SecurityGateway email spam firewall for Exchange/SMTP Servers protects against viruses, phishing, spoofing, and other malware. Analyze, manage, and report on email traffic patterns. Simple Administration, Powerful Filtering, Accurate Results!
SecurityGateway email spam firewall for Exchange/SMTP Servers provides affordable email security with a powerful spam filter that serves as a Microsoft Exchange firewall or SMTP firewall. It also protects against viruses, phishing, spoofing, and other forms of malware that present an ongoing threat to the legitimate email communications of your business.
Featuring simple administration and powerful filtering with accurate results, SecurityGateway analyzes, manages, and reports on the inbound and outbound email traffic patterns of Microsoft Exchange Server or any SMTP mail server.
Simple Administration -- Intuitive, task oriented interface allows already overworked administrators to perform common actions with minimal effort.
Comprehensive Reporting -- Identify email traffic patterns and potential problems with SecurityGateway email spam firewall for Exchange/SMTP Servers comprehensive reporting.
Accurate Detection -- With multiple analysis tools for separating threats from legitimate email, SecurityGateway leverages the best proven anti-spam, anti-virus, anti-phishing, and anti-spoofing technologies to produce a 99 percent spam blocking rate and achieve nearly zero false-positive results.
Data Loss Prevention -- In addition to inbound mail traffic filtering, SecurityGateway also filters outbound email. An easy-to-use interface allows policies to be created which detect and prevent the unauthorized transmission of sensitive information outside of your network.
Powerful Filtering Engine -- SecurityGateways powerful filtering engine is based upon the industry standard SIEVE mail filtering language. An administrator may extend its functionality by using their own SIEVE scripts.
Defense Layer Customization -- A unique control method that allows email administrators the flexibility to prioritize the order of operations a specific security rule will execute when analyzing incoming or outgoing mail traffic.