The challenges of today in creating a secure infrastructure has grown in complexity, due to the nature of the sophisticated attacks. With that in mind, providing proper email security measures has grown way beyond signature based anti-spam and anti-virus.
With our Email Security service, you can implement a comprehensive solution protecting against e-mail borne threats. The solution incorporates correlated data from Web Security, thus being able to block incoming emails carrying URLs with links to malware sites.
We offer the following deliverables within this service:
When things get complicated, we will support you and provide direct access to the vendor support.
Hotline is available via email, phone and our customer portal.
Response time is defined by the SLA you attach to the agreement:
Analysis & Design
We have years of experience reviewing existing infrastructures, and providing optimized network designs. Take advantage of our Professional Services team that will support you doing your classic architectural tasks such as:
Resilient secure email gateway design
Integration with sandboxing and other technologies
Implement & Configure
If you buy the solution, we can do more than a simple Rack & Stack. We will support throughout the deployment and deliver a detailed set of system documentation.
Deployments are always performed by combining best practices from the vendor with our own experiences. Typically we can estimate deployments beforehand and are delivered using fixed pricing.
We have the following deployment options available:
Review & Assess
Optimizing the current configuration and rulebase. We offer the following:
Trend Micro Interscan Messaging Security provides the most comprehensive protection against both traditional and targeted attacks. Using the correlated intelligence from Trend Micro™ Smart Protection Network™ and optional sandbox execution analysis, it blocks spam, phishing, and advanced persistent threats (APTs).
It will provide the following benefits:
Trend Micro IMHS (Hosted Service) offers the same as above, but as a pure cloud service.
Fortinet’s flagship FortiGate security appliances deliver ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet’s broad product line of complementary solutions goes beyond UTM to help secure the extended enterprise – from endpoints, to the perimeter and the core, including databases and applications.