ESET® MAIL SECURITY FOR IBM Domino

Protect your users’ emails, the number one threat vector

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mail Security for IBM Domino

Additional layer of real-time email protection against targeted attacks, phishing and malware perfectly complementing ESET’s overlapping layers of security protection with:

Anti-malware

Anti-spam

Anti-phishing

On-demand database scan


Multilayered protection

The first layer works with our proprietary antispam technology, which filters spam messages with almost 100% accuracy as shown by 3rd party testing. The second layer is our antimalware scanner, which detects suspicious attachments.

Proprietary technology

ESET Mail Security solutions use in-house developed anti-spam, anti-phishing and host server protection, combining machine learning, big data and human expertise into one, award-winning mail security platform.

Flexible and scalable

ESET Mail Security enables component-based installation, providing admin with an opportunity to select only a certain component of the solution. Also, ESET Mail Security allows exclusion of specific objects or processes from on-access scanning, thus minimizing interference with the process to improve backup speed and process integrity.

Use cases

PROBLEM

Users are constantly targeted via phishing campaigns that may contain other malicious components.

SOLUTION

  • Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
  • Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
  • ESET Mail Security uses a sophisticated parser that searches message body and subject line to identify malicious links.
  • Any email containing malicious files or links is quarantined and prevented from being received by the users.
Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 million customer base

The ESET difference

Antispam

Using our own proprietary award-winning engine, spam is prevented from ever reaching your users’ mailboxes. Includes SPF and DKIM validation, backscatter protection and SMTP protection.

Antimalware

Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.

Anti-phishing protection

Prevents users from accessing web pages known for phishing by parsing messages body and subjects to identify URLs. URLs are then compared against the phishing database and rules to decide whether they are good or bad.

On-demand database scan

On-demand database scanner provides option to choose the targets to scan. Also, you can use the scheduler to run the database scan at a specific time or at an event.

Rules

ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with filtered emails.

Mail quarantine manager

Admin can inspect objects in this special IBM Domino database and decide to delete or release them. This feature offers simple management of emails quarantined by the transport agent.

ESET MAIL SECURITY FOR IBM DOMINO

Make an enquiry

Leave us your contact details to receive an offer tailored for your company´s needs.

Try before you buy

Why not download a free trial license with absolutely no commitment on your side.

System Requirements

ESET Mail Security is also available for

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Have AI’s promises fallen to the margins?

Claims about Next-Gen, AI and Machine Learning had considerable impact on the way endpoint security has been framed over the last two to three years; at least from marketing perspective, which has...

Convergence - technology vs monetization & destruction

Technology alone won’t break the quagmire of the dark arts of malware, but informed choices might

See more

We Live Security blog

The Occasional Orator Part 1

Speaking at conferences can be daunting for presenters but often it is about striking the right balance between content and delivery

Bristol airport takes flight screens offline after apparent ransomware attack

The screens in “key locations” are back up and running again, while the airport paid no ransom to return its systems to working order

Are you an existing customer?

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Renew or manage license

Login or retrieve your password to manage your existing licenses.

Need assistance?

All ESET products come with free technical support in your language.