Cloud-based e-Mail Security to keep YOUR business secure

Stop “Business Email Compromise” attacks and secure your email

91% of cyberattacks start with an email

Zero Trust Email Protection

Every incoming email must be treated as suspicious. e-Purifier with ATP inspects all components of the email including the email body, links, and attachments. 

Focus on prevention

Weaponized emails containing Zero Days and undetectable malicious code continually lead to ongoing data breaches and ransomware incidents. ePurifier is a fully managed service that delivers Clean.Safe.Email

Advanced Threat Protection

ATP adds a proven and award-winning layer of security to the organization's security. Using powerful anti-spam and anti-malware detectors, complemented by advanced techniques such as outbreak protection, content disarm and reconstruction, sandbox analysis, impersonation detection, and other technologies to stop unwanted bulk email, phishing, ransomware, business email compromise, and targeted attacks transforming each email message into a trustworthy copy.

Save IT time and resources

Replace ineffective Security Email Gateways and stop more phishing, BEC, spam, ransomware, malware and data leaks with Kenya’s 1st 100% locally hosted Cloud Email Service 


Key Features

Scalable Cloud

e-Purifier is scalable and supports any sized business. 

Redundancy

e-Purifier is fully redundant. In the event of a disturbance to operations, business can continue as normal.  

TLS

TLS (Transport Layer Security) encryption on mail communication/transferring is supported. 

LDAP

Integration with Active Directory (AD) is supported via LDAP (Lightweight Directory Access Protocol). 

2FA

The e-Purifier platform supports two factor authentication (2FA) for access to administrative and end user MailVault web portals. 

Auditing

The e-Purifier logs contain information on interface operations. 

RBL

Real-time blackhole list (RBL) is a service whereby mail systems perform a check via a DNS (Domain Name System) query to check whether a sending host's IP address is blacklisted for email spam.

Geoblocking

This is the practice of restricting email communication based on the sender’s geographical location.

Rate Control

The Rate Control feature protects the e-Purifier system from spammers or spam-bots that send large amounts of email in a small amount of time.

Greylisting

Email greylisting is a method of protecting email users from spam. An MTA (Mail Transfer Agent) that uses greylisting blocks a suspicious email with a “temporary rejected” error. In such a situation, a legitimate SMTP (Simple Mail Transfer Protocol) server makes multiple attempts to resend a delayed email until it is finally accepted.

Recipient Verification

Recipient verification (aka Recipient Validation) allows e-Purifier to verify if a recipient email address exists before sending them an email. If a user does not exist, it will block the email before reaching the mail server.

SPF, DKIM & DMARC

These are all sender authentication checks performed to detect spoofing and altering of email via interception.

Outbound Scanning

Outbound scanning of email is vital today. It blocks spam and viruses being sent out from your organization and prevents your IPs from being blacklisted by many global blacklisting services as a spammer.

Impersonation Protection

This e-Purifier feature includes sender alignment, impersonation analysis as well as cousin domain profiles. Sender alignment checks for a Header From and Authorization Domain mismatch and is an SPF related function. Impersonation profiles and cousin domain profiles respectively checks for appropriate display and domain names.

Allowed/Block Lists

e-Purifier allows to “always allow” or “always block” email from a particular mail source.

Disclaimers

e-Purifier allows disclaimers to be added to all outbound emails. This can be specified per domain. Plain text or HTML text versions are supported.

Mail Redirecting

This feature allows Administrators to create mailbox forwarding rules inside of e-Purifier.

Attachment Scanning

e-Purifier’s attachment filters identify file attachments using several different methods and can block specific files based on customer requirements.

Syslog

e-Purifier can send all log output to a customer’s remote syslog server.

Keyword Scanning

Administrators can use the e-Purifier keyword scanning feature to block inbound or outbound emails containing specific keywords.

Machine Learning

e-Purifier analyzes similarities between known spam email with new uncertain email to determine if the uncertain email is spam. This is done by using the Machine Learning database that gathers spam email caught by global threat intelligence databases.

Dual Anti-Virus Scanning

e-Purifier uses multi-award-winning anti-virus engines running in parallel to provide dual-layered virus protection.

Phishing Detection

e-Purifier is an advanced anti-phishing solution as it includes Artificial Intelligence (AI) driven anti-phishing protection against this business email threat.

Multi-layer Anti-Spam

e-Purifier uses multiple spam ruleset databases which are lists of custom spam rulesets that are updated regularly.

URL Inspection

e-Purifier checks all URLs in the body or attachment of an email against an online Known Bad URL database. By doing this the catch rate of especially zero-day malware is improved.

Behavior Analysis

ATP’s Behavior Analysis engine is a classic anti-spam technique that analyzes words in an email to determine the probability that it is spam. This technique compares words or tokens with two pre-existing global databases of tokens: one derived from known spam and the other from clean emails. If there is a higher correction of tokens with the spam collection, then the email is marked as spam.

Heuristic Anti-Spam engine

ATP uses various methods to detect spam using Heuristic Spam scanning tools. Heuristics are the strategies derived from previous experiences with similar problems.

CDR

HTML content in email body and attachments may potentially contain hazardous tags and attributes such as hyperlinks and scripts. MS Office and PDF attachments may contain potentially hazardous macros, active scripts, and other active content. CDR (Content Disarm & Reconstruction) provides the capability to remove or neutralize the potentially hazardous contents and reconstruct the email messages and attachment files.

Heuristic Anti-Virus engine

ATP uses heuristic Anti-Virus tools to scan the email header, body, and attachments (which also includes compressed attachments) for virus infections. Heuristics are the strategies derived from previous experiences with similar problems.

Sandbox

When ATP detects that an email contains a potentially dangerous file, but isn't sure, it will automatically be sent to a Sandbox. Sandboxing is the process of opening a potentially dangerous attachment in an isolated controlled environment, to verify if it is dangerous.

DLP

e-Purifier’s Data Leak Prevention (DLP) feature helps prevent sensitive data from leaving a network via email. On defining sensitive data patterns, action can be taking against emails that are flagged with data matching these patterns.

Advanced Anti-Phishing

ATP uses various methods to detect Phishing using Heuristic Phishing scanning tools. Heuristics are the strategies derived from previous experiences with similar problems.

URL Click Protection

This ATP feature provides the ability to rewrite links in emails that prevents a user from clicking on malicious links. Users that click on these malicious links are redirected to a block page.

Quarantine

e-Purifier message quarantine lists all messages that have been blocked as suspected spam or that contain a virus.

Mail Tracking

The Mail Tracking page enables you to review all mail transactions that have passed through e-Purifier.

Reporting

e-Purifier reports can be scheduled for Daily, Weekly or Monthly delivery. These PDF file type reports are emailed to the specified addresses or distribution groups. Daily reports will generate a report of the specified type for the previous day’s activity. Weekly reports will be run each Monday and will produce a report of the specified type for the previous Monday-Sunday. Monthly reports will be run on the 1st of the month and will produce a report for the previous month.

Partner

Discover which threats are evading your current email defences

Email Security