ZYXEL LIC-CES Cloud Email Security 5
You have to log in to shop/see prices.
|
|
ZYXEL LIC-CES Cloud Email Security 5
|
Description
Specifications
A cloud-based service designed to protect organizations from spam, malware, and phishing while ensuring uninterrupted email communications. Zyxel Cloud Email Security (CES) provides worry-free email communication for your SMB with the best threat catch rates in the industry and “SaaS simple” administration.
Email Protection for Your Company
To achieve the highest possible level of protection, Zyxel combines multiple detection technologies that together, offers an optimum threat protection.
Anti-Malware
Industry-leading protection against “zero hour” outbreaks and known viruses, worms, and trojans sent through email. New malwares are identified immediately when it first appears.
Anti-Phishing
Users have continuous, instant protection against compromises of their corporate accounts by hijacked websites, “zero-hour” phishing attacks, and fake URLs masquerading as legitimate websites.
Anti-Spam
CES anti-spam capabilities offer filtering and email categorization based on ‘fingerprint’ comparisons, enabling precise differentiation between unwanted spam and legitimate bulk emails such as newsletters.
Threat Intelligence Powers The Email Security
Being a cloud service, security will always be up to date. Zyxel CES operates a comprehensive, cloud-based security threat intelligence network that processes over 25 billion daily transactions and blocks up to 300 million threats per day on security cloud platform.
Same Email Infrastructure with More Safety
Zyxel’s Cloud Email Security allows you to keep existing infrastructure with zero maintenance. It is easy to reduce management overhead and eliminate IT admin resources usage, all while increasing productivity and lowering operational costs.
Respond Faster with Web Management
Zyxel’s Cloud Email Security provides complete management dashboard for IT admins to easily monitor and manage with real-time logging and reporting analysis of user and mailbox behaviors to identify anomalies that point to a possible threat.
| License quantity | 5 license(s) |
| Software type | License |
| Edition type | Standard |
| License term in months | 3 month(s) |
Please note that although care has been taken in the degree of relevancy, pictures are for
display purposes only, and product appearance may differ from what you see. If there are any
discrepancies between the product headline, description and picture, the correct information
will be in the product headline (i.e. computer systems may not come with monitors even if
pictured that way). If anything is unclear, please email support before placing your order.