Attacks/Breaches
4/30/2007
12:15 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Marshal Offers SP Edition

Integrated email and Internet content security provider is launching a Service Provider Edition of its MailMarshal software

BASINGSTOKE, U.K. -- Integrated email and Internet content security provider, Marshal, is launching a Service Provider Edition of its award-winning MailMarshal software. MailMarshal Service Provider Edition (SPE) provides MSPs and ISPs with a range of hosted email security services that can be tailored to their customers' specific requirements. Services offered include email filtering, policy control, archiving and reporting and the ability to grant differing levels of administration access rights to service providers' customers' own administrators.

MailMarshal SPE is a business-enablement solution for service providers targeting business customers and SOHO users. The software's intuitive, centralised management console makes it easy for MSP/ISP staff to manage policies, user accounts and messages spread across multiple servers located in geographically distributed locations. MailMarshal's Array Manager architecture naturally lends itself to a hosted environment, because it is highly scalable and provides an extremely redundant architecture design for up to 99.999% network availability.

Ed Macnair, CEO of Marshal, comments: "With the launch of MailMarshal SPE, service providers can now offer their customers a hosted version of what is one of the world's top three email content security software products. The beauty of MailMarshal SPE is that it is based on a highly scalable and extremely redundant architecture - both of which are critical to an efficient hosted service - and can be tailored by service providers to meet the exact requirements of their customers, be they SOHO users or larger businesses."

Marshal Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-3277
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

CVE-2010-2236
Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

CVE-2011-3628
Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.0...

CVE-2012-0214
Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

CVE-2013-4768
Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web