ESET® MAIL SECURITY FOR IBM Domino

Protect your users’ emails, the number one threat vector

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mail Security for IBM Domino

Additional layer of real-time email protection against targeted attacks, phishing and malware perfectly complementing ESET’s overlapping layers of security protection with:

Checkmark icon

Anti-malware

Checkmark icon

Anti-spam

Checkmark icon

Anti-phishing

Checkmark icon

On-demand database scan


Multilayered protection

The first layer works with our proprietary antispam technology, which filters spam messages with almost 100% accuracy as shown by 3rd party testing. The second layer is our antimalware scanner, which detects suspicious attachments.

Scan found malware image

Proprietary technology

ESET Mail Security solutions use in-house developed anti-spam, anti-phishing and host server protection, combining machine learning, big data and human expertise into one, award-winning mail security platform.

Flexible and scalable

ESET Mail Security enables component-based installation, providing admin with an opportunity to select only a certain component of the solution. Also, ESET Mail Security allows exclusion of specific objects or processes from on-access scanning, thus minimizing interference with the process to improve backup speed and process integrity.

Use cases

PROBLEM

Users are constantly targeted via phishing campaigns that may contain other malicious components.

SOLUTION

  • Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
  • Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
  • ESET Mail Security uses a sophisticated parser that searches message body and subject line to identify malicious links.
  • Any email containing malicious files or links is quarantined and prevented from being received by the users.
Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 million customer base

The ESET difference

Antispam

Using our own proprietary award-winning engine, spam is prevented from ever reaching your users’ mailboxes. Includes SPF and DKIM validation, backscatter protection and SMTP protection.

Antimalware

Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.

Anti-phishing protection

Prevents users from accessing web pages known for phishing by parsing messages body and subjects to identify URLs. URLs are then compared against the phishing database and rules to decide whether they are good or bad.

On-demand database scan

On-demand database scanner provides option to choose the targets to scan. Also, you can use the scheduler to run the database scan at a specific time or at an event.

Rules

ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with filtered emails.

Mail quarantine manager

Admin can inspect objects in this special IBM Domino database and decide to delete or release them. This feature offers simple management of emails quarantined by the transport agent.

ESET MAIL SECURITY FOR IBM DOMINO

Make an enquiry

Leave us your contact details to receive an offer tailored for your company´s needs.

Try before you buy

Why not download a free trial license with absolutely no commitment on your side.

System Requirements

ESET Mail Security is also available for

Microsoft Exchange logo
Linux logo
Kerio logo

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Malware Researcher + Threat Analyst: two perspectives on the MITRE ATT&CK™ knowledge base

ATT&CK imprints an efficient mapping and documentation process on people engaging in activities as diverse as ruleset creation and product functionality, on to descriptions of threats mapped to...

Father’s Day 2019: Top tips for dad

As Father’s Day approaches, it’s time to tip our hats to all the dads out there who work ceaselessly to protect their kids – in the real world and the digital one.

See more

We Live Security blog

You’d better change your birthday – hackers may know your PIN

Are you in the 26% of people who use one of these PIN codes to unlock their phones?

Instagram tests new ways to recover hacked accounts

Locked out and out of luck? The photo-sharing platform is trialing new methods to reunite you with your lost account

Are you an existing customer?

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Manage licenses

ESET Business Account is a license management platform and entry point to ESET cloud services.

Need assistance?

All ESET products come with free technical support in your language.