{"id":650,"date":"2025-09-28T00:27:18","date_gmt":"2025-09-28T00:27:18","guid":{"rendered":"https:\/\/dev.networks.engineering\/?page_id=650"},"modified":"2025-10-15T10:50:42","modified_gmt":"2025-10-15T10:50:42","slug":"email-filtering","status":"publish","type":"page","link":"https:\/\/www.networks.engineering\/index.php\/email-filtering\/","title":{"rendered":"Email Filtering"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"650\" class=\"elementor elementor-650\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7c2608 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"e7c2608\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;animation&quot;:&quot;zoomIn&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a106cd elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4a106cd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">\nEmail Filtering <br>\nServices<\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0488175 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0488175\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"main-section\"><div class=\"container-main-1160\"><section class=\"c-full-bleed-title module-68e8104c2676f\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><section class=\"c-full-bleed-title module-68e89428bff46\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><section class=\"c-full-bleed-title module-68e8bdc68f812\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><section class=\"c-full-bleed-title module-68e8bfda42653\" data-rocket-location-hash=\"fe19b82ca538b8c89d0dfec69b9379d7\"><div class=\"o-container\" data-rocket-location-hash=\"280c4df016dbfde607f76a8aa7e78bae\"><div class=\"c-full-bleed-title__copy\"><section class=\"c-full-bleed-title module-68e8c417d4df6\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><section class=\"c-full-bleed-title module-68e8c41f8a00f\"><div class=\"o-container\"><div class=\"c-full-bleed-title__copy\"><p><strong>Networks Engineering email filtering services eliminate malware threats and improve the relevancy of your emails<\/strong><\/p><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb4ac7f e-flex e-con-boxed e-con e-parent\" data-id=\"cb4ac7f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-847d9c7 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"847d9c7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Refine What Comes Through To Your Inbox &amp;\nReduce Threats<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cd46e2 elementor-widget elementor-widget-text-editor\" data-id=\"5cd46e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Safeguarding your sensitive data and critical systems from malicious threats is paramount. Protect your systems with Networks advanced managed antivirus &amp; anti-ransomware solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd707cc elementor-widget elementor-widget-text-editor\" data-id=\"bd707cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Our services act as a first line of defence for dealing with malicious emails, following our proactive approach to support. Coupled with additional services such as Phishing Testing, Server Monitoring and User Awareness Training, you can be sure your operations are safeguarded.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdd5b83 elementor-widget elementor-widget-text-editor\" data-id=\"bdd5b83\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"c-text-block module-68e8c41f8a8da\"><div class=\"o-container c-text-block__container\"><p><strong>Get in touch with one of our specialists to find out more:<\/strong><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fc21d3 e-flex e-con-boxed e-con e-parent\" data-id=\"1fc21d3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6418488 e-con-full e-flex e-con e-child\" data-id=\"6418488\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fbbf510 e-con-full e-transform e-flex e-con e-child\" data-id=\"fbbf510\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3547015 elementor-widget elementor-widget-heading\" data-id=\"3547015\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Discuss Your Requirements\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f973f06 elementor-widget elementor-widget-text-editor\" data-id=\"f973f06\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Speak with a member of our team to find out more about protecting your organisation&#8217;s most vulnerable areas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a353fed elementor-align-center elementor-widget elementor-widget-button\" data-id=\"a353fed\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/networks.engineering\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cfe3e2f e-con-full e-flex e-con e-parent\" data-id=\"cfe3e2f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-e8bdc06 e-con-full e-flex e-con e-child\" data-id=\"e8bdc06\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9711016 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"9711016\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"899\" height=\"500\" src=\"https:\/\/www.networks.engineering\/wp-content\/uploads\/2025\/10\/photo_2025-10-10_13-18-25.jpg\" class=\"attachment-full size-full wp-image-1580\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75ba0c1 e-con-full e-flex e-con e-child\" data-id=\"75ba0c1\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f139302 e-con-full e-flex e-con e-child\" data-id=\"f139302\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0294f50 elementor-widget elementor-widget-heading\" data-id=\"0294f50\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Do You Need\nAn Email Filtering\nService?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df06da5 elementor-widget elementor-widget-text-editor\" data-id=\"df06da5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Email is the single leading business communication method, with the average worker sending over 40 per day and receiving over 120 per day. Unfortunately, bundled with the many advantages of email are significant threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2da4dde elementor-widget elementor-widget-text-editor\" data-id=\"2da4dde\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The simple act of opening an email or clicking a link can release payloads of viruses which can demolish networks and internal structures. They can also have devastating consequences on your customers and contacts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-474de76 elementor-widget elementor-widget-text-editor\" data-id=\"474de76\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-left c-text-image--non-full-bleed module-68e6409d38a93\"><div class=\"o-container c-text-image__container\" data-wpr-lazyrender=\"1\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-left c-text-image--full-bleed module-68e8c417d82e3\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><p>Networks Engineering Email Filtering service provides advanced email security for your business. Our software solution acts as the first point of contact for all emails, inspecting all mail for viruses or spam.<\/p><\/div><\/div><\/section><section class=\"c-accordion-group module-68e8c417d8a8d\"><div class=\"o-container\"><div class=\"c-accordion\"><div class=\"c-accordion__question-holder\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8c102f elementor-widget elementor-widget-text-editor\" data-id=\"e8c102f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-left c-text-image--non-full-bleed module-68e6409d38a93\"><div class=\"o-container c-text-image__container\" data-wpr-lazyrender=\"1\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-left c-text-image--full-bleed module-68e8c417d82e3\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-left c-text-image--full-bleed module-68e8c41f8b05e\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-left c-text-image--full-bleed module-68e8c41f8b05e\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><div><p>Unsolicited emails, phishing attempts, spoofing and illicit content are just some of the categories of unwanted email that our solution blocks.<\/p><\/div><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/div><\/section><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c62e59d e-flex e-con-boxed e-con e-parent\" data-id=\"c62e59d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-420a212 e-con-full e-flex e-con e-child\" data-id=\"420a212\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-329d8b6 e-con-full e-flex e-con e-child\" data-id=\"329d8b6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0da438 elementor-widget elementor-widget-heading\" data-id=\"b0da438\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What\u2019s The\nImpact Of Spam\nEmails?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03d9d90 elementor-widget elementor-widget-text-editor\" data-id=\"03d9d90\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The impact of spam emails extends far beyond the annoyance of sifting through unwanted messages.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4614f9e elementor-widget elementor-widget-text-editor\" data-id=\"4614f9e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As many as\u00a070% of the emails a business receives are spam.\u00a0In addition to being a time-consuming task, going through spam emails can hinder productivity and divert attention away from essential work-related activities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-126470a elementor-widget elementor-widget-text-editor\" data-id=\"126470a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"c-text-image c-text-image--img-right c-text-image--non-full-bleed module-68e8bdc68ff12\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><section class=\"c-text-image c-text-image--img-right c-text-image--non-full-bleed module-68e8c41f8d4df\"><div class=\"o-container c-text-image__container\"><div class=\"c-text-image__copy-holder\"><div><p>However, implementing an effective email filtering solution can alleviate these burdens. By eliminating 50% of emails that are spam, businesses can save valuable time for their employees. On average, an employee may spend around 30 minutes a day dealing with emails, but with a reliable filtering system, they can regain the better part of a day each month. This translates to substantial efficiency savings when multiplied across an entire organisation<\/p><\/div><\/div><\/div><\/section><div class=\"c-text-block module-68e8c41f8dc5b\"><div class=\"o-container c-text-block__container\">\u00a0<\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f834fb5 e-con-full e-flex e-con e-child\" data-id=\"f834fb5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5233737 elementor-widget elementor-widget-image\" data-id=\"5233737\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"738\" height=\"595\" src=\"https:\/\/www.networks.engineering\/wp-content\/uploads\/2025\/10\/photo_2025-10-10_13-20-39.jpg\" class=\"attachment-large size-large wp-image-1581\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-941db14 e-flex e-con-boxed e-con e-parent\" data-id=\"941db14\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df4cd4b elementor-widget elementor-widget-text-editor\" data-id=\"df4cd4b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Networks Engineering email filtering solution not only eradicates threats posed by spam but also enhances the relevance of received emails. Administrators can configure the system to operate at different levels of security and incorporate trigger words to block common spam terms. Moreover, the email filtering provides a summary email at the end of each day, offering insights into the blocked emails. This allows users to review and release any legitimate emails caught in the filter, subsequently whitelisting the respective sender.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb1fe4a elementor-widget elementor-widget-text-editor\" data-id=\"bb1fe4a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>To further facilitate user control and access, Networks Engineering email filtering offers a quarantine area that can be accessed at any time through a simple login process. This empowers users to review any potentially filtered emails, granting them the ability to retrieve important messages that may have been erroneously flagged as spam.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c5373c elementor-widget elementor-widget-text-editor\" data-id=\"2c5373c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>By investing in robust email filtering services like Networks, businesses can effectively mitigate the negative impact of spam emails. They can save valuable time, enhance productivity, and ensure that important messages are not missed or wrongly classified.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3dd9e60 e-flex e-con-boxed e-con e-parent\" data-id=\"3dd9e60\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1766ab3 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"1766ab3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits Of An Advanced Email Filtering\nService<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d76311f elementor-widget elementor-widget-text-editor\" data-id=\"d76311f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>While many organisations think they get sufficient protection from free or included services, there are many threats that such services miss. Given the number of threats each day, that can significantly increase the risk to your organisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84bc6e8 elementor-widget elementor-widget-text-editor\" data-id=\"84bc6e8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Advanced email filtering services provide the following benefits:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdec153 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"bdec153\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-square-full\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M512 512H0V0h512v512z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enhanced Threat Detection: Sophisticated algorithms to better identify complex threats.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-square-full\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M512 512H0V0h512v512z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Robust Security Features: Includes sandboxing and real-time link scanning for comprehensive protection.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-square-full\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M512 512H0V0h512v512z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Customisable Controls: Allows for specific filtering settings to match organisational needs.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-square-full\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M512 512H0V0h512v512z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detailed Reporting: Offers in-depth insights and analytics on potential security threats.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-square-full\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M512 512H0V0h512v512z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data Protection: Integrates advanced data encryption and access controls to safeguard sensitive information.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-square-full\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M512 512H0V0h512v512z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Regulatory Compliance: Ensures adherence to stringent industry regulations with enhanced security measures.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f7b270 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"9f7b270\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;animation&quot;:&quot;zoomIn&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65c3af3 elementor-widget elementor-widget-heading\" data-id=\"65c3af3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Email Filtering Services<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-222f19b elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"222f19b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Get In Touch<\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bad739 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8bad739\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"main-section\"><div class=\"container-main-1160\"><section class=\"main-section\"><div class=\"container-main-1160\"><span style=\"font-size: 16px;\">Get <\/span><span style=\"font-size: 16px;\">in <\/span><span style=\"font-size: 16px;\">touch <\/span><span style=\"font-size: 16px;\">for <\/span><span style=\"font-size: 16px;\">more <\/span><span style=\"font-size: 16px;\">information <\/span><span style=\"font-size: 16px;\">about <\/span><span style=\"font-size: 16px;\">email <\/span><span style=\"font-size: 16px;\">filtering <\/span><span style=\"font-size: 16px;\">or <\/span><span style=\"font-size: 16px;\">to <\/span><span style=\"font-size: 16px;\">arrange <\/span><span style=\"font-size: 16px;\">a <\/span><span style=\"font-size: 16px;\">demo.<\/span><\/div><\/section><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae9d680 elementor-widget elementor-widget-button\" data-id=\"ae9d680\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/networks.engineering\/index.php\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Form<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Email Filtering Services Networks Engineering email filtering services eliminate malware threats and improve the relevancy of your emails Refine What [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-650","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/pages\/650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/comments?post=650"}],"version-history":[{"count":0,"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/pages\/650\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.networks.engineering\/index.php\/wp-json\/wp\/v2\/media?parent=650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}