ESET® MAIL SECURITY FOR IBM Domino

Protect your users’ most exploited threat vector—their email

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mail Security for IBM Domino

Additional layer of real-time email protection against targeted attacks, phishing and malware. Complements ESET’s overlapping layers of protection with:

Checkmark icon

Antimalware

Checkmark icon

Antispam

Checkmark icon

Anti-phishing

Checkmark icon

On-demand database scan


Multilayered protection

The first layer works with our proprietary antispam technology, which filters spam messages with close to 100% accuracy as confirmed by third party testing. The second layer is our antimalware scanner, which detects suspicious attachments.

Proprietary technology

ESET Mail Security solutions use in-house developed antispam, anti-phishing and host server protection, combining machine learning, big data and human expertise into one award-winning mail security platform.

Flexible and scalable

ESET Mail Security enables component-based installation, providing admin with an opportunity to select only a certain component of the solution. It also allows exclusion of specific objects or processes from on-access scanning, minimizing interference with the process to improve backup speed and process integrity.

Use cases

PROBLEM

Users are constantly targeted via phishing campaigns that may contain other malicious components.

SOLUTION

  • Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
  • Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
  • ESET Mail Security uses a sophisticated parser that searches both the message body and subject line to identify malicious links.
  • Any email containing malicious files or links is quarantined and prevented from being received by the users.
Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2008
license prolonged/enlarged 10x

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 million customer base

The ESET difference

Antispam

Our award-winning proprietary engine prevents spam from ever reaching your users’ mailboxes. Includes SPF and DKIM validation, backscatter protection and SMTP protection.

Antimalware

Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.

Anti-phishing protection

Prevents users from accessing web pages known for phishing by parsing email subject lines and content to identify URLs. URLs are then compared against the phishing database and rules to decide whether they are malicious. 

On-demand database scan

On-demand database scanner provides option to choose the targets to scan. Also, you can use the scheduler to run the database scan at a specific time or at an event.

Rules

ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with filtered emails.

Mail quarantine manager

Admin can inspect objects in this special IBM Domino database and decide to delete or release them. This feature offers simple management of emails quarantined by the transport agent.

ESET MAIL SECURITY FOR IBM DOMINO

Get started

We'll design a personalized offer to fit your requirements.

Or, you can purchase this product online as part of ESET security bundles. Learn more

Try before you buy

Download a free trial license with absolutely no commitment. 

System Requirements

ESET Mail Security is also available for

Microsoft Exchange logo
Linux logo
Kerio logo

Looking for additional solutions?

Related enterprise-grade solutions

ESET Targeted Attack Protection solution icon

ESET Targeted Attack Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
  • Endpoint Detection & Response
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

Who says cybercrime is a serious threat? Just about everyone, according to a new ESET study

Nine out of 10 people in North America identified cybercrime as an important challenge to the internal security of their country, according to a new survey conducted by ESET.   

Respondents put the...

Whitelists safe files based on reputation database for ultra-fast scans.

Moving to the cloud? Five tips for a fully secured SMB environment

Considering moving your data to the cloud? Good idea, but be sure to read ESET's five tips to ensure success.

We Live Security blog

Scams and flaws: Why we get duped

What are the emotional triggers and errors in judgment that make you fall for an online scam?

Week in security with Tony Anscombe

GreyEnergy: ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks

Download others white icon

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Renew or manage license

Log in or retrieve your password to manage your existing licenses.

Need assistance?

All ESET products include free technical support in your language.