Update: The guidelines mentioned in this blog article will also apply to outlook.com users from May 5, 2025. This includes the services live.com and hotmail.com. Further information can be found at Microsoft.
Managed service providers can easily provide secure, legally compliant email solutions. Audit-proof journaling of incoming emails, checked for spam and malware, fulfils all legal retention requirements.
The mandatory introduction of the AES-128 GCM encryption standard in EDI@Energy will take effect on October 1, 2025. The transition was originally planned for April 1, 2025. We explain what you need to do now.
For two decades, we at NoSpamProxy have been doing everything we can to make email communication more secure and efficient. Based in Germany, we have made a name for ourselves as a manufacturer of email security solutions in the DACH region and can now easily hold our own against global providers. Now is the right time to take our unique approach internationally and open up new markets.
On March 15, 2025, the licence for the Core Antispam Engine expired for some customers. In some cases, this resulted in temporary rejections of emails.
The menswear manufacturer relies on NoSpamProxy from the cloud for reliable, silent protection against cyber threats. This gives internal IT more freedom for innovation within the company.
Gain an overview of all NoSpamProxy modules with our webcasts. In this session, we will present practical examples of solutions and you will have the opportunity to ask specific questions. The webcast participation is part of the partner certification for new partners. But even if you have been a partner for some time, we recommend that you attend at least once a year to keep up to date.
With outstanding ratings from more than 4,500 application experts, NoSpamProxy is at the top of the PUR-S diamond. Above-average customer satisfaction and loyalty emphasise the market position of the email security solution.
NoSpamProxy
Categories
Latest News
NIS2 – What the directive means for you (Update 2026)29.01.2026 - 10:38
How cloaking disguises phishing attacks23.01.2026 - 09:45





