Ratings and Reviews 814 Ratings
Ratings and Reviews 0 Ratings
What is SpamTitan?
SpamTitan's email security solution safeguards businesses, educational institutions, small to medium-sized enterprises (SMBs), and managed service providers (MSPs) from various email threats including spam. It effectively defends against phishing attempts, zero-day vulnerabilities, viruses, malware, ransomware, and other malicious email activities, ensuring a secure mail flow and filtering out unwanted messages. Our user-friendly yet robust email protection is compatible with Office365, making it accessible for a wide range of users. You can try SpamTitan Email Security risk-free with a fully supported trial.
SpamTitan – Comprehensive features included:
* Protection against CEO impersonation
* Safeguarding against spear phishing attacks
* Analysis of links within emails
* Complete email sanitization
* Defense against zero-day attacks
* Mail spooling capabilities
* Anti-spoofing measures
* Protection against ransomware and malware
* Checking for SPF, DKIM, and DMARC compliance
* Encryption options available
* Fully multi-tenant architecture
* Customizable user interface for branding
* Complete REST API access
* Detailed setup documentation and support
Recognized as a top solution in the G2 Crowd Email Security category, SpamTitan Email Security stands out for its premium functionalities and reliability. Begin your free trial today and enhance your email security!
What is Spam Marshall?
Since its inception in 2003, Spam Marshall has played a crucial role in creating spam-free environments for Exchange servers, gaining the confidence of numerous small to medium-sized enterprises globally as their foremost defense against unwanted email. With its sophisticated Customs Rules Engine Technology (CuRE), Spam Marshall adeptly prevents spam from infiltrating Exchange Servers through a variety of strategies, which include real-time monitoring, content filtering, greylisting, anti-phishing tactics, SPF and PTR checks, email rate management, domain type evaluations, and age verification, among others. The platform provides administrators with a robust array of customizable filtering options, allowing them to personalize their spam defense approaches. Importantly, Spam Marshall is built to be scalable, adaptable, and economically viable, with a quick installation process that typically takes only a few minutes. Starting at a competitive price point of $749, it is compatible with Exchange versions 2000, 2003, 2007, and 2010, as well as any SMTP server, and is supported on Windows operating systems 2000, 2003, and 2008 in both x386 and 64-bit formats. This comprehensive compatibility and ease of use make Spam Marshall an excellent choice for organizations aiming to bolster their email security with minimal effort, while also ensuring ongoing protection against evolving spam threats.
API Availability
Has API
API Availability
Has API
Pricing Information
$2.14/user/month
Free Trial Offered?
Free Version
Pricing Information
$749 one-time payment
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
TitanHQ
Date Founded
1999
Company Location
Ireland & US
Company Website
www.titanhq.com/email-protection/
Company Facts
Organization Name
ITA Networks
Date Founded
2003
Company Location
United States
Company Website
www.spam-filter-exchange.com/SpamFilterWeb/index.jsp
Categories and Features
Anti-Spam
Allow / Block List
Audit Log
Email Archiving
Email Recovery
Email Routing
Encryption
Fraud Detection
Quarantine
Reporting & Statistics
Spam Filter
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Email Management
Data Recovery
Email Archiving
Email Monitoring
Queue Manager
Response Management
Routing
Shared Inboxes
Signature Management
Spam Blocker
Whitelisting / Blacklisting
Email Security
Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Web Content Filtering
Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting
Categories and Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning