Deprecated: Function eregi() is deprecated in /home/factory7/public_html/pm_inc.php on line 26

Deprecated: Function ereg() is deprecated in /home/factory7/public_html/pm/inc.lib.php on line 127
Email Security
About Us | Contact | Support | Search | Login   

Security | Networking | Web | Desktop | Data | Up-Time   
 
  Unified Threat Management | Web Security | E-Mail Security | Networking Security | HIPAA Compliance
What clients are saying
"As Stanley was preparing to leave yesterday, I quickly looked at your Invoice and wrote a check for that amount and gave it to Stanley as he departed.

After he had gone, I more carefully reviewed the bill and was quite surprised and grateful for the most generous discount you gave me.

I want to thank you for this and your courtesy, promptness and excellent service. Please convey this feeling also to Stanley."

-Jack Butterworth M.D.
        Email Security

The most deadly viruses, able to cripple your email system and corporate network in minutes, are being distributed worldwide via email in a matter of hours (for example, the LoveLetter virus). Email worms and viruses can reach your system and infect your users through harmful attachments. But that's not all! Some viruses are transmitted through harmless-looking email messages and can run automatically without the need for user intervention (like the Nimda virus). Are you covered against such threats?

Virus Protection for Email
-Block viruses, worms, trojans, and other “malware” before they reach email servers of desktops
-Scans SMTP and POP3 traffic
-Dual virus scanners with multiple detection methods
     -Virus signatures, heuristic analysis
-Database of more than 280,000 virus signatures
     -Frequent automatic updates
-Flexible management
     -Can specify file formats and text strings to block
     -Emails and attachments can be dropped, rejected with message to sender, passed with a warning, quarantined
-Gateway virus protection supplements desktop virus scanning.

Spam Protection
-Identifies and disposes of unsolicited emails (spam)
-Multiple methods to identify spam
     -Sender address verification, Realtime Blackhole Lists, header and text analysis, whitelists, blacklists, URL scanning, greylisting
-Heuristic methods create a “spam score” based on probability
-Flexible management
     -Emails and attachments can be dropped, rejected with message to sender, passed with a warning, quarantined
     -User can release messages from quarantine queue
-Can attach headers to email messages to allow the email server to take additional actions

Protection Against “Phishing”
-“Phishing”
     –Criminals imitate emails from banks, credit card companies, eBay and other sources to obtain confidential user information
-Astaro identifies and blocks phishing emails through several techniques:
     -Virus scanner identifies phishing signatures
     -URL filtering database captures phishing servers in the “suspicious” category
     -Content downloaded from web sites will be blocked if it matches patterns of phishing content

 

For Immediate Technical Support Please call (804)-354-9977
Factory7, LLC. • Richmond, VA • 804.354.9977
Security | Networking | Web | Desktop | Data | Up-Time | About Us | Contact | Support | Home
© 1996-2014, Factory7, LLC