Cookie anyone?

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. You consent to our cookies if you continue to use our website. learn more

Multi-Layered Security with Online Detection

IceWarp's security features combine world class multi-threaded Anti-Virus and multi-layered Anti-Spam protection. A unique combination of more than 20 antispam technologies, including zero-hour protection from CYREN and Intrusion Prevention System, stops malicious or unwanted behavior in real time.

hero-device-image
Stop Spam, Malware and Attackers at the Gateway
Your system is protected by more than 20 antispam technologies, including zero-hour protection from CYREN and Intrusion Prevention System. Users have control over the system through Black Lists, White Lists, Spam Folders & Quarantine Reports.
Anti-Spam Protection
Users have control over the system through Black Lists, White Lists, Spam Folders & Quarantine Reports.
Zero-Hour Outbreak Monitoring

Ensures real-time protection from the moment a spam outbreak emerges. Proactive IP reputation service analyzes more than 12 billion internet transactions daily from more than 550 million endpoints.

Enterprise Anti-Virus

Every file going in or out of your server is scanned and validated, be it email, groupware attachments, FTP files, or IM file transfers.

Data Security

Potentially dangerous email attachments can be globally excluded based on their file extensions. The flexible filter system is able to reject password-protected files and executables hidden within archives (ZIP, RAR,…).

Secure Data and Keep Your Conversations Private
Potentially dangerous email attachments can be globally excluded based on their file extensions. The flexible filter system is able to reject password-protected files and executables hidden within archives (ZIP, RAR,…).
SSL security protects your data when it travels over the Internet.
Intrusion Prevention

Intrusion prevention filters analyze all incoming connections including the number of authorization attempts, IP addresses and security level. Cross-session and cross-protocol monitoring blocks attackers instantly.

TLS/SSL

Integrated Let's Encrypt service with certificate lifecycle management lets you easily deploy secured inbound SSL connections, enforce SSL to specified Secure Destinations and set up VPN-like operation between servers with an SSL Tunnel.

Email Encryption

Certificate management allows users to digitally sign and encrypt email to ensure that messages cannot be read by anyone untrusted. Server-side message encryption adds another layer of protection for messages in transit.

Voice Encryption

Integrated WebRTC security features enable always-on voice and video encryption. Secure RTP protocol (SRTP) is used to protect both voice and video, which is especially beneficial for WiFi-connected devices.