loader image
LOGO

HIGH SECURITY PLATFORM DESIGNED TO MEASURE YOUR COMPANY

Our Antispam solution is a completely cloud-based protection that protects you against spam, phishing, scams, viruses and malware. You will also be able to have a much higher level of security for your emails sent with our email encryption.

GOODBYE TO SPAM

NAT SECURITY FOR MAIL has an independent high security platform with a double scanning engine, where emails that are detected as spam, malicious or contain content that can damage the company’s information are stored, thus having a platform that takes care of the IT assets. Our platform has a secure environment that allows users to view the content of emails that have been detected as malicious or spam, without being affected regarding the company’s information.

CENTRALIZED ADMINISTRATION OR MAIL ACCOUNT

The filtered emails will be managed, organized and eliminated by the platform administrator, as well as this management can be delegated to the users or email accounts.

ADVANCED DETECTION

NAT SECURITY FOR MAIL replicates Sandbox technology, which can study the malware that is trying to break into the organization’s internal system, analyzing and detecting attack tactics to learn from them and thus prevent future attacks. Likewise, it implements a tool with a series of solutions called DPL or Data Loss Prevention System, with the purpose of preventing the leakage of information whose origin turns out to be within the organization, performing these actions actively and without losing productivity. .

SPECIFIC FILTERS

With NAT SECURITY FOR MAIL you can find the different types of emails placed in quarantine, applying filters according to the type of detection that has existed, which may be: Malware, Spam, Expression, Extension, MIME Type, DLP, unscannable, among others. Also, you can easily configure your BlackList and WhiteList filters.

TRUSTED RBL

NAT SECURITY FOR MAIL works together with four RBL’s (Barracuda, Spamhaus, SpamCop and DNSBL) which work as a mail filter before it reaches its destination. Having as its main function, detecting which IP’s or domains are considered as possible threats.

FOR ALL ENVIRONMENTS

You can hire this service depending on the system you have in your organization. If it is a cloud mail service such as Office 365, Kerio or Google (gsuite) then you can contract NAT SECURITY FOR MAIL – CLOUD. While, if you have a local mail server, then you can contract NAT SECURITY FOR MAIL – LOCAL, NAT being in charge of providing you with the security device which is included in the contracting price of this service.

TOTAL CONTROL

NAT SECURITY FOR MAIL has various types of control for the emails we receive, these being: Content control, Expression control, Character control, word blocking, filters by extensions, file verification, sender identity verification, among others. It will have 20 GB of space, where these emails that have been detected as malicious or spam will be stored and these emails are deleted every 30, 60 or 90 days. In case the storage fills up before the set time, the system automatically frees up space.

FREQUENTLY ASKED QUESTIONS, ANSWERS FAST

New-Age Technology data centers are equipped with backup uninterruptible power supplies (UPS) and diesel generators, and are designed to ensure constant power availability for up to 48 hours during an indefinite power outage. In addition, there are redundant heating, ventilation and air conditioning (HVAC) systems, networks and UPS. Physical security is ensured through the use of high fences, 24/7 security personnel, and video surveillance with 90-day archiving. To access it is necessary to pass a biometric scan of the geometry of the hand and present a proximity card.

We have never really had problems with service outages, however, to ensure the Business Continuity of our clients, all our nodes are connected in an optical ring. The information is replicated to the next fastest responding DC in less than 15 minutes and everything continues as normal. We have our own nodes:AMÉRICAS: Washington (USA), New York (USA), Chicago (USA), Metro Kanzas (USA).
EUROPA: París (France).
PAISES BAJOS: Amsterdam.
ALEMANIA: Frankfurt am Main, Metro Karlsruhe , Munich.

To arrive at this answer, we must first mention that Backup tasks can be performed hot (working hours) or cold (non-working hours). Obviously it is more advisable to do it outside working hours so that it does not consume the bandwidth that users are surely using. In any case, if it is required to run the Backup hot, for example, because the Manager only works until noon and I need to backup his laptop before he leaves; In this case, we can assign a specific bandwidth to the task, thus avoiding saturated upload consumption (Post, Drive, online collaboration tools, etc.)

The data is stored encrypted in AES-256bits, which means that only the client with a username and password can access the information stored in our Cloud. You don’t need to be physically on your LAN to manage your backups: the console is 100% Cloud. We have privacy and confidentiality clauses with their respective penalties in accordance with the data protection law (DLP).

STRATEGIC PARTNERS
OF INTERNATIONAL BRANDS

FOLLOW US ON:

NEW-AGE TECHNOLOGY
IN THE WORLD

© 2022, New-Age Technology Inc. All rights reserved

contact us

Our commercial advisors will contact you shortly.

STRATEGIC PARTNERS OF INTERNATIONAL BRANDS

tE CONTACTAMOS A LA BREVEDAD

contáctanos

Nuestros asesores comerciales se comunicaran con usted a la brevedad.

SOCIOS ESTRATÉGICOS DE MARCAS INTERNACIONALES

GRACIAS POR REGISTRARSE

UN ASESOR COMERCIAL SE COMUNICARÁ A LA BREVEDAD CON USTED