010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

Xeams

Xeams Logo

 

Xeams

 

Xeams - A Comprehensive Solution

Xeams is a secure and powerful mail server for Windows, Linux, Solaris, Mac OS X and other flavors of UNIX, and supports SMTP, POP3, and IMAP. Xeams includes a powerful spam filtering engine that eliminates up to 99% of junk email right out of the box. The software offers a flexible approach to email, making it a very user friendly server.

 

Full SMTP and/or Proxy Server

Xeams is equipped with a full SMTP server that accepts emails and queues them for delivery, as well as a Proxy Server that can be used for inbound filtering.


Office 365 Integration

Use Xeams in front of your Office 365 infrastructure to gain additional filtering, reporting and archiving capabilities that you don't get with Office 365 alone. 


99% Spam Protection

Xeams can block 99% percent of all junk messages right out of the box. The filtering rules are fully customizable and get better as Xeams adapts to your email environment.

 

Built-in POP3 and IMAP Servers

IMAP and POP3 servers built right into the system to easily fetch emails from an email repository to a client's machine.

 

Extensive Reporting

Out of the box, Xeams provides several reports that accurately report the usage and load trends on your server. The Live Monitoring feature in Xeams provides a summary of emails as they arrive in your system.

 

Message Archiving

Xeams automatically archives every message that goes through it - both inbound and outbound. This makes Xeams a perfect companion to servers like Microsoft Exchange when it comes to message archiving.

 

Xeams can work in 3 modes:

  1. Standalone server - In this mode you do not need any other email server, but Xeams, to handle every e-mail. Clients connect to Xeams using POP3/IMAP protocol to fetch their messages and use SMTP to send outbound emails.
  2. Spam firewall - In this mode Xeams sits in front of another email server, such as Microsoft Exchange, Sendmail, Novell Groupwise or any other SMTP server. Every incoming email filters through Xeams and only good messages are forwarded to the actual email server. Your users connect to the corporate email server to fetch and send email.
  3. Hybrid mode - This is a combination of mode 1 and 2. Using Xeams in this mode provides redundancy to your existing email infrastructure. Every message is saved in two places: Xeams and your corporate email server.

 

More than just an email server

Xeams offers much more than a typical email server. Here is a partial list of its features.

 

A comprehensive solution

A complete email server supporting POP3, IMAP and SMTP protocols. Users can use any client such as MS Outlook, Mozilla Thunderbird or any other email client to send and receive emails. It has a builtin web server and a relational database. All this reduces configuration time and you can be up and running in minutes.

 

Multi-platform support

Xeams works on a large variety of operating systems this includes: Microsoft Windows, Linux, UNIX, Mac OS X, BSD. Xeams is written in 100% Java and therefore it supports every operating environment for which a Java virtual machine is available.

 

Sophisticated spam filter

A built in spam filter provides protection against junk emails, virus and phishing attacks. It blocks 99% of junk messages right out of the box. A higher rate of accuracy can be achieved by taming the rules engine that comes with the product.

 

  • Benefits

 

  • 100% In-House Solution

Xeams offers a 100% in-house solution, minimizing privacy risks associated with outsourced solutions.

 

Comparing In-House vs Cloud

With the growth of cloud-based services, many companies are debating how to maximize their return on investment while still maintaining privacy for their email infrastructure. This page discusses 3 different models of deploying email systems.
 

Deployment Models

  • 100% Outsourced - Let a third-party company handle your emails
  • 100% In-House - Run your email servers within your organization
  • Hybrid - Run your email server on the cloud with full control. For example, on MS Azure or Amazon EC2

The following section discusses pros and cons of every approach.

 

100% Outsourced

Pros

  • Easy to setup - All you need to do is configure the MX record for your domain to a third-party email provider.
  • Less administration - Most of the administrative tasks are handle by the third-party company and therefore, very less administration is required on your end.

Cons

  • No privacy - Every email you receive or send goes through this third-party provider. The filtering system as well as employees working for this provider typically can see every message belong to your company. Moreover, many cloud-based companies don't actually own the hardware. Instead, they lease their hardware from yet another provider adding another layer of privacy concerns.
  • Less control - Service providers often host emails for several companies therefore, accommodating customized filtering requests is not always possible. For example, if your company policy requires up to 100MB of attached files, the server provider may not agree to this.
  • Variable cost - Service providers base their cost on several factors. This includes number of users, number of emails they get and the size of their messages. Some companies may charge you separately if you decide to hold historic data.

 

100% In-House

Pros

  • 100% secure - Since emails are not routed through any third-party provider, there are no privacy concerns.
  • Full control - Since the system is not shared by other companies, you will have full control over the rules when it comes to junk filtering or message size.
  • Fixed cost - Cost is deterministic when running the email system on your own hardware. Some government regulations require you never delete your emails. In that case, you can simply archive your older messages to USB drives.

Cons

  • More administration - You will typically need a technical person within your company who if familiar with email systems.
  • Hardware cost - Besides a machine, you will also need a static IP address from your ISP to run an email server. Hardware costs can be minimized by using a virtual machine
  • Network outage - Email servers should be running on a network that seldom goes down. Many small companies, particularly in rural areas, do not have a reliable network that can be trusted for network continuity.

 

Hybrid

Many companies offer a Virtual Private Server (VPS) at very cost effective rates allowing you to run entire machine somewhere in the cloud.

Pros

  • 100% Secure - Since emails are not routed through any third-party provider, there are no privacy concerns.
  • Full Control - Since the system is not shared by other companies, you will have full control over the rules when it comes to junk filtering and message size.
  • Reliable Network - Cloud providers typically run their infrastructure on redundant and reliable networks.

Cons

  • Initial Setup - Even though the hardware is managed by a third-party company, you will have to setup the software. Synametrics Support can help you install and configure Xeams in this environment, mitigating this risk.

 

  • 3 Modes

3 different modes of operation:

  • Stand-alone
  • Firewall
  • Hybrid

 

Stand Alone Mode

Xeams runs as a full email server in this mode, supporting SMTP, IMAP and POP3 protocols. Every user has their own Inbox. Incoming emails are checked against spam filters and then are forwarded to appropriate inboxes.

 

Users can use any email client, such as Xeams web client, MS Outlook, Thunderbird or any other client that supports POP3 or IMAP protocols to fetch new emails.

 

No other email server is required if you use Xeams in this mode. This is the default mode of operation.

 

Spam Firewall

In this mode Xeams acts like a firewall that sits in front of your corporate email server. Every in-bound email is checked by Xeams before it is forwarding the message to the actual email server. Similarly, every outbound message is checked before delivering it to its final destination.

 

Xeams works with any email server that supports the SMTP protocol, including Microsoft Exchange, Sendmail, Novel Groupwise, Lotus Notes and others.

Xeams provides two types of SMTP servers when operating in this mode:

  1. Regular SMTP server
  2. SMTP proxy server

 

Hybrid Mode

This is a combination of mode 1 and 2. User's inboxes are created on two locations: Xeams and your corporate email server. Users have a choice of using either one of them.

Although, every email gets copied at two locations, it provides redundancy for your corporate email infrastructure.  

 

  • Junk Filtering

Blocks 99% of junk messages right from reaching your inbox. Reduces traffic to your primary email server and prevents harmful attachments from getting into your network.

 

Junk Mail Filtering

Upon installation, Xeams provides an excellent junk mail filtering solution. Upon arrival, every email gets:

  • Checked against the sender's IP using several RBLs and SPF rules
  • Checked for viruses in attachment
  • Content filtering based on user defined rules as well as Bayesian analysis
  • Attachment filtering
  • Company policy rules
  • Finger print analysis
  • And more...

 

By default, all quarantined emails are saved on the server for 15 days. All quarantined messages are stored in a different folder, which are easily accessible by either the web interface or any IMAP client such as MS Outlook and Mozilla Thunderbird.

 

 

Feature details

Xeams uses a sophisticated score based mechanism to decide if an email should be considered junk. Every incoming and out-going email is assigned a score. Based on this score, Xeams assigns one of three categories to the email:

  1. Junk
  2. Possible Junk
  3. Good

 

Besides Junk and Good, Xeams utilizes a third category called Possible Junk. Occasionally, if an email to too close to being good or junk, it is assigned this category, providing the users to manually decide if they want to mark them as junk or good. By default if an email gets a score less than 60, it is considered good. A score of 100 or higher is considered junk. Score between 60 and 100 is considered Possible Junk.

 

Scoring criteria

Scoring is done based on several built-in rules. Every rule in the system can take the score either in the positive or negative direction. The final score decides the category of the email. Rules in Xeams can be further divided into two categories:

  1. User defined rules
  2. Self-learning rules

Several user-defined rules are bundled with Xeams at the time of installation. All of these rules has a default score and are fully user configurable.

Self-learning rules adapt to the environment of your users. For example, it learns from the past history of emails to assign a score to future emails. One such rule is called Bayesian Analysis. Another example of self-learning rule is when a local user sends a message to someone outside the network. Xeams remembers who the recipient is and gives credit to that user if he/she sends a reply back.
 

Score reasoning

Many spam filtering solutions block messages without giving an adequate reason of why it was selected as junk. Xeams, on the other hand, gives a detail description of why a particular email is considered junk. This description is very useful for administrators who want to fine tune the filtering rules.

 

  • End-to-End Encryption

Protect sensitive data by encrypting email that cannot be viewed by anyone but the intended recipient(s).

 

How to encrypt emails

Emails are inherently insecure. Consider a scenario where you are receiving the results of a blood test from your doctor via email. There is no guarantee that the email was not viewed by anyone else before it reached your inbox unless it was encrypted. This page demonstrates a very simple way of encrypting emails ensuring no one but the actual recipient will be able to see the message.

 

Design Goals

Before discussing how to encrypt emails, let's talk about a few design goals for such a system.

 

Privacy

No one but the intended recipient should be able to open the message. Not even administrators or a junk filtering email system.

No Plugins

No plugin should be required to open the original message. It uses software that is commonly available on every computer or mobile device.

Off-line Access

Recipients should not have to rely on external websites in order to view the message. They should be able to view the message even if Internet access is not available.

Mobile Access

Recipients should be able to open the message on their mobile devices, running on iOS, Android or Windows.

No Expiration

A previously sent message should never expire.

 

SSL/TLS 

A misconception

Many individuals incorrectly think they can achieve end-to-end encryption when using SSL/TLS. SSL can only encrypt in-transit data.

Consider the image below as an example:
 

 

Since SSL/TLS only encrypts in-transit data (represented by red lines in the diagram), it is potentially stored in clear once the message gets to the next SMTP server. Therefore, both humans and software can look into the message, defeating the purpose of having an end-to-end encryption system.

 

Using Xeams to the Rescue

Starting from v6.6 of Xeams, local users can send encrypted emails to recipients on the Internet without using any special software on the client's machine.

 

Steps to Encrypt

The following steps demonstrate how to encrypt emails in Xeams.

  • Ensure you're using version 6.6 or higher
  • Select Plugins under Home and click the Manage button for End-to-End Encryption
  • Click Enabled

 

Composing Emails

Users can compose emails using their normal email composing tool such as MS Outlook, Mozilla Thunderbird or any other web-based email client. Modify the subject line with a pre-configured suffix word. This word by default is encpass. Here is an example of a subject line:

Before

Your tax returns for 2018

 

After

Your tax returns for 2018 encpass(magicWords2018)

 

Sensitive Keywords

As a company policy, you can define certain words/pattern as sensitive. For example, if an email contains a social security number or a credit card number, you may want to force your users to encrypt that message. Using the following steps you can force your users to use encryption:

  • Select Plugins under Home and click Manage button
  • Check Require encryption for sensitive content
  • Specify keywords in the field for Sensitive Words
  • This field can accept patterns specified as regular expressions

 

Specifying Predefined Passwords

Users can predefine encryption passwords for common recipients. For example, a doctor's office can specify individual passwords for every patient before sending a blood report. 

 

Background Processing

Xeams takes the following steps when users indicate they need to encrypt the message:

  • Xeams searching for the subject line for the pre-configured suffix word
  • Extracts the body as well as attached files from the email, creates an encrypted PDF document using 256-AES encryption and sends the encrypted PDF instead
  • The PDF reader, either on desktop or mobile device, will prompt the recipient for the encryption password, which should be relayed to the recipient by the sender using a channel other than email.

 

  • Message Archiving

Archive historic messages with lightning fast searching capability. Quickly find out attachments sent in and out of your company in the past.

 

Xeams automatically archives every message that goes through both inbound and outbound. This allows administrators and other company principals to search and retrieve messages received in the past.

 

How it works?

Every message that passes through Xeams is indexed and saved on the disk. The indexes make searches lightning fast. Users can search either recipient's name/email, sender's name/email, or within the message contents.

A date range can be specified to restrict the results so you only see relevant records.

Additionally, predicates like "AND" and "OR" can be applied when searching for contents. For example, if you are looking for an email containing "Law Suite" and "Simpson", searching for "law AND suite AND simpson" will return your desired messages.

 

HIPAA Compliance

The HIPAA Act of 1996, require every healthcare organization to maintain a record of correspondence between patients and their healthcare providers. Message archiving features in Xeams help tremendously in retrieving any electronic communication between doctors and their patients.

 

  • Clustering

Build a highly available email infrastructure with built-in clustering capabilities.

 

Consider a scenario where you have more than one Xeams installed to filter junk messages. This scenario is depicted in the image below.

Example

Consider the following scenario:

  • You have 3 MX records to process incoming emails.
  • You are running Xeams on all 3 servers, that filter junk messages
  • Eventually, good messages are sent to MS Exchange
  • The highest priority MX refers to a Xeams instance that is on the same network as your Exchange
  • Xeams running on secondary MX are somewhere on the Internet

 

Since there are 3 instances of Xeams, it becomes a lot easier from an administrative perspective to change a rule on MASTER instance and let it automatically propagate to the SLAVES.

 

Prerequisites

  • You must use version 5.3 or newer
  • The build number between MASTER and SLAVES must match

 

Steps to enable clustering

Enabling clustering is a two-step process:

 

Step 1 - Designate the highest priority Xeams as MASTER.

  • Login as admin to the web interface of the Xeams server that you want to make the MASTER.
  • Click Cluster Management under Home
  • Select Master for Role
  • Add one or more slaves. Master and slave will communicate with each other over HTTP(S) using the same channel administrators use to connect to the web interface. Therefore, use the URL you normally use in your browser AND ensure necessary TCP/IP port (5272 by default) is open between the two machines.
  • You can add as many SLAVES as you like.
  • Note that you will see Not Authorized for the status when a slave is first added. This is normal.

 

Step 2 - Authorizing a MASTER.

  • Login as admin to the web interface of the Xeams that you want to designate as SLAVE.
  • Click Cluster Management under Home
  • Select Slave for Role
  • Add the IP address of the machine where MASTER is running. If that machine has multiple IP addresses, you can separate them by a comma. NOTE that there can ONLY be one MASTER. Do not put IP addresses for more than one machine in this field.
  • Once a MASTER is authorized, refresh the browser that is connected to the MASTER and ensure both machines can talk to each other by looking at the Status

 

What is synchronized

The following information is synchronized between MASTER and SLAVES.

  • Modifications to filtering rules, such as Score Configuration, Content Filters, RBL Filters, Black/white listed IP address, and Bypassed Users List.
  • Aliases
  • Distribution List
  • Users Configuration along with passwords
  • Trusted Domains
  • Profiles
  • Action Management

 

What is NOT synchronized

Most global parameters are NOT synchronized. Below are some examples:

  • Server Configuration, such as TCP/IP ports, SSL certificates, server mode
  • Configuration for SMTP Server or SMTP Proxy Server
  • Adminstrator's email and password
  • Active Directory, Message Retention, Alerts, Local Host File, ClamAV
  • Live Monitor
  • Log files.
  • Maximum global email size
  • Global reports - daily, monthly, yearly

 

Message Repository and Reports

Message repository is automatically synchronized between MASTER and SLAVES. Therefore, when you search messages or display a list of all messages, the MASTER will pull necessary information from the SLAVES and display one consolidated result.

Additionally, different colors are used in the message repository when a message is pulled from a SLAVE. See image below for a screenshot.



Same goes with user reports that are sent on daily basis. Reports will only be sent out from the MASTER and will contain records from the SLAVES. Therefore, user will only get one report that will pull data from every instance of Xeams.

 

Sending Outbound Emails through Slaves

Xeams can automatically route outbound emails through multiple slaves if the first attempt from MASTER fails. Two things happen when a message gets routed through a slave:

  • Color of the Status Icon changes to blue
  • Log entry in OutboundAuditTrailSuccess.log will contain the word slave:

 

Use the following steps to enable/disable delivery through slaves:

  • Click Server Configuration &rarrow; SMTP Configuration
  • Select the Advanced tab
  • Check Relay Through Clustered Slaves

 

Licensing

A license is inherited from MASTER to SLAVE. Therefore, do not explicitly apply the serial number in SLAVE(s).

  • Install Xeams on SLAVE
  • Register it as if you're using it in Community Edition
  • Configure clustering as mentioned above
  • MASTER Xeams will automatically push its license to SLAVE in a few minutes. No further action is required.

 

Troubleshooting common problems

The communication between the MASTER and SLAVE server occurs over HTTP(S). Assuming the URL for a slave is http://mx2.yourcompany.com:5272, you will have to open firewall ports allowing the MASTER server to reach the slave on port 5272.

 

Checking the slave's status from Server

  • Click Cluster Management under Home
  • Refer to the Status column. There are 4 possible values for this status:
    1. Up and Running - this means MASTER can successfully connect to slave
    2. Invalid Response - this occurs if the slave machine is using an older build, or the URL is referring to an HTTP server other than Xeams
    3. Not Authorized - this means the IP address of the MASTER is not among the authorized IP addresses. Connect to the slave and add MASTER's IP address as Authorized Server
    4. Unable to connect - this occurs if the slave is NOT running or a firewall is block traffic

 

Checking the MASTER's status from slave

  • Click Cluster Management under Home
  • The MASTER is supposed to ping the slaves once every 10 minutes. You will see a warning message on this page if these pings are not received.
  • If no pings are received for 30 minutes, the administrator will be sent an email.

 

Frequently asked questions

 

Can I change filtering rules on SLAVES?

No. Rules you modified on SLAVES will get overwritten by MASTER. Therefore, avoid modifying any filtering rules on SLAVES.

 

Do I have to purchase a separate license for the SLAVE?

No. The license gets inherited from MASTER to SLAVE(s).

 

Do I have to search every instance for an email?

No. Messages searches are integrated. Therefore, try searching email only on MASTER. It will display emails that were received by the SLAVES.

 

Will SLAVES send quarantined report?

No. Only MASTER will send a consolidated report displaying quarantined emails not only from its own instance but emails that were received and quarantined by SLAVES.

 

  • Email Compliance

Stay compliant with many government regulations. For example, HIPAA, GLBA, CFPB, FERPA, Sarbanes-Oxley, Safe Harbor, etc.

 

Email is one of the most common methods for communication. Companies rely on emails for sending sensitive data to their business partners. Emails are inherently insecure therefore; many regulations exist that govern sharing sensitive data through email messages.

 

  • Prevent IP Leakage

Prevent intellectual property leakage by monitoring sensitive information being sent out via email. This includes message content as well as attached files.

 

Preventing Intellectual Property Leakage

Intellectual Property (IP) is the lifeblood for every organization and as such, must be protected against leakage. One common and occasionally overlooked channel is email. This page talks about how Xeams can be used to prevent IP leakage.

In addition to IP leakage, companies need to ensure other sensitive data or information is protected, such as personal identifiable information, vendor cost/pricing, employee/client health records, customer pricing, contracts, financial data, etc.

 

Repercussions

 

IP leakage can potentially have long-term consequences on your business. Consider the following examples:

  • Losing competitive edge by compromised patents, trademarks, copyright, trade secrets, etc.
  • Regulatory fines
  • Civil lawsuits
  • Loss of business

 

How Can Xeams Help?

Several features in Xeams help companies protect their sensitive data as well as IP.

Policy Violation Alerts

Automatic alerts can be triggered when certain sensitive data is found either in inbound or outbound emails. Administrators can configure triggers to search following components of an email.

  • Sender/Recipient's Email address
  • Sender's IP address
  • Attachments
  • Subject or Body

Attachment Reports

Historic reports can easily help investigators find who sent or received certain attachments.

Message Catalog

Summarized message catalog help investigators get a summary of emails sent and received from interesting parties. For example, it is very easy to find what emails were sent by an employee before the left the company.

 

  • Latest Specs

Xeams uses many technologies that are considered best practices in the industry such as STARTTLS, SPF, DKIM, DMARC and others.

 

SPF

SPF prevents forgery by designating a handful of IP addresses where emails can originate for your domain. SPF check will fail if a spammer sends a forged message from their own IP, allowing Xeams and other servers to treat that as spam.

 

It is very easy to forge a sender's email address but is very difficult to forge an IP address. This makes SPF very effective in combating email forgeries.

 

DKIM

DKIM ensures the message was actually composed by someone belonging to the domain they claim to be part of. Additionally, it ensures the message is not modified in transit. Technically, the message is digitally signed by the email server before leaving and this signature is verified by the receiving end, allowing the receiving end to verify the authenticity of the message.

 

Xeams can assign a score to any incoming message where DKIM signature does not match.

 

DMARC

DMARC builds on top of SPF and DKIM. This not only helps prevent forgery but also provides a sophisticated reporting mechanism allowing the senders to fine tune their SPF and DKIM rules.

 

Xeams adds a score if DMARC alignment fails. Additionally, it can also process incoming reports and send outbound reports to other email servers on the Internet.

 

Implementing for your domain

All three mechanisms require a TXT record in your DNS server. In addition to the TXT record, DKIM also requires creating a public/private key pair for DKIM signature. Xeams can automatically create these signatures for you without using any other third-party tool, saving you precious time and effort.

 

  • Administration

 

  • Easiest Installation

Simply double click setup.exe or run Install.sh on Linux and Xeams will be up and running in seconds. No need to install any other software/database.

 

  • 100% web-based interface

Everything you do in Xeams is through an intuitive web interface allowing you to connect from any computer.

 

  • Deploy anywhere

Xeams can be installed on any operating system including Microsoft Windows, Linux, BSD, Unix and Mac OS X

 

  • Active Directory

Seamless integration with Active Directory allow administrators to integrate user accounts with Xeams.

 

  • Tiered administration

Delegate administrative tasks to domain owners so they can manage filtering rules for their domain without affecting others.

 

  • Configurable retention

You decide how many days’ worth of emails you need to hold, which applies not only to good messages but also junk/spam messages.

 

  • Live monitoring

Watch new emails as they arrive in the server. This is one of the most loved feature and is exclusive only to Xeams.

 

  • Live logs

Watch contents of the log files as they appear. This is another exclusive feature and helps tremendously for administrative troubleshooting.

 

  • Extensive reporting

Several reports show you how many emails you are received in a day, week, month and year. It also shows a ratio of junk and good messages.

 

  • Never lose any email

Xeams keeps a complete history of every email ever received. You decide how many days you need to retain messages.

 

  • Cherry pick the features

Although Xeams provide a complete email solution, you can enable/disable any feature you like.

 

  • Rules updates

Rules are software updates are automatically downloaded and all administrators have to do is restart Xeams.

 

  • Services

 

  • Unlimited Usage

Xeams supports unlimited domains and there is no limit on the number of emails sent in or out.

 

  • Email protocols

Every common email protocol and specifications are support. Such as Smtp, Pop3, Imap, DKIM, DMARC, SPF, etc.

 

  • Mailing/Discussion list

Built in support for mailing lists exists in Xeams. Using the Administration console you can easily build new mailing lists and modify existing ones.

 

  • Email Signatures

Customized signatures can be attached to every outbound email conforming to your company's standard policies.

 

  • Policy management

Xeams allows you to enforce your company policies. Alert emails are sent to managers whenever a policy violation occurs.

 

  • Automatic indexing

Every message that comes in gets indexed by a built in search engine. This allows users to search older messages within seconds whether they are one day or one hundred days old.

 

  • Quarantine reports

Quarantine reports can be sent to users allowing them to restore emails and also manage their own white/black list.

 

  • Out-of-office notifications

Users can set and manage their own out-of-office notifications letting others know they won't be able to respond to their emails while away on vacation.

 

  • Handling large attachments

When combined with SynaMan, users can attach large files to your emails. There is no upper limit on the size.

 

Why Choose Xeams?

 

Comprehensive Protection as One Integrated Solution

Xeams is a single platform that enables you to protect, analyze, manage, and report on email traffic flowing in and out of your organization. It is based on an enterprise-class, component-based architecture that includes a state-of-the-art SMTP relay and a powerful policy engine. By monitoring messaging at the Internet gateway with a complete set of email security capabilities, Xeams provides the most effective method to make your inbound and outbound email streams secure and reliable.

To ensure compliance with government and industry regulations like HIPAA, GLBA, Sarbanes-Oxley and Safe Harbor (EU), Xeams provides sophisticated filtering, monitoring, encryption and reporting capabilities. And, using state-of-the-art technology, authentication, tracking and intelligent routing capabilities, Xeams makes it simple for administrators and management in your company to monitor any message coming in and going out of your network.
 

With Xeams, organizations can:

  • Stop spam, viruses, hackers and phishing attacks at the Internet gateway
  • Define custom policies based on any characteristic of email, ensuring compliance with company policies, industry and government regulations
  • Authenticate and intelligently route email according to administrator-defined policies
  • Prevent intellectual property leaks through customer-defined content filtering parameters
  • Use email to reliably and securely exchange information with customers and partners.

 

Benefits of using Xeams

  • Ongoing, regularly updated services - Free rule-updates are pushed to your server every two hours ensuring your organization is protected from the latest threats
  • Centralized management lets administrators manage email infrastructure from any machine using their web browser. Users can connect to the admin console to manage user-defined rules
  • Integrated graphical reporting provides a single point of management and reporting on email usage and trends, including email volume and policy violations.
  • Complete inbound and outbound protection provides security in both directions.

 

What makes Xeams different?

  • No hidden cost - Unlike many competing solutions, we publish our pricing publicly on our site. We do not ask how big your company is or how much revenue you generate before generating a quote.
  • Easy Trial - Many companies use Xeams for spam/junk filtering and put it in front of their existing server. Trying out Xeams is very easy and does require any changes on your existing production server. Simply install Xeams on any machine and configure your network firewall to route the messages through Xeams. If you don't like, simply change the firewall back to its original setting.
  • Precise Reasoning - You will know exactly why a message was blocked. Thousands of filters add their own independent score and you will know why each score was applied
  • Latest Specs - Xeams support latest specs including SPF, DKIM and DMARC.
Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved