Webinar Recording Available – MDaemon 15 New Features

We recently released MDaemon 15, with new features such as IPv6 support, email encryption, improved account hijack detection, 64-bit support, dynamic screening improvements, and much more. To learn more about what’s new, watch the following brief webinar.

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

The Benefits of using Smaller Tech Vendors

I was reading an article on ZDNet today by Steve Ranger about the benefits of using smaller tech vendors, and I wanted to share it with you. While large tech vendors may have brand recognition and a large development team, dealing with these vendors can often cause headaches. In the article, Ranger says, “…persuading such mighty suppliers to change anything maybe impossible unless you’re one of their top customers.” If you’re a Microsoft Exchange or Office 365 user, imagine the efforts it might take to submit a feature request or report a bug, or even to find online help. As a small business that provides messaging solutions to small-to-medium businesses, we at Alt-N want to make it easy for our customers to contact us, or to submit feature requests. The Alt-N Idea Engine provides a portal for customers to submit their ideas and feature requests, and when these ideas are considered, there’s often a speedy reply with more information or a status update. The article goes on to mention the bureaucracy and red tape that often goes with dealing with a large tech vendor. Here at Alt-N, our developers are active in our community forums, allowing customers to have a direct dialog with us on issues, features, advanced configuration, and much more.

Click on the link below to read the full article.

Can small, industry-focused tech suppliers offer benefits that the big players can’t deliver?

If you have questions or comments, please leave us a comment below.

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

New SecurityGateway How-to Guide – Settings to Protect your Mail Server

SecurityGateway protects your mail server and end users from email-borne threats such as spam, viruses, malware, phishing attempts, and much more. For best results, SecurityGateway can  be configured to perform the following tasks:

  • Prevent spammers from guessing passwords
  • Verify that a user is valid before creating an account
  • Prevent unauthorized account access
  • Prevent unauthorized mail relaying
  • Protect your domain with IP Shielding
  • Encrypt communications with SSL
  • Prevent backscatter (out-of-office and non-delivery replies (NDRs) sent in response to messages that your users never sent)
  • ….and much more.

Click here to view the new SecurityGateway how-to guide.

Scroll down to the SecurityGateway section & click on “Settings to Protect Your Mail Server: How-to Best Practice Guide.”

If you don’t yet have SecurityGateway & would like to try it out, then visit the Downloads page & download your free trial. Let us know if you have questions!

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Rebuilding the Bayesian Learning Process in SecurityGateway

SecurityGateway and MDaemon both feature Bayesian learning, which allows administrators (or users, when authorized) to feed samples of spam and non-spam email messages to designated public folders. By default, when 200 samples of spam and 200 samples of non-spam have been placed in these folders, the Bayesian learning process will process these folders and feed their contents to a database of what are known as tokens – snippets of spam-like and ham-like (non-spam) content, basically. We all know that we humans are not infallible – people make mistakes, so it’s possible for messages to be fed to the wrong folders. When this happens, users may begin to receive more false-negatives (spam that was not caught by the spam filter) or you may accumulate a number of false positives (legitimate email messages that were flagged as spam by the spam filter). When this happens, it may be necessary to rebuild the Bayesian database. You may recall that I posted  a blog entry awhile back on how to rebuild the Bayesian database for MDaemon. You can read that post here. For SecurityGateway, the concepts are the same, but the navigation and file locations are different. The following tutorial video explains how to rebuild the Bayesian database in SecurityGateway.

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •