Here are just some of the benefits:
- A brandable cloud platform for the rapid, on-demand configuration and management of your customers
- Integration into the leading PSA and RMM solutions channel vendor ecosystem, including Autotask, ConnectWise, AVG Managed Workplace, LabTech, and CentraStage
- 100% channel
- No setup charges, minimums or commitments — just a basic monthly subscription charge per user
- High-quality, in-house technical support via phone, email and live chat — you’ll speak with someone who thoroughly understands the product
- Compliance training to help transition your business from trusted IT advisor to a provider of compliance-supporting technology (virtual CIO)
- Joint webinars leverage our expertise, providing educational opportunities for your customers and prospects
It makes no difference if a client wants allow lists, block lists, challenge-response, simple filtering, email archiving, email continuity, email encryption or any combination of services: This solution’s provides the platform to respond to their desires while delivering exceptional value to solution providers by lowering costs, increasing revenues, and improving operational efficiencies.
- Total Control Email Security
- Archiving, Discovery and Recovery
- Email Encryption Services
- Email Continuity Services
Endless configurations for solution providers. Easy to use for customers.
This Solution’s antispam and email security service provides the configurability that IT solution providers need to address a wide range of customer requirements, with the automation and simplicity that end users love.
- Blocks spam, viruses and volume-based attacks before they reach the corporate network
- Address-on-the-Fly™ technology preserves the integrity of one’s primary email address and identifies address-sharing and the sources of spam
- Automatic inbound email queuing assures email continuity in the event of a local server outage
- Outbound email filtering protects one’s reputation and helps to avoid IP address blacklisting
There are three main points:
- RTC provides many different layers of protection for defense-in-depth of one’s inbox.
- The service is uniquely configurable, providing the versatility that email administrators and solution providers need to address the widest range of end-user requirements. Mail for a specific user will only be subjected to the tests dictated by their configuration (or if one is not specified, by the default enterprise configuration).
- The architecture is extensible so that new defenses can be added as they become available or desirable.
A wide range of capabilities and blended defense provide maximum user control.
Email users often have a favorite method of dealing with unwanted content and senders. Some people like the precision of allow/block lists to authorize or block specific senders or domains (often called “whitelisting” and “blacklisting”); others prefer the simplicity of content filtering; still others like the added effectiveness of challenge-response methods.
A similar range of preferences exists for handling the messages classified as spam. Some users want a daily email summary of blocked email; others want to examine their spam quarantine folder directly; still others may choose to divert their daily quarantine summary to an assistant for checking. Some may not want to be bothered with checking spam folders at all, and elect to have any offending mail vaporized.
This Solution’s service has the versatility to accommodate all of these preferences, and more. Importantly, capabilities can be blended to provide more effective protection than can be achieved by using any one technique independently. In particular, customer experience shows that by combining content-independent techniques with content-based filtering techniques, This Solution’s yields dramatic improvements in user control over inbox access.
Address-on-the-Fly™ protects the user’s primary address.
Address-on-the-Fly™ (AOTF) provides users with a unique, liberating capability for disclosing email aliases as alternatives to their primary address. Its simple implementation does not require any user interaction with the service, and it spares the use of one’s primary address from public or uncontrolled disclosures that may result in new sources of spam. All AOTFs automatically resolve to the user’s single inbox.
This popular feature provides an effective means of controlling inbox access, blocking spam, making phishing attacks immediately evident, and preserving the long-term integrity of the user’s primary email address.
Savvy email users have long recognized the value of using multiple email addresses, and general awareness is growing. In fact, many consumers now employ multiple addresses, albeit by maintaining separate email accounts. AOTF brings the power of this technique to a single inbox in a fully automated fashion.
An in-message control panel informs and empowers the user.
This Solution’s unique in-message control panel provides a simple and intuitive means for bi-directional communication between the user and the service, presenting the user with message-specific options for controlling inbox access.
This Solution’s uses the control panel to identify the envelope To: address in order to bring out information about the message. For example, a message recipient can see when one party has shared the recipient’s address with another party. This Solution’s users employ the control panel to communicate with the service, amending their access policies for specific senders and addresses.
Experience confirms that users find the control panel to be simple, helpful, and effective. It’s easy for users to understand, the choices are intuitive, and most of all, users like the ability to take concrete, immediate action to squash a spammer.
Some users also employ the control panel as a safe alternative to the unsubscribe function in many emails, which some people no longer trust out of fear that it merely confirms a valid address and alerts a spammer to a “live” recipient.
Control panels are available in English, Spanish, French, German, Brazilian Portuguese, Dutch, Italian and Chinese, with Russian and Hebrew on the way.
Outbound email auditing helps protect one’s brand and avoid email disruptions.
No legitimate correspondent or domain owner ever wants to be in the position of inadvertently sending out spam and viruses. It’s not only embarrassing, but can damage one’s reputation or brand. It can also lead to severe operational disruptions if one’s email server gets “blacklisted,” as this dreaded outcome prevents the delivery of all mail, good and bad, to all recipients at domains that utilize the specific blacklist to preemptively block senders deemed to be abusive or careless. This can be especially bad for Internet Service Providers (ISPs), as a blacklisted server affects all domains supported by that server, whether responsible for the outgoing spam or not.
This Solution’s Outbound Mail Auditing (ROMA) addresses these serious concerns by inspecting outbound messages using pattern matching, statistical heuristics, and fingerprint filtering and scanning techniques. As outbound mail is received by This Solution’s servers, each message is passed through a series of checks to determine conformance with message size and volume limits, to identify message type (for example, to isolate bounce messages to avoid “blowback spam”), and to scan for spam and viruses.
Each outbound message is then routed according to its categorization. For example, policy-offending or suspicious mail is placed in a quarantine queue, while non-delivery receipts are routed through a server that is dedicated to such traffic. If that server becomes blacklisted, it won’t jeopardize one’s operations. Messages found to be spam or to contain viruses are also placed in the quarantine.
When a message fails a security or policy check, the network administrator is automatically alerted to the offending or suspicious content. These alerts specify the reason for placing the message in the quarantine; for instance, because the message content exceeded a size or “spamminess” threshold set by the originating domain, or it contained a virus, or the volume of mail from the specific sender exceeded a specified message-rate-over-time threshold.
These alerts can be customized as appropriate for one’s specific policies. From these alerts, administrators can take several actions, such as releasing a specific message for delivery, vaporizing the message, or logging into the This Solution’s administration console to dispatch multiple messages. In addition to alerting, This Solution’s provides an optional branded bounce notification to the end user to inform them of a violation of policy, or in the case of an ISP, of a contractual stipulation, such as a limit on the amount of email that can be sent during a 30-day trial period.
ROMA provides the capability to implement rate limiting for individual users, blended with content and domain filtering, and controlled through a user interface. For example, if a user sends 20,000 messages in a specified time period, x% of which exceed a pre-set content-scoring threshold, This Solution’s will queue those message as suspicious and send an automated alert to the email administrator or ISP for review. This Solution’s will also profile the standard email usage patterns of individual users and compile a report. This report can help to identify suspicious senders or zombie PCs so that remediation can begin, or so that an ISP can take necessary steps such as contacting and/or canceling the customer in order to avoid any damage to its IP addresses.
Rapid message retrieval. Comprehensive search scours attachments for keywords.
Archiving, Discovery and Recovery (RADAR) is a hosted email archiving service that operates in conjunction with your existing email infrastructure to ensure the protection, preservation and continuous operation of email communication for your business while providing on-demand email access for users anytime, anywhere.
Today, email is the core business communication channel. Since its inception, email has evolved from a simple intra-office messaging tool to the information and communication backbone of companies of all sizes.
As reliance on email grows, so does the need to ensure its operation as a communication tool and to preserve the information it contains. Excessive data loads, the constant pounding of spam and viruses, unplanned service interruptions, and ad-hoc needs to find pertinent information within the flood of content presents constant challenges for business owners.
RADAR solves these problems. It can be deployed for any size business to ensure that electronic communication is automatically preserved for intelligent discovery, rapid recovery and continuous access from any location.
The structure of email, its constant use by staff and its dual purpose as a communications tool and information repository demand that its retention be managed more dynamically than regular files and folders. This is accomplished through active archiving.
RADAR’s active archiving automatically stores a copy of all incoming, outgoing and internal email in a secure, encrypted repository indefinitely.
eDiscovery refers to the process of finding email in the active archive. RADAR provides a unique set of eDiscovery tools that empower users to perform multiple levels of live search for any email or attachment within the archive.
RADAR’s proprietary DeepLink™ discovery engine enables users to easily locate related emails and attachments from their mailbox archives. Authorized users are permitted to search across the enterprise.
Using RADAR’s online user interface, users can instantly recover any email or attachment from the active archive into their desktop inbox without assistance from IT.
RADAR’s unique “click and pick” data-packaging tools allow the recovery of email and attachments to be fully customized by the user. In the event of a catastrophic failure, a full mailbox restore is available to users for complete disaster recovery.
As a hosted cloud service, RADAR provides continuous on-demand access to email from any location. In the event of any internal network or server outages, users can access the secure RADAR servers via any browser or email client and continue communication via email without any downtime, mail queuing or sender “bounce-back” messages.
In addition to complete mobility and 24×7 email accessibility, RADAR enables email users to access ALL messages and attachments within the active archive — not just the email residing on the in-house mail server. Employees are not constrained by local configuration requirements or network access availability, as they are simply sending and receiving email securely within RADAR via an encrypted SSL internet connection.
As a hosted service, RADAR operates transparently “in the cloud,” automatically saving incoming, outgoing and internal email. Importantly, this does not require any additional hardware, client-side software or IT support. Email availability becomes like electricity availability: it’s just there. But it’s even better because if your local power goes out, you can still reach your email from another location.
This Solution’s servers are located in class-A datacenters that leverage the most modern storage software and infrastructure to provide our customers with superior email availability and redundancy.
Affordable encryption to ensure privacy and meet regulatory compliance requirements.
With an increase in regulatory pressures, identity theft, and highly publicized security breaches in the media, companies that do not encrypt emails containing sensitive information are at risk of regulatory fines, lawsuits, negative PR and a loss of company intellectual property.
Companies dependent on building a relationship of trust with their customers and business partners cannot afford to risk such potential damages to their brand images. Email encryption is therefore an important piece of the security puzzle: it protects your company, your customers and business partners. The question then becomes how to implement this critical business process.
Protect your customers and yourself by encrypting sensitive email with RTCEncrypt. Now you can easily ensure privacy and meet regulatory compliance requirements with cost effective email encryption.
Messages are encrypted in one of three ways:
Force Phrase Keyword
The user simply adds a predetermined encryption phrase to the subject of the email. For example, any messages with “Secure” in the subject line will be encrypted.
Encryption Policy Tripping
Administrators can configure encryption policies to automatically detect the presence of personally identifiable information such as social security numbers. When such information is detected in the body of an email message, that message will be encrypted.
Mark as Confidential
And finally, Outlook users can simply mark a message as confidential in the Options > More Options menu of any email message.
Anyone who receives an encrypted email will be directed to the secure message portal, where the message can be retrieved. There is a one-time account setup for recipients; once an account has been created, messages can be read and replied to. Past messages will remain available inside the secure message portal as long as they haven’t expired or been deleted.
The Power of the Network
This unmatched approach to email encryption is accomplished via customers enrolling in the Directory, a global encryption key repository with almost 30 million members, and growing at over 100,000 new members per week.
Customers eliminate the need to build their own directories of encryption keys and instead leverage the hosted and shared secure network, which includes:
- The U.S. Federal Banking Regulators and the SEC
- More than 1,200 financial institutions
- 20 state banking regulators
- More than 1,000 U.S. hospitals
- More than 30 Blue Cross Blue Shield institutions
- Three out of the five largest U.S. health insurance companies
Policy-Based Email Encryption
This Solution’s email encryption service offers the ability for a company to encrypt outbound emails based on content, sender, and recipient.
Features for senders include:
- Centralized, policy-based email encryption for regulatory compliance
- Automatic retrieval and distribution of public encryption keys, enabling transparent email encryption between all encryption customers
- Automated content scanning of messages and attachments, providing transparent encryption for senders
- Ability to encrypt, reroute or block emails based on company policy
- “Push” recipient delivery method: sending an encrypted email directly to a recipient’s inbox enables secure read, reply and forward capability
The secure message portal for recipients includes:
- “Pull” recipient delivery method, including custom branding based on your company’s needs
- Hosted and maintained in SysTrust-certified and SAS-70 type II accredited data centers
- Encrypted read, reply and save capabilities for recipients
- Secured compose capability for your business partners, customers, members, patients and others
- Unique support for smartphones and tablets
The full content scanning of messages and attachments enables companies to comply with industry regulations with the help of predefined lexicons that automatically encrypt, reroute, or block email messages containing financial (GLBA), healthcare (HIPAA), PHI, PII and profanity content. A company’s sender can also trigger an email to be encrypted as well as encrypting all emails destined for specific recipient email domains and email addresses.
Email queuing for server outages with automatic unloading once you’re back online.
For many companies, email is mission-critical. As the primary communications tool, server crashes can paralyze a business.
This Solution’s email continuity services allow end users to access their email and continue with business operations during an outage. As a major piece of a company’s disaster recovery plan, our continuity services allow customers to send and receive email using any active Internet connection, including mobile connections.
Email continuity provides for send and receive capability and continuous on-demand access to email from any location. Email is stored for 60 days regardless of the status of the customer’s mail server.
If a customer mistakenly deletes an email message they need, they’re able to retrieve past messages and attachments that have been sent or received within the past 60 days.
Find the messages you need, fast. This Solution’s proprietary DeepLink™ discovery engine enables users to easily locate related emails and attachments from their mailbox archives. Authorized users are permitted to search across the enterprise.
In addition to complete mobility and 24/7 email accessibility, This Solution’s Email Continuity enables users to access the past 60 days of email and attachments within an active archive. Employees are not constrained by local configuration requirements or network access availability. Sending and receiving email happens securely via an encrypted SSL Internet connection, and there’s full integration into Microsoft’s Outlook email client.