(21)
4.8 out of 5
Visit Website
Sponsored
Intelligence Reporting | Based on 23 Mesh reviews. Actively gathers data on suspicious sources and characteristics of potentially malicious content | 93% (Based on 23 reviews) | |
Email Integration Suppor | Based on 21 Mesh reviews. Supports secure implementation with popular email applications and clients. | 96% (Based on 21 reviews) | |
Access Management | Allows administrators to set user access privileges to permit approved parties to access sensitive data. This feature was mentioned in 20 Mesh reviews. | 94% (Based on 20 reviews) |
Auditing | As reported in 21 Mesh reviews. Access pre-built and custom reports to monitor user activity and storage. | 96% (Based on 21 reviews) | |
Allow and block lists | As reported in 24 Mesh reviews. Prevents previous committers of fraud and other suspicious accounts from future communications | 99% (Based on 24 reviews) | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. 18 reviewers of Mesh have provided feedback on this feature. | 98% (Based on 18 reviews) |
Anti-Malware/Anti-Spam | Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools. 23 reviewers of Mesh have provided feedback on this feature. | 99% (Based on 23 reviews) | |
Quarantine | Based on 23 Mesh reviews. Isolates potentially malicious content and files before they can gain network access | 100% (Based on 23 reviews) | |
Advanced Threat Protection (ATP) | Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks. This feature was mentioned in 18 Mesh reviews. | 99% (Based on 18 reviews) | |
Anti-Phishing | Based on 23 Mesh reviews. Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks. | 98% (Based on 23 reviews) |