How It Works

Getting Started

The Sign Up Process

To get started with SpamGoblin, simply fill out the sign up form on our website or call us directly at 888-727-5890. We only need a few details about your business including the number of email accounts you currently have created and use. Our expert technicians will also get some technical information to help assist you in setting up your account.

Connecting To Our Server

Once we have activated your SpamGoblin account we will have you point your Mail Exchanger (MX) records to the SpamGoblin server. This process takes less than 15 minutes, but if you are not tech savvy, one of our Goblins can take care of it on your behalf.

Immediate Results

After signing up for our service and changing your MX records to point the SpamGoblin server, we will begin receiving your emails. Our advanced software filters through all emails–good and bad–but only sends you emails that have been cleaned. As an extra level of security you can also change your email server to only accept connections from our secured IP range. We are happy to help assist you with setting this up if needed!

Not only are we a filtering service, we also provide redundancy as well. If your email server or internet connection goes down, we keep emails for 4 days until you are able to get your email server back online. This is a great backup plan.

Spam Filtering

Solving The Spam Problem

To win the war against spam, businesses must evolve their spam defenses faster than spammers are able to evolve their techniques.

SpamGoblin gathers real-time spam intelligence from a number of sources and then actively uses this intelligence to block spam. SpamGoblin tracks tens of thousands of live spam email signatures which identifies the majority of spam. In addition, a number of third-party spam databases, several DNS checks, and message-formatting tests are used to analyze each email.

SpamGoblin aggregates all of this data into a collection of several thousand spam tests performed on emails entering the hosting system. The results identify more than 99% of spam with virtually zero false-positives.

The Human Element

One of the elements that sets SpamGoblin apart from other spam services is that SpamGoblin employs a staff of highly trained individuals who manually comb each email to ensure that we are providing our customers with the best filtering solution possible. Not only do we use advanced software to track and stop spam messages, but we also rely on our expert employees.

Stopping Spam Cold

Since our creation in 2007, we have filtered through millions of business emails and stopped 99.8% of spam messages from continuing on to their destination. We are extremely proud of this number and continue to try and raise the bar by constantly updating our spam definitions.

Virus Scanning

Restricted Attachments

Emails are searched for dangerous types of file attachments. Dangerous files contain executable code, which can be used by malicious persons to spread viruses or do harm to your computer. Restricted file types include, but are not limited to program files (.exe, .com), script modules and files (.bas, .vbs, .js), Internet links (.url, .ins), and shortcuts to files (.lnk, .pif). When an email is sent or received containing a restricted file attachment, the email is rejected and the sender receives a “bounced” email notification informing them of the restriction. This is useful to notify the person sending the email of a problem.

Normalization

This stage searches for email formatting vulnerabilities used by viruses to hide from virus scanners. If any vulnerability is found, our system will correct the formatting of the message so it is thoroughly scanned for viruses. This process is called “normalizing” the message. Normalization protects against all known security threats.

Decompression

If the email contains any compressed attachments such as zip files, compressed attachments are temporarily unzipped and the contents are scanned for viruses. Many of today’s viruses use compression as a way to sneak past virus scanners. Decompression elevates that risk. If the attachment cannot be decompressed, such as the case with password protected zip files, the original file is scanned for virus signatures that occur in compressed attachments.