MXSweep Pricing, Features, Reviews & Comparison of Alternatives

MXSweep Reviews


Internet security and compliance services

23     80

This Application No Longer Exists

MXSweep is no longer available for purchase. Archived information about MXSweep is available below.

Alternatives to MXSweep


Intended Users
Small Business, Large Enterprises, Public Administrations, Non Profit, Freelancers, Mid Size Business
Devices Supported
Mac, Windows, Web-based, Windows Phone
Supported Countries
United States, Canada, United Kingdom, Australia, China, India
Supported Languages
Danish, Dutch, English, French, German, Swedish
Business Continuity Software
Email Security Software
Backup Software
Distributor Software
Communication Software
Cybersecurity Software

MXSweep Pricing

Pricing model: Subscription

Free Trial: Available (No Credit Card required)

monthly subscription per active mailbox

Users who visited MXSweep also visited

Key Features of MXSweep

  • Easy to use and deploy SaaS email and web security


Email Security
- Lower Total Cost of Ownership
- Opex spend vs Capex spend
- Predictable expense analysis, lower maintenance costs
- Eliminates hardware investment for spam spikes
- Security effectiveness
- Best-of-breed threat protection in real-time
- Stops threats before they reach corporate network
- Larger reputation base with more IPs connected to your organization
- Scalability
- Able to grow or reduce with your business
- Ease of use
- Integrated management consoles and centralized policy control
- Flexibility of choice in hosted or hybrid/hosted configuration
- Integration with other communication security services
- Content Control/Data loss prevention (DLP)


Secure sensitive email messages and attachments
Simplifies secure collaboration
Streamline existing business processes
Prevent data loss via email
Ensure only authorised recipients can access secure information
Manage time sensitive information in real-time and enforce data embargo
Audit disclaimer acceptance and satisfy compliance laws
Simple end user experience
Free of charge for recipients to send and receive encrypted data

Mobile Security
Mobile Phone
Remote phone lock / unlock protects your phone and data
Phone contact back up / restore allows you to recover vital data
Phone locks automatically after an unauthorised SIM card change
Device Siren makes the phone a risk to handle incoming calls to lost or stolen phone when locked
Calls to MXSweep allowed from lost or stolen phone to encourage returns
Autolock functions lock phone following unusual usage
Inactivity/call pattern/country dialing/roaming locks

Remote or offline locking
Full screen lock will lock down the laptop completely making it unusable until unlocked
Device scream
Makes the laptop a risk to handle and attracts attention
User snapshot
Takes a picture using in-built webcam of anyone trying to access the laptop
Location mapping
IP tracking will help us to locate the laptop whenever it is connected to the internet
Data shredding
Shred your data upon loss or theft of your device to stop it falling into the wrong hands.
Deterant and encouragement - Thieves are dettered and finders are encouraged to return the laptop by a message on the lock screen.

Industry leading scalability
Comprehensive record management
Unified email and file archiving solution
Full automation of email management
Email Archive captures, indexes and archives all compliance-stipulated metadata
Storage Reduction on average of more than 75% or completely for our SaaS solution
Litigation support such as thorough e-discovery, legal hold, message classification, tagging, transparent annotation, message pathway analysis, and authentic verification
Optimized email application infrastructure for employees to have immediate access to archived data
Security and complianceSupport for diverse enterprise messaging environments
Ease of Implementation & Maintenance

Web Security:

Protect network environments
MXSweep provides corporate networks and equipment another layer of security by blocking sites containing spyware, phishing and other malicious applications.
Reduce legal liability
Eliminate the risk of illegal, copy-righted and inappropriate content from entering the workplace and potentially resulting in criminal or harassment lawsuits.
Improve productivity
Management can harness the power of the Internet for business activities by filtering, according to our customisable and scalable categories, keeping employees focused.
Compliance through reporting
Ensure compliance with internal Acceptable Use Policies and government regulations through the use of reporting and logging tools to monitor and control employee Internet usage.
Accelerate revenue related tasks
By controlling bandwidth availability, businesses are able to stop Internet abuse and enable revenue generating activity.