ESET Mail Security solutions use in-house developed anti-spam, anti-phishing and host server protection, combining machine learning, big data and human expertise into one, award-winning mail security platform.
Flexible and scalable
ESET Mail Security enables component-based installation, providing admin with an opportunity to select only a certain component of the solution. Also, ESET Mail Security allows exclusion of specific objects or processes from on-access scanning, thus minimizing interference with the process to improve backup speed and process integrity.
Users are constantly targeted via phishing campaigns that may contain other malicious components.
- Early warning system such as ESET Threat Intelligence notifies about a phishing campaign.
- Rules can be implemented in ESET Mail Security to prevent emails from being received from known malicious countries and domains.
- ESET Mail Security uses a sophisticated parser that searches message body and subject line to identify malicious links.
- Any email containing malicious files or links is quarantined and prevented from being received by the users.
The ESET difference
Using our own proprietary award-winning engine, spam is prevented from ever reaching your users’ mailboxes. Includes SPF and DKIM validation, backscatter protection and SMTP protection.
Our second layer of protection built into ESET Mail Security provides detection of suspicious or malicious attachments to prevent users from being infected.
Prevents users from accessing web pages known for phishing by parsing messages body and subjects to identify URLs. URLs are then compared against the phishing database and rules to decide whether they are good or bad.
On-demand database scan
On-demand database scanner provides option to choose the targets to scan. Also, you can use the scheduler to run the database scan at a specific time or at an event.
ESET’s comprehensive rule system allows administrators to manually define email filtering conditions and actions to take with filtered emails.
Mail quarantine manager
Admin can inspect objects in this special IBM Domino database and decide to delete or release them. This feature offers simple management of emails quarantined by the transport agent.
ESET MAIL SECURITY FOR IBM DOMINO
Stay on top of cybersecurity news
Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.
We Live Security blog
GDPR-themed WordPress plugin flaw exploited. Google’s data charts path to avoiding malware on Android. Plus security researchers bypass encryption on self-encrypting drives
Industry standard specification does not guarantee the safety of the self-encrypting drives despite verification