Website Design | Web Design | Custom Website Design | Website Application Development | Web Development | Software Development


Anti-Spam    Real-time, most accurate Spam Protection
Cyberoam Anti-Spam solution offers real-time spam protection over SMTP, POP3, IMAP protocols, protecting organizations from zero-hour threats and blended attacks that involve spam, malware, botnets, phishing, Trojans and more.

Cyberoam’s Check Mark Level 5 certified Anti-Spam solution offers 98% protection against zero-hour attacks with .0001% false positive rate, minimizing the threat of business mail loss.

Back to Home
Feature Feature Description Benefit
Spam Filtering
IP reputation-based filtering
RBL Lists, MIME header check
Based on message header, size, sender, recipient
Screens out the 90% spam in incoming mail
Saves bandwidth
Recurrent Pattern Detection
Automated antispam protection based on distribution pattern
Extracts and analyzes relevant message patterns
Signature-less technique
Detects, blocks emerging spam outbreaks
Blocks attachment-based spam – PDF, XL, MP3 etc.
Content agnostic, multi-language, multi-format antispam protection – Blocks foreign language, image spam
Zero-hour protection with no wait for signature updates
Narrow window of exposure
High spam catch rate
Virus Outbreak Detection (VOD)
Signature-less detection from Cyberoam Anti-Virus and Anti-Spyware
Closes early-hour vulnerability gap of massive virus outbreaks over email
Protects against the initial peak of attack
Comprehensive Email Security
Identity-based Security
Layer 8 Identity-based requirement
Copy and route mail to pre-defined mail addresses
Data Leakage Prevention
Granular protection based on user work profile
Email Management
Granular email management with message and attachment size, subject line etc.
Minimizes exposure to threats and legal implications
Increases productivity
Lower cost of compliance
Quick recovery for disaster management
Self-Service Quarantine Area
Quarantines malware-infected mails
Sends Spam Digest to users
User right to check quarantine mails
Meets security and regulatory compliance requirements
Saves IT administrator time
Email Logging and Reporting
Data archiving
Extensive Layer 8 Identity-based reporting – Top spam receivers, senders, applications of spam
Real-time logs and reports
Options of on-appliance reporting, centralized reporting from CCC and Cyberoam iView
Meets regulatory compliance, audit, forensic requirements