Audience

Network security solution for companies

About Cybowall

Every business needs an intelligent, real-time solution to repel malware and other advanced threats on your network. Mail Secure seamlessly integrates with existing email servers, like Office 365, to provide necessary protection from malicious and inadvertent email-borne threats. Whether installed on local hardware or a virtual platform, Mail Secure neutralizes advanced threats with a multi-layer anti-spam and anti-virus system, enforced user-defined policy controls, automated virus updates and add-on a-la-carte solution modules. Intercepts attachments in real-time for additional threat analysis in a behavioral sandbox. Enables centralized management of email traffic, quarantine logs and reporting.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Cybonet
Founded: 2002
Israel
www.cybonet.com

Videos and Screen Captures

Cybowall Screenshot 1
Other Useful Business Software
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now

Product Details

Platforms Supported
Cloud
Training
Documentation
Support
Phone Support
Online

Cybowall Frequently Asked Questions

Q: What kinds of users and organization types does Cybowall work with?
Q: What languages does Cybowall support in their product?
Q: What kind of support options does Cybowall offer?
Q: What type of training does Cybowall provide?

Cybowall Product Features

IT Security

Event Tracking
Intrusion Detection System
Vulnerability Scanning
Anti Spam
Anti Virus
Email Attachment Protection
IP Protection
Internet Usage Monitoring
Spyware Removal
Two-Factor Authentication
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN
Vulnerability Scanning
Threat Response
Analytics / Reporting
Compliance Reporting