POP
Post Office Protocol is a standard protocol for receiving email. POP is a client/server protocol in which email is received and held for you by our Mail server. Periodically, you (or your client email receiver e.g. Outlook) check your mail-box on the server and download any email using POP3.
IMAP
The Internet Message Access Protocol (IMAP) is a service that allows email messages stored on a remote server to be managed in much the same way as if they were stored on the user’s local machine. Unlike POP3, which only allows access to a single inbox, IMAP allows the creation of additional folders, between which messages can be distributed for archiving. The folders will be synced across all your devices. Advanced features include the ability to search and sort messages within a folder and the ability to flag messages as “sent”, “replied-to” etc.
WEB EXCHANGE
Allows you to access your emails securely from any location, all you need is an Internet connection and web browser and you can log into your Exchange Mail account to read, send, receive and manage your emails.
Effective Spam and Virus Management Tools
- Built on SpamAssassin and amavisd-new.
- Supports a wide range of virus scanners, and can use multiple scanners for layered protection.
- Supports scanning for viruses, spam, banned attachment types, and invalid mail headers.
- Confirmed spam and ham is used to automatically train SpamAssassin’s Bayes engine.
- Confirmed spam can be automatically reported to spam-monitoring networks, e.g. Vipul’s Razor, the Distributed Checksum Clearinghouse, Pyzor, and SpamCop.
- Supports the use of “spam-trap” accounts to gather and report evidence.
- Auto-accept or auto-reject mail larger than a specified size.
- Scalable Design
- Mail servers, database servers, web servers and content filters can be hosted on separate machines.
- Supports arrays of content filtering machines, all controlled from a single interface.
- Supports virtual hosting of multiple domains, with per-domain features.
- SQL database storage for all e-mail, no more files.
Data Security and Integrity
- Unless explicitly discarded, no mail is ever “lost”.
- Mail is stored in pristine form, no amavisd/SA headers.
- (depreciated) Strong Blowfish/CBC encryption of stored e-mail can be enabled.
- Privacy settings can be configured to prevent or allow administrators to read users’ e-mail.
- Statistics Tracking
- Tracks viruses, spam, and ham (i.e. “non-spam”) for statistical purposes.
- Tracks bandwidth consumption for viruses, spam and ham.
- Tracks financial costs associated with bandwidth for each type of item.
- Filter effectiveness stats.
- Statistics available in table form and as graphic charts (with JpGraph?).
- New charts and visualizations of the data can be added easily.
- Condensed stats table.
Hosted on a dedicated appliance at our Data Centre located in Manchester you will have full access, management and responsibility for your email security giving you total ownership of your email correspondence.