Protection against spam, viruses, Trojans and phishing

You work more efficiently, in a more focused manner and with fewer worries without spam and with protection against viruses and Trojans and dangerous attacks.

All the advantages at a glance:

  • Protect up to 2000 mailboxes
  • Real-time spam and virus protection
  • Full control of your e-mail traffic


Number of e-mail accounts

Subscription period 12, 24, 36 months
Billing period 3 months
setup fee
CHF 250.–

per month and use

{{aktivesProdukt1.monthPrice | number :2}} per

order now

Inbox and outbox

Number of e-mail accounts

Subscription period 12, 24, 36 months
Billing period 3 months
setup fee
CHF 250.–

per month and use

{{aktivesProdukt2.monthPrice | number :2}} per

order now

Protect yourself against e-mails with viruses, Trojans and phishing:

  • Simple installation by rerouting e-mail traffic (MX record)
  • No own antispam/antivirus infrastructure required
  • Antispam checks and sorts your e-mails
  • No more annoying sorting of unwanted e-mails
  • Spam, viruses and Trojans remain in our quarantine
  • Improved productivity and increased security
  • Your own infrastructure is protected from malicious e-mails
  • No unnecessary loading of your infrastructure due to unnecessary data traffic

  • GateSentry, monitors all your incoming e-mail
  • Tri-Fi AntiVirus, removes viruses and malware from e-mails
  • SpamNet, analyses e-mails for spam characteristics
  • Delivery Manager, monitors the delivery of clean e-mails
  • Quarantine, stores suspicious e-mails for you
  • Web Interface, gives you complete control of your e-mail traffic

The antispam solution works as follows:

Analysis of the subject line:

Many spam e-mails have recognizable, known subject lines that can be used to filter our newly sent spam e-mails.

Anti-relay function:

Protects the mail server so that it cannot be used as a spammer. This prevents being listed in real-time blacklists.

Antispam database:

Databases on the Internet that contain examples of known spam e-mails. Mail servers can compare e-mails with these databases and block e-mails found in the databases.


Recognizing spammers whose e-mails are actually from external domains, but are camouflaged with internal sender addresses.

Header analysis:

Analyzing the e-mail header to determine discrepancies from defined e-mail standards.

Heuristic analysis:

Rule-based scan methods that recognize specific e-mail characteristics. Characteristics like “Removelink” and certain words like “VIAGRA” indicate spam and are assigned “bad points”. Following the analysis, the points are added. If they exceed a defined threshold, an e-mail is classified as spam.

Internal blacklists and whitelists:

Lists with domain names and addresses that are explicitly blocked. Whitelists are the counterpart, clearly specified as wanted e-mails.

Lexical text analysis:

Examination of entire sections of text and links using operators like OR, AND, NOT, etc. to find, for example, sales pitches and requests to visit websites.

Real-time blacklists (RBL):

Lists on the Internet containing IP addresses of mail servers that have sent spam. RBLs prevent company servers from accepting e-mails from such known IP addresses. It is possible that mail servers are incorrectly placed on these lists when company servers were unwillingly forced to send spam.

Protection against mail bombing:

Preventing a mail server from sending a massive amount of automatically generated e-mails (DoS, denial of service). This protection regulates e-mail traffic to prevent overloading.

Preventing directory harvesting attacks:

Stop attempts by spammers to find valid e-mail addresses via the SMTP server.

The right service for the product:

Do you want even more protection?
Our DDoS Guard provides comprehensive protection against volumetric DDoS attacks.

More about DDoS