-- GW_MODIFICATIONS 2009-07-15 - javascript below to toggle class of selected navigation link to "currentpage" - added variables to staticpage plugin to provide necessary parent page info into this template - altered output of sitenav section to make currentpage navigation drill up into parentpage link of main navigation for consistent user experience //-->
Your enterprise-class eMail solution, your compliance needs - SOLVED

Redundant servers and redundant (RAID) storage provide fail-safe infrastructure for your business-critical messaging needs.
Standards-based SMTP and IMAP services on opensource UNIX platforms for ROCKSOLID stability, and maximum interoperability with the diverse internet.
State-of-the-art anti-virus and anti-spam protection provide maximum protection from the dangers of data-borne threats.
Base package includes 10 accounts and 1 gigabyte of storage. Additional accounts and gigabytes may be added singly, or in "packs" of 5, 10 or 25, for flexible and cost-effective growth.

IMAP
Our redundant unix IMAP servers provide a robust, industrial-strength email engine. IMAP "maildir" is the intelligent choice for standards-based, portable, professional message management and storage.
- Email messages are stored on our servers using a robust, industrial strength storage and indexing engine.
- Messages may be accessed securely from multiple personal computers and/or email client applications, including mobile devices, and webmail from anywhere...
- All eMail client applications stay "in-sync", because they are all accessing the same set of online data.
- Users can create their own Folders, and an optional web-based Filter program can pre-sort messages to those folders.
- All messages are automatically backed-up every night.
Anti-VIRUS Sophisticated anti-virus scanning of incoming and outgoing messages
- Two different anti-virus engines attack the threat independently, each with their own methodology of extracting and matching the unique qualities of each virus.
- Using both heuristic rule-based pattern matching methodologies, and viral code signature database matching techniques, we provide for a highly accurate protection from this very real threat.
- Extensive flexibility regarding file types and message formats. Custom solutions are available for specific needs or applications.
- Pattern signature and rules databases are updated continuously, maintaining our email engines as current as the latest threats.
- Messages found as malevolent are automatically quarantined, appropriate parties notified, and the message is held for disposal, available via the web.
Anti-SPAM Sophisticated anti-UCE Unsolicited Commercial Email filtering to reduce SPAM
- Two different anti-virus engines attack the threat independently, each with their own methodology of extracting and matching the unique qualities of each virus.
- Using both heuristic rule-based pattern matching methodologies, and viral code signature database matching techniques, we provide for a highly accurate protection from this very real threat.
- Extensive flexibility regarding file types and message formats. Custom solutions are available for specific needs or applications.
- Pattern signature and rules databases are updated continuously, maintaining our email engines as current as the latest threats.
- Messages found as malevolent are automatically quarantined, appropriate parties notified, and the message is held for disposal, available via the web.
USER PORTAL to manage quarantined eMail messages and SPAM
- Two different anti-virus engines attack the threat independently, each with their own methodology of extracting and matching the unique qualities of each virus.
- Using both heuristic rule-based pattern matching methodologies, and viral code signature database matching techniques, we provide for a highly accurate protection from this very real threat.
WEBMAIL available Industrial-strength, leading webmail application available as part of webhosting package
- Two different anti-virus engines attack the threat independently, each with their own methodology of extracting and matching the unique qualities of each virus.
- Using both heuristic rule-based pattern matching methodologies, and viral code signature database matching techniques, we provide for a highly accurate protection from this very real threat.