Want help with your product upgrades? Upgrades made easy

Protection against email exploits and Trojans

Protect your company from attacks that target vulnerabilities which can use email as a threat vector, and malicious email-based Trojan executables.

GFI's email exploit engine builds on our research into email exploits, safeguarding you from attacks that specifically target vulnerabilities that can use email as a threat vector. This technology is specifically built to protect against email-based attacks, unlike various email protection technologies on the market that were originally built to protect against file-based or other endpoint based attacks.

The GFI MailEssentials Trojan and executable scanner detects unknown malicious executables by analyzing what they do. A Trojan is a computer program which offers some functionality that might be useful to a user, while performing other malicious actions under the hood. For example, granting an attacker unrestricted access to data. The scanner uses built-in intelligence to rate the risk level by disassembling the executable, detecting what it might do and comparing its actions to a database of malicious actions.The scanner then quarantines any executables that perform suspicious actions for example making network connections or accessing the address book.

Protection against email exploits and Trojans

Previous feature  |  Next feature