There is only a couple of changes to do before starting to use SAFEMAIL
SAFEMAIL works with every mailserver, even third party hosted solutions like Office 365
You can have multiple domains managed by a single control panel
You have H24 full control of your email stream with the optimized Dashboard and the automatic reports
You can try our service for free for 30 days before deciding if SAFEMAIL satisfies your needs
To better understand how our product works, let's simplify things by comparing emails to physical mails.
Like traditional mails, emails have too headers (sender and recipient) that can easily be falsified or altered.
Even the body headers, the equivalent of the traditional mail's letterhead, can be used to better identify the sender, and these can too be altered.
Emails, like their real life equivalent, have to pass some intermediary stations before reaching your inbox. DKIM and SPF could be loosely compared to the stamp and the post office rubber stamp.
We check that the sender intenet domain exists or not, that's the same of verifying that the sender written in the envelope of a real mail lives in a real city or have a valid street address
The sender email is checked in various blacklists. It's like knowing the street address of known scammers and rejecting their mails
We check the IP address of the last untrusted relay and the IP address of the various intermediary stations is checked against multible RBLs. Similar to check if the mail has passed in a shady post office before reaching your letterbox
We check all emails URLs and compare them with lists of hacked, abused or malicious lists. Similar to reject a mail that is written with newspaper clippings
If we find dangerous or potentially dangerous attachments, we disarm the email by stripping them out. We work both reactively (with AV signatures) and proactively, by removing potentially dangerous attachments like windows executables and office documents with macros. That's the equivalent of airport metal detectors, with the difference that you are able to whitelist senders that you really trust and receive all attachments from them.
Thanks to multiple threat intelligence sources we scan the email body and identify known malicious contents. With the help of constantly trained machine learning engines, our systems can predict the spamminess of an email even if the contents are still unknown to the security community. It's like working in a big company and having all the mails opened and checked by the company's post office before being forwarded to the final recipient