How Our Service Works to Protect You
LEVEL 1: Threat Intelligence
Our security analysts mine the entire DNS system for indicators of cyber criminal behaviour. We analyse the data, apply our knowledge and use this intelligence to protect our customers from threats they didn’t know existed.
LEVEL 2: Reputation-Based Algorithms
Our industry-leading algorithms can identify whether an email is coming from a genuine email server or is just internet ‘noise’. If the email is recognised as spam, the customer doesn’t need to see it, so the connection is dropped. Logs are still retained on the service for reference if needed in the future.
LEVEL 3: Anti-Virus Protocols
Each email that passes through our protection system is scanned by five separate anti-virus engines. Three of these are signature-based, while the other two are behavioural-based engines to ensure the system captures new viruses and malware. These are also continuously changing to take advantage of the best performing engine.
LEVEL 4: Content Assessment
Every email is put through a range of filters to examine different aspects of its content. This includes assessing embedded URLs for malicious links and investigating header and body content for ‘spammer’ giveaways.
LEVEL 5: User Specifications
Customers also have a number of options when it comes to what is presented in their inbox. Through the customer web interface, they can block macros, zip files or executable files, as well other options and implement white and black lists.
LEVEL 6: Encryption Options
We provide the customer with many options for utilizing our encryption features. We believe in choice for the customer to use the type of encryption that suits their business.