5G Gateway Router

Email Security & SMTP Gateway Router

Empower your enterprise

In Enterprise networks, businesses need to ensure that critical applications receive proper handling and treatment. True application recognition can only be performed at Layers 4-7 of the OSI model by a DPI engine such as Network Application Visibility Library (NAVL), capable of identifying traffic on a per- application basis. Other solutions that attempt to recognize and classify traffic by port and protocol fall short, in that they fail to identify the thousands of applications that are developed to be delivered as HTTP over port 80, and those that “port-hop” or go from port to port when they are blocked or throttled back. NAVL provides network equipment vendors with that visibility while satisfying the diverse requirements of all use cases.

Application Visibility and Control in your solutions

While traffic speeds on LANs and WANs have risen sharply since the advent of DPI technologies in the late 90s, so have the number and types of applications on these networks and the “bursty” nature of their behaviour. Aggressive recreational streaming audio and video traffic including even mission-critical voice and video applications authorized by schools and businesses can easily expand to consume all available bandwidth on a given link. Even worse, lack of visibility into network traffic make it impossible for IT managers to distinguish one from the other, often leading to “all or nothing” application admission policy implementations that can negatively affect business and learning processes and programs.

Product Comparison ( For Only 25,465,587 Ports )
5G Gateway Router
Gmail MTA
Hotmail MTA
Yahoo MTA
Mail.ru Agent & MTA
Yandex MTA
Baidu MTA
Intel McAfee
Lotus Domino
Spam Titan
Cisco IronPort
Trend Micro
Barracuda Spam Firewall
Symantec & Brightmail
Anti-Spam Features
Policy-Based User Settings U
Policy-Based Domain Settings U U
Policy based User SMS Messaging On GSM Network N
Multiple Rule Scanning Engines
Internal RBL - SBL ( Country or Corporate or Domain ) U U U U
Outer RBL - SBL ( SpamCop - SpamHaus - Barracuda )
Antispoofing ( SPF, Sender ID, DKIM Spoofing )
Backscatter ( Fake Bouncing )
Tarpitting ( Multi Server , Botnet Mail Attacks ) U U U U U U U U U
SMTP Banner Delay
Early Talk Blocking
Outgoing Bounce Blocking
Advanced Bounce Policy
DNS Poisoning Control
DNS Poisoning Stopping U U U U U U
Creating and Using Own BlackList (RBL) and WhiteList (RWL) U
Regular Expressions in Rules
User Based Allow and Block Lists
User Based Contacts Allowed
User Based Quarantine
Domain Based Allow and Block Lists
Domain Based Contacts Allowed
Domain Based Quarantine
Domain Based White List
Global Rules ( RFC )
Morph Server Using U U U U U U U U U
Multi Node U U U U U U U U U
CC - BCC Management ( Creating Unique Message for each Receipents ) U U U U U U U U U
Regulating and Slowing Spam Attacks
On Flood Attacks Changing Role to As Firewall & Grounding U U U U U U U U U U U U U U U
Frequently Hacker Eye Testing U U U U U U U U U U U U U U U
Implementing and Communicating with CRM Modules O
Data DNA O U U U U U U U U U U U U U U U
Photo DNA N U U U U U U U U U U U U U U U
Layer 7 Analysis on SMTP Ports U U U U U U U U U
Layer 8 - Layer 9 - Layer 10 Analysis on SMTP Ports O U U U U U U U U U U U U U U U
Header - Message Body - Attachment Filtering ( Content Filtering)
Policy-Based User Settings
Ultimate UTF-8 Triggering U U U U
Inappropriate Content Control
Internal Route Filtering
Outbound Filtering
Inbound Filtering
SSL Filtering U
Ultimate Regular Expressions
Backing Up Messaging in Private File type
Global Disclaimers
Policy-Based Disclaimers
Embedded Attachments
Private Disclaimers
Automatic Creating Email Adress and Domain ( No Requiring Operator or Admin )
Customizable SMTP Banner Text
Customizable Connection Timeouts
Customizable Temporary or Permanent BAN U U
Customizable Retry Management U U U U U
Stopping DNS Poisining at Start
Online Traffic Reporting ( Time - Transferred Data - Item ) U U U
Online Ultimate Traffic Reporting ( Messaging between email Clients ) U U U U U U
Guard Options for Tracking Inside Poisining ( Bounce Check Method )
User Validating Attack Stopping
Quarantine Options
Handling and Managing Message Routing Fingerprint ( Received by in Mail Header ) O
Multi-Server Replication ( Multi Node + Same Database )
Cluster Configuring ( Multi Node + Multi Database )
Web Console
Parental Control O
IP Optimized Mobile Applications Messaging ( DHCP Based Mobile Networks )
Role Management ( Only Inbound - Only Outbound )
Internal UTF-8 DNS
Quick Configuring Internal DNS and Trusted DNS's
Configuring Private Untraceble Messaging between Nodes
UTF-8 Domain Email Adresses
Port Management ( Communication with Standart 25,465,587 )
Port Management ( Communication with Selectable Private Ports Except 25,465,587)
Private Port Messaging between Nodes ( Government Operations )
Only Nodes Communication ( Goverment Operations )
Crypto engine: AES 128-256, SHA-1,SHA-256 ( Only Node to Node Communication ) N U U U U U U U U U U U U U U U
Private Cyrpto : Client Defined or similar TOR N
Common Private Cyrpto Server for Multi Domain & Servers N
Open Source .NET and Database Management N
Easy Configuring and Creating Private Web Based Mail Services
Ready to Windows,Android,iOS Applications Connects N
Auto Detecs Newsletters and Newsletter engines ( Already %72 Success )
GSM Messaging Manage,Control,Billing or Bartering N
Working as GSM Messaging Gateway N U U U U U U U U U U U U U U U
Check System Resources
Load Balancing Between Nodes
Disaster Mode U U U U U U U U U U U U U U U
Automatic System Health Reporting via email or to SMS Gateway
Updates on Request
Updates on Global Rules
Running on Windows Platform
Creating Special Test Websites as Mxtoolbox N
Guarding Big Clouds or Datacenters
Remote Data Backing Up
User and Domain Based Traffic Usage API Management for Other Applications                              
Virus Scanning
Virus Engine
Php Vulnerability Engine
Auto detecting php attack softwares
Remote MTA Reputation O
Profiling & Statistics
Email Adresses Profiling Possibility ( Statictics Bank,Corporate or Social Media ) O
Implementing Big Profile Networks easily and Compatible
Ready to Use Next Generation 5G Networks
Ready to Use WeTransfer Style High Volume Data Mailing ( Requires Web Design ) O
High Volume Data Messaging Transfer ( Up to 2 Gigabytes ) O
Auto Translation ( Sending Auto Translated Emails ) O
Translation Engine
Ping and Distance Calculation N
Other Calculations O
Pay and Send & Receive N
Clearing Worldwide IP Blacklist Reputation ( In a Days , incl. Country Reputation )
GSM Operator Implementation N
GSM Operator to Internet Service Provider Applications N
Creating SMS or Messaging System for GSM Operators N
Open Code N                              
Demonstrated to Country Backbone U U U U U U U U U U U U U U U
Working on Medium or High Scale Datacenters
Working on Medium Size Internet Service Providers
Working on Medium or High Scale Domains