*Spam-X is required if using an AdamsWells email address

Incoming email must pass through successive layers of SMTP session level defenses and antivirus engines before reaching your inbox. An effective phishing filter, each level also looks for and removes specific threats based on content analysis, virus detection, sender profiling, and more.

Since delivery is critical to any secure email for business, outbound traffic is inspected to identify computers that have been infected and converted to a “zombie” or botnet client. Botnet attacks can result in a network being black-listed by other spam filters, preventing legitimate email sent by anyone on the network from reaching its intended recipient.

This technology defends against network-based threats such as DoS and DHA by using grey listing and merit-based reputation analysis of IP addresses, senders, and recipients.

Behavior-analysis system is proactive email security, monitoring inbound and outbound network traffic to spot unusual behavior patterns. Suspicious emails are identified and blocked.

Merit-based reputation is created for each email sender based on history and message characteristics to detect spammers. This reputation analysis is then used to identify and block spam.

Proprietary email DNA analysis technology identifies unique characteristics of email that indicate spam, phishing schemes, and other forms of dangerous or objectionable content with unrivalled accuracy.

Exclusive phishing and spam filter technology monitors campaigns to quickly identify spam and phishing before they penetrate users’ networks. Suspicious campaigns are quarantined until a rule can be made.

Advanced Image Filtering technology includes both comprehensive image analysis as well as dynamic feedback of the message content.

Industry-leading antivirus, web security, and mobile device management.

Store all of your important usernames and passwords in one secure and convenient place.

Keep your digital documents safe with the online backup storage of File Hopper.

Securely manage your installed applications and mobile devices.