Email encryption is the basis for data protection and legal security in your company. Encryption is no longer a marginal topic for organizations, and that’s a good thing: Rising threats from espionage and automated email screening by intelligence agencies show how important it is to protect your communications. In addition, encrypted communication with suppliers or external service providers is a prerequisite for awarding contracts in many industries. Until now, the email certificates required for encryption required administrative effort to acquire, distribute and manage. With Managed Certificates, you automate certificate management and reduce the effort to a minimum.
We are the first and only manufacturer to be awarded the title of Champion for the fifth time in techconsult’s independent user ranking for security solutions! This milestone is a reason to celebrate together: for each of the five Champion stars, there are rich discounts through our partners!
The “Security Insider Deep Dive” focuses on the new solution NoSpamProxy Cloud, presented by Stefan Cink. He takes an in-depth look at the new product.
In the course of the sales tax reduction, there are special features that also affect the NoSpamProxy license business. For continuous services, which also include the licence business, the day on which the agreed service period ends is used to determine the tax rate. In fact, this means that from 01.07. every licence key with […]
The time of waiting is over! It’s been over six months since Broadcom acquired Symantec products – including the Symantec Mail Security products – originally developed mostly by Brightmail and one of the most popular mail security products. Customers and resellers complain about problems to extend existing licenses, new functions are hardly or not at […]
Much has been written lately about Emotet and the consequences that an infestation with this banking Trojan can have. Among other things, public institutions have had and are struggling with the consequences of successful cyberattacks that have polluted and crippled their respective IT infrastructures, with sometimes catastrophic consequences. The Berlin Chamber Court is perhaps the best-known example, as large amounts of data could probably be stolen over several days. A real IT total damage. We have already explained how you and your company can protect yourself from emotet elsewhere.
But what does an emotet email actually look like? Three concrete examples show how authentic emotet emails now look. All three examples have been reported to us and have only been anonymized by us to the extent necessary for data protection reasons.
The action Project 32Guards is available since version 13.0 as a preview in NoSpamProxy. It currently ensures that metadata for email attachments and URLs are collected and uploaded to the NoSpamProxy cloud. This includes the file name, file sizes, the SHA-256 hash value, the MIME type (as recognized by NoSpamProxy) and the transaction ID.
At the security fair it-sa, which takes place from 08-10 October in Nuremberg, we will show you our new version 13.1! In addition to numerous improvements, it offers optimization for SaaS operation. On this basis, we will Aufbau und Betriin future offer partners whoare able to set up and developea managed service for customersare shying awayfrom a own cloud service. A total of 18 new features and feature enhancements include adding new checks to the Reputation Filter, supporting additional file types in the content filter to increase the security of email attachments, and VIP Encrypt©, which, in conjunction with Office 365, can be used to implement particularly secure content encryption.