Business email protection
from viruses, spam and malware is imperative
For most companies email has become more than just a communication medium.
Yet, for all its advantages, the growing volume and dependence on email the fact is that 96% of the world’s email traffic is spam. Mail protection from viruses, spam and malware is imperative for any business. MxVault provides advanced filtering algorithms and spam pattern detection to eliminate 99.98% of all inbound, unsolicited bulk email.
MxVault offers the latest intel on spam and virus outbreaks, real time database and user synchronization, processing well over 5 billion messages. A number of proprietary self-learning smart technologies have been deployed to eliminate spam, virus, phishing and malware attacks, some of these are:
- Inbound and outbound email filtering including deep content and attachment inspection.
- Quarantine folder setup by administrator and managed by administrator and user.
- Up to 5 filtering layers (Email attack, SPAM filtering, primary filters, virus and worm filtering and content filtering).
SMTP and Data Level Filtering
These filtering methods have been specifically designed to avoid false positives. Many different checks are performed to avoid making mistakes based on only a single classifier. MxVault one of the world’s best anti-spam solution with the most advanced filtering algorithms and spam pattern identification of spam ensuring a cleaner mailbox.
Features and benefits
Below are some of the primary features and benefits relating to MxVault Mail Protection
Taking pressure off the customers’ IT department, or saving money on outsourced technicians.
Employees will not have to deal with daily spam messages anymore and will save valuable time to focus on what they are good at: growing their business!
MxVault solutions protect the client’s network against all email based security threats by applying its proprietary self-learning smart technologies to filter all incoming email, eliminating spam before it reaches the network.
MxVault outgoing filtering systems secure all IP ranges from blacklisting and save the network reputation.
The implementation of MxVault outgoing filter will help you get rid of network weaknesses and will cut the time spent with delisting to a minimum.
With our outgoing filter service you can get clear and concise reports indicating which users’ accounts require your attention, automatically locking them.
Eliminate risk of lost email and productivity from downtime by having Immediate, secured access to email during outages.
What should I look out for?
Below is a list of common file extensions and the risks they may pose
|Extension||Description of file||Safety Rating|
|.alx||HTML Layout||Caution, low risk|
|.asp||Active Server Page, web page definition||Caution, may contain nasty programming|
|.au||audio, basic||Safe, common|
|.bas||script, Basic programming lanquage||Dangerous, Common|
|.bat||script, DOS batch file||Dangerous, Common|
|.bmp||image, bit-map||Safe, common|
|.c||programming, C++||Dangerous, non-standard|
|.cab||compressed file storage||Caution, may contain infected files|
|.cda||audio, CD format||Safe, non-standard|
|.cdr||data, Corel Draw||Safe, common|
|.chf||PCAnywhere, remote control config||Safe, non-standard|
|.cmd||script, advanced batch file||Dangerous, Common|
|.com||program, older DOS||Dangerous, Common|
|.cpl||Control Panel application||Dangerous, non-standard|
|.cur||Cursor (pointer) definition||Caution, low risk|
|.dic||Dictionary||Caution, low risk|
|.dll||program helper file (Dynamic Link Library)||Dangerous, Common|
|.doc||MS Word Document||Caution, may contain nasty programming|
|.dot||MS Word Template, for starting a new document||Caution, low risk|
|.drw||CAD, drawing file||Safe, common|
|.dwg||CAD, Adobe Illustrator, drawing file||Safe, common|
|.dxf||CAD, universal Data eXchange Format||Safe, common|
|.eml||Microsoft Internet Mail Message||Dangerous, Common|
|.eps||image, post script||Safe, common|
|.exe||program, 'executable'||Dangerous, Common|
|.fav||Outlook Navigator Bar File||Caution, could activate local program|
|.gif||image, internet||Safe, common|
|.grp||windows program manager file||Caution, could activate local program|
|.gtar||compressed file storage||Caution, may contain infected files|
|.gwf||PCAnywhere Gateway File||Safe, non-standard|
|.gz||compressed file storage||Caution, may contain infected files|
|.hlp||help file||Safe, non-standard|
|.ht||Hyperterminal setting file||Safe, non-standard|
|.htm||web page, Hyper Text Markup File||Caution, low risk|
|.html||web page, Hyper Text Markup File||Caution, low risk|
|.ico||icon file||Safe, common|
|.img||image file||Safe, common|
|.inf||information file, usually for install||Caution, local settings could be altered|
|.ini||initialization information, settings||Caution, local settings could be altered|
|.iso||CD-Recordable image||Safe, non-standard|
|.java||programming, internet universal scripting||Dangerous, non-standard|
|.jpeg||image, internet||Safe, common|
|.jpg||image, internet||Safe, common|
|.ldb||MS Access, lock file||Safe, non-standard|
|.lnk||link - shortcut definition||Caution, could activate local program|
|.log||log file - generic||Safe, common|
|.mdb||MS Access, database file||Safe, common|
|.mde||MS Access, database file (can't change design)||Safe, common|
|.mdw||MS Access, workgroup security file||Safe, non-standard|
|.mid||audio, MIDI file||Safe, common|
|.midi||audio, MIDI file||Safe, common|
|.mov||movie, quicktime format||Safe, common|
|.movie||movie, sgi format||Safe, common|
|.mp1||audio, mpeg format||Safe, common|
|.mp2||audio, mpeg format||Safe, common|
|.mp3||audio, mpeg format||Safe, common|
|.mpeg||video, MS format||Safe, common|
|.mpg||video, MS format||Safe, common|
|.msg||message file||Safe, common|
|.msi||MS installer, package information||Caution, local settings could be altered|
|.msp||MS installer, patch information||Caution, local settings could be altered|
|.nws||Microsoft Internet News Message||Safe, common|
|.obd||MS Office Binder||Safe, common|
|.oft||MS Outlook Template||Caution, low risk|
|.pbk||phone book, Dial Up Networking & others||Caution, local settings could be altered|
|.pcl||output to printer, HP||Safe, non-standard|
|.pcx||image, black & white (fax)||Safe, common|
|.pdd||image, Photo Deluxe format||Safe, common|
|Acrobat Reader document, Adobe Portable Document Format||Safe, common|
|.pif||program start information file||Dangerous, Common|
|.pl||PERL programming, UNIX internet server script||Dangerous, non-standard|
|.pot||MS Powerpoint Template||Caution, low risk|
|.pps||MS Powerpoint Slide Show||Safe, common|
|.ppt||MS Powerpoint data file||Caution, may contain nasty programming|
|.pub||MS Publisher data file||Safe, common|
|.qbb||Intuit Quick Books Backup file||Safe, common|
|.qbw||Intuit Quick Books work file||Safe, common|
|.qdb||Intuit Quicken data file||Safe, common|
|.ra||RealPlayer, real audio information||Safe, common|
|.reg||Windows registry, import/export data||Dangerous, Common|
|.scr||screen saver file||Dangerous, Common|
|.sct||programming, scriptlet file"||Dangerous, non-standard|
|.shtml||web page, Secure Hyper Text Markup File||Caution, low risk|
|.sys||system information file||Caution, local settings could be altered|
|.tar||compressed file storage (UNIX)||Caution, may contain infected files|
|.text||plain text||Safe, common|
|.tgz||compressed file storage (UNIX)||Caution, may contain infected files|
|.tsv||tab seperated values||Safe, common|
|.ttf||True Type Font||Caution, local settings could be altered|
|.txt||plain text||Safe, common|
|.url||Internet Shortcut||Caution, could activate local program|
|.uu||UUEncode, internet transfer format for all files||Caution, may contain infected files|
|.vbe||programming, Visual Basic Scripting||Dangerous, Common|
|.vbs||programming, Visual Basic Scripting||Dangerous, Common|
|.vir||Norton anti-virus definition file||Caution, local settings could be altered|
|.wb2||spreadsheet, Quattro||Caution, may contain nasty programming|
|.wbk||MS Word, backup file||Caution, may contain nasty programming|
|.wiz||MS Word, wizard defination||Caution, may contain nasty programming|
|.wk4||spreadsheet, Lotus 123||Caution, may contain nasty programming|
|.wks||spreadsheets, MS Excel worksheet||Caution, may contain nasty programming|
|.wmf||MS windows metafile||Safe, common|
|.wpd||Word Perfect document||Caution, may contain nasty programming|
|.wri||document, MS Write||Safe, common|
|.wsc||scriptlet file||Dangerous, Common|
|.wsh||programming, windows scripting||Dangerous, Common|
|.xlk||MS Excel, backup file||Caution, may contain nasty programming|
|.xls||MS Excel, spreadsheet book||Caution, may contain nasty programming|
|.xlt||MS Excel, new spreadsheet template||Safe, non-standard|
|.xml||web page, Extended Markup Lanquage||Caution, could activate local program|
|.z||compressed file storage (UNIX)||Caution, may contain infected files|
|.zip||compressed file storage||Caution, may contain infected files|
Start working with us
and everything starts to work for you
Our expertise and knowledge in the IT field allows us to select, bundle, integrate and deliver comprehensive business solutions.
With an end-to-end approach, we consult, design, migrate, implement and manage our solutions, and train your internal teams if required.
Certifications & Recognition
Our team of experts are trained and certified to deal with any challenge or regulatory framework whilst ensuring operational excellence.