Ratings and Reviews 814 Ratings
Ratings and Reviews 0 Ratings
What is SpamTitan?
                SpamTitan's email security solution safeguards businesses, educational institutions, small to medium-sized enterprises (SMBs), and managed service providers (MSPs) from various email threats including spam. It effectively defends against phishing attempts, zero-day vulnerabilities, viruses, malware, ransomware, and other malicious email activities, ensuring a secure mail flow and filtering out unwanted messages. Our user-friendly yet robust email protection is compatible with Office365, making it accessible for a wide range of users. You can try SpamTitan Email Security risk-free with a fully supported trial.
SpamTitan – Comprehensive features included:
* Protection against CEO impersonation
* Safeguarding against spear phishing attacks
* Analysis of links within emails
* Complete email sanitization
* Defense against zero-day attacks
* Mail spooling capabilities
* Anti-spoofing measures
* Protection against ransomware and malware
* Checking for SPF, DKIM, and DMARC compliance
* Encryption options available
* Fully multi-tenant architecture
* Customizable user interface for branding
* Complete REST API access
* Detailed setup documentation and support
Recognized as a top solution in the G2 Crowd Email Security category, SpamTitan Email Security stands out for its premium functionalities and reliability. Begin your free trial today and enhance your email security!
            
        
            What is AP Lens?
                AP Lens serves as a Sandbox browser that enhances network security through DNS Whitelisting, effectively thwarting attacks before they infiltrate your systems. 
What advantages does AP Lens provide?
Web Filtering: Offers a versatile and intuitive way to block unwanted content.
Anti-Phishing: Eliminates the risk of similar-looking domains with complete accuracy.
Ransomware Defense: Shields your network from cybercriminals while ensuring business applications remain unaffected.
Secure Remote Work: Implements VPN technology to uphold internet usage policies.
AP Lens Augmented Whitelist: A solution to eliminate 0-Day Attacks.
Compliance: Adheres to the regulatory standards required by cybersecurity insurance policies.
One-Click Installation: Eliminates the hassle of user setup or updates on their computers.
No Maintenance: Prevents malware and phishing threats without the need for continuous oversight.
With over two decades of collective expertise in cybersecurity, cloud security, and information protection, our team has successfully served various sectors, including both private and public domains, ensuring robust protection for all clients.
            
        
            Media
No images available
    
Integrations Supported
            
                
    Microsoft 365
            
            
        
        
    
        
        
            
                
    Microsoft Exchange
            
            
        
        
    
                
            API Availability
            
                Has API
            
            
        
        
    
                API Availability
            
                Has API
            
            
        
        
    
                Pricing Information
        $2.14/user/month
        
    
    
    
        
        
            
                Free Trial Offered?
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Information
        $5
        
    
    
    
        
        
            
                Free Trial Offered?
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Supported Platforms
            
                SaaS
            
            
        
        
    
        
        
            
                Android
            
            
        
        
    
        
        
            
                iPhone
            
            
        
        
    
        
        
            
                iPad
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                On-Prem
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
                Supported Platforms
            
                SaaS
            
            
        
        
    
        
        
            
                Android
            
            
        
        
    
        
        
            
                iPhone
            
            
        
        
    
        
        
            
                iPad
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                On-Prem
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
                Customer Service / Support
            
                Standard Support
            
            
        
        
    
        
        
            
                24 Hour Support
            
            
        
        
    
        
        
            
                Web-Based Support
            
            
        
        
    
                Customer Service / Support
            
                Standard Support
            
            
        
        
    
        
        
            
                24 Hour Support
            
            
        
        
    
        
        
            
                Web-Based Support
            
            
        
        
    
                Training Options
            
                Documentation Hub
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Online Training
            
            
        
        
    
        
        
            
                On-Site Training
            
            
        
        
    
                Training Options
            
                Documentation Hub
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Online Training
            
            
        
        
    
        
        
            
                On-Site Training
            
            
        
        
    
                Company Facts
Organization Name
TitanHQ
Date Founded
1999
Company Location
Ireland & US
Company Website
www.titanhq.com/email-protection/
Company Facts
Organization Name
AP Lens
Date Founded
2018
Company Location
Hong Kong
Company Website
aplens.co
Categories and Features
Anti-Spam
                                        Allow / Block List
                                        
                                    
                                    
                                    
                                        Audit Log
                                        
                                    
                                    
                                    
                                        Email Archiving
                                        
                                    
                                    
                                    
                                        Email Recovery
                                        
                                    
                                    
                                    
                                        Email Routing
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Fraud Detection
                                        
                                    
                                    
                                    
                                        Quarantine
                                        
                                    
                                    
                                    
                                        Reporting & Statistics
                                        
                                    
                                    
                                    
                                        Spam Filter
                                        
                                    
                            
                        Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Computer Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Audit Trail
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Database Security Audit
                                        
                                    
                                    
                                    
                                        File Access Control
                                        
                                    
                                    
                                    
                                        Financial Data Protection
                                        
                                    
                                    
                                    
                                        Maintenance Scheduling
                                        
                                    
                                    
                                    
                                        Real Time Monitoring
                                        
                                    
                                    
                                    
                                        Security Event Log
                                        
                                    
                                    
                                    
                                        Virus Definition Update
                                        
                                    
                                    
                                    
                                        Vulnerability Protection
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        Email Management
                                        Data Recovery
                                        
                                    
                                    
                                    
                                        Email Archiving
                                        
                                    
                                    
                                    
                                        Email Monitoring
                                        
                                    
                                    
                                    
                                        Queue Manager
                                        
                                    
                                    
                                    
                                        Response Management
                                        
                                    
                                    
                                    
                                        Routing
                                        
                                    
                                    
                                    
                                        Shared Inboxes
                                        
                                    
                                    
                                    
                                        Signature Management
                                        
                                    
                                    
                                    
                                        Spam Blocker
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        Email Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Quarantine
                                        
                                    
                                    
                                    
                                        Reporting/Analytics
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        IT Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Event Tracking
                                        
                                    
                                    
                                    
                                        IP Protection
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Spyware Removal
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Web Content Filtering
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Automated Blacklist
                                        
                                    
                                    
                                    
                                        Browser-based Management Portal
                                        
                                    
                                    
                                    
                                        Category / Keyword Filters
                                        
                                    
                                    
                                    
                                        LDAP Integration
                                        
                                    
                                    
                                    
                                        Multi-Language Filtering
                                        
                                    
                                    
                                    
                                        Reporting / Analytics
                                        
                                    
                                    
                                    
                                        Roles / Permissions
                                        
                                    
                                    
                                    
                                        SSL Inspection
                                        
                                    
                                    
                                    
                                        Time-based Controls
                                        
                                    
                                    
                                    
                                        VPN Blocking
                                        
                                    
                                    
                                    
                                        White Label
                                        
                                    
                                    
                                    
                                        Whitelisting
                                        
                                    
                            
                        Categories and Features
Firewall
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Application Visibility / Control
                                        
                                    
                                    
                                    
                                        Automated Testing
                                        
                                    
                                    
                                    
                                        Intrusion Prevention
                                        
                                    
                                    
                                    
                                        LDAP Integration
                                        
                                    
                                    
                                    
                                        Physical / Virtual Environment
                                        
                                    
                                    
                                    
                                        Sandbox / Threat Simulation
                                        
                                    
                                    
                                    
                                        Threat Identification
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        