ESET® MAIL SECURITY FOR IBM Domino

Protect your users’ most exploited threat vector—their email

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mail Security for IBM Domino

Additional layer of real-time email protection against targeted attacks, phishing and malware. Complements ESET’s overlapping layers of protection with:

Checkmark icon

Antimalware

Checkmark icon

Antispam

Checkmark icon

Anti-phishing

Checkmark icon

On-demand database scan


Multilayered protection

The first layer works with our proprietary antispam technology, which filters spam messages with close to 100% accuracy as confirmed by third party testing. The second layer is our antimalware scanner, which detects suspicious attachments.

Scan found malware image

Proprietary technology

ESET Mail Security solutions use in-house developed antispam, anti-phishing and host server protection, combining machine learning, big data and human expertise into one award-winning mail security platform.

Flexible and scalable

ESET Mail Security enables component-based installation, providing admin with an opportunity to select only a certain component of the solution. It also allows exclusion of specific objects or processes from on-access scanning, minimizing interference with the process to improve backup speed and process integrity.

Use cases

PROBLEM

Users are constantly targeted via phishing campaigns that may contain other malicious components.

SOLUTION

  • Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
  • Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
  • ESET Mail Security uses a sophisticated parser that searches both the message body and subject line to identify malicious links.
  • Any email containing malicious files or links is quarantined and prevented from being received by the users.

Protected by ESET since 2011.

Protected by ESET since 2008.

Canon logo

Protected by ESET since 2016.

T-com logo

ESET ISP security partner since 2008.

The ESET difference

Antispam

Our award-winning proprietary engine prevents spam from ever reaching your users’ mailboxes. Includes SPF and DKIM validation, backscatter protection and SMTP protection.

Antimalware

Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.

Anti-phishing protection

Prevents users from accessing web pages known for phishing by parsing email subject lines and content to identify URLs. URLs are then compared against the phishing database and rules to decide whether they are malicious. 

On-demand database scan

On-demand database scanner provides option to choose the targets to scan. Also, you can use the scheduler to run the database scan at a specific time or at an event.

Rules

ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with filtered emails.

Mail quarantine manager

Admin can inspect objects in this special IBM Domino database and decide to delete or release them. This feature offers simple management of emails quarantined by the transport agent.

ESET MAIL SECURITY FOR IBM DOMINO

Get started

We'll design a personalized offer to fit your requirements.

Or, you can purchase this product online as part of ESET security bundles. Learn more

Try before you buy

Download a free trial license with absolutely no commitment. 

System Requirements

ESET Mail Security is also available for

Microsoft Exchange logo
Linux logo
Kerio logo

Looking for additional solutions?

Related enterprise-grade solutions

ESET Targeted Attack Protection solution icon

ESET Targeted Attack Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
  • Endpoint Detection & Response
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

Human Rights Day 2019 – The power of the internet

This Tuesday, 10 December, is Human Rights Day, marking the day on which the Universal Declaration of Human Rights was adopted by the United Nations in 1948. This year, the theme is ‘Youth Standing Up...

Dr. Paul Vixie scores Google 2 out of 2 points for doing DNS-over-HTTPS the right way

Last week, we spoke about the ongoing battle for internet privacy with the rollout of the new DNS-over-HTTPS (DoH) protocol. DoH encrypts the traffic between a browser and a DNS provider, ensuring...

Webinars

Cybersecurity Trends 2020: What's Coming & How to Prepare

Wednesday, Dec. 18, 2019

Get a head start with expert insights from the ESET research team, based on their upcoming 2020 cyber trends report.

The MITRE ATT&CK framework: Everything you need to know in under 60 minutes

Wednesday, Nov. 13, 2019

The ATT&CK framework is an ever-expanding knowledge base of threat tactics and techniques—based on real-world observations— that the global cybersecurity community...

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Renew or manage license

Log in or retrieve your password to manage your existing licenses.

Need assistance?

All ESET products include free technical support in your language.