N-able Mail Assure Features
What are the features of N-able Mail Assure?
Functionality
- Email Storage
- Reporting
- Email Analysis
- Archive Backup
Administration
- Intelligence Reporting
- Email Integration Suppor
- Access Management
Maintenance
- Auditing
- Allow and block lists
- Compliance
- Archiving
Security
- Anti-Malware/Anti-Spam
- Encryption
- Quarantine
N-able Mail Assure Categories on G2
Filter for Features
Functionality
Email Storage | Compress and store email files for later referencing or auditing. 12 reviewers of N-able Mail Assure have provided feedback on this feature. | 79% (Based on 12 reviews) | |
Encryption | Protect archived emails with secure encryption. | Not enough data | |
Reporting | Based on 12 N-able Mail Assure reviews. Generate reports regarding archive storage, content searches, and more. | 74% (Based on 12 reviews) | |
Email Analysis | As reported in 12 N-able Mail Assure reviews. Generate actionable insights based off of email keywords, contacts, and more. | 79% (Based on 12 reviews) | |
Migration | Migrate email data between servers as needed. | Not enough data | |
Archive Backup | As reported in 12 N-able Mail Assure reviews. Back up archived email data. | 75% (Based on 12 reviews) | |
Anti-Spam | Prevents unwanted emails including bulk, mass, or other junk emails from reaching recipients mailboxes. | Not enough data | |
Anti-Malware | Prevents emails with malicious links or attachments embedded with malware, such as ransomware, spyware, and other viruses, from reaching email recipients. | Not enough data | |
Anti-Phishing | prevent social-engineering attacks such as phishing, spear-phishing, and c-level executive impersonation attacks. | Not enough data | |
Filtering Functionality | Provides filters such as: approved senders, whitelists, greylists such as bulk emails that may not be malicious, blocked senders, blacklists, IP reputation, content (such as profanity, credit card numbers, password protected files, and other sensitive information), virus detection, re-directs and malicious URLs, newsletter detection, attachment size, and invalid recipients. | Not enough data | |
Quarantine | Includes a quarantine area for users to manually inspect suspicious emails. | Not enough data | |
Outbound Email Monitoring | Monitors outgoing mail to prevent data loss by encrypting messages or preventing the messages from being sent. | Not enough data | |
Advanced Threat Intelligence/Protection | Includes advanced threat protections such as machine learning to conduct abnormal behavioral analysis, display name spoof detection especially regarding c-level impersonation attacks, detecting lookalike email domains that are visually confusing. | Not enough data | |
Archiving | Offers archival email retention for compliance purposes. | Not enough data | |
Reporting | Offers standard reporting functionality. | Not enough data |
Administration
Intelligence Reporting | Based on 20 N-able Mail Assure reviews and verified by the G2 Product R&D team. Actively gathers data on suspicious sources and characteristics of potentially malicious content | 82% (Based on 20 reviews) | |
Email Integration Suppor | Based on 22 N-able Mail Assure reviews and verified by the G2 Product R&D team. Supports secure implementation with popular email applications and clients. | 86% (Based on 22 reviews) | |
Access Management | Based on 20 N-able Mail Assure reviews and verified by the G2 Product R&D team. Allows administrators to set user access privileges to permit approved parties to access sensitive data. | 88% (Based on 20 reviews) | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Intelligence Reporting | Actively gathers data on suspicious sources and characteristics of potentially malicious content | Not enough data | |
Email Clients | Supports secure implementation with popular email applications and clients. | Not enough data | |
Role-Based Rules | Allows administrators to set user access privileges to permit approved parties to access sensitive data. | Not enough data |
Maintenance
Auditing | Based on 19 N-able Mail Assure reviews and verified by the G2 Product R&D team. Access pre-built and custom reports to monitor user activity and storage. | 83% (Based on 19 reviews) | |
Allow and block lists | Based on 22 N-able Mail Assure reviews and verified by the G2 Product R&D team. Prevents previous committers of fraud and other suspicious accounts from future communications | 87% (Based on 22 reviews) | |
Compliance | As reported in 20 N-able Mail Assure reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 86% (Based on 20 reviews) | |
Archiving | Based on 19 N-able Mail Assure reviews and verified by the G2 Product R&D team. Archives conversations, files, and other communications for future reference | 82% (Based on 19 reviews) |
Security
Anti-Malware/Anti-Spam | Based on 23 N-able Mail Assure reviews and verified by the G2 Product R&D team. Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools. | 88% (Based on 23 reviews) | |
Encryption | Encrypts the content of emails and their attachments. 17 reviewers of N-able Mail Assure have provided feedback on this feature. | 88% (Based on 17 reviews) | |
Quarantine | Based on 21 N-able Mail Assure reviews and verified by the G2 Product R&D team. Isolates potentially malicious content and files before they can gain network access | 90% (Based on 21 reviews) | |
Advanced Threat Protection (ATP) | Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks. | Not enough data | |
Anti-Phishing | Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks. | Not enough data | |
Account takeover prevention | Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information. | Not enough data |
Detection
Activity Monitoring | Monitors user email activity, documents behaviors for baselining and anomaly detection. | Not enough data | |
Real-Time Detection | Constantly monitors system to detect anomalies in real time. | Not enough data |
Protection
Targeted Attack Prevention | Analyzes historical email data, identifies at-risk individuals, then detects and blocks targeted spam emails. | Not enough data | |
Policy Enforcement | Allows administrators to set policies for security and governance. | Not enough data | |
Spam Filtering | Prevents spam emails containing phishing links, suspicious URLs, and malicous attatchments from reaching a user's inbox. | Not enough data |