Most of our customers are small-to-medium businesses with limited IT budgets across a variety of industries – including healthcare, education, manufacturing, and government. Having a limited IT budget often means having limited staff available for troubleshooting email or tracking down messages, so when considering which email gateway/spam filter you want for your business, one of the main criteria to consider is how easy it is to find messages for your users. Users who are expecting business-critical messages need to know ASAP what happened if that message is not delivered. With Security Gateway, it’s easy to find out if a message was rejected, quarantined or delivered. If it was rejected or quarantined, color-coded transcripts make it easy to determine exactly why the message was not delivered.
Never Lose an Important Email: How to Track Messages in Security Gateway
By Brad Wyro posted in Email Gateway How-To, Email How To, Security Gateway for Email, Tutorial
MDaemon Technologies Announces New Email Security Gateway Services in the Cloud
By Brad Wyro posted in Product Updates, Security Gateway for Email
The latest version of Security Gateway for Email Servers includes new cloud services, expanded Data Leak Prevention rules and integrated archiving features to help companies affordably protect user email.
Alt-N Technologies is Renamed MDaemon Technologies
By Brad Wyro posted in MDaemon Email Server, Security Gateway for Email, Email Server, Email Security Trends
New Name to Leverage Global Brand Equity of Company’s Flagship Email Server
Grapevine, TX (USA) – January 2, 2018 – Alt-N Technologies announced today that, effective immediately, the Company’s legal name will be MDaemon Technologies, and that it will begin doing business under the new company name.
How to Deal with Spam in SecurityGateway
By Brad Wyro posted in Security Gateway for Email, Stop Spam Email
SecurityGateway is a powerful email spam & malware filter & gateway that can be used to protect any type of mail server. It offers a layered approach to security, with protection features including data leak prevention, attachment filtering, heuristic and Bayesian analysis, zero-hour Outbreak Protection, and much more.