Modern malicious programs or malware, include viruses, worms, Trojans and spyware are most common way for attack through e-mail.

Most common email threats:
The most common threats are classic spam attacks, spam with infected attachments or malicious links, as well as phishing, through them can attackers tried to get the user's sensitive information and passwords through fake websites or other methods.
A common method is a targeted form of phishing, focused at specific people with access to the most valuable data and information. This attacks are designed to theft of personal identity or to gain control over the computer. With this accessibility obtain attacker way to attack company network.
Directory Harvest Attack (DHA), used to get e-mail addresses through massive waves of e-mails with common names that spammers detect functional and vulnerable e-mails.
The potential damage caused by these threats cause a reduction in employee productivity and can easily escalate into serious problems, such as data leakage, financial loss, misuse customer information or damage the reputation of the company.
Many times it is just employee of the weakest element in the security policy of the company and therefore comany protect data from misuse or theft of data (DLP) via e-mail is very important.
Our solutions are designed not only for early detection of mentioned attacks, but mainly to prevent and stop before attack start or data theft ever could be realized.
Solutions from vendors WEBSENSE, TRENDMICRO and FORTINET are included:
AntiMalware ,Antivirus , Antispam, AntiPhishing, AntiSpyware, DLP, mobile DLP, Secure Email Delivery, Email archiving, File Sandboxing, Email Encryption, IM security, Image analyzis , reporting a many other functionalities.

More solutions


Mobile security represents growing security area, its growth caused primarily by the growth in sales of mobile devices (smartphones, tablets, notebooks) and existence of BYOD.

Read more


Solution Cluster-in-a-Box is a pre-configured and pre-installed IT environment with high availability for small and medium sized businesses in a single cabinet.

Read more


Read more


Watching the computer network is composed of two main parts. Monitoring service and Data analysis.

Read more