According to recent research, spear phishing emails with malware attachments are the most common vector for deployment of APT attacks. These meticulously-crafted emails bait the user into opening attached files, with the understanding that the file will run inside the organization’s network.

odix Mail offers seamless protection from all file-based attacks that enter the network by email. The odix Mail server acts as a mail proxy or relay between the organizational mail server and the web. Each incoming message is stripped of attachments and embedded files, which are transferred to the odix Core. There, the files are inspected, malware removed, and threats neutralized. After our patented Deep File Inspection process, clean and safe files are reattached to the mail and transferred to via the mail server to their intended recipient.

odix Mail is provided with a powerful, smart management server, for total control of the file sanitization process including the CDR (Content disarm and reconstruction) and the corporate’s security policy.

Implementation of odix Mail is generic and doesn’t require any API integration. odix Mail is integrated with Microsoft Outlook (O365) and requires simple MX record configuration for activation.The typical deployment of the odix Mail solution will be between a spam service (secured email gateway) and the organization’smail server.odix offers flexible deployment either in the cloud or on the customer’s on-premises servers.

odix Mail Benefits

Secures all files entering by email

Integrates with any existing mail servers

Unique and state-of-the-art proprietary odix engines developed in house

Each file type is handled by a unique algorithm

Modular design allows adding more filters by demand

Virtual environment for each filtering process

Customize handling and permissions per users and groups

Unique and proprietary technology for saving data for forensics purposes: – Comprehensive log saving. – Viruses quarantine

odix Mail is an ultimate solution for
secured file attachments usage
Case study example

Find out more


Request a

with us