Hexamail Guard provides the most comprehensive set of antispam, antiphishing and antivirus features of any server based email gateway software. This provides effective elimination of email threats before they penetrate your organization and allows you to decide on the techniques that are best suited to your email system.
Many spamblockers simply rely on central "finger print" files or lists of IP addresses to block. Often this approach fails to prevent initial outbreaks of new types of spam or spam from new sources. Hexamail employs additional powerful content inspection techniques that read the actual email, ensuring even spam from new IP addresses, or of an entirely new nature is blocked. You can enable Bayesian analysis, DNS based blocklists, keywords and expression matching, sender blacklisting, whitelisting, challenge-response for blocked email, email tagging, email deletion or any combination of the techniques you wish!
Add a powerful Antivirus option to Hexamail Guard, allowing automatic processing of all suspect attachments and elimination of virus, worms, scripts and other malicious content. Hexamail can scan with numerous antivirus engines if installed. Hexamail with antivirus provides customers with total email protection.
Hexamail Guard integrates automatically and seamlessly with all versions of Exchange on-premises providing straightforward integration and easy administration. Hexamail can integrate with Exchange 2016, 2013, 2010, 2007, 2003, 2000, or 5.5 on the same machine or on a separate server.
SPF (Sender Policy Framework) fully supported. SPF ensures that email is only accepted if it came from the servers designated by the sending domain's policy. This means you can verify the sender is legitimately allowed to send email from the domain. In particular this can help reduce Phishing, where senders spoof email from another domain.
DomainKeys Identified Mail (DKIM) checks are performed on any DKIM signed email. This verifies the sender is allowed to send email from the domain specified. It also verifies that the email has not been tampered with or forged. In particular this can help reduce phishing, where senders spoof email from another domain.
SURBL is an RBL designed to be used to block or tag spam based on URIs (usually their domain names) contained within the message body. It is not a conventional RBL in that it's not intended to block the source of spam messages. Instead, SURBL can be used to block spams based on their message content. http://www.surbl.org/
Bayesian pattern matching is used to analyze the entire content of incoming email: this prevents the mistakes made by relying on single keywords or rules whilst ensuring the filters are robust to subtle changes in language, deliberate misspellings and tricks typical in spam. This allows Hexamail software to provide unrivalled accuracy and reliability when detecting spam.
Cutting-edge neural network technology is used to identify suspicious sender addresses with high accuracy and incredible performance. Neural sender matching enables high volumes of email to be checked in the shortest possible time.
Hexamail provides support for multiple sender and recipient white lists. The white list can be imported, manually created or automatically created and kept up to date through analysis of outgoing email traffic. Domain whitelisting is also possible.
Hexamail Guard not only analyses the text of email but also any embedded images, using the structure of the images to determine whether an email is SPAM or not. Increasingly SPAM email consists entirely of images, and so this technique is essential for effective blocking.
Hexamail can download all your user's POP3 accounts, strip out the SPAM and reroute the email to their corporate mailbox or other email address.
Configurable greylisting (or graylisting) support allow rejection of unknown senders and IPs
Hexamail supports any third party DNS based blacklists (DNS BL or real time black hole lists). These databases can be used to block all email from known SPAM sending email servers and open relays. Choose what to do with matching IP addresses, Reject, Block, Mark or Weight. Hexamail Guard supports all real-time blacklist services including: list.dsbl.org, blackholes.intersil.net, proxies.relays.monkeys.com, relays.ordb.org, sbl.spamhaus.org, dnsbl.njabl.org, blackholes.wirehub.net, china.blackholes.us, korea.blackholes.us, taiwan.blackholes.us, blackholes.easynet.nl, multihop.dsbl.org, unconfirmed.dsbl.org, dnsbl.sorbs.net, bl.spamcop.net, rbl-plus.mail-abuse.org, cbl.abuseat.org, spamsources.fabel.dk, dnsbl.njabl.orgt, multi.surbl.org, Customized lists can also be imported or new IP addresses added in a single click from the spam quarantine.
URLs contained in the content of email are checked against configurable DNS based databases of known spam hosts. Email is blocked if it contains URLs hosted on webservers known to belong to spammers.
Right-Hand-Side blacklist checking againt configurable DNS based databases of known spam domains. Email is blocked if the sender is from a domain known to belong to spammers.
Hexamail Guard integrates automatically and seamlessly with all versions of Small Business Server providing straightforward integration and easy administration. Hexamail can integrate with SBS 2003, SBS 2008 and SBS 2011 either on the same machine as SBS or on a separate server if required.
Hexamail Guard integrates automatically and seamlessly with all versions of Windows Server Essentials providing straightforward integration and easy administration. Hexamail can integrate on the same machine as Windows Server Essentials or on a separate server if required.
Link Interception dynamically rewrites email links to redirect users to a warning page if they click links in email that arrives from external unknown senders. This can be used to warn the user that they may be visiting a malicious site and to be aware of phishing and spear-phishing attempts.
Email from external unknown senders can be tagged in the subject or content to alert users to email from external or previously unknown sender addresses. Hexamial Flow email client already highlights this and alerts users, but if your inferior email client does not already highlight this this feature can be used to add this functionality to your email system.
SPAM detected by Hexamail can be stored in a quarantine for later review. The quarantine allows the administrator to quickly review and send on or delete large numbers of email with a single click. A special viewing window allows the safe viewing of any suspect email without inadvertently triggering worms, virus or pop ups.
Unlike many antispam solutions, Hexamail does not send your email to the cloud for processing. Email stays on your network which guarantees privacy of your communications, prevents snooping and industrial espionage, and reduces the risk of hacking.
Zimbra, Zarafa, Kerio mailserver, IMailserver, hMailserver, Lotus Notes, NTMail, SL Mail, QMail, Exim, Lotus Domino 5, LSMTP, MailSite, MDaemon, MetaInfo, Sendmail, MS IMS/IIS, Netscape Messaging Server, NTMail, and Post.Office are all supported by Hexamail. Hexamail can be used in conjunction with any SMTP compatible mail server, allowing you the freedom to choose your email server now and in future.
For a corporate anti-spam policy to be successful it must be enforced at the server level removing the need for client-side installs and end-user training. Not only does this ensure the most straightforward maintenance but also ensures the solution is as cost-effective as possible to deploy.
SPAM and virus adapt and change every day. Any system to detect and eliminate unsolicited email and virus must be kept up to date. Hexamail's software automatically updates itself over the Internet to ensure the latest SPAM and virus can be stopped.
Hexamail supports multiple sophisticated header, subject and content checks with configurable rules, keyword filtering and phrase matching lists that can be maintained by the administrator.
Hexamail features built in anti-phishing protection by recognizing spoofed email, web links and requests for account details.
Mark SPAM subject lines, delete SPAM over a specified match confidence or forward to user's spam folder, public folder or any other email account.
The administrator can optionally allow some or all users to review their own quarantined SPAM via a web based interface. Users are automatically alerted to new email arriving in their quarantine and can empty their quarantine with a single click from the alert email. Alternatively they can login to a secure web interface to selectively delete SPAM email and accept legitimate email.
The web based interface is fully customizable through the built in HTML template manager and editor.
Hexamail is dedicated to changing the way business software works: making it easy and productive to use. This reduces configuration mistakes and saves you time and money.
Filter outbound email and block or censor specific email or attachments to prevent corporate data loss.
Hexamail Guard Basic
Hexamail Guard Pro
Hexamail's server antispam filter eliminates the cost, time and frustration your workers spend on unsolicited email (junk/spam) by blocking the majority of spam email before they ever reach your mailserver. Hexamail's multilayered antispam filtering ensures the best of breed techniques are used to provide total protection from all email bourne threats including spam, malware, spoofing, phishing and virus. Automatic built in heuristics are combined with admin and user configurable rules and optional features such as greylisting and challenge response to allow you to tailor your spam solution to your exact needs. Unlike the majority of other antispam solutions, Hexamail is a server software solution that runs on your network so your email is never sent to the cloud or any third party servers for analysis. This ensures your privacy is guaranteed, eliminates any additional latency in receiving email and prevents your email being dependent on a third party service that can suffer downtime or hacking. Integrated analysis of outgoing email traffic ensures false positives are minimized by automatic allowlisting.
Highly automated accuracy with 99% elimination of spam virus and malware, automatic allowlist generation from outgoing email analysis
Only incoming email from the Internet or POP3 accounts are filtered. Customer outbound and internal email is not filtered
Suspect email are are quarantined or forwarded to an appropriate recipient
You maintain control of your own email systems without having to rely on third party servers or services
Unrivalled easy to use configuration through a remote administration interface
5 minute plug-in SMTP installation with no changes to DNS or MX records required
Highly optimized natively compiled code ensures the highest performance filtering and no email latency
Add security options to your existing email infrastructure to prevent open relay, dictionary harvest attacks
Privacy is guaranteed because email is never sent to the cloud for analysis
Automatic allow list generation from senders contacts and email message threads coupled with intelligent on-the-fly allow list detection. This ensures legitimate senders email do not get blocked by the SPAM blocker
Challenge-response features to allow senders to verify and have email automatically accepted and their address allowlisted
Temporarily fail connections from new IP, sender and recipient sets to effectively block spam software, and BotNets. Automatically allowlists your regular senders so that no delay is experienced for legitimate communications.
Dynamic Adaptive Honeypot. The Honeypot uses spam sent to chosen honeypot addresses to automatically generate adaptive intelligent agents, known as "bees". These identify and block similar spam. This provides realtime protection against new spam types, sender IPs, and specifically image spam.
Full Bayesian statistical pattern matching providing highly accurate (better than 99%) spam blocking with minimal false-positives (emails incorrectly marked as spam). Selectable pattern matching subcategories allowing bypass of pattern matching for specific types of spam, such as 'Money Making', 'Recruitment', 'Privacy', 'Competitions' etc. Multiple thresholds for pattern matching allowing marking, blocking or automatic deletion of identified spam. Email accepted or deleted from the quarantine is used to further the Bayesian matchign for future email.
Easy to use allow-list management facility allowing you to maintain lists of email addresses that you never want blocked. Users each have their own personal allow-lists and senders can be automatically allowlisted if a blocked email is released from the quarantine.
Full SPF (Sender Policy Framework/Sender ID) support and failure blocking. Helps prevent phishing attacks
Full DomainKeys Identified Mail (DKIM) support and failure blocking. Helps prevent phishing attacks
Full support for DNS-based URL checking of URLs within emails Built in SURBL support for DNS-based URL checking of URLs within emails
Block IP addresses from relay, sending inbound email. Whitelist IP addresses so that they are never blocked, or white list IPs for relay. Use DNS based databases to block known spam IP addresses
Full support for multiple configurable DNS based spam protection databases. Dial-Up User Lists (DULs), Real time Black hole Lists (RBLs), Spamhaus SBL, XBL and Relay Spam Stoppers (RSS) are all supported! Override to allow receipt from known good sender addresses
Spam quarantine with safe email viewer that doesn't trigger virus, worms, popups or other malicious code. The administrator can optionally allow users to review their own spam using a web-based quarantine view. Users and administrator can be automatically alerted when they have spam in the quarantine to review
Blocking based on strings, wildcards, word/phrase, regular expression matches in the email content or subject Configure different actions to perform for each expression matched.
Blocking based on strings, wildcards and phrase matches in the email sender address Elimination of emails with missing, undisclosed, invalid or suspect sender addresses Easy to use one-click sender blocking facility to allow direct blocks of unwanted newsletters or repeat offenders.
Blocking based on country of client IP Address. This allows weighting, blocking or deletion of email originating from specified countries.
Configurable automatic blocking of graphical or image-based emails. The system performs sophisticated checks on any attached or included images to identify image based spam and block it.
Hexamail automatically inspects PDF attachments for textual and image based spam and blocks if an attachment contains spam content
Hexamail automatically unpacks ZIP attachments, identifies malicious contained files and even reads the textual content to detect spam attachments
Configurable automatic blocking of emails with suspect MIME headers
Automatically block NDR Spam attacks by detecting NDRs from spoofed recipients, to false recipient addresses, or to nominated bad addresses.
Configurable automatic blocking of emails from suspect Mailer programs
Automatic text style and font analysis and blocking
Configurable automatic blocking of emails containing web bugs, inline framesets, popup windows etc.
Configurable automatic blocking of emails with dangerous or suspect attachments
Configurable automatic identification and blocking of emails with suspect recipient lists
Configurable automatic verification of replyto/sender
Configurable spam action options, including quarantine storage, subject line marking, forwarding, blocking and deletion
The POP3 reader module acts as a POP3 connector, automatically downloading emails from any configured POP3 or IMAP accounts on external servers, and reroutes the emails to any internal mailbox or other external email account.
Unify user email into corporate mailboxes
Spam filter and automate routing of all incoming email
Process all email for spam and virus whether from external accounts or to internal mailboxes
Highly efficient multiplexing communications used to download from many accounts simultaneously
Individually configurable download schedules with timetable to define when to use regular or limited download speeds
Supports SSL servers for both POP and IMAP including Gmail
Download schedules as short as 1 minute
Use IMAP IDLE PUSH notifications to instantly download new email as it arrives
User can configure their own accounts via a web interface or IIS
Modes to download all or only new email for each user
Catch-all and individual accounts supported
IMAP Support including configurable folders
Multi-domain catch-all accounts supported
Full Gmail Support including all hidden Gmail IMAP folders like [Gmail]/All
Sophisticated rerouting and readdressing options including subject, sender and recipient rerouting
Export email to files as text or MIME
Export attachments to files
Emails are routed through all processing modules, allowing for antivirus scanning, spam blocking, routing, alerting, responders and all other Hexamail features!
Retrieves messages from mailboxes located on any number of Internet Service Providers (ISP).
Check and download new messages as often as you require, with schedule interval resolution of 60 seconds.
Automatically delete, expire or retain the emails on your email account
SSL fully supported, allowed secure retrieval of emails from SSL compliant mailservers.
Configure how much bandwidth to use at various times of day
Support secure logon with APOP (Authenticated Post Office Protocol).
Retrieves messages from more than one mailbox at the same time. This ensures that mailboxes with large volumes of email do not hold up processing of other mailboxes.
Reroute to new recipients based on the original sender address
Reroute to new recipients based on the original subject line with wildcard matches
Allows forwarding of email to any other address, mailbox or corporate email server. Route email by domain to different servers or smarthosts
Instead of having to laboriously enforce corporate signatures in every email client in your organization, Hexamail Guard allows you to configure a corporate signature once and have it automatically added to all outgoing email. This helps prevent additional network traffic from redundant signatures on internal emails and ensures you can be confident that every external email will contain the required signature.
Automatically identifies all emails with missing signatures and disclaimers
Ensure every email has the appropriate company-wide signature/disclaimer/footer text present on leaving your organization
Configure signatures for each domain served
Automatic fuzzy-detection of existing signatures
Automatic insertion of disclaimers and signatures if missing, for HTML and text emails
Optional individual signatures for each domain or sub-domain served
Use HTML or plain text disclaimers
Support for images in signature HTML
The web interface module allows individual end-users to interact with the Hexamail service and perform operations such as configuring external email accounts to download, spam quarantine management, calendaring and contact management (depending on the product and modules enabled)
Adapts for any browser device such as Android smart phone, tablet or iPhone
Full SSL support is available
Optimized HTML ensures the bandwidth usage is minimal
Built in web interface does not require IIS or Apache
Ultra compact HTML pages ensure the fastest possible interface, making the Web Mail module one of the most usable web email clients available.
Optional bandwidth restrictions
IP address blocking and restrictions
Configurable port and host bindings to allow use in multi-NIC environments
Integrates with IIS if required.
The antivirus module automatically scans all incoming email attachments for virus, worms and trojans. If identified, the email can be marked so that the end user is aware of the infected content, blocked completely so that the end user cannot inadvertently execute a virus or a script, or the infected attachment can be removed and a comment added to the email to inform the user of the action taken. All processed emails can be optionally stored in a quarantine for later review, resend or deletion.
You can expect 100% detection of In-the-Wild viruses and Trojans from our embedded ClamAV scanning engine
The Antivirus engine automatically updates itself at regular intervals
Alert your administrator or senders to virus in emails
Block infected, dangerous, or forbidden attachments
Remove infected, dangerous, or forbidden attachments
Quarantine infected emails for later resend or deletion
The embedded antivirus engine features outstanding detection abilities together with high performance. You can expect 100% detection of In-the-Wild viruses, Trojans, malware and even office document macros.
Automatic updates are another key point in virus protection, both the virus database and the program itself can be updated automatically. The updates are incremental, and only new data is downloaded, thus ensuring updates are timely and efficient.
Allow alerts to senders of infected emails
Configurable response to sender with optional blocking reason
Hexamail Secure module provides a centralized automatic email security solution. It enables signing, verification, encryption, decryption using PKI X509 certificates and also Domain Keys Identified Mail (DKIM) functions on outbound email. PKI certificates are easily managed and multiple security policy rules can be setup to dictate which email is signed, encrypted, decrypted and verified. Email security failures can be quarantined for administrator inspection. DKIM is used to sign email from your domain so that the recipient knows that they have not been spoofed. Hexamail helps you manage your DKIM signing public/private key pairs and the required DNS entries for DKIM.
Removes the ability of malicious parties to spoof email from your domain using Domain Keys Identified Mail (DKIM)
DKIM ensures improved delivery rates of email to many domains such as Yahoo, Gmail, AOL
Email encryption with PKI (SMIME) allows for end to end email security on Blackberry, Android and iPhone devices and desktop email clients. This prevents email interception
All incoming email can automatically be verified ensuring your users can have peace of mind when receiving signed email
Enable the secure module, install any required email certificates and the deployment is complete!
Removes the complexity of encrypted and signed email from the users and allows the company to specify central security policies
PKI SMIME signing allows all your outbound email to be securely signed using PKI email signing certificates (X509)
PKI SMIME verification allows you to configure central policies for email signature verification for inbound email Automatically quarantine email that fails verification, as it may be spoofed.
PKI SMIME encryption allows you to encrypt outbound email using centrally managed policies and certificates
PKI SMIME decryption allows you to configure a single central policy to automatically decrypt inbound email
DKIM signing allows Domain Keys Identified Mail signatures to be automatically added to all outbound email from your server. These signatures guarantee to the next server that the email has not been tampered with and when combined with Author Domain Signing Practices guarantees that the message originates from your email domains
Hexamail automatically creates the required crytopgraphic public/private key pairs required for DKIM signing. The private key is held securely on your server
DKIM allows for multiple different selectors (or key pairs) to be used for signing. Hexamail manages these and automatically signs email with the appropriate selector
The Secure module automatically generates the DNS entries required for the DKIM signature verification process, allowing recipient servers to verify your email signatures. Simply cut and paste the generated DKIM DNS entries into your DNS management interface as a TXT record
Author Domain Signing Practices ensure that only signed email from your domain be accepted by recipient servers, allowing them to reject spoofed or modified email
Incoming emails can place a huge burden on the nominated recipient. Often several email addresses are provided publicly for information, questions and other telemarketing activities. More often than not emails arrive to all addresses about a diversity of subjects, with little relationship between the email address and the subject matter. For example, a company-wide email address such as email@example.com will receive speculative employment queries, requests for information, invitations to tender, unsolicited junk mail, technical support questions etc. etc. Having a single nominated recipient quickly results in the recipient becoming over-burdened with email. Studies show that having multiple recipients results in no one giving the incoming message stream the required attention. The solution? Intelligently route each incoming mail based on the nature of the subject, content, and any attachment to the most suitable respondent recipient. Routing uses rules concerning the subject line, contents, and previous message chain to ensure that the correct recipient is initially identified and then continues the correspondence when required.
Ensure incoming emails go to the right person immediately
Automatically detect the language of incoming emails and reroute
Schedule routes depending on the day of week or date
Bounce email by rules/phrases
Redirect email to another address
Automatic language detection and rerouting for each language
Support for Chinese, Czech, Danish, Dutch, English, Finnish, French, German, Hungarian, Icelandic, Italian, Norwegian, Polish, Portuguese, Spanish, Swedish, and Turkish
Route email by rules
Route email email by subject phrases
Route email email by content phrases
Route email email by sending IP address
Route email email by attachment types
Route email email by MIME headers
Redirect group email
Route email based on date
Route email based on day of week and time of day
Route email based on size
Hexamail Archiver module provides is a centralized automatic email archiving solution. Highly efficient full-text indexing and compression algorithms ensure that the most scalable and high performance email archive is generated entirely automatically from all of your email. Hexamail's email archive software leverages state of the art indexing and compression technology to create the most compact and high performance index of email data. Inferior solutions often simply push emails to relational databases or worse, file systems. Such systems suffer from poor scalability, lengthy query/discovery times and extremely high storage requirements: often requiring more space for the archive than the original emails!
Store 100% of your email in full original MIME format
Use the live search facilities to allow users to access their old email
Store many years of email in a single server
Unique MIME compression algorithms ensure most compact storage
Full text queries provide relevant retrieval
Enable SSL archive web interface for maximum security
Native high-performance C++ archiving code ensures that emails are archived and indexed in realtime. The unsurpassed performance allows the archive to be used live by end-users to retrieve old, deleted, or difficult to find emails from a web-interface.
Archiving of 100s of millions of emails in a single archiver is possible, allowing many years of emails to be archived on a single server or drive.
All email content (MIME) is retained compressed, allowing accurate records to be retained while minimizing storage. Emails are automatically deduplicated. Save costs of storages devices, upgrading servers and backup time and facilities.
Full-text indexing automatically takes place on archiving. This allows your valuable resource of archived emails to be leveraged for knowledge management, auditing and discovery within your organization.
Some inferior archiving solutions simply push email content into a relational database. This can be costly in database licenses, slow to retrieve email and extremely demanding of disk space and other machine resources. Be sure to check the licensing implications and costs of such systems before purchase. Hexamail is a complete solution requiring no third party database licenses.
Archiving takes place on your servers, within your network. Sensitive emails need never leave your organization, eliminating trust, hacking, or security breach concerns typical of third party service based archive solutions providers.
Active Directory integration allows automatic import of your users and restriction of their access to only their emails
Full secure SSL access to web based knowledge management, discovery and search interfaces.
The Archiver module can index email from almost any source including Exchange, maildir, mbox, hMail, iMail, MDaemon, Hexamail, POP3, SMTP, and PST
Index email directly from Exchange 2000 onwards
Index any PST files from Outlook clients or Exchange server
Content can be retained for periods matching typical regulatory requirements such as Sarbanes Oxley, European Union ISP Communications Data retention, SEC Rules, NASD, HIPAA and Graham-Leach-Bliley Act.
Full MIME storage ensures your chosen email archive solution adheres to all regulations now and in future. Regulations such as Sarbanes-Oxley can be costly to implement, Hexamail Vault eliminates the cost for archiving email in a compliant way.
A unique index design allows email content to be backed up and removed from the live server to secure/offsite backup facilities. The fulltext index remembers which emails were in which backup files and allows fulltext search even over email removed from the server.
Automated export features allow all email matching specific complex criteria to be exported to directories or zip files for litigation or auditing purposes.
Full-text indexing automatically takes place on archiving. This allows your valuable resource of archived emails to be leveraged for knowledge management, auditing and discovery within your organization.
Live-access allows your end-users to access the archive through a web-interface and retrieve email they may have deleted or lost in their inbox. This simultaneously ensure valuable knowledge is never lost from your organization, can be quickly retrieved, and users reduces user inbox storage requirements.
Redelivery or historical email to selected recipients allows verbatim copies of emails to be retrieved and redelivered in a single click.
Users can run their own audit and generate folders or zip files of vital emails for meetings, storage offsite or presentation to management.
Administrators can restrict access to discovery features to specific users or areas of discovery
The responder allows automatic out-of-office responders to be set up for nominated email accounts. These responders include automatic scheduling to allow the responder to be set up in advance and engage/ disengage automatically on the required dates or schedule.
Automatically schedule responders to enable/disable
HTML support in response email
Configure sophisticated rules to dictate response sent
Automatic scheduling of responders
Sophisticated rules processing to determine when to respond and response to send
Support for HTML and plain text responders.
Support for images in response HTML
The developer module allows full access and control of all Hexamail modules using an API based on REST json and XML. This ensures support for the widest variety of scripting and programming languages.
Develop custom apps that leverage your email and collaboration data
Fastest possible REST server ensures highly usable low bandwidth API access
Restrict access to specific IPs and ports to prevent unauthorized access.
Full support for all configuration parameters to control every aspect of Hexamail
Full support for all stored email such as junk, errors and sent items
Full support for accounts and user data including signatures, external accounts
Access and manage all mailbox data, including management of email and folders
Access and manage contacts stored in the mailbox module
Access and manage tasks, events, notes stored in the calender module
Fully REST compliant
XML or JSON results format options
The reports module provides fully-automatic scheduled reporting of any statistics.
Each report can be fully configured to your requirements
Scheduling allows report publication on any time period
Archiving of reports uses compression to minimize disk usage and allow for longer term archives
Standard HTML publication allows easy viewing and printing
Reports can be exported into standard HTML
Full-color graphs are used in the reports to ensure the clarity of vital information
The IMAP Push module allows email to be uploaded to an IMAP server based on configurable rules.
Migrate IMAP email from one IMAP account to another
Automatically move email from one folder to another based on rules
Archive email from your email accounts to another IMAP account
Highly efficient multiplexing communications used to upload to many accounts simultaneously
Individually configurable IMAP accounts
Supports SSL IMAP servers
Remap IMAP folders on upload
Selectively push email based on recipient addresses
IDLE support for efficient push of multiple email to the same account
The attachment module automatically archives attachments from all email. It also optionally removes the attachment and replaces it with a link allowing the attachment to be served more efficiently from a webserver. This prevents users having to download attachments they don't need or wish to refer to later. Attachments are automatically deduplicated if sent to multiple recipients: you only need store one copy of each file received or sent!
You can view and control attachments using powerful queries. This allows you to remove any attachments accidentally sent to external recipients, or dangerous or time-wasting attachments sent to your internal users.
Mail servers often store file attachments extremely inefficiently, wasting over 25-30% more space than is required for the attachment itself. The attachment module reduces the disk resources required by up to 50% by using compression
Attachments are stored as files or compressed files directly in a filesystem, allowing any normal backup system to be used to backup the attachment store.
Email clients no longer need to download the attachment data when checking email - the attachment can be downloaded when required
Store all attachments in a central file store
Automatic compression of non compressed attachment types
Automatic deduplication and instancing of replicated attachment files, offering MASSIVE storage and processing savings on your mailserver
Customizable attachment replacement links
Powerful attachment store query tool
Resend and export attachments
The Group Distribution module allows powerful group forwarding features, allowing email discussion groups to be setup, including closed, internal and public groups. Sophisticated rules allow you to determine who can and can't send to a group, what sort of content they can send (for example, you may wish to prevent large attachments going to a mobile sales force on dial-up).
Internal Groups that only internal users can email to
Automatic Group resolution to prevent group feedback and autoresponders to groups
Closed Groups that only group members can email to
Send to group based on phrases or wildcards in the contents
Send to group based on phrases or wildcards in the subject line
Automatic identification of group emails
Outgoing lists and groups also supported, with address hiding
External group responses rerouted to original sender
Message size restrictions
Group distribution address hiding
Attachment size and type restrictions
Autoresponse to group elimination
Email subscribe requests
Automatic group signature
Support for Newsletter format
Moderator controlled groups
Internal/Closed group postings can be moderated
Automatic discussion archiving
Automatic message digests
Do you know what kind of information is leaving your company by email? While many organizations have strict physical security and diligent gatekeepers guarding against physical theft or unauthorized removal of materials, their electronic gatehouse is nonexistent. The alerter allows you to alert specified users to various types of email passing through the guard layer.
Alert a product manager to unauthorized emails divulging information about a new product code, name or features.
Alert the CFO to financial figures being distributed to outside parties.
Alert customer centre line managers to the use of swearing or offensive content in emails to customers.
Alert customer centre line managers to unduly long conversations or discussions with customers that may require escalation.
Alert the development team managers to unauthorized code, executables, or documentation leaving your company by email.
Alert manages to incoming offensive material or email-time-wasting.
Alert administrators to incoming or outgoing executables, scripts or other potentially dangerous files in and out of the organization.
Alert administrators to emails being sent at incongruous times of day.
Alerting allows offending emails to be routed to a named recipient, then authorized and sent on intact and untampered with.
Standard rule types for common usage: Offensive Material, Potential Virus, Lengthy Discussion, etc. Entirely configurable rules engine allowing administrator controlled rules to trap almost any type of email.
Virtually unlimited number of rules, and alert recipients.
High-performance rules engine ensures low-latency filtering of email traffic both incoming and outgoing.
Automatically add advertisements and marketing inserts to the footer of all outgoing emails. Create and manage mini-email marketing campaigns to get to every eyeball that sees an email from your company!
Reach your customers and partners with your marketing message on every outgoing email
Coordinate email footers and marketing inserts from a central point
Configurable email marketing inserts
Automatic fuzzy detection of existing marketing insert
Override or disable for specific domains
Automatic conversion of HTML to text inserts when required
Loose talk costs money. A poor choice of words in an outgoing email with or without appropriate disclaimers can be a costly business today. Hexamail Guard allows the censoring or offensive or inappropriate words from all outgoing (and optionally incoming) emails, ensuring that your corporate voice is as clean and virtuous as your reputation.
Ensure all outgoing emails don't offend your customers and partners
You control the obscenity lists
Optionally turn off censoring for specific white listed users
Hiding of obscene/forbidden phrases/words/wildcards in the content
Hiding of obscene/forbidden phrases/words/wildcards in the subject line
Configurable hide string, e.g. ****** or !CENSORED!
Configurable white list of users address matches to bypass the censoring
Support for emails attached to emails
Configurable mark string to optionally alert recipient the email has been censored
Option to block obscene emails
Option to forward obscene emails to nominated address or the administrator
Censored emails stored for later archiving/forwarding/sending or removal
Automatic alert when censored store reaches configurable size
In some instances it is desirable to prevent emails to or from certain sources or destination companies. For example, perhaps you wish to ensure that no emails from recruitment agencies or ex-employees reach your staff, or prevent all outgoing emails to a competitor. In other situations it is the contents of the email that requires blocking. This can often be outgoing or incoming offensive material, such as pornography, swearing, or other undesirable material. Blocking works in concert with alerting to ensure that emails can be systematically blocked, stored and a nominated party alerted to the incidence of the blocked email.
Protect your company's reputation from unauthorized emails going out to important customers
Secure your company from malicious emails from ex-employees
Alert your company to unauthorized distribution of information to external parties
Block dangerous or forbidden attachments
Remove dangerous or forbidden attachments
Alert Admin when blocking emails
Alert admin if blocked email store reaches a configurable size
Allow return to sender of blocked emails
Configurable response to sender with optional blocking reason
Forward blocked emails to nominated account
Override block if containing specific content phrases or wildcards
Block if containing specific content phrases or wildcards
Block if missing specific content phrases, allowing a form of send password in the content
Configurable sender address white lists
Configurable sender address block lists
Configurable sender name block lists
Configurable recipient block lists
Block if too many recipients
Block undisclosed sender emails
Block undisclosed recipient emails
Block by white list of allowed IP
Block by disallowed IP
Block based on email size
Store blocked email for later inspection/archiving or resending
Blocked email store maintenance interface and send on options
Block if contains phrases or wildcards in the content
Block if contains phrases or wildcards in the subject line
Block if missing specific subject phrases, allowing a form of send password in the subject line
Block emails with attachments of specific types
Remove specific attachment types, e.g. worms, virus and other malicious types