How we ensure confidence in our client’s email
Want to learn more about how we filter emails? You’ve come to the right place. Hold on to your hats: this might get technical.
Want to learn more about how we filter emails? You’ve come to the right place. Hold on to your hats: this might get technical.
Chris S.
Our filters start the scanning process during the SMTP connection. Even before we've seen the email content or subject, our filters can already split the good from the bad by analyzing how the sending server is communicating. Bad emails are blocked before they even reach the quarantine, making your life easier.
Throttling
Standards compliance
Blacklisting
Our filters are thorough and check every part of the email content: subject, content, URLs, images, etc. Some of the analysis is done with our manmade rules; over 10,000 of them! Some of the analysis is done with our Machine Learning engine called Tyr. All blocked emails are placed in quarantine with a score so you can see just how bad they are.
Link scanning
Content filtering - heuristics
Content filtering - AI
Who likes malware? Not us! Our filters check all attached files to block potential infections. To protect against Zero-Days, our filters will automatically quarantine messages that have potentially dangerous files like executables or Office documents with Macros. Blocked messages are placed in quarantine so they can be easily released if needed.
Antivirus
File-type blocking
We're working very hard so you don't have to. Scammers are always coming up with new ways to make their emails look legit. ZeroPhishing is there to make sure that spoofed emails are blocked. Our filters are updated daily so you don't have to worry about opening your emails.
Content filtering - heuristics
Email authentication (SPF / DKIM / DMARC)
Everyone gets advanced protection against threats like BEC and CEO Scams at no extra cost. While this filtering might be advanced, it sure is easy to set up and use.
Spearphishing module
Lexicographical analysis
While these authentication frameworks have existed for many years, not everyone enforces them. We do.
We don’t just use them, we know how they work. Want help setting up authentication verifications? We’ve got you covered. These are, after all, important protections. We have years of experience setting up and troubleshooting DNS entries. It’s the kind of thing we email geeks find interesting.