Z Services Secure Email
Gateway Cloud

Threat Protection

Z Services [Email Security Cloud] employs the most advanced threat protection that filters inbound and outbound email for spam, viruses, malware, phishing attacks, and more. Z Services [Email Security Cloud] removes all malicious and inappropriate email that could negatively impact an organization, before it reaches inboxes.

Our interface logs all emails Inbound and Outbound- which pass through a company’s system, enabling complete message traceability for users. Disclaimers can also be attached to all filtered email in line with each business’ own compliance guidelines. Outbound mail is scanned for any viruses, malware or other malicious content. As a result, a company can provide protection to the intended recipients while protecting the professional reputation of its organization.

Z Services [Email Security Cloud] is powered by Proofpoint MLX machine learning technology Z Services [Email Security Cloud] provides the most effective anti-spam solution available to the SME. Mounting an effective defense against spam requires detection techniques that evolve as quickly as the attacks themselves.

Z Services [Email Security Cloud] MLXTM technology uses advanced machine learning techniques to provide comprehensive spam detection that guards against the spam threats of today as well as tomorrow.

MLX continuously analyzes millions of messages and automatically adjusts its detection algorithms to identify even the newest, most cunning types of attacks. MLX provides accurate, adaptive, and continuous protection against spam without requiring manual tuning or administrator intervention.

Z Services Email Security Cloud MLX Technology

To detect new types of spam without manual intervention the system’s ability to identify spam does not degrade as spammers change their tactics.
To detect new types of spam without manual intervention the system’s ability to identify spam does not degrade as spammers change their tactics.
To detect new types of spam without manual intervention the system’s ability to identify spam does not degrade as spammers change their tactics.
To detect new types of spam without manual intervention the system’s ability to identify spam does not degrade as spammers change their tactics.
To detect new types of spam without manual intervention the system’s ability to identify spam does not degrade as spammers change their tactics.

Highlights of Z Services [Email Security Cloud] Protection

Contextual, lexical and image-based analysis.
Reputation Analysis for IP Addresses and URLs.
International Language Analysis.
Detection of subcategories of spam such as Phishing Attacks and Pornographic Spam.
Bounce Management.
Outbound Spam Detection.
Obfuscation Detection.
Natural Language Tests.

Advanced Threat Protection

Z Services [Email Security Cloud] leverages Proofpoint’s Targeted Attack Protection Technology to provide complete protection against all email threats.

Targeted email attacks containing malicious links and attachments represent one of the most dangerous IT threats facing enterprises today.

Z Services [Email Security Cloud] leverages advanced technology to provide smaller enterprises with a comprehensive URL and Attachments Defense service inclusive of predictive sandboxing, advanced malware detection and real-time dynamic analysis features. Targeted email attacks containing malicious links represent one of the most dangerous IT threats facing enterprises today.

Proofpoint Targeted Attack ProtectionTM is the industry’s first comprehensive email analysis solution for combatting targeted threats using a full lifecycle approach, monitoring suspicious messages containing malicious URLs or malicious attachments, and observing user clicks as they attempt to reach out. The Z Services [Email Security Cloud] URL Defense feature takes a more advanced approach to identify suspicious email messages containing malicious URLs.

Highlights of Z Services [Email Security cloud] Advance Protection

Cloud Architecture Billions of messages traverse the cloud every week, providing global visibility and early protection for emerging threats
Protection across the corporate network, public network, and mobile devices
Advanced Protection against targeted email attacks like spear-phishing attacks, zero-day exploits, advanced persistent threats (APTs)
Leverage Big Data techniques to build statistical models to provide predictive analysis
Use of techniques like Dynamic Malware Analysis

Email Filtering

Z Services [Email Security Cloud] offers intelligent content filtering to effectively address the issue of confidential, malicious or inappropriate email content being sent or received by your enterprise. Email is vital for facilitating fast, effective corporate communications, however, it is essential that enterprises manage the content of all messages entering and leaving their networks. Failure to do so can result in confidential information, offensive jokes, inappropriate language or unsafe attachments flowing in and out of your organization without your knowledge and with harmful consequences.

How does the content rules engine work?

Z Services [Email Security Cloud] offers a powerful, customizable rules engine. This facilitates both content and event-based email management whilst providing highly sensitive levels of control regarding email traffic. The service allows users to control where messages are sent to and how they should be filtered depending on specified rules with full visibility and control of features. This sophisticated feature allows users to filter their email based on a series of select variables. Rules can be set to cater for a number of different situations offering a wealth of functionality. Users are able to filter emails based on various criteria such as message size, country of origin or destination. The rules can be directed to the user only, to a group of users chosen by the company administrator or even to the entire organization. Users are additionally able to edit and order rules to their own preferences.

How does the content rules engine work?

Protecting you from unwanted Content and Attachments

The Z Services [Email Security Cloud] advanced threat detection technology enables our anti-virus engines to provide clients with an unrivalled protection from viruses and other email-borne threats. All messages are meticulously scanned by our sophisticated virus engines, operating at the highest levels of accuracy, performance and effectiveness ensuring all known viruses are captured and blocked. For increased protection, services [Email Security Cloud] additionally employs heuristics scanning technology to discover email threats currently unknown to the system and protects against these in real time.

Protecting you from unwanted Content and Attachments

Highlights of Z Services [Email Security Cloud] Email Filtering

Detection of confidential or inappropriate text-based content.
Comprehensive, highly flexible and intuitive filtering processes.
Scanning within email header, subject and body.
Use of techniques like Dynamic Malware Analysis

Detects a large variety of attachments including

Microsoft® Office

PDF attachments
Compressed file types
Executable (EXE) & major media types

Email Encryption

Z Services [Email Security Cloud] Email Encryption offers powerful, policy-driven encryption features that mitigate the risks associated with regulatory violations, data loss and corporate policy violations, while positively enabling critical business communications. Email Encryption is ideal for any organization that needs to protect sensitive data, while still making it readily available to appropriate affiliates, business partners and end users on their desktops and mobile devices.

Z Services [Email Security Cloud] Email Encryption offers powerful, policy-driven encryption features that mitigate the risks associated with regulatory violations, data loss and corporate policy violations, while positively enabling critical business communications. Email Encryption is ideal for any organization that needs to protect sensitive data, while still making it readily available to appropriate affiliates, business partners and end users on their desktops and mobile devices.

Z Services [Email Security Cloud] monitors all content being sent in an email communication, and if sensitive data is identified, the email is automatically encrypted. In this way security is maximized, without impacting end- users. The integration with email policy and Data Loss Prevention (DLP) creates a single point of control that can reduce the burden on administrators.

With Z Services [Email Security Cloud] end users can also make the decision themselves to encrypt emails with the addition of a simple identifier in the subject line of the email. This quick and easy step encrypts the email to secure the communication. Recipients of the encrypted emails have an intuitive web portal through which they can read and respond to the email. Authenticating the recipient further increases the level of security around the encrypted email ensuring that only the valid recipient can access it. All encrypted emails time out after 15 days and are removed from the service, ensuring that sensitive data is not retained for longer than necessary.

Highlights of Z Services [Email Security Cloud] Email Encryption

Organizations can create filters that automatically identify outbound emails that should be encrypted.
External users must use Secure Mail (web-based interface) in order to read and respond to encrypted emails they have been sent.
End-users can trigger encryption by using a pre-defined tag in the email subject line.
Internal users, including the original sender and internal recipients can compose, read and respond to all encrypted emails in their inbox.

Continuity

Z Services [Email Security Cloud] ensures that vital email communications are up and running like normal at all time even when there is partial network failure. If email messages cannot be delivered due to network issues,Emergency Inbox enables users you to log in and access new mail instantly and securely via any web connection.

Users can quickly and easily access any queuing email via a webmail client, with the ability to read, forward, reply, open attachments and compose new messages as normal. Whilst other Email Continuity systems only activate when an action is taken after a disaster, the Z Services [Email Security Cloud] Emergency Inbox automatically kicks in from the very moment a problem hits so your enterprise doesn’t miss a single email. Such functionality means the outside world will have no idea the organization is experiencing technical difficulties. Additionally, all messages sent and received via the emergency inbox will continue to be scanned for any content rules previously set by the organization.

Z Services [Email Security Cloud] Emergency Inbox Benefits

The Emergency Inbox is activated instantly and automatically, providing users with the ability to open, read, download attachments and reply to any email currently queuing.

Users can compose new emails that will be sent from their usual email account, so recipients will never know there’s an issue.

Quick restoration of any email sent or received via the Emergency Inbox, to your primary system once it recovers.

Messages restored to the email server with intact headers which can provide data for archiving & legal purposes.

Highlights of Z Services [Email Security Cloud] Continuity

Instant and automatic activation
Fast and easy we-access to queued emails
Administrator control of user access
Enables business email as usual
Quick, one step restoration of messages
Recipients won’t know there’s an issue

Archiving

Z Services [Email Security Cloud] can offer up to 10-year cloud archive where you can manage your data, prevent leakage, have easy access for discovery, achieve regulatory compliance, remove storage limitations, and reduce on-going costs. The archive can dramatically reduce the internal growth of pst files, with data stored separately from other users and secured with a unique encryption key.

How does Z Services [Email Security Cloud] Archive your email?

At Z Services [Email Security Cloud] , we store each customer’s email separately in the cloud, using unique encryption. We use the exchange journaling function to extract email from your exchange server.

This removes a carbon copy of your email (inbound, outbound and internal) from the server without the need to install client site software. This process, finely tuned by Z Services [Email Security Cloud] isa highly-supported method of archiving from the early stages of exchange due to its accuracy and reliability.

Why should you archive your emails with Z Services [Email Security Cloud]?

Automatically preserve all emails and attachments for compliance protection.
Protect vital data and store it securely.
Provides tamper-proof email capture.
Verified end-users can easily access archived data if and when required, from any web browser and without any technical know-how.
Fully indexed, rapid search and e-discovery features as standard
Ability to manage, monitor and review all email content.
Eliminate data storage constraints and meet legal and regulatoryobligation.
Because backing up is simply no longer good enough.
Customers’ email is stored separately from other users in a uniquely encrypted format.

Highlights of Z Services [Email Security Cloud] Archiving

Unlimited Storage.
Up to 10 Years storage options.
Territory-based Archiving.
Tamper Proof and off-site
World-class search & legal discovery.
Supporting Microsoft SBS. Exchange 2003,2007,2010, Hosted Exchange*
Real-time envelope journaling for Exchange.
Instant retrieval of email messages up to 10 Years.
Rapidly search and retrieve email messages and hundreds of types of attachments
Easy to use Search Archive Audit log.
Configurable Retention Policy.
Detailed Email Archive logs.
Segregated and secure archive per customer
Complete traceability.
Configurable Retention Policy.
Uncover the advanced threats risk exposure of your organization Request A Demo