NAT SECURITY FOR MAIL has an independent high security platform with a double scanning engine, where emails that are detected as spam, malicious or contain content that can damage the company’s information are stored, thus having a platform that takes care of the IT assets. Our platform has a secure environment that allows users to view the content of emails that have been detected as malicious or spam, without being affected regarding the company’s information.
NAT SECURITY FOR MAIL replicates Sandbox technology, which can study the malware that is trying to break into the organization’s internal system, analyzing and detecting attack tactics to learn from them and thus prevent future attacks. Likewise, it implements a tool with a series of solutions called DPL or Data Loss Prevention System, with the purpose of preventing information leakage whose origin turns out to be within the organization, performing these actions actively and without losing productivity.
With NAT SECURITY FOR MAIL you can find the different types of emails placed in quarantine, applying filters according to the type of detection that has existed, which may be: Malware, Spam, Expression, Extension, MME Type, DLP, unscannable, among others. Also, you can easily configure your BlackList and WhiteList filters.
NAT SECURITY FOR MAIL has various types of control for the emails we receive, these being: Content control, Expression control, Character control, word blocking, filters by extensions, file verification, sender identity verification, among others. It will have 20 GB of space, where these emails that have been detected as malicious or spam will be stored and these emails are deleted every 30, 60 or 90 days according to the client’s needs, in order to always have storage space. storage. In case the storage fills up before the set time, the system automatically frees up space.
NAT SECURITY FOR MAIL works together with four RBL’s (Barracuda, Spamhaus, SpamCop and DNSBL) which work as a mail filter before it reaches its destination. Having as its main function, detecting which IP’s or domains are considered as possible threats.
You can hire this service depending on the system you have in your organization. If it is a system that is in the cloud, then you can hire NAT SECURITY FOR MAIL – CLOUD. While, if you have a system that is stored locally, you can then contract NAT SECURITY FOR MAIL – LOCAL, NAT being in charge of providing you with the security device which is included in the contracting price of this service.
NAT SECURITY FOR MAIL – LOCAL has all the previously mentioned functionalities at 100%, both for incoming and outgoing emails, and can also send encrypted emails.
NAT SECURITY FOR MAIL – CLOUD accounts with all the aforementioned functionalities except for the DPL service or Data Loss Prevention System, taking into account that the security applied is only for incoming emails.
Dual Engine Live Antivirus with Scanning
Unique SPX encryption with integrated DLP policy
Low false positive rate.
Implementation in 20 minutes
spam-free mailboxes
virtualized hardware
Block malware, phishing, and unwanted content
Control of content by mail
Attention through digital channels (Chat and Calls with a maximum wait of 1 minute)
30 minute SLA under contract
24 x 7 support, 365 days a year
New-Age Technology data centers are equipped with uninterruptible power supplies (UPS) and backup diesel generators, and are designed to ensure constant power availability for up to 48 hours during an indefinite power outage. In addition, there are redundant heating, ventilation, and air conditioning (HVAC) systems, networks, and UPSs. Physical security is ensured through the use of high fences, 24/7 security personnel, and video surveillance with 90-day archiving. To access it is necessary to pass a biometric scan of the geometry of the hand and present a proximity card.
We have never really had problems with service outages, however, to ensure Business Continuity for our clients, all our nodes are connected in an optical ring. The information is replicated to the next fastest responding DC in less than 15 minutes and everything continues as normal. We have our own nodes:AMÉRICAS: Washington (USA), New York (USA), Chicago (USA), Metro Kanzas (USA).
EUROPA: París (France).
PAISES BAJOS: Amsterdam.
ALEMANIA: Frankfurt am Main, Metro Karlsruhe , Munich.
To get to this answer, we must first mention that Backup tasks can be performed hot (business hours) or cold (non-business hours). Obviously it is more advisable to do it outside of working hours so that it does not consume the bandwidth that users are surely using. Anyway, if it is required to run the hot Backup, for example, because the Manager only works until noon and I need to backup his laptop before he leaves; In this case, we can assign a specific bandwidth to the task, thereby preventing upload consumption from being saturated (Email, Drive, online collaboration tools, etc.)
The data is stored encrypted in AES-256bits, which means that only the client with a username and password can access the information stored in our Cloud. You do not need to be physically on your LAN to manage your backups: the console is 100% Cloud. We have privacy and confidentiality clauses with their respective penalties in accordance with the data protection law (DLP).
© 2022, New-Age Technology Inc. All rights reserved
UN ASESOR COMERCIAL SE COMUNICARÁ A LA BREVEDAD CON USTED