Zaščitite e-poštna sporočila uporabnikov

users worldwide

business customers

countries & territories

global R&D centers

ESET Mail Security za IBM Domino

Dodatna plast zaščite elektronske pošte v realnem času pred ciljnimi napadi , lažnim predstavljanjem in zlonamerno programsko opremo, ki popolnoma dopolnjujejo zaščite ESET z:

Checkmark icon

Protivirusna programska zaščita

Checkmark icon

Proti nezaželjeni pošti

Checkmark icon

Preprečevanje lažnega predstavljanja

Checkmark icon

Skeniranje baze podatkov na zahtevo

Večplastna zaščita

Prvi sloj deluje z našo tehnologijo proti nezaželjni pošti, ki filtrira vsa neželjena sporočila s skoraj 100-odstotno natančnostjo, kot kaže tretje stransko testiranje. Druga plast je naš mehanizem proti zlonamerni programski opremi, ki zazna sumljive priloge.

Zaščitena tehnologija

Rešitve ESET Mail Security uporabljajo lastno razvito zaščito proti nezaželeni elektronski pošti, zaščito proti lažnemu predstavljanju in strežniku, ki združuje strojno učenje in človeško znanje v eno nagrajeno platformo za poštno varnost.

Prilagodljiv in fleksibilen

ESET Mail Security omogoča namestitev na podlagi komponente, ki skrbniku omogoča, da izbere le določen del rešitve. Prav tako ESET Mail Security omogoča izključitev določenih predmetov ali procesov od skeniranja ob dostopu s čimer zmanjšuje motnje v procesu in izboljša varnostno kopiranje celovitih procesov.

Use cases


Users are constantly targeted via phishing campaigns that may contain other malicious components.


  • Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
  • Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
  • ESET Mail Security uses a sophisticated parser that searches message body and subject line to identify malicious links.
  • Any email containing malicious files or links is quarantined and prevented from being received by the users.
Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 million customer base

The ESET difference


Using our own proprietary award-winning engine, spam is prevented from ever reaching your users’ mailboxes. Includes SPF and DKIM validation, backscatter protection and SMTP protection.


Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.

Anti-phishing protection

Prevents users from accessing web pages known for phishing by parsing messages body and subjects to identify URLs. URLs are then compared against the phishing database and rules to decide whether they are good or bad.

On-demand database scan

On-demand database scanner provides option to choose the targets to scan. Also, you can use the scheduler to run the database scan at a specific time or at an event.


ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with filtered emails.

Mail quarantine manager

Admin can inspect objects in this special IBM Domino database and decide to delete or release them. This feature offers simple management of emails quarantined by the transport agent.


Sistemske zahteve

ESET Mail Security je na voljo tudi za

Microsoft Exchange logo
Linux logo
Kerio logo

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

ESET security suite selected as 'PCMag Readers' Choice Award winner

2019 welcomed us with the great news that our consumer product offering was recognised by the Readers of PC Mag as “everything you need in a security suite.”

ESET Veteran Stephen Cobb Receives Prestigious CompTIA Award

Stephen Cobb, Senior Security Researcher at ESET and one of the world’s leading voices in cybersecurity, will receive a prestigious Computing Technology Industry Association (CompTIA) Award.

See more

We Live Security blog

Siegeware: When criminals take over your smart building

Siegeware is what you get when cybercriminals mix the concept of ransomware with building automation systems: abuse of equipment control software to threaten access to physical facilities

Switzerland offers cash for finding security holes in its e-voting system

Anybody with hacking prowess can take a crack at reading votes or even rigging the vote count itself