Spambrella includes classifiers that categorize email and enable granular dispositions on those categories such as graymail “bulk mail” (e.g. newsletters, opt-in emails, etc.). Unlike Office 365 and Google’s approach to spam detection, Spambrella does not treat bulk mail as spam, as there might be legitimate cases where such mail needs to be delivered (e.g. some end users might opt-in to a medical newsletter on diabetes, and classifying such an email as spam is clearly a false positive).
The problem with Graymail
Although it may not initially be seen as a problem, Graymail can cause headaches for business email users and administrators. Graymail is a term used for legitimate opt-in (user-specified and confirmed by email they wish to receive the email) and therefore should not be regarded (and rightfully so) as SPAM. Not all graymail is for personal use either, many of us utilize on-line publications for our job roles such as legal teams, marketing departments, and healthcare publications.
Marketing companies have many sub-direction forks and they often share opt-in user details with other areas of its marketing force including sub-marketing partner organizations. As an end-user, you most likely (and unwillingly) signed up to allow sharing of your email address and other personal information you registered with when you first created your opt-in subscriptions. Let’s be honest, when you are attempting to read an article or purchase an item you don’t want to read through a 10-page terms and conditions document. This is the problem with graymail. In theory, the opt-in process is a great step in adding layered verification to the types of emails we wish to receive. As always marketing companies have also monetized this verification to you ‘the users’ detriment.
Managing Graymail in 2020 and beyond…
The easiest way to manage Graymail is to stipulate which departments need which particular newsletters/publications. You could, for example, create an internal white list of trusted resources/domains and publish this through Sharepoint or other internal resources. Understanding what ‘business email’ is required by your users is, of course, the first step to understanding Graymail traffic for your business.
End-users have grown tired of unsubscribing from emails they no longer wish to receive. Some of which could be phishing emails delivered to users inboxes by way of steering a user to a fake Office 365 login page for example. As a business, you may use security awareness training services which will enable your workforce to have a higher level of resilience but do you really want to rely solely on this? Most likely not. The logical step is to add a third party proven and trusted service to your perimeter defense arsenal.
Spambrella provides a 30-day free service trial which will enable any SME or Enterprise to expand its email classification with granular control. The trial service will allow your IT department to determine the level of security controls requires, will remove the time consuming unsubscribe processes, and will gain additional employee productivity very quickly.
Furthermore, Spambrella is a true cloud service, we will not interfere with any local services and do not need any user intervention. The service is managed by the nominated IT administration team.
Robust, versatile, and reliable...
The reliability of the service and the level of protection that it provides. My spam levels immediately dropped to near zero.
There are almost no false positives. And I'm easily able to customize the level of protection with whitelists, blacklists, and sensitivity settings. I'm also a big fan of the antivirus and URL scanning features.
It doesn't require an arcane knowledge to set the Spam filtering up, the guides are straight to the point and support staff are very helpful. Functionality wise, in short: we do not get spammed. Thanks to Spambrella.
Archiving wise, the new solution is easy to use, searches well and fast and is by far the cheapest we could find at the time. Ten year retention rocks!
Easy to onboard my customers from another spam filtering system. Very fast and haven't had any downtime in the 9 months since I have moved to Spambrella. When I have had to use support, responses where quick. I had to move all my customers from another filtering system with little notice. After I moved my customers I realised how bad the old solution I used was. Contact with Sales and Support always been professional
Used the software for: 2+ years - 5/5 Overall
With an ever overloaded department, and with cybersecurity skills shortage getting worse securing the I.T infrastructure.
Offloading the task of e-mail filtering to Spambrella has dramatically helped in the department's performance. The only drawback in our case is that the service is hosted outside of our territory and thus out of the legal jurisdiction.
I found spambrella to be easy to set up and has dramatically reduced the number of spam emails hitting our inboxes. It was easy to 'train' the software to release any genuine emails that were caught or add any spam that was not picked up.
Within a couple of weeks of use virtually no spam arrived to our mailboxes. Spam and phishing emails are a growing problem for everyone I'm sure. I now get a very low incidence of spam.
The service is great at filtering bad email as well as junk email out while allowing clean email though. I have used a few other options over the years and this is the best I have found. Clients sometimes have trouble configuring their settings to how they want it to be. Or tag emails as approved when they shouldn't and need IT interaction to resolve. Maybe just ease of use or having a more clear way for clients to resolve basics on their own.
With the ever-evolving landscape of email security services comes the ‘question’… ‘what are the top email security gateway services’? Our website analytics show that this…
Spambrella the Global Email Security and Corporate Governance company has been awarded a highly prestigious Queen’s Award for Enterprise in the United Kingdom. Presented on…
Kovter is a fileless malware that attempts to remain invisible and targets the Windows operating system. Kovter avoids detection as it relies on the host…