Attacks/Breaches
4/30/2007
12:15 PM
Connect Directly
RSS
E-Mail
50%
50%

Marshal Offers SP Edition

Integrated email and Internet content security provider is launching a Service Provider Edition of its MailMarshal software

BASINGSTOKE, U.K. -- Integrated email and Internet content security provider, Marshal, is launching a Service Provider Edition of its award-winning MailMarshal software. MailMarshal Service Provider Edition (SPE) provides MSPs and ISPs with a range of hosted email security services that can be tailored to their customers' specific requirements. Services offered include email filtering, policy control, archiving and reporting and the ability to grant differing levels of administration access rights to service providers' customers' own administrators.

MailMarshal SPE is a business-enablement solution for service providers targeting business customers and SOHO users. The software's intuitive, centralised management console makes it easy for MSP/ISP staff to manage policies, user accounts and messages spread across multiple servers located in geographically distributed locations. MailMarshal's Array Manager architecture naturally lends itself to a hosted environment, because it is highly scalable and provides an extremely redundant architecture design for up to 99.999% network availability.

Ed Macnair, CEO of Marshal, comments: "With the launch of MailMarshal SPE, service providers can now offer their customers a hosted version of what is one of the world's top three email content security software products. The beauty of MailMarshal SPE is that it is based on a highly scalable and extremely redundant architecture - both of which are critical to an efficient hosted service - and can be tailored by service providers to meet the exact requirements of their customers, be they SOHO users or larger businesses."

Marshal Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0985
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.

CVE-2014-0986
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.

CVE-2014-0987
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.

CVE-2014-0988
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.

CVE-2014-0989
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.

Best of the Web
Dark Reading Radio