A fully outsourced email content filtering service for both incoming and outbound mail. The service is based on a market-leading email content security solution. With totally customisable filtering rules, it protects Vodacom Business SMEs and enterprise clients against email-associated threats by enforcing acceptable usage policies. The solution is designed to control the email traffic being received by a client from the Internet by blocking all unnecessary email before it enters the network in line with the client's policy needs.
Why choose Email Security?
Vodacom Email Security solution covers the following:
• Blocking profanity in incoming and outgoing email.
• Blocking racist, sexist or other politically insensitive remarks, particularly in outgoing email.
• Blocking sexually explicit images attached to email messages.
• Blocking specific types of attachments for users, such as MP3 audio files, AVI video files and executables.
• Restricting the size of incoming or outgoing emails.
• Blocking outgoing messages containing sensitive or confidential information from unauthorized email accounts.
• Adding customer specific disclaimers to all outgoing messages.
Benefits to your business
Outsourced solution
Save on time and hardware/software expenses that companies usually incur when setting up their own mail filtering solution.
Increase productivity
Limit employee email abuse, such as sending large attachments and any non work- related mail.
Versatility
Administrators may need to change rules set from time to time. Both inbound and outbound rules can be altered and customised via a customer portal to meet corporate policy requirements.
Savings
By eliminating unwanted email content at the perimeter, valuable bandwidth can be saved.
Quarantine
Blocked messages can be released if requested by a user via the onsite administrator, using the customer portal. Notification of blocked email can be sent to notify users of policy-blocked mail.
How much does Secure Remote Access cost?
The cost of these services depend on your business requirements.
Find out how much Secure Remote Access will cost for your business.
You may also be interested in:
Safely enter your private corporate network.
A consultative approach in reviewing your security posture.
Use hosted managed UTM solutions as first line defence in-depth.