First Cloud Email Security Features | Business Essential | Advanced Defence | HR & Legal | Enhanced Integration | Custom Add-on (POA) |
---|---|---|---|---|---|
Anti-Virus | |||||
Anti-spam (incl. Public Indirect spam filter) | |||||
Anti-Phishing Machine Learning Classifier & Reputation) | |||||
Anti-Ransomware Malicious Files / Links) | |||||
Forged email filter C-level impersonation filter (Whaling/BEC) | |||||
Secure RBAC Portal (2FA/N-Tier) | |||||
Centralised Policy View & Management Portal) | |||||
Extensive / Rich Policy Filter Rules / Flow Combinations | |||||
Advanced Analytics & Reports (Portal) Unified Intuitive Portal GUI with Apps | |||||
Advanced Content Control App | |||||
Data loss prevention | |||||
SPF filter (email spoofing) DKIM fillter (email spoofing/fraud) | |||||
DMARC filter (email domain spoofing) Cousin Domain filter (Homograph) | |||||
Office 365 Mail Security with DKIM | |||||
MTA Management | |||||
Email spooling (up to 5 days) | |||||
URL Filtering (Advanced) | |||||
Extended Trace application (32 days) | |||||
Role Based Access Control (RBAC) | |||||
AMP-File Reputation Analysis & Advanced Malware Detection/Blocking | |||||
TLS Encryption | |||||
Extended Trace application (up to 36 months) | |||||
Image Control App (Offensive/Non-Business) Office 365 Outbound / Migration) | |||||
Product Training (1 hour) | |||||
7-year archive with trace and replay | |||||
Log Feeds to SIEM or other User or Group (LDAP) - Based Policy |
A proven and affordable inbound and outbound email security solution
Cisco AMP - Defence against advanced persistent threats or ransomware attacks
Data Loss Prevention through guaranteed backup as per compliance standards
Assured disaster recovery and 32 days trace replay
Ensured 100% uptime using redundant and fault tolerant infrastructure
24/7 proactive monitoring, alerting, and expert support
Rapid service provisioning within 3-5 days with pre-set policies
Patented image control and Marketing/Graymail filters for advanced content control
Protection against phishing and BEC attacks through C-level impersonation and typo domain filters
Efficient email remediation with advanced analysis
Advanced access, visibility, and role based controls for easier content management.
Easy integration with O365 and Gmail
Prevent total access to sensitive email attachments on vulnerable unmanaged devices (BYOD) while permitting full access to secure managed devices.
Unique phishing education with feedback capabilities educates employees as they make mistakes, helping them to better learn and understand safe email best practices.
Detect unwanted spam and unsafe phishing emails, allowing customers to block, quarantine, or take other actions.
The Forcepoint Image Analysis Module allows employers to proactively monitor, educate, and enforce company email policy for explicit or pornographic image attachments.
Enable secure delivery of email communications with Forcepoint Email Encryption that eliminates the traditional barriers of cost and complexity by offering easy administration, without key management or additional hardware.
Fill up the details to know more
-sadanand surve
-randy roman
-Clint N
XcellHost's Cloud Email Security is a pure cloud based service offering superior cloud based protection from spam, phishing attacks and malware.
The Cloud Email Security service stops Spam, phishing, and virus attacks with over 99% effectiveness using multiple proven, patented techniques including reputation checks that check not only a message's sender IP reputation but also the reputation of its content, structure, links, images, attachments. The technology also provides Denial of Service (DoS) protection and sender validation. Advanced techniques are also used to analyze email content, such as image analysis, etc is used to uncover hidden known threats and new threats.
You can filter on message or attachment size with a message filter. (You cannot use content filters to filter on message or attachment size.)
Rate limiting is used to define the maximum number of recipients per hour you are willing to receive from a remote host. When you have configured rate limiting on a listener or mail flow policy, your mail_logs log file will contain an entry stating "Rejected By Receiving Control" for each message attempt after the limit is exceeded. The following excerpt shows the format of a mail_logs log entry documenting a message that was blocked by rate-limiting.
Beyond Filtering. Adaptive Security & Data Loss Preventionfor the web and cloud applications.Your employees rely on the web & email to do their jobs, but cybercriminals are lurking in the background 24/7.
Learn MoreOur Business Email package comes with a storage space of 5GB per account. This is dedicated to file storage and also backs up all your mails on our state of the art infrastructure, making sure you never experience a loss of mails
Includes Office 365, Windows 10 & Enterprise Mobility + Security. Learn More Now. Trusted & Secure. Secure Cloud Service. Intelligent Security. Built For Teamwork. Achieve More Together.
Microsoft Office 365, Exchange Server and G Suite solutions for email signatures, archiving, email utilities & more.
Keep up with the latest blog posts, product updates & offers by signing up to our newsletter.
Top Services
Blog Feeds
Security
XcellHost Cloud Services – a leading Managed Cloud Service Provider since 1999 based out of Mumbai, INDIA. which provides Managed Cloud Services across the globe helping customers manage Public Clouds (AWS, Azure, GCP, Alibaba) + Private clouds to manage the entire Cloud Management Lifecycle i.e Cloud Assessment, Cloud Migration, Cloud Deployment, Cloud Management, Cloud Monitoring, Cloud Security, Cloud DevOps delivered through Cloud-based ServiceDesk + Cloud-based Management Platform. Our SaaS-based Cloud Marketplace Platform helps enterprises consume over 80+ Cloud Services & help them overcome the complexities of Cloud Billing + Provisioning + Reseller Management combined with our 24 x 7 NOC + SOC Services.