Using Dell™ email security solutions, you can protect your organization from outside attacks with an effective virus, zombie, phishing and spam blocker that also ensures that compliance and e-discovery mandates are met with ease. Leverage multiple-threat detection techniques, plus a unique worldwide attack identification and monitoring network. Ensure the secure exchange of email containing sensitive customer data or confidential information. Better understand email usage, archive for compliance, perform e-discovery without overburdening your administrators and audit all mailboxes and access controls to prevent violations. Address your specific requirements while simplifying management and controlling costs with multiple deployment options.
Cloud-based email securityAdopt cloud-based protection from spam, phishing and malware attacks, and capitalize on affordable and predictable monthly or annual subscription pricing while minimizing upfront deployment time and costs, as well as ongoing administration expenses. Take advantage of multiple anti-virus solutions, including Dell™ SonicWALL™ GRID Anti-Virus and Dell SonicWALL Time-Zero virus protection.
On-site email security appliances and softwareSelect on-site solutions that can be deployed as hardware appliances, virtual appliances or software, including software optimized for Microsoft® Windows Server® or Windows Small Business Server (Windows SBS). Scale easily and cost-effectively from 10 to 100,000 mailboxes.
Powerful gateway protectionAdd the Dell SonicWALL Comprehensive Anti-Spam Service (CASS) for SonicWALL firewalls to eliminate inbound junk email at the gateway before it enters the network. CASS is ideal for smaller organizations and distributed enterprises of up to 250 users that receive email at multiple locations and need gateway-based, inbound email protection to reduce network traffic.
Email analytics and reportingReduce risk and improve security by reporting on keywords, message-level history of all SMTP domain traffic and header information. Determine appropriate use and compliance with messaging policies. Detect and investigate questionable communications that may leak sensitive information.
Compliance and email discoveryAchieve compliance with regulatory and e-discovery mandates, ensuring email is available when needed with archiving and recovery solutions. Granular retention and disposition policies keep only relevant email for the right amount of time. Search multiple email data sources (Office 365®, production/archived mailboxes, public/personal folders (PSTs), offline Exchange files, Archive Manager, backups) while simultaneously exporting the results into a variety of formats and simplifying the e-discovery response.
Auditing and access controlProvide the “who, what, where, when and workstation” of all configuration and permission changes to Exchange. Take the complexity out of security management with a centralized interface to manage permissions and ensure that proper access controls are in place — for Exchange and your entire Windows environment.