Reflexion provide a range of hosted email services that are differentiated by their ease of implementation and use, their unique features and effectiveness, and their affordability.
Reflexion Total Control (RTC)
RTC is a hosted email security service that blocks spam, viruses and volume-based attacks before it reaches the corporate network. Reflexion’s unique technology also identifies address-sharing and the sources of spam, and provides concrete tools for preserving the integrity of one’s primary email address. Automatic inbound email queuing assures email continuity in the event of a local server outage, and outbound email filtering protects one’s reputation and helps to avoid the business disruption of IP address blacklisting. Reflexion’s service provides the configurability that IT Solution Providers need to address a wide range of customer requirements, with the automation and simplicity that ISPs require for their subscribers.
Reflexion Archiving, Discovery and Recovery (RADAR)
RADAR provides businesses with a complete, searchable email archive that can be accessed at any time, from anywhere on the Internet. RADAR provides email continuity during local email server outages, full email disaster recovery from more severe outages, rapid retrieval of emails that have been misplaced or deleted locally, a searchable knowledgebase of a company’s intellectual property stored in email, and a rapid means of responding to discovery requests for legal proceedings governed by the new Federal Rules of Civil Procedure.
With an increase in regulatory pressures, identity theft and highly publicized security breaches in the media, companies that do not encrypt emails containing sensitive information are at risk of regulatory fines, lawsuits, negative PR and a loss of company intellectual property. Companies dependent on building a relationship of trust with their customers and business partners cannot afford to risk such potential damages to their brand image. Email encryption is, therefore, an important piece of the security puzzle; it protects your company, your customers and business partners. The question then becomes how to implement this critical business process.