VIPRE Integrated Email Security Features
Administration (4)
-
Intelligence Reporting
Actively gathers data on suspicious sources and characteristics of potentially malicious content
-
Email Integration Suppor
Supports secure implementation with popular email applications and clients.
-
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
-
Data Loss Prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Maintenance (4)
-
Auditing
Access pre-built and custom reports to monitor user activity and storage.
-
Allow and block lists
Prevents previous committers of fraud and other suspicious accounts from future communications
-
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
-
Archiving
Archives conversations, files, and other communications for future reference
Security (6)
-
Anti-Malware/Anti-Spam
Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools.
-
Encryption
Encrypts the content of emails and their attachments.
-
Quarantine
Isolates potentially malicious content and files before they can gain network access
-
Advanced Threat Protection (ATP)
Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks.
-
Anti-Phishing
Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks.
-
Account takeover prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Functionality (10)
Anti-Spam
Prevents unwanted emails including bulk, mass, or other junk emails from reaching recipients mailboxes.
Anti-Malware
Prevents emails with malicious links or attachments embedded with malware, such as ransomware, spyware, and other viruses, from reaching email recipients.
Anti-Phishing
prevent social-engineering attacks such as phishing, spear-phishing, and c-level executive impersonation attacks.
Filtering Functionality
Provides filters such as: approved senders, whitelists, greylists such as bulk emails that may not be malicious, blocked senders, blacklists, IP reputation, content (such as profanity, credit card numbers, password protected files, and other sensitive information), virus detection, re-directs and malicious URLs, newsletter detection, attachment size, and invalid recipients.
Quarantine
Includes a quarantine area for users to manually inspect suspicious emails.
Outbound Email Monitoring
Monitors outgoing mail to prevent data loss by encrypting messages or preventing the messages from being sent.
Advanced Threat Intelligence/Protection
Includes advanced threat protections such as machine learning to conduct abnormal behavioral analysis, display name spoof detection especially regarding c-level impersonation attacks, detecting lookalike email domains that are visually confusing.
Archiving
Offers archival email retention for compliance purposes.
Reporting
Offers standard reporting functionality.
On-prem deployment
Supports on-premises deployments of secure email gateways, which requires a company to maintain their own hardware. This is different than Cloud Email Security software which protects cloud-based email environments and do not require on-premises hardware installations.
Detection (3)
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
Threat Alerting
Identifies and alerts administrators of threats, issues, incidents and requests related to SaaS applications.
Analysis (4)
Malware Evaluation
Tools to test an object to see whether or not it qualifies as malware.
Sandboxing
Provides a resource-isolated environment to examine malware and evaluate objects against a database of known threats.
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
File Analysis
Analyze file contents to identify malware components or unknown and advanced threats.
Response (3)
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Malware Removal
Facilitates the remediation of network, endpoint, and application malware malware.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Generative AI (1)
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Secure Email Gateway (1)
Proactive Assistance
Anticipates needs and offers suggestions without prompting





