Best Avast Email Security Alternatives in 2024
Find the top alternatives to Avast Email Security currently available. Compare ratings, reviews, pricing, and features of Avast Email Security alternatives in 2024. Slashdot lists the best Avast Email Security alternatives on the market that offer competing products that are similar to Avast Email Security. Sort through Avast Email Security alternatives below to make the best choice for your needs
-
1
NeoCertified
230 RatingsNeoCertified secures sensitive information via our secure email app across our versatile Cloud-based platform. It works on any web browser through Microsoft Office 365/Outlook plug ins and Gmail integration. You can also download the iPhone + Android mobile apps directly to your mobile devices. Since 2002, we have been providing federally compliant, secure mail solutions. We have helped businesses send and get secure emails from any web browser or mobile device. NeoCertified works with all email providers, giving businesses the flexibility and guaranteed protection they need. -
2
Avast Business Hub
Avast
$36.99 7 RatingsThe Business Hub is an integrated platform for complete security – delivered entirely through the cloud. The Business Hub encompasses every essential layer of security needed to defend a business from cyberthreats – covering users and devices anywhere, anytime. Formerly known as CloudCare, the Business Hub is an easy-to-use cloud security platform with a refreshing new UI. -
3
SecurityGateway™ for Email Servers
MDaemon Technologies
$1 per user per month 1 RatingSecurity Gateway's email threat detection technology was developed by MDaemon Technologies. This email industry pioneer has been protecting email servers against viruses, spam, phishing and other threats for more than 20 years. Our expertise is trusted by companies to keep their email communications safe. We protect all email platforms, including Microsoft Exchange, Office 365, and other. Our team of email security specialists will take the hassle out of managing your company’s email security. Security Gateway employs the most up-to-date email threat detection technology and policy enforcement tools in order to ensure good emails flow to and from your users. Security Gateway cloud service is easy to deploy, so you can focus on other important tasks. Check out this video to see some of the Security Gateway features. -
4
Fortinet, a global leader of cybersecurity solutions, is known for its integrated and comprehensive approach to safeguarding digital devices, networks, and applications. Fortinet was founded in 2000 and offers a variety of products and solutions, including firewalls and endpoint protection systems, intrusion prevention and secure access. Fortinet Security Fabric is at the core of the company's offerings. It is a unified platform which seamlessly integrates security tools in order to deliver visibility, automate, and real-time intelligence about threats across the network. Fortinet is trusted by businesses, governments and service providers around the world. It emphasizes innovation, performance and scalability to ensure robust defense against evolving cyber-threats while supporting digital transformation.
-
5
N-able Mail Assure
N-able
13 RatingsN-able Mail Assure, a cloud-based email security system, provides advanced threat protection for both inbound and outbound emails using collective threat intelligence, long-term email archive, and 24/7 email continuity. The service offers multi-tenant web-interfaces with predefined settings, reporting and views that allow for control and visibility over all email flows. N-able Mail Assure's proprietary technology uses input from large volumes of email data to feed the Intelligent Protection and Filtering engine. This, combined with real-time pattern threat detection leveraging a variety if filtering technologies, helps protect against spam, viruses and phishing attacks as well as impersonation, malware and other email-borne threats. -
6
Trustwave Secure Email Gateway
Trustwave
Advanced protection against today's sophisticated email threats. Includes extensive policy controls, data security and compliance management, as well as extensive policy controls. Your email environment should be protected against spam, malware and phishing attacks, account compromise, account takeover, ransomware, and other threats. Trustwave Secure Email Gateway (SEG), a multi-layered intelligence engine and detection engine, analyzes your inbound mail traffic in real-time to protect your users against cyber threats. It allows you to integrate your email content into your business processes and scrutinizes outbound email traffic to prevent any loss of confidential documents, intellectual property, or financial records. These security modules can be used in conjunction with Secure Email Gateway to provide additional protection and compliance capabilities for businesses. -
7
SonicWall Email Security
SonicWall
Cloud email security services can help you protect yourself from today's advanced email threats. Cybercriminals use email as the most common vector of attack. The cloud-based service protects your company from advanced email threats like ransomware, targeted phishing attacks, ransomware and business email compromise (BEC). SonicWall reduces administrative overhead by allowing for easy deployment, management, and reporting. -
8
ePrism Email Security
EdgeWave
ePrism provides email security that is unrivaled against external and internal threats like spam, viruses, spyware and phishing schemes. It also protects against identity theft and other offensive or dangerous content. Our services include industry-leading inbound/outbound spam filtering, category-based policy, and automated seamless directory integration in a hosted SaaS platform that can be provisioned immediately without the need to install any hardware or software. EdgeWave technical specialists provide proactive monitoring and management to prevent threats from reaching your internal servers. The key features include advanced threat protection and intelligent threat management, data loss prevention, compliance, disaster recovery, disaster recovery, granular policies controls, account management, and complete visibility and reporting. Optional add-ons ThreatTest anti-phishing and incident response Email Continuity Email encryption Email Archiving DLP -
9
Proxmox Mail Gateway
Proxmox Server Solutions
€149 per yearProxmox Mail Gateway, the most popular open-source email security tool, helps you protect your mail server from all possible threats right away. Its flexible architecture and user-friendly web-based management interface allow IT professionals and businesses to easily manage all incoming and outgoing email and protect their users against spam, viruses, trojans, phishing, and other threats. In just a few minutes, organizations of any size can deploy and implement the antispam and antivirus platform. The fully featured mail proxy can be deployed between the firewall to the internal mail server and allows you to manage all email traffic from one platform. Proxmox allows you to maintain a professional and secure email communication, as well as ensure business continuity and customer satisfaction. -
10
Your teams can be more productive, secure, compliant, and compliant in a digital world. Modern workplaces allow for better collaboration, remote work, data sharing, and flexibility. Secure file sharing, email encryption, and business communications archive (emails, social media, instant messages) are all best-in-class. All services are supported by our amazing care team 24/7/365 to help you better manage people, technology and process. Your employees, executives, and yourself will have unparalleled peace of mind with automatic email encryption and data loss prevention. Protect your email and business from malware, ransomware, and other advanced threats. Secure message retention makes compliance and eDiscovery simpler for you and your colleagues.
-
11
AppRiver
OpenText
You can unleash your teams to be more productive, secure, compliant, and compliant in a digital world. Secure Cloud can help you increase productivity, improve security, and strengthen compliance. Reduce the risks of human error and security-related obstacles that hinder productivity. Continuous, automated, and dynamic threat detection and risk mitigation are available. Secure file sharing, email encryption, and business communications archive (emails, instant messaging, social media) are best-in-class. All services are supported by our amazing care team 24/7/365 to help you better manage people, technology and process. Your employees, executives, and yourself will have unparalleled peace of mind with automatic email encryption and data loss prevention. Protect your email and business from malware, ransomware, and other advanced threats. -
12
Clearswift Secure email Gateway (SEG), provides powerful protection for an organization's emails against inbound cyber-attacks, and outbound data loss prevention. Email is the most popular method of communication in organizations. Cybercriminals can use it to steal your sensitive data and infiltrate your systems. Our Secure Email Gateway protects you against known and unknown malware as well as advanced threats such phishing. IT teams must ensure that all information shared via email within and outside of an organization is secure, appropriate, and compliant. Clearswift's unrivalled level of inspection and granular policies controls ensure that your emails are treated with the best security. This ensures that your communications are safe and uninterrupted and minimizes business disruptions.
-
13
Barracuda Email Security Gateway
Barracuda
1 RatingThe Barracuda email security gateway protects against spam, phishing and inbound malware. This ensures that your business productivity is not affected by attacks via the email system. Further enforcement of the requirements for inbound email messages can be done with powerful and customizable policies. -
14
RMail
RPost
$7/month/ user RMail®, the e-security platform from RPost®, is a global leader in 2000. RMail is a specialist in elegantly simple email encryption for privacy, compliance, legal e–delivery proof secure file sharing, email rights management, email impostor protection and email encryption. RMail's transmission security services are often used by businesspeople and business systems that need to send sensitive or consumer-regulated information. These RMail services can be used for messages that require additional functionality beyond standard email. They include (a) an easier-to-use and more automated email encryption to ensure privacy compliance; (b) a verifiable proof record of who sent what email to whom; (c) assurance and peaceof mind in relation to delivery and open status email of important and time-deadline emails, (d) need to have a timestamped proof that content was delivered; (f) the need to securely share large files. -
15
FortiMail
Fortinet
Email remains the most important communication tool for businesses. Email is the most dangerous threat vector due to the increasing sophistication and volume of attacks. Customers are also shifting to cloud email providers like Google G-Suite and Microsoft 365, which makes it difficult to protect their email traffic. These platforms' built-in security tools are not sufficient to protect against attacks, protect sensitive data, or meet compliance objectives. FortiMail, Fortinet’s secure email gateway solution provides a multi-layered, comprehensive approach to all inbound and outside email traffic. Fortinet is a trusted vendor and offers the industry's broadest portfolio of security solutions,--including identity management, advanced threat/zero-day protections and security-driven networking--with its Security Fabric. -
16
LuxSci
Lux Scientiae
$4 per/user/ month LuxSci's mission is to keep personal data safe while reliably protecting the world’s communications. LuxSci specializes in providing HIPAA-compliant web and email communications services. LuxSci creates uniquely secure and customizable enterprise-grade environments and solutions that enable organizations to confidently meet their specific business and security needs at scale. Our services include Secure Email, Web, and Forms. -
17
InterScan Messaging Security
Trend Micro
Trend Micro™, InterScan™, Messaging Security offers the best protection against targeted and traditional attacks. It blocks spam, phishing and advanced persistent threats (APTs) by using the correlated intelligence of Trend Micro™. Smart Protection Network™. The hybrid SaaS deployment option includes a gateway virtual appliance and a SaaS prefilter. This prevents spam and threats from reaching their source. This hybrid solution combines the best of both worlds, combining the privacy and control of an appliance on-premises with an in-the cloud pre-filter for resource efficiency as well as proactive protection. The Data Privacy & Encryption module solves the most difficult regulatory compliance and data protection issues by securing outbound information. This module is optional and provides easy-to-use identity based encryption. It also includes customizable data loss prevention (DLP), templates that can be quickly deployed. -
18
Secure email hosting for your company. Your business email can be hosted on a secure, encrypted and privacy-guaranteed email service. The data centers at Zoho Mail offer top-notch security and surveillance with a 99.9% uptime. Secure email hosting is available that supports encryption at rest and end, as well as S/MIME message encryption. Set up custom email addresses and a domain for your company. Your company will be seen and heard with professional email addresses. The powerful Control Panel of Zoho Mail is the administrator's first choice for configuration, customization, and setting up all settings. You can add users, manage group names, set up policies to moderate email content, and much more. To comply with company standards, and to protect yourself from legal attacks, you can keep emails in your organization for a certain period. e-Discovery helps discover such retained emails quickly.
-
19
Z1 SecureMail Gateway
Zertificon
from $ 1.50 per user/per month 25% of the top 100 German companies with the highest turnover choose Zertificon's solutions. We make Enterprise Email Encryption effortless for secure communications with anyone, anywhere, with our Z1 SecureMail Gateway solution. Your entire organization encrypts and decrypts, just as well manages and verifies email signatures smoothly in the background. Z1 SecureMail Gateway requires very little maintenance. Furthermore, the browser-based admin interface does not call for any special skills. Keys are managed automatically, and security policies are centrally enforced. Integration into your cloud or on-premises email infrastructure is quick and straightforward. Your business and workflows are uninterrupted – no employee training is required, and recipients get a frictionless experience. Encryption is centrally customizable and proofed against human error with Z1 SecureMail Gateway. You can quickly establish and maintain compliance and the highest levels of security. You also own your encryption keys and get German-engineered data sovereignty with no backdoors. -
20
ClrStream
Mithi Software Technologies
29% of businesses that suffer a data breach lose revenue. Email is the most common target of attack. ClrStream will protect your email systems. ClrStream is a security and continuity solution that can be used with MS Exchange, Office 365. 88% of businesses suffer data loss, with email being the main culprit. Email scrubbing solution that guarantees protection against Malware, Ransomware and Virus. It has low latency for mail delivery and a low number of false positives. A peripheral, outside-of-environment solution that can be used to protect against DDOS attacks. This solution can provide email continuity when the primary mail server goes down or is unavailable. A solution that offers built-in redundancies, scale, and eliminates the need to use a mail parking service. A cloud-based SaaS service that reduces bandwidth usage and eliminates management headaches. -
21
PhishProtection
DuoCircle
$100/month/ user Make the smartest investment today to reduce email security threats. Get a comprehensive email security solution for small businesses at small business pricing. Cybercriminals are targeting CEOs and CFOs in every industry, as well as HR, Accounting, and HR departments. Office 365 has very limited protection options to prevent impersonations, email fraud, and phishing. You can only create so many custom transport rules to block domains and protect against employee impersonations. PhishProtection is compatible with every email server, device, and smtp service. We can protect you no matter where you are, whether you're on your phone, outlook, or any other email client. It provides the best security for both Android and iOS devices. -
22
Symantec Email Security.cloud
Broadcom
1 RatingProtect Microsoft Office 365, Google G Suite and on-premises email using the industry's best email security solution. Email Threat Isolation protects users from ransomware, credential theft, and spear phishing. Stop insidious email threats like ransomware, spear phishing, email spam, business email compromise, and email theft. Multiple layers of protection are available to stop spear phishing emails. These include threat isolation, spam filtering and advanced security email analytics. Built-in user awareness and education tools can also be used. Protect your computer from the latest ransomware by using content defense, sandboxing and link protection technologies to detect new, stealthy and zero-day attacks. Protect your business email from compromise by using impersonation protection, sender authentication enforcement, and brand protection controls. Symantec Email Fraud Protection protects your brand reputation and solves the practical issues of sending authentication (DMARC/DKIM/SPF). -
23
Trellix Email Security
Trellix
Protect your email infrastructure and users, whether they are on-premises or in cloud. Trellix Email Security can help you identify and mitigate advanced email threats such as ransomware, BEC (business email compromise) and phishing. Trellix Email Security will provide you with the best detection and response capabilities to create a trusted, resilient environment for email. Prioritized alerts help analysts quickly identify current threats and take immediate action. With the most advanced sandbox technology and AI, you can keep your email safe, no matter where it is stored. To gain insights and create a unified security ecosystem, connect with as many as 65 Trellix solutions as well as third-party products. This on-premises solution will reduce the risk of breaches, identify, isolate and protect against advanced URL- and attachment-based attacks. Select Advanced Threat mode to find malicious URLs using custom plug-ins or Full Hygiene mode for reducing impersonation, BEC and other issues. -
24
ESET PROTECT Mail Plus
ESET
$132 per 5 devices per yearAdditional security layer to prevent threats from reaching users on the network. This product is designed to protect email communication, which is the most vulnerable vector. ESET is a 64-bit product that allows clustering to ensure speed is not a concern for organizations of all sizes. ESET Mail Security solutions combine machine learning, big data, and human expertise to create an award-winning mail security platform. It helps eliminate unwanted emails and targeted attacks, so employees can focus on their jobs and ensure business continuity. Phishing campaigns are constantly targeting users, which may include other malicious components. Due to the fact that users must sort through emails to determine if they are legitimate, a single user will not be able to perform their tasks efficiently. Users receive emails about spam email that has been quarantined. -
25
Mimecast Advanced E-mail Security is a robust email security solution that protects organizations from a variety of email-based threats including phishing attacks, malware, impersonation, and spam. Mimecast uses cutting-edge AI and Machine Learning to provide real-time threat prevention and detection in order to safeguard sensitive data and ensure business continuity. It provides advanced filtering and scans of incoming and emailed outgoing emails to reduce the risk of data breaches and help organizations comply with regulatory requirements. Mimecast's comprehensive reporting and management features enable IT teams to monitor and respond to threats efficiently, making it the preferred choice for businesses looking to enhance email security.
-
26
Forcepoint Email Security
Forcepoint
Organizations require an easy, cost-effective, and fast email encryption solution to comply with regulations and protect their confidential information. Forcepoint email encryption, a policy-driven technology, enables secure delivery. It removes the traditional barriers to cost and complexity, while allowing for easy administration without the need for additional hardware or key management. You won't lose the ability to inspect encrypted emails for malware and content violations thanks to Forcepoint Email Security and Forcepoint DLP Web and Email. -
27
Microsoft Exchange
Microsoft
6 RatingsBusiness-class email and calendaring make it easier to work smarter. Exchange allows you to collaborate on critical documents and gives an organized inbox that prioritizes important messages. It adapts to your work style and adapts to your needs so you can get more done faster. Access to a personalized inbox with helpful features, a smarter way to view and interact via email and a smarter way to organize it. Search enhancements provide faster and more complete results. Add-ins allow for powerful customization and extensibility that connects you to modern services as well as internal line-of business applications. A calendaring system that does more than just schedule appointments and make commitments will help you organize your time. Automatically capture events such as hotel reservations and flights from email. Get suggestions based on where you are located about where to meet. Microsoft 365 offers many benefits that can help you and your company be more productive. -
28
Proofpoint Email Protection
Proofpoint
3 RatingsProofpoint Email protection solutions, whether deployed as a cloud-based service or on-premises, protect against malware and threats without malware, such as impostor emails or business email compromises (BEC). Granular email filters control spam, bulk graymail and other unwanted emails. Continuity capabilities ensure that email communications continue even if your email server fails. Proofpoint Email Protection, the industry's leading email gateway, can be deployed on premises or as a cloud-based service. It detects both known and unknown threats, which others may miss. Email Protection, powered by NexusAI's advanced machine learning technology and powered by NexusAI, accurately classifies different types of emails. It also detects and blocks threats without malicious payloads, such as impostor emails (also known as Business Email Compromise (BEC), using our Advanced BEC Defense. You can also tag suspicious emails automatically to raise user awareness. You can also track down any email within seconds. -
29
Sealit
Sealit Technologies
You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you. -
30
SEPPmail
SEPPmail AG
4.5 € per user per monthIt is now easier than ever to send and receive digitally signed encrypted emails. The Secure E-Mail Gateway (SEPPmail) with its patented GINA procedure for spontaneous encrypted, SMEs as well as large corporations can secure all e-mail communications at the highest level. It requires minimal effort and is easy to use for both sender and receiver. SEPPmail's comprehensive Secure Email solution sets new standards in secure, GDPR-compliant email communication. SEPPmail is a world-class email encryption and signature solution. It includes all the features necessary to protect confidential data via email, ensure authenticity of the sender, and ensure confidentiality and integrity of the message. The modular design of the secure email gateway solution allows it to be customized to meet customer needs and can be easily expanded. -
31
Comodo Dome Antispam
Comodo Group
$4.00/one-time/ user Secure Email Gateway is an enterprise antispam and threat prevention system. It uses a sophisticated array anti-virus scanners, spam filters, and content analysis engines to stop unsolicited mail from ever entering your network. Employee security needs are different. Different security levels may be required for different employees, such as those in finance or sales. Dome Anti-spam allows you to create different types of profiles and set different restrictions. Containment protects against the latest forms of ransomware and zero-malware as well as other advanced threats. The Valkyrie file verdict system analyses unknown files. The attachments are openable, executable and can be used by users with zero risk of infection. Comodo's unique containment technology means that any risk is fully contained before reaching its end point. This ensures that there is no risk of infection from new malware. -
32
Advanced protection for your inbox. Email is still the number one threat vector. Email is still the No. Expand your defenses so you can detect dangerous threats, and respond quickly to and remediate any new threats in real-time. Identify the malicious tactics used in attacks against your organization. Understanding the specific risks to your business and categorizing threats will help you gain insight into which parts of your organisation are most vulnerable. AI-driven threat recognition uses multiple detection engines that simultaneously evaluate different parts of an incoming message. These verdict details ensure accurate threat classification and identify business risks, as well as promote an appropriate response. There are many threats: phishing emails, malware, ransomware, and business email compromise. With industry-leading threat information, you can quickly act to protect yourself against them.
-
33
Axway MailGate SC
Axway
Axway MailGateSC offers multiple layers of security that can be used in combination or individually to protect against threats at the DMZ or within the enterprise network and to secure inbound and outbound mail traffic at the network and content levels. MailGate SC is able to seamlessly plug-and play with your existing architecture without browser or operating system dependencies. This gives you the flexibility to add security levels as your needs change, without having to make changes to enterprise systems, protocols, or end user workflows. -
34
Spambrella
Spambrella
$1.00Dynamically classify fake email. Preventively identify suspicious URLs and sandbox them. Big-data analysis can be used to accurately classify bulk mail. All this in one service that connects to Google Workspace and Microsoft 365. Spambrella's Email Security & User Awareness Training technology is used in many of the world's most successful security-conscious businesses across many continents and environments. Spambrella can help you unify your email security requirements and user awareness training needs on a global level. Spambrella is your outsourced email security team. We are able to migrate you seamlessly and have the technical expertise of all other service providers, such as Symantec.cloud, Mimecast, MxLogic. To uncover email threats to your email users, schedule a demo with our cybersecurity experts today. -
35
Sophos Email
Sophos
Today's email threats are moving fast. Growing businesses need predictive email security to defeat today's threats and keep their eyes open for tomorrow. Sophos Email Sandboxing uses the same technology as Intercept X, our award-winning security product. It is a deep-learning neural network that can block zero-day malware, unwanted applications, and other threats. The most advanced anti-ransomware technology. Sophos email security uses behavioral analytics to stop ransomware and boot-record attacks. Time-of-click URL Protection checks the website reputation of email links prior to delivery and again after you click. This prevents stealthy, delayed attacks that other email security systems may miss. Your Sophos Email gateway will not be affected by the thousands of new threats that are discovered every hour, despite processing millions of emails daily. -
36
OMNITRACKER
OMNINET
$20000 one-time payment 1 RatingOMNITRACKER can be used to adapt processes to meet your specific needs. OMNITRACKER's unique module and application design, as well as many out-of-the box solutions, make it easy to launch. You can easily and flexibly adapt the functionality to meet your needs or create your own workflows. The multi-client OMNITRACKER allows for unlimited scaling. Easy maintenance and updating, as well as a attractive licensing model, guarantee a quick return on investment. Our highly efficient, scalable, and effective solution for IT Service Management (ITSM) is highly efficient. It is based upon the current ITIL standard and integrates with other supporting processes. It supports you at all stages of the project and greatly facilitates planning and control. It can be combined with other applications. You can track all sales projects with our application for the complete process, from lead generation to successful completion. -
37
Comodo Dragon Platform
Comodo
Our cloud-native framework provides zero day protection against undetectable threats and protects your endpoints against known threat signatures. Comodo has created a new approach for endpoint protection that addresses the problem of legacy security solutions. The Dragon platform provides the foundation principles for next-generation endpoint security. The Dragon Platform's lightweight agent delivers artificial intelligence (AI), and Auto Containment to protect against all threats. This makes it easy to improve your cybersecurity and performance. Comodo provides everything you need to activate breach protection immediately. 100% trust verdict in 45 seconds for 92% of signatures via analysis and 4 hours SLA for the remaining 8% via human specialists. Automated signature updates simplify deployment across your entire environment, reducing operational costs. -
38
Proxmox Backup Server
Proxmox Server Solutions
€449 per yearProxmox Backup Server, an enterprise backup solution, can be used to back up and restore VMs, containers, as well as physical hosts. Proxmox Backup Server reduces network load by supporting incremental, fully-deduplicated backups. This also saves storage space. You can backup data with confidence, even to untrusted targets, thanks to strong encryption and data integrity methods. Modern data centers are focused on data safety and minimizing downtime. Reliable backup software is one of the most important infrastructure components you can invest in. The easy-to-use Proxmox backup server allows you to back up your data in an efficient manner, restore it quickly, and reduce work hours with its web-based interface. -
39
XGen Security
Trend Micro
XGen(tm security) is a new type of security software that addresses all threats, both present and future. Instead of using separate, siloed security systems that don't share information with each other, XGen™, security offers a cross-generational mix of threat defense techniques and a connected defense that can protect your company from all unseen threats. -
40
Ciphermail Appliance
in-put
$670 one-time paymentEmail encryption with CipherMail The majority of emails are sent in plain text. This means that anyone with access to the data stream could read the contents of the emails. This is unacceptable for most businesses, institutions, and organizations and could also be a violation of applicable law. E-mail encryption is a way to ensure security and trust in communications. CipherMail, a central mail transfer agent, works on the "store-forward" principle. No matter if they come from internal or external sources e-mails are not saved until they are encrypted / decrypted so that they can be forwarded to their intended recipient. This can be done without having to change the email client. It is also possible with any SMTP server. E-mail encryption can either be done in S/MIME, PGP, or in a PDF file. This can also be triggered by a trigger in your subject line. CipherMail also contains a Data Leak Prevention module (DLP). -
41
RevBits Email Security
RevBits
RevBits Email Security, a next-generation email security product, aims to address major gaps in the market. Revbits Email Security uses unique algorithms, such as a page impersonation detection method, to achieve the highest level of email analysis. RevBits Email Security provides a composite probabilistic score for each email. It also includes full details for continued user education. RevBits Email Security Enhances Email Security Architecture RevBits Email Security improves email security by blocking and detecting sophisticated malicious emails that penetrate the organization's email security layer. RevBits Email Security protects the employee endpoint, the last point of email interaction. -
42
Votiro
Votiro
Positive Selection is the only file security solution that guarantees all files entering your company are safe. Positive Selection is a file security solution that does not scan for suspicious elements or block files. Instead, it identifies the safe elements in each file and ensures that every file that comes into your company is 100% secure. Any file, any time, anywhere. Votiro's Secure File Gateway has a deep and expert understanding of all file types. It eliminates threats from any file, regardless of how it enters your organization. -
43
Secure Exchanges
Secure Exchanges
$0.99 per user per monthSecure platform for confidential documents exchange, retrieval and signing (up to 2.5G files per email), without compromising any sensitive information within or outside your organization. Our technology allows users to add layers to their email exchanges by limiting their read time, their lifespan, or adding SMS codes or passwords that can be sent to their recipients. The online world today is highly vulnerable. Choose a secure and innovative tool that is unique in computer security. You can send and receive large, confidential attachments to emails. Emails can be used to exchange passwords, financial statements, tax returns and incident reports, as well as credit cards and financial statements. Our technology can help your company. -
44
Avast One is an all-in-one security service that provides comprehensive protection. It includes an award-winning antivirus, VPN and data breach monitoring. You can also use device cleanup tools to keep your devices clean and secure from today's threats. You can rest assured knowing that you have an award-winning antivirus protecting your computer. It's not slowing down, but it's packed with features. You can keep your identity and personal information safe from cybercriminals and remain as private online as you like. Your phone and computer will feel faster with more storage space and faster processing, and longer battery life. Avast One is an online safety tool. Avast One protects your computer from malware, hides your IP address using a VPN, updates your software to fix vulnerabilities and prevent hacking exploits and helps you secure your accounts in case of data breaches.
-
45
Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Go about your business knowing you are backed by effective cybersecurity built for small companies. Control your IT security from anywhere, powered by the cloud, advanced AI, and a global threat detection network. Avast Small Business Solutions consist of: * Avast Essential Business Security helps deliver device security for small businesses that want remote visibility and centrally controlled protection against viruses, phishing, ransomware, and advanced cyberattacks. * Avast Premium Business Security combines our next-gen antivirus with VPN and USB control to help your employees and their devices stay more private and safer online, as well as offline. * Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.
-
46
modusCloud
Vircom
ModusCloud by Vircom is a cloud-based email security product that provides real-time threat protection, phishing detection, advanced multilayer antivirus and email archiving. Users are protected against malicious and unwanted email. Administrators can easily customize service to meet users' requirements and policies. ModusCloud offers clients access to enterprise security technology and infrastructure used by some the most secure companies in the world. This is combined with our expert knowledge and understanding of smaller businesses' needs. We offer a hosted email security solution that includes email threat protection, email continuity with Emergency Inbox and policy-enforced encryption. All of this is easily managed via a user interface. -
47
VIPole
VIPole
$5.99 per monthChat window clearing, message editing and deleting, complete history wiping, auto-delete, chat window clearing, and message deletion. Remotely disconnecting devices, fake secret phrase and auto lock. Contact authorization, configurable contact authorization, hidden and blacklisted contacts, individual visibility settings, configurable contact authorization. Track the progress of your colleagues and yourself by assigning tasks. Securely share passwords with contacts by storing and organizing them. Encourage collaboration by setting goals and monitoring the resolution of issues. -
48
Comprehensive cybersecurity and patch automation for growing businesses Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure. Key Benefits: * Remote Management with online management console * Device Protection with next-gen antivirus * Data Protection with Firewall, Ransomware Shield, USB Protection, Password Protection * Online Security and Privacy with VPN, Web Shield, end Web Control * Patch Management
-
49
MailChannels
MailChannels
$79.99 per monthSecure and send email at scale MailChannels can be used to detect spammers and stop them from exploiting your infrastructure. Monitor outgoing emails for spam and unusual sending activities. Protect your customer's inboxes from spam, phishing, or other email threats. An intuitive interface makes managing customers easy and efficient. Our services are available across multiple clouds, so we minimize the chance of any single point of failure. You will get a human response within 30 minutes, or less, to your ticket 24/7/365. -
50
Avast Free Antivirus
Avast
1 RatingIt's packed with the most advanced threat-detection network, machine learning virus protection, and home network security that won’t slow down your computer. Avast Free Antivirus scans your computer for security and performance issues, and then tells you how to fix them immediately. It analyzes unknown files to protect you in real time. Avast is the most trusted antivirus available. It has a beautiful interface, advanced protection, and a passive mode that allows you to run multiple security products simultaneously. There's even something for gamers and movie lovers. Our new interface is easy to use and checks everything, from your passwords to your network security. We don't just scan your applications for malware. We monitor their behavior to ensure they don't suddenly go crazy.