en tr

Anti-Spam - Real-time, most accurate Spam Protection

Cyberoam Anti-Spam solution offers real-time spam protection over SMTP, POP3, IMAP protocols, protecting organizations from zero-hour threats and blended attacks that involve spam, malware, botnets, phishing, Trojans and more. Cyberoam’s Check Mark Level 5 certified Anti-Spam solution offers 98% protection against zero-hour attacks with .0001% false positive rate, minimizing the threat of business mail loss.

Features Feature Description Benefits
.Spam Filtering .IP reputation-based filtering
.RBL Lists, MIME header check
.Based on message header, size, sender, recipient
.Screens out the 90% spam in incoming mail
.Saves bandwidth
.Recurrent Pattern Detection .Automated antispam protection based on distribution pattern
.Extracts and analyzes relevant message patterns
.Signature-less technique
.Detects, blocks emerging spam outbreaks
.Blocks attachment-based spam – PDF, XL, MP3 etc.
.Content agnostic, multi-language, multi-format antispam protection – Blocks foreign language, image spam
.Zero-hour protection with no wait for signature updates
.Narrow window of exposure
.High spam catch rate
.Virus Outbreak Detection (VOD) .Signature-less detection from Cyberoam Anti-Virus and Anti-Spyware .Closes early-hour vulnerability gap of massive virus outbreaks over email
.Protects against the initial peak of attack
.Comprehensive Email Security
.Identity-based Security .Layer 8 Identity-based requirement
.Copy and route mail to pre-defined mail addresses
.Data Leakage Prevention
.Granular protection based on user work profile
.Email Management .Granular email management with message and attachment size, subject line etc. .Minimizes exposure to threats and legal implications
.Increases productivity
.Lower cost of compliance
.Quick recovery for disaster management
.Self-Service Quarantine Area .Quarantines malware-infected mails
.Sends Spam Digest to users
.User right to check quarantine mails
.Meets security and regulatory compliance requirements
.Saves IT administrator time
.Email Logging and Reporting .Data archiving
.Extensive Layer 8 Identity-based reporting – Top spam receivers, senders, applications of spam
.Real-time logs and reports
.Options of on-appliance reporting, centralized reporting from CCC and Cyberoam iView
.Meets regulatory compliance, audit, forensic requirements