ESET® MAIL SECURITY FOR IBM Domino

Protect your users’ most exploited threat vector—their email

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mail Security for IBM Domino

Additional layer of real-time email protection against targeted attacks, phishing and malware. Complements ESET’s overlapping layers of protection with:

Checkmark icon

Antimalware

Checkmark icon

Antispam

Checkmark icon

Anti-phishing

Checkmark icon

On-demand database scan


Multilayered protection

The first layer works with our proprietary antispam technology, which filters spam messages with close to 100% accuracy as confirmed by third party testing. The second layer is our antimalware scanner, which detects suspicious attachments.

Scan found malware image

Proprietary technology

ESET Mail Security solutions use in-house developed antispam, anti-phishing and host server protection, combining machine learning, big data and human expertise into one award-winning mail security platform.

Flexible and scalable

ESET Mail Security enables component-based installation, providing admin with an opportunity to select only a certain component of the solution. It also allows exclusion of specific objects or processes from on-access scanning, minimizing interference with the process to improve backup speed and process integrity.

Use cases

PROBLEM

Users are constantly targeted via phishing campaigns that may contain other malicious components.

SOLUTION

  • Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
  • Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
  • ESET Mail Security uses a sophisticated parser that searches both the message body and subject line to identify malicious links.
  • Any email containing malicious files or links is quarantined and prevented from being received by the users.

Protected by ESET since 2011.

Protected by ESET since 2008.

Canon logo

Protected by ESET since 2016.

T-com logo

ESET ISP security partner since 2008.

The ESET difference

Antispam

Our award-winning proprietary engine prevents spam from ever reaching your users’ mailboxes. Includes SPF and DKIM validation, backscatter protection and SMTP protection.

Antimalware

Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.

Anti-phishing protection

Prevents users from accessing web pages known for phishing by parsing email subject lines and content to identify URLs. URLs are then compared against the phishing database and rules to decide whether they are malicious. 

On-demand database scan

On-demand database scanner provides option to choose the targets to scan. Also, you can use the scheduler to run the database scan at a specific time or at an event.

Rules

ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with filtered emails.

Mail quarantine manager

Admin can inspect objects in this special IBM Domino database and decide to delete or release them. This feature offers simple management of emails quarantined by the transport agent.

ESET MAIL SECURITY FOR IBM DOMINO

Get started

We'll design a personalized offer to fit your requirements.

Or, you can purchase this product online as part of ESET security bundles. Learn more

Try before you buy

Experience ESET products including ESET Full Disk Encryption for 30 days with a free trial, to make sure they suit your needs. All you need is ESET Business Account.

System Requirements

ESET Mail Security is also available for

Microsoft Exchange logo
Linux logo
Kerio logo

Looking for additional solutions?

Related enterprise-grade solutions

ESET Targeted Attack Protection solution icon

ESET Targeted Attack Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
  • Endpoint Detection & Response
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

Protecting your business with ESET Cloud Office Security

With cybercrime skyrocketing during the coronavirus shutdowns, there has never been a more important time to secure your business from potential threats. Running a business is a complicated, difficult...

United against bullying online: Types of bullying

Over the years, bullying has evolved and adapted to the changing world—and, unfortunately, technology now plays a significant role in many forms of bullying among young people. One third of all people...

Webinars

Election (in)security: Why this year’s biggest issue may be cyber technology

Tuesday, Oct 13, 2020

As the countdown to the U.S. presidential election continues, concerns about cybersecurity are on the rise.

Zero day attacks & trillion dollar profits: How cloud sandboxing protects against a new wave of advanced threats

Wednesday, Aug 12, 2020

Learn about the latest advanced cyberattacks and effective defenses.

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Manage licenses

ESET Business Account is a license management platform and entry point to ESET cloud services.

Need assistance?

All ESET products include free technical support in your language.