Separating spam emails from legitimate emails by inspecting the content of incoming email messages.
This can be achieved by using multiple antispam techniques such as:
- Greylist Scanning
- DNSBL Scanning (DNS Block List)
- SUBURL Scanning
- Bayesian Scanning
- Heuristic Scanning
- Image spam techniques
- PDF scanning
- Banned word scanning
- Sender reputation scanning
- Safe list word scanning
Protects users from any attempt on installing malware through emails. Malware such as ransomware and spyware are common attacks in industry sector by utilizing email attack vector.
Types of malware are as follows:
- Zero-day malware
Filter all incoming files through emails by blocking them by file types such as .pdf, .exe and much more.
Quarantine suspected spam or malicious emails. This splits the emails onto separate section where end user can verify the authenticity of the email. These emails will be available for a few days to retrieve before their disposal.