Email Protection

Email Protection

Email Security and Protection

Proofpoint Email Protection is the industry-leading email gateway, which can be deployed as a cloud service or on premises. It catches both known and unknown threats that others miss. Powered by NexusAI, our advanced machine learning technology, Email Protection accurately classifies various types of email. And it detects and blocks threats that don’t involve malicious payload, such as impostor email—also known as business email compromise (BEC)—using our Advanced BEC Defense. You can also automatically tag suspicious email to help raise user awareness. And you can track down any email in seconds. Plus, our granular email filtering controls spam, bulk graymail and other unwanted email.

Gartner Market Guide for Email Security

It’s not always clear how and where to invest your cybersecurity budget for maximum protection. Gartner’s «Market Guide for Email Security» is a great place to start.

Advanced BEC Defense

Phishing, imposter and email fraud protection

Proofpoint Advanced BEC Defense powered by NexusAI is designed to stop a wide variety of email fraud. This includes payment redirect and supplier invoicing fraud from compromised accounts. For these types of threats, you need a more sophisticated detection technique, since there’s often no malicious payload to detect.

With Advanced BEC Defense, you get a detection engine that’s powered by AI and machine learning. And it’s specifically designed to find and stop BEC attacks. It analyzes multiple message attributes, such as:

  • Message header data
  • Sender’s IP address (x-originating IP and reputation)
  • Message body for urgency and words/phrases, and more

It then determines whether that message is a BEC threat. And it detects various attacker tactics, such as reply-to pivots, use of malicious IPs, and use of impersonated supplier domains.

Advanced BEC Defense also gives you granular visibility into BEC threat details. It provides the BEC theme (e.g., supplier invoicing, gift card, payroll redirect), observations about why the message was suspicious, and message samples. These key details help your security team better understand and communicate about the attack.

Block malicious email

Multilayered detection

We use multilayered detection techniques, including reputation and content analysis, to help you defend against constantly evolving threats. With Email Protection, you get dynamic classification of a wide variety of emails. These include phishing, malware, impostor threats, bulk email, spam and more.

Raise user awareness

Email warning tag

You can automatically tag suspicious email. This reduces the risk of potential compromise by making your end users more cautious of uncertain email.

Track down email in seconds

Smart search

Pinpoint hard-to-find log data based on dozens of search criteria. You can also swiftly trace where emails come from and go to.

Classify and quarantine email

Gain Granular control of unwanted email

Identify graymail (e.g., newsletters and bulk mail) with our granular email filtering. And give your users individual control over their low-priority emails. This also helps to reduce your IT overhead.

Related Products

Targeted Attack Protection

Targeted Attack Protection provides you with an innovative approach to detect, analyze and block advanced threats targeting your people. And it gives you unique visibility around these threats.


Essentials is an easy-to-use, integrated, cloud-based solution. It provides email security, continuity, encryption, and archiving for small and medium businesses.

Business continuity

With Business Continuity, you can maintain email communications if your on-premises or cloud-based email server fails.

Sendmail Sentrion

Sendmail Sentrion provides full-content message inspection that enables policy-based delivery of all human and machine-generated email.

5 Best Email Protection Tools

Email protection isn’t something to be taken lightly. Email can put users at risk of scams, malware, phishing, stolen devices, and stolen passwords. Without effective email protection tools, you could be giving hackers a direct route into your data and resources.

But finding the best email protection software isn’t easy. The IT security software market has become increasingly saturated, with every email protection program claiming to be the best. I’ve created this list of the best available email protection software to help you choose between the biggest players in email data protection.

Feel free to jump ahead to each tool review:

In ranking these products, I’ve considered user-friendliness, range of functionality, sophistication of features, and the trustworthiness of the vendor. Overall, SolarWinds ® Identity Monitor ranks the highest. This email protection program balances range, ease of use, and sophistication. To find out more about Identity Monitor and how the other products compare, check out my list below.

SolarWinds Identity Monitor

SolarWinds Identity Monitor is a comprehensive and dynamic email protection program. It’s first on this list because its features combine scope, genuine usefulness, and sophistication to deliver a truly enterprise-grade email protection tool. This program employs an attractive user interface designed to be simple and easy to navigate. And unlike many tools on the market, it’s scalable and doesn’t compromise on value as your company grows.

Identity Monitor offers three main capabilities to prevent account takeover:

  1. Monitoring your email domains for any signs of exposure
  2. Notifying you of any leaked data
  3. Resetting passwords before they’re compromised

This tool allows you to establish a domain watch list, which is viewable in a table format. Alongside the domain name, you’ll see when the domain was last discovered, the number of corporate records associated with it, its status, and whether it’s verified. You can perform actions on each of the domains within this page, edit the number of entries you can see, adjust column visibility, and conduct searches. You can also sort information to reflect your priorities.

As soon as a leak is identified, Identity Monitor notifies you, so you can take immediate action. This might include interrogating recent logins or resetting passwords. You can also force password resets for impacted accounts. The program gives you recommendations to keep your team informed on email protection best practices, like maintaining a password manager and using unique credentials.

Identity Monitor is always analyzing new data leaks, alerting you to how many of your corporate records have been discovered in a breach and how sensitive the source is. All collected data is accompanied by contextual details revealing the severity of the breach and the primary concern associated with it (e.g., password reuse).

This email data protection tool lets you add IPv4 CIDR or IPv4 addresses to your watch list, monitoring them for breaches and botnets. You can also monitor the private email credentials of key employees as well as multiple domains.

You can try Identity Monitor for free by entering your credentials into the site, which will show your current level of exposure. A free trial is also available.

SolarWinds Server & Application Monitor

SolarWinds Server & Application Monitor (SAM) isn’t strictly a security solution. It’s an email monitoring tool and an essential part of wider monitoring processes. It’s also highly effective because it consolidates all your email monitoring into a single dashboard. This streamlines your email security and oversight, so you’re always informed.

SAM comes with out-of-the-box mail Exchange server monitoring capabilities, giving you detailed insight into patterns of behavior possibly resulting in poor performance. This includes testing round-trip time and email delivery success for MAPI, POP3, and IMAP4 mail protocols. You can monitor email servers from the end user’s perspective and gain visibility across all top web email clients, including Microsoft Outlook Web Access. This program is powerful enough to manage high email rates, POP3 requests, and MAPI operations, so it can meet the requirements of growing enterprises.

SAM identifies CPU bottlenecks in email servers and unusual spikes in email traffic. It’s able to diagnose issues related to storage, replication, database capacity, and RPC requests in a matter of minutes, and it can troubleshoot in real time. Troubleshooting is supported by historical performance-related data. You can use SAM to view the size of a database, the amount of space currently in use, the total number of mailboxes, and the average size of a mailbox.

Читайте также  Как не перекачать ноги девушке?

SAM is a great tool for investigating potential email issues. It enables you to drill down into key information, search for users, and troubleshoot user problems in Exchange. You can view the size and number of mailbox attachments, patterns in sent and received emails, and synchronized devices, which can assist with the identification of spam issues associated with a user’s account.

Because email protection cannot be achieved without effective email monitoring capabilities, SAM is a valuable addition to any IT monitoring solution. The level of insight this tool provides is unrivaled, affording you rare visibility into your email servers capable of directly informing the actions you take to protect them. You can try a fully functional free trial of SAM for 30 days.

Proofpoint Email Protection

Proofpoint provides many IT security products, including Advanced Threat Protection, Security Awareness Training, Cloud App Security, Information Protection, and Digital Risk Protection. As a security-focused vendor, it’s no surprise the company’s email protection solution is effective. Proofpoint Email Protection establishes numerous security layers to make it as difficult as possible for malware and non-malware threats to infiltrate your email.

This program controls every component of outbound and inbound email, identifying and blocking threats before they deal damage. It also prevents private information from being compromised, shared, or accessed by the wrong people. Email Protection lets you establish email filtering policies as well as complex firewall rules and antivirus policies.

Email Protection leverages everything at its disposal, including user bulk mail actions, to improve future detection accuracy. The program uses a Stateful Composite Scoring Service (SCSS)—a machine learning operation—to recognize and prevent impostor attacks. SCSS learns from your environment and uses Proofpoint customer data to continuously improve its email fraud blocking capacity.

However, Proofpoint Email Protection isn’t as user-friendly as it could be, and it has a steep initial learning curve. You can watch a demo here.


Mimecast offers a cloud-based approach to email protection software. Cloud-based programs can be accessed from anywhere, provided you have an internet connection. The Mimecast solution is intelligent and continuously evolving to keep pace with increasingly insidious and sophisticated threats.

Mimecast is a comprehensive program providing advanced threat protection against spear phishing, email compromise attacks, malicious URLs, weaponized attachments, fraud, social engineering, and much more. It also offers data leak protection, secure messaging, and secure transfer for large files.

There’s zero capital outlay associated with this program, and because it’s cloud-based, Mimecast lets you conveniently deploy company-wide security policies from a single web-based console. However, there is some disagreement about how secure cloud-based solutions are, and some IT administrators will prefer on-premises programs. You can schedule a demo of Mimecast.

Barracuda Total Email Protection

Barracuda Total Email Protection is a bundled solution combining Barracuda’s full range of email protection tools. This bundle is easy to implement and combines basic email protection utilities—like spam blocking, encryption, backup, archiving, and email filtering—with spear phishing simulations, full training, and much more. This bundle is a one-stop solution for email protection, which simplifies due diligence and post-purchase evaluation and eradicates the need to integrate with other products.

Barracuda Sentinel, one of the products included in the bundle, uses a powerful AI engine to detect advanced threats, including targeted spear phishing attacks and account takeover. Barracuda PhishLine, another included product, offers email protection training in the form of a spear phishing simulation platform. With this tool, you can learn to identify email threats, even on devices outside corporate email gateways. Lastly, Barracuda Forensics and Incident Response automates incident response operations, proposing remediation options so you can manage attacks rapidly and effectively.

Barracuda Total Email Protection is an enterprise-grade email protection program, but it may not be suitable or cost-effective for smaller organizations. It could also be more beginner-friendly, as learning to navigate the user interface takes some time. You can request a free evaluation at the bottom of this page.

Choosing the Best Email Protection Software

SolarWinds Identity Monitor stands out as the best email protection tool. The software’s range of functionality is impressive, and its user interface is easy to navigate. This beginner-friendly program offers an enterprise-grade experience at a fair price.

A provider’s reputation is always important to consider, as many vendors provide top-quality tools but can’t be relied upon to maintain prices. SolarWinds has a consistent track record of producing some of the best enterprise-grade IT tools available. Its product range is dependable and well supported. If you’re looking for the best email protection software available, Identity Monitor is the tool for you.

Top 6 email security best practices to protect against phishing attacks and business email compromise

Most cyberattacks start over email—a user is tricked into opening a malicious attachment, or into clicking a malicious link and divulging credentials, or into responding with confidential data. Attackers dupe victims by using carefully crafted emails to build a false sense of trust and/or urgency. And they use a variety of techniques to do this—spoofing trusted domains or brands, impersonating known users, using previously compromised contacts to launch campaigns and/or using compelling but malicious content in the email. In the context of an organization or business, every user is a target and, if compromised, a conduit for a potential breach that could prove very costly.

Whether it’s sophisticated nation-state attacks, targeted phishing schemes, business email compromise or a ransomware attacks, such attacks are on the rise at an alarming rate and are also increasing in their sophistication. It is therefore imperative that every organization’s security strategy include a robust email security solution.

So, what should IT and security teams be looking for in a solution to protect all their users, from frontline workers to the C-suite? Here are 6 tips to ensure your organization has a strong email security posture:

You need a rich, adaptive protection solution.

As security solutions evolve, bad actors quickly adapt their methodologies to go undetected. Polymorphic attacks designed to evade common protection solutions are becoming increasingly common. Organizations therefore need solutions that focus on zero-day and targeted attacks in addition to known vectors. Purely standards based or known signature and reputation-based checks will not cut it.

Solutions that include rich detonation capabilities for files and URLs are necessary to catch payload-based attacks. Advanced machine learning models that look at the content and headers of emails as well as sending patterns and communication graphs are important to thwart a wide range of attack vectors including payload-less vectors such as business email compromise. Machine learning capabilities are greatly enhanced when the signal source feeding it is broad and rich; so, solutions that boast of a massive security signal base should be preferred. This also allows the solution to learn and adapt to changing attack strategies quickly which is especially important for a rapidly changing threat landscape.

Complexity breeds challenges. An easy-to-configure-and-maintain system reduces the chances of a breach.

Complicated email flows can introduce moving parts that are difficult to sustain. As an example, complex mail-routing flows to enable protections for internal email configurations can cause compliance and security challenges. Products that require unnecessary configuration bypasses to work can also cause security gaps. As an example, configurations that are put in place to guarantee delivery of certain type of emails (eg: simulation emails), are often poorly crafted and exploited by attackers.

Solutions that protect emails (external and internal emails) and offer value without needing complicated configurations or emails flows are a great benefit to organizations. In addition, look for solutions that offer easy ways to bridge the gap between the security teams and the messaging teams. Messaging teams, motivated by the desire to guarantee mail delivery, might create overly permissive bypass rules that impact security. The sooner these issues are caught the better for overall security. Solutions that offer insights to the security teams when this happens can greatly reduce the time taken to rectify such flaws thereby reducing the chances of a costly breach

Читайте также  За сколько времени можно накачать пресс девушке?

A breach isn’t an “If”, it’s a “When.” Make sure you have post-delivery detection and remediation.

No solution is 100% effective on the prevention vector because attackers are always changing their techniques. Be skeptical of any claims that suggest otherwise. Taking an ‘assume breach’ mentality will ensure that the focus is not only on prevention, but on efficient detection and response as well. When an attack does go through the defenses it is important for security teams to quickly detect the breach, comprehensively identify any potential impact and effectively remediate the threat.

Solutions that offer playbooks to automatically investigate alerts, analyze the threat, assess the impact, and take (or recommend) actions for remediations are critical for effective and efficient response. In addition, security teams need a rich investigation and hunting experience to easily search the email corpus for specific indicators of compromise or other entities. Ensure that the solution allows security teams to hunt for threats and remove them easily.
Another critical component of effective response is ensuring that security teams have a good strong signal source into what end users are seeing coming through to their inbox. Having an effortless way for end users to report issues that automatically trigger security playbooks is key.

Your users are the target. You need a continuous model for improving user awareness and readiness.

An informed and aware workforce can dramatically reduce the number of occurrences of compromise from email-based attacks. Any protection strategy is incomplete without a focus on improving the level of awareness of end users.

A core component of this strategy is raising user awareness through Phish simulations, training them on things to look out for in suspicious emails to ensure they don’t fall prey to actual attacks. Another, often overlooked, but equally critical, component of this strategy, is ensuring that the everyday applications that end-users use are helping raise their awareness. Capabilities that offer users relevant cues, effortless ways to verify the validity of URLs and making it easy to report suspicious emails within the application — all without compromising productivity — are very important.

Solutions that offer Phish simulation capabilities are key. Look for deep email-client-application integrations that allow users to view the original URL behind any link regardless of any protection being applied. This helps users make informed decisions. In addition, having the ability to offer hints or tips to raise specific user awareness on a given email or site is also important. And, effortless ways to report suspicious emails that in turn trigger automated response workflows are critical as well.

Attackers meet users where they are. So must your security.

While email is the dominant attack vector, attackers and phishing attacks will go where users collaborate and communicate and keep their sensitive information. As forms of sharing, collaboration and communication other than email, have become popular, attacks that target these vectors are increasing as well. For this reason, it is important to ensure that an organization’s anti-Phish strategy not just focus on email.

Ensure that the solution offers targeted protection capabilities for collaboration services that your organization uses. Capabilities like detonation that scan suspicious documents and links when shared are critical to protect users from targeted attacks. The ability in client applications to verify links at time-of-click offers additional protection regardless of how the content is shared with them. Look for solutions that support this capability.

Attackers don’t think in silos. Neither can the defenses.

Attackers target the weakest link in an organization’s defenses. They look for an initial compromise to get in, and once inside will look for a variety of ways increase the scope and impact of the breach. They typically achieve this by trying to compromise other users, moving laterally within the organization, elevating privileges when possible, and the finally reaching a system or data repository of critical value. As they proliferate through the organization, they will touch different endpoints, identities, mailboxes and services.

Reducing the impact of such attacks requires quick detection and response. And that can only be achieved when the defenses across these systems do not act in silos. This is why it is critical to have an integrated view into security solutions. Look for an email security solution that integrates well across other security solutions such as endpoint protection, CASB, identity protection, etc. Look for richness in integration that goes beyond signal integration, but also in terms of detection and response flows.

6 Best Email Security Tools + Protection Services

Jul 7, 2020 — By Skirmantas Venckus

Email system security should be your business top priority. Email is the number one point for hackers to access your valuable business data, email attacks like business email compromise and phishing are on the rise.

Your first defense plan should be an Email Protection Software, a platform that protects your emails against hackers and viruses.

Detecting threats to emails requires more than just having a spam-blocking system. Threat vectors are launched from particular angles at once, and hackers have developed packages of malware, each performing a functional task to provide towards the corruption of your email system.

Emails are a vital source of data, and they can be used by malware to send out stolen data. Blocking attacks against you requires multiple email protection strategies. It can seem like a complicated task, and very few email protection services on the market can satisfactorily fulfill all requirements.

According to Disk Drill Data Recovery, many large companies, annually lose a lot of data due to the fault of developers or specialists themselves, there is a data leak as well as unplanned removal for technical reasons.

Luckily, there are several great email protection systems out there, and we reviewed all of them. Companies are not identical, and with various email options and the requirements to protect an email can’t have in a one-size-fits-all strategy. We crafted a list of email protection solutions that will help you to protect your business according to your needs.

TOP6 Email Security Tools

This list of choices includes protection for chase fraud protection email, phishing protection, virus protection, cloud email security. Suitable for Yahoo, Office 365, Outlook, Gmail (Google), AOL, Apple and etc.

Reading through the full descriptions of each of these email protection solutions should help you to work out which email security appliance is suitable for your company.

1. Easydmarc


  • Powerful Standards Application.
  • Alert Your Employees.
  • Protect Data.
  • Reach the Inbox.
  • Know Senders.

Easydmarc stops hackers from sending emails from the corporate domain. They minimize the possibility of data leakage and financial loss for companies by preventing email fraud and improve reputation and trust among clients, partners, and employees due to improved email security systems.

2. PEP


  • Peer-to-peer and end-to-end email encryption.
  • Automatic protection of emails from being read or modified.
  • Seamless use on your laptop, desktop, tablet, and mobile with PEP sync.
  • Protection rating at a glance using traffic lights.
  • Free and open source software.

PEP is a great email protection service tool for organizations across the private and public sectors with extensive and fully automated encryption tools. This tool helps to avoid phishing and business email compromise.

Читайте также  Изолят растительных белков что это?

PEP software is easy to install and available for iOS, Android, Outlook, Swift, and Thunderbird. Unlike other solutions, PEP doesn’t need any training or manual key, trust, and identity management.

As PEP company mentioned, they believe that everyone deserves privacy and security by default and sending emails as they like. The PEP engine is Open Source, and the P≡P software is free for the community and the customers.

3. Europeanmx


  • In- and outbound spam and virus filtering.
  • Email archiving according.
  • Email queuing on server failure.
  • Reputation protection.

Spam and malware will end up in the trash box, while your email communication is immediately passed through to the mail server and can be archived automatically if you like. EuropeanMX uses a self-adaptive, database with constant real-time synchronization.

It protects you and maintains a high reputation for your company’s IPs and ensures that adverse events do not disrupt the actual email communication.

4. Sonicwall


  • The Inbound Spooling feature allows users to hold mail when all the customer’s receivers are unavailable.
  • Phishing protection and email fraud.
  • Scan malicious URLs at the time-of-click for advanced threats.
  • Prevent email fraud through powerful email authentication policies, including DMARC.

Sonicwall is the best security email service tool for various industries like distributed enterprise, healthcare, federal, retail, and hospitality, etc.

The email security service stops spam, phishing and virus attacks with over 99% effectiveness using multiple techniques including reputation checks. The technology also provides Denial of Service (DoS) protection.

Advanced techniques are also used to examine email content, such as adversarial filtering, image analysis, and gibberish detection, to uncover hidden threats.

Sonicwall is more for advanced email protection software users, and they offer security not only for email but for all of your systems. We’d recommend this software to larger organizations that can take advantage of this.

5. Cisco


  • Automatically blocks links it considers to be unsafe, which protects from emails even when they look genuine.
  • The reporting and logging on offer are reliable, bring you insights into your email security.
  • Active spam filtering, which will ensure you only get the emails you want in your inbox.
  • Data loss protection, with methods that ensure your emails, are protected with encryption.

Cisco has created a reliable email security gateway that offers a strong defense against email compromise and phishing. Their research team looking at email threats is vast, ensuring you will always have access to cutting-edge threat protection.

6. Proofpoint


  • The software protects against email threats, effective spam protection, dominant URL defense, and content filtering.
  • Proofpoint’s user console is modern, providing granular controls and improved threat reporting.
  • It’s an ideal solution for companies and MSPs, with easy set-up and competitive pricing.
  • Great tool for teams using Office 365, as it offers Azure Active Directory Sync, meaning implementation is seamless, and new users are automatically added.

Proofpoint is a market-leading email security gateway, and one of the largest email security vendors. Proofpoint Essentials is created for small and mid-sized organizations.

Essentials is a reliable solution for email protection, encryption, archiving and continuity, delivered as a single platform, with a single admin console.

Proofpoint has unparalleled visibility into email threats with its global threat intelligence platform that spans email and social and mobile.

Proofpoint is a cost-effective, with many features such as archiving, and encryption included as part of the paid package that would otherwise be expensive add-ons. That’s why it is a great tool for smaller organizations.

Choosing an email protection solution

Reading the descriptions of each of these software, you will narrow down your choice to one we recommend. Many of the software in this list offer free trials, so you can test out yourself which program suits your needs.

Whichever program you choose, it is essential to recognize the weakness that email systems represent. Email security is a crucial part of your system defenses.

Email is the most common threat vector used by cyber criminals. Choose wisely today, which prevention tool you will use for your web content, and save your data.

What is Email Protection?

Email Protection or Email Security refers to the methodologies implied to safeguard the content and access to email service or individual accounts. In other words, Email Protection enables a business or organization to control and manage the overall access to one or more email addresses/accounts. Every email service provider has an email protection mechanism in place to ensure subscriber email accounts and data are safe from online fraudsters – at rest and in transit.

Email Protection employs numerous techniques to safeguard email service from hackers. Be it an individual account, service or end-user standpoint, effective email security measures cover strong passwords, password rotations, and spam filters.

Features and Benefits of Email Protection

Advanced Protection
Take control of routing email to users by setting up robust policies. Email Protection enables you to set up robust policies whereby you can create your own specific firewall rules based on your needs. Gather data and maintain an extensive pack of search tools to ensure your organization’s email is protected.

Email Impostor Threat
It is hard to identify email impostor threats. The latest defense mechanism will allow you to run checks on the impostor threats to more effectively detect and block email fraud.

Uninterrupted Email Service
An uninterrupted email service nurtures the organization growth by ensuring continuity. A downtime brings down productivity and hits badly on the performance part. Enterprise Continuity takes care of such issues and provides full access to users through Outlook integration, a web portal or native mobile support.

Internal Mail Defense
Today, a lot of organizations are moving to the Cloud which poses the threat of compromising more and more accounts. The Internal Mail Defense fetaure scans all the internal email traffic and offers the multilayered approach. The internal defense easily takes care of spam, malware or phishing attacks and keeps them at bay.

Email Protection Software Protects Your Corporate Email

Email Protection Suite offers superior email protection and lessens the burden on internal resources. People can stay rest assured of the email safety in an organization. Here are some of the key features that the email protection services pack: The reputation filter aids in rating the domain in no minute and it is a dynamic solution. The Spam Filter analyzes all the messages which cover URL links too. The malware filter feature deflects all the malware attempts using unknown malware. The secure unsubscribe option enables users to unsubscribe from unwanted distribution lists.

Important Email Protection Tips You Should Know About Comodo Dome

The enterprise anti-spam and threat prevention system

Comodo Dome Anti-spam uses an advanced array of anti-virus scanners, content analysis engines, and spam filters to stop undesired emails from ever entering your network.

Easy to Use

The single console handles per-user and per-group mail management. Dome Anti-spam offers you the option of defining several types of profiles with different security features and restrictions.

Innovative Advanced Protections

The Comodo’s Containment technology protects from the latest ransomware, zero-malware and other high-level threats. New and Unknown files are analyzed by the Valkyrie file verdict system. All users are free to open, execute and use the attachments with ZERO risks of infection.

Flexible Usage

Important information can be accessed instantaneously using exhaustive archiving and instant search. Stay rest assured, there is no fear of losing any emails, simply access any emails in the Dome Anti-spam archive, which uses advanced search options.

Stable Filtering

Simply restore the bandwidth using Stable Filtering that was lost due to unsolicited email traffic. This will also reduce the load on your email server.