commitment on your side.

System Requirements

ESET Mail Security is also available for

Microsoft Exchange logo
Linux logo
Kerio logo

Looking for the complete security of your network?

Related bundled solutions

ESET Targeted Attack Protection solution icon

ESET Targeted Attack Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
  • Endpoint Detection & Response
ESET Secure Business solution icon

ESET Secure Business

  • Security Management Center
  • Endpoint Security
  • File Server Security
  • Mail Security
ESET Secure Business Cloud solution icon

ESET Secure Business Cloud

  • Cloud Administrator
  • Endpoint Security
  • File Server Security
  • Mail Security
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

The pitfalls of securing mobiles and how you can protect yourself in 2019

Research has shown that mobile web traffic now represents 52% of all Internet usage worldwide, but for some reason we would still prioritize protecting our laptops over our phones.

SMBs - secure your passwords to secure your business

Employ 2FA, one of the strongest steps which can be taken to secure data is improving the protection provided by passwords, e.g. making what should be safe - in theory – actually secure.

 

See more

We Live Security blog

Bug in EA’s Origin client left gamers open to attacks

The gaming company has rolled out a fix for the remote code execution vulnerability, so make sure you run the platform's latest version

Your Android phone can now double as a security key

An extra layer of security never hurt anybody, and now you can turn your phone into a physical security key

Are you an existing customer?

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Manage licenses

ESET Business Account is a license management platform and entry point to ESET cloud services.

Need assistance?

All ESET products come with free technical support in your language.