Best Practices for Evaluating Anti-spam Solutions
|
|
- Logan McDonald
- 8 years ago
- Views:
Transcription
1 Nathan Turajski Jamz Yaneza Best Practices for Evaluating Anti-spam Solutions VB 2005, Dublin, Ireland
2 Benchmarking Validation Methodologies Accurate Comprehensive Fair Filtering Techniques Pattern matching, Heuristics, IP blocking, Whitelist/Blacklist, Challenge/Response, Community..
3 Anti-spam Solutions Current Solutions Software Appliance Services Legislation Methods Catch rate (effectiveness) Error rate (accuracy)
4 Content Defined Spam UCE, commercial bulk mail Consumers: well defined Enterprise: borderline Non-spam Appropriate, predictable, traceable Graymail Inappropriate to environment Requires exception capability
5 Factors for Evaluating Solutions Primary Effectiveness Accuracy Resiliency Secondary Administration Integration
6 Testing Failures Confused spam type classification Non real-world environment Short-term testing cycle Fixed regional origins Fixed language type Non-relative industry. Etc.
7 Spam Trends Estimates vary, but the total amount was usually agreed to have passed 40% by the beginning of was 50% SPAM by January of % of all was SPAM by 2004 Almost 80% of all is currently either unwanted advertising or virus-ridden
8 Evaluation Guidelines Valid vs. illegitimate mail sampling over time period spam/month
9 30% Monthly Spam Growth (2005) Total Spam Mails Received , , , , March April May June
10 Evaluation Guidelines Predominant language English vs. Non-english New Spam Mails Received June, 46% May, 62% April, 51% March, 66% English Non-English March, 34% April, 49% May, 38% June, 54%
11 Evaluation Guidelines What Country does Spam like the Most? 2.97% 3.83% 2.77% 3.94% 2.21% 2.05% 1.84% 10.34% 21.42% 21.78% China United States Republic of Korea Brazil Japan France Spain Taiwan Israel Germany Point of origin broad mixed sampling Spam Countries Brazil 4% Japan 3% Spain 3% Germany 2% Poland 2% Republic of Korea 31% Switzerland 4% France 5% United States 20% China 26%
12 Industry definitions Evaluation Guidelines overlap of needs vs. excess 8% Spam Categories 10% 18% 24% 36% 4% 23% 1% Adult 19% Bad Samples Commercial 8% 3% Financial Health 14% Others Non-English 32%
13 Chinese Language (traditional) Traditional Chinese (snapshot) Work Spiritual 0.3% Sexual 7% Health 4% Financial 22% Education 4% Spiritual Sexual Health Financial Education Commercial Other Work 23% Other 2% Commercial 38% Summary: 38% commercial offers, 23% work related, 22% financial, 7% sex related
14 Chinese Language (simplified) Sexual 5% Spiritual 0.04% Health 2% Simplified Chinese (snapshot) Financial 17% Education 4% Work Spiritual Sexual Health Financial Education Commercial Work 1% Other 2% Other Summary: Commercial 69% 69% commercial offers, 17% financial, 7% sex related, 4% education
15 German Language Health 1% Financial 1% Commercial 12% German (snapshot) Sexual Health Financial Commercial Other Sexual 15% Other 71% Summary: 15% sex related, 12% commercial, 71% mixed offers
16 Evaluation Guidelines Timeliness update frequency distribution strain on network/system correction efficiency
17 Evaluation Guidelines Summary Efficiency and accuracy dependent on spam classification and audience Used testing samples to be valid and fixed Overall results used for evaluation False positive graymail vs. legitimate mail Unmodified message delivery
18 Other Considerations Product configuration and tuning Out of the box state Vendor recommended tuning Tolerance rating based on audience target Long-term testing timeframe
19 Other Considerations Filter technique testing Signature matching Focus: catch efficiency and update timeliness Heuristic rules Focus: false positive rate and mitigation tools Hybrid techniques Focus: accuracy and update timeliness IP filtering Focus: delivery efficiency and mitigation tools
20 Other Considerations Performance Deployment time Management reporting tools Update overheard Message latency
21 SUMMARY Comprehensive evaluation includes scalability and resiliency long term performance customer specific goals exception handling minimal administration
22 Questions?
23 Mass-mailing malware spam Malware Tracking Center # of reported infections (uniqe) 2,000,000 1,500,000 1,000, ,000 0 January February March April May June July August September October November December Bulk-mailing Malware Summary: 2003, due to Mimail, Blaster, and Sobig 2004, due to Bagle, Mydoom, Netsky, and Sasser
Spam Testing Methodology Opus One, Inc. March, 2007
Spam Testing Methodology Opus One, Inc. March, 2007 This document describes Opus One s testing methodology for anti-spam products. This methodology has been used, largely unchanged, for four tests published
More informationThe Role of Country-based email Filtering In Spam Reduction
The Role of Country-based email Filtering In Spam Reduction Using Country-of-Origin Technique to Counter Spam email By Updated November 1, 2007 Executive Summary The relocation of spamming mail servers,
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
More informationProtecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
More informationOpus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY
Joel Snyder Opus One February, 2015 COMPARING RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION The following analysis summarizes the spam catch and false positive rates of the leading anti-spam vendors.
More informationHow to Access Your Private Message Center if you need more control
How to Access Your Private Message Center if you need more control If and When you log in to your message center for the first time, you will be asked to change your password. It needs to be at least six
More informationEnterprise Buyer Guide
Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight
More informationComparing Industry-Leading Anti-Spam Services
Comparing Industry-Leading Anti-Spam Services Results from Twelve Months of Testing Joel Snyder Opus One April, 2016 INTRODUCTION The following analysis summarizes the spam catch and false positive rates
More informationNext Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
More informationSimplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%
Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity
More informationeprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
More informationWhen Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
More informationWebsense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security
Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to
More informationChoose Your Own - Fighting the Battle Against Zero Day Virus Threats
Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle
More informationHow to Use the Greymail Spam Filter
How to Use the Greymail Spam Filter This guide will show you the basics of how to view messages flagged as spam, and how to recover them, if improperly flagged. For a full overview of the New Greymail
More informationSpam Classification Techniques
Spam Classification Techniques Executive Overview It costs companies nearly $2,000 per employee a year in lost productivity, double from a year ago. Nucleus Research, USA Today, June 2004 In its infancy,
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
More informationWebsense Web Security Solutions
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people
More informationHybrid Wide-Area Network Application-centric, agile and end-to-end
Hybrid Wide-Area Network Application-centric, agile and end-to-end How do you close the gap between the demands on your network and your capabilities? Wide-area networks, by their nature, connect geographically
More informationPROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES
PROTECTING YOUR MAILBOXES Features SECURITY OF INFORMATION TECHNOLOGIES In 2013, 50% of businesses would have experienced a virus infection by e-mail. Electronic mail remains one of the preferred vectors
More informationReport on Government Information Requests
Report on Government Information July 1 - December 31, 2014 apple Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software
More informationSecuring the Borderless Enterprise
Securing the Borderless Enterprise Websense TRITON Solution The Web 2.0 Workplace: New Opportunities, New Risks Web-enabled technologies are reshaping the modern enterprise. Powerful, cloud-based business
More informationWorry-Free Business Security 6.0. External FAQ
Worry-Free Business Security 6.0 External FAQ May 2009 Page 1 Contents Introducing Worry-Free Business Security...3 What is Worry-Free Business Security?... 3 When is Worry-Free Business Security available?...
More informationINTERNATIONAL COMPARISONS OF HOURLY COMPENSATION COSTS
For release 10:00 a.m. (EST) Tuesday, March 8, 2011 USDL-11-0303 Technical Information: (202) 691-5654 ilchelp@bls.gov www.bls.gov/ilc Media Contact: (202) 691-5902 PressOffice@bls.gov INTERNATIONAL COMPARISONS
More informationBest Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
More informationConfiguring DHCP for ShoreTel IP Phones
Configuring DHCP for ShoreTel IP Phones Network Requirements and Preparation 3 Configuring DHCP for ShoreTel IP Phones The ShoreTel server provides the latest application software and configuration information
More informationForeign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund
Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000
More informationHow To Create A Spam Detector On A Web Browser
Design and Evaluation of a Real-Time URL Spam Filtering Service Geraldo Franciscani 15 de Maio de 2012 Teacher: Ponnurangam K (PK) Introduction Initial Presentation Monarch is a real-time system for filtering
More informationSpam Filtering using Naïve Bayesian Classification
Spam Filtering using Naïve Bayesian Classification Presented by: Samer Younes Outline What is spam anyway? Some statistics Why is Spam a Problem Major Techniques for Classifying Spam Transport Level Filtering
More informationIntegrating CaliberRM with Software Configuration Management Tools
Integrating CaliberRM with Software Configuration Management Tools A Borland White Paper By Jenny Rogers, CaliberRM Technical Writer January 2002 Contents Introduction... 3 Enabling SCM for a Project...
More informationEmail Security 8.0 User Guide
Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to
More informationIntercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
More informationSTPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.
STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication
More informationHow To Run A Realtime Blackhole List (Rbl) In Hkong Kong Ken Kong
Response to the OFTA Consultation Paper, Proposal to Contain the Problem of Unsolicited Electronic Messages by Hong Kong Computer Emergency Response Team Coordination Centre 1. General We consider that
More informationReview of R&D Tax Credit. Invitation for Submissions
Review of R&D Credit invitation for submissions Review of R&D Credit Invitation for Submissions February 2013 Economic and Fiscal Divisions Department of Finance Government Buildings, Upper Merrion Street,
More informationAnti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
More informationFireEye Email Threat Prevention Cloud Evaluation
Evaluation Prepared for FireEye June 9, 2015 Tested by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com Table of Contents Executive Summary... 1 Introduction... 1 About
More informationEmail Threat Trend Report Second Quarter 2007
Email Threat Trend Report Second Quarter 2007, Ltd. 2550 SW Grapevine Parkway, Suite 150 Grapevine, Texas 76051 Phone: (817) 601-3222 Fax: (817) 601-3223 http://www.altn.com/ 2007 Contents Emerging Email
More informationTRUSTWAVE SEG SPAMCENSOR EXPLAINED
.trust TRUSTWAVE SEG SPAMCENSOR EXPLAINED wave.com Updated October 9, 2007 Table of Contents About This Document 2 1 SpamCensor Defined 3 2 How Does SpamCensor Work? 3 3 How Are the Rules Made and Scored?
More informationAbout this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
More informationRecurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
More informationReport on Government Information Requests
Report on Government Information Requests January - June, Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and
More informationCaliberRM / LDAP Integration. CaliberRM
CaliberRM / LDAP Integration CaliberRM Borland Software Corporation 100 Enterprise Way Scotts Valley, California 95066-3249 www.borland.com Made in Borland Copyright 2004 Borland Software Corporation.
More informationSybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment
Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment OVERVIEW Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Rising medical
More informationContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
More informationThe versatile solution of anti-spam, personal email backup and recovery, easy email security policy management and enforcement.
Anti-Spam Expert The versatile solution of anti-spam, personal email backup and recovery, easy email security policy management and enforcement. Effectively filter spam mails by cocktailed N-Tier filter
More informationMXSweep Hosted Email Protection
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740
More informationAntispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
More informationTightening the Net: A Review of Current and Next Generation Spam Filtering Tools
Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools Spam Track Wednesday 1 March, 2006 APRICOT Perth, Australia James Carpinter & Ray Hunt Dept. of Computer Science and Software
More informationThe Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
More informationSPAM: 101 Cause and Effect
SPAM: 101 Cause and Effect Table of Contents Background: JARING SPAM 101 Effects Lesson Learned Challenges and Propositions 1 Part I: Background on JARING (We're the good guys.) What is JARING? The first
More information[NUGENESIS SAMPLE MANAGEMENT ] AMPLE IMPROVING LAB EFFICIENCY, ANAGEMENT ACCELERATING BUSINESS DECISIONS. bigstock.com $69
[NUGENESIS SAMPLE MANAGEMENT ] AMPLE ACCELERATING BUSINESS DECISIONS IMPROVING LAB EFFICIENCY, ANAGEMENT bigstock.com $69 [ N U GENESIS SAMPLE MANAGEMENT ] MANAGING SAMPLES SHOULD NEVER BE A BARRIER TO
More informationReport on Government Information Requests
Report on Government Information January 1 - June 30, 2015 Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and
More informationIpswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
More informationIntent Based Filtering: A Proactive Approach Towards Fighting Spam
Intent Based Filtering: A Proactive Approach Towards Fighting Spam By Priyanka Agrawal Abstract-The cyber security landscape has changed considerably over the past few years. Since 2003, while traditional
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
More informationInternational Equity Investment Options for 401(k) Plans
International Equity Investment Options for 401(k) Plans Considerations for Plan Sponsors Authored by: Adam D. Brown, T. Rowe Price Defined Contribution Investment Specialist Executive Summary T. Rowe
More informationWhen Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
More informationSymantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
More informationHandling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at Staffordshire University
Reference : USER 190 Issue date : January 2004 Revised : November 2007 Classification : Staff Originator : Richard Rogers Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at
More informationE-Mail Security. on your terms SOFTSCAN
E-Mail Security on your terms SOFTSCAN With fraudulent and offensive emails delivered in vast quantities to businesses every day a foolproof email security system is essential. Setting the standards SoftScan
More informationPowerful and reliable virus and spam protection for your GMS installation
Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise
More informationWANT TO STRENGTHEN YOUR CUSTOMER RELATIONSHIPS? THE RIGHT SALES STRATEGY WILL HELP
Amdocs Sales WANT TO STRENGTHEN YOUR CUSTOMER RELATIONSHIPS? THE RIGHT SALES STRATEGY WILL HELP Changing market conditions mean that you have to do more than just keep your customers you have to grow your
More informationDOMINION GLOBALIZATION WORKSHOP
DOMINION GLOBALIZATION WORKSHOP Financial Sector Dennis Encarnation Harvard University For more information, please contact me at www.encarnation.com SERVICES Financial Services & Capital Markets Topics:
More informationGE Grid Solutions. Providing solutions that keep the world energized Press Conference Call Presentation November 12, 2015. Imagination at work.
GE Grid Solutions Providing solutions that keep the world energized Press Conference Call Presentation November 12, 2015 Press Conference Call Recording: Toll Free: +1 (855) 859-2056 Toll: +1 (404) 537-3406
More informationOn What Resources and Services Is Education Funding Spent?
Indicator On What Resources and Services Is Education Funding Spent? In primary, secondary and post-secondary non-tertiary education combined, current accounts for an average of 92% of total spending in
More informationSymantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses
A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed
More informationCopyright Information. Confidentiality Notice. Anti-Spam Evaluation Guide Confidential November 2009 Page 2 of 16
Copyright Information Kaspersky is a registered trademark of Kaspersky Lab. Other trademarks found in this publication have been used for identification purposes only and may be the trademarks of their
More informationEXPLANATION OF COMMON SPAM FILTERING TECHNIQUES WHITEPAPER
EXPLANATION OF COMMON SPAM FILTERING TECHNIQUES WHITEPAPER Every year, the amount of unsolicited email received by the average email user increases dramatically. According to IDC, spam has accounted for
More informationResponding to Healthcare s Most Urgent Business Issues. Gundersen Lutheran Health System Case Study
Responding to Healthcare s Most Urgent Business Issues Gundersen Lutheran Health System Case Study Gundersen Lutheran Health System case study Surgical Instrument Management Reduces Surgery Delays and
More informationTest Report October 2007. InterScan Messaging Security Suite. Anti-Spam Technology Report
Test Report October 2007 InterScan Messaging Security Suite Anti-Spam Technology Report Vendor Details Name: Trend Micro Inc. Address: 10101 N. De Anza Blvd., Cupertino, CA - 95014, USA Telephone: + 1
More informationTechnology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationINSIDE. Neural Network-based Antispam Heuristics. Symantec Enterprise Security. by Chris Miller. Group Product Manager Enterprise Email Security
Symantec Enterprise Security WHITE PAPER Neural Network-based Antispam Heuristics by Chris Miller Group Product Manager Enterprise Email Security INSIDE What are neural networks? Why neural networks for
More informationCisco Conference Connection
Data Sheet Cisco Conference Connection Cisco IP Communications a comprehensive system of powerful, enterprise-class solutions including IP telephony, unified communications, IP video/audio conferencing,
More informationHow many students study abroad and where do they go?
From: Education at a Glance 2012 Highlights Access the complete publication at: http://dx.doi.org/10.1787/eag_highlights-2012-en How many students study abroad and where do they go? Please cite this chapter
More informationCommtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
More informationWhen Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
More informationShared Incident Response
Shared Incident Response towards mitigation of spam and net abuse Suresh Ramasubramanian Postmaster, Outblaze Limited Coordinator, APCAUCE.ORG Some quick background information Outblaze is a provider of
More informationCisco Smart Care Service
Q. What is Cisco Smart Care Service? A. Cisco Smart Care Service is a collaborative, comprehensive network wide service that enables your partner to deliver proactive network monitoring, health checkups,
More informationSymantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
More informationITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem. Mark Sunner, Chief Technical Officer MessageLabs
ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem Mark Sunner, Chief Technical Officer MessageLabs 6 th July 2004 MessageLabs MessageLabs protects businesses worldwide against email
More informationOffice 365. Service Overview with a focus on Identity Federation and Directory Synchronization. Jono Luk, Program Manager jluk@microsoft.
Office 365 Service Overview with a focus on Identity Federation and Directory Synchronization Jono Luk, Program Manager jluk@microsoft.com Presented on July 6, 2011 at Seattle Windows Networking User Group
More informationAdaptive Filtering of SPAM
Adaptive Filtering of SPAM L. Pelletier, J. Almhana, V. Choulakian GRETI, University of Moncton Moncton, N.B.,Canada E1A 3E9 {elp6880, almhanaj, choulav}@umoncton.ca Abstract In this paper, we present
More informationGLOBAL HRMONITOR NEW DIMENSIONS IN ONLINE HR INFORMATION TALENT HEALTH RETIREMENT INVESTMENTS
GLOBAL HRMONITOR NEW DIMENSIONS IN ONLINE HR INFORMATION TALENT HEALTH RETIREMENT INVESTMENTS DISCOVER MERCER S GLOBAL HRMONITOR ABOUT GLOBAL HRMONITOR Mercer s Global HRMonitor is a single-source, web-based
More informationCisco IOS Public-Key Infrastructure: Deployment Benefits and Features
Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,
More informationCES 9 Virtualization. Reducing costs and improving operations in service provider IT environments
CES 9 Virtualization Reducing costs and improving operations in service provider IT environments AMDOCS FINANCIAL SERVICES 2 Contents 1. VIRTUALIZATION...3 1.1 Introduction...3 1.2 What is Server Virtualization?...3
More informationBT Connect Networks that think
Networks that think We run network services for 3,000 organisations in 197 countries/territories BT Ethernet Connect update, December 2011 BT Ethernet Connect Quick recap What s new/changed What s coming
More informationPeak Hosting, founded in 2001, provides comprehensive ITas-a-service
Cloud Service and Managed Hosting Provider Delivers Customer Value with High-performance Multi-tenant Application Delivery web properties in the world. Peak Hosting, founded in 2001, provides comprehensive
More informationRadware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
More informationPREVENTING WORM AND VIRUS OUTBREAKS WITH CISCO SELF-DEFENDING NETWORKS
WHITE PAPER PREVENTING WORM AND VIRUS OUTBREAKS WITH CISCO SELF-DEFENDING NETWORKS Worm and virus attacks are among the most common security breaches for organizations today*. A server, laptop, or personal
More informationEmail Quick Reference. Administrator Guide
Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationThe Cost of Movie Piracy. An analysis prepared by LEK for the Motion Picture Association
An analysis prepared by LEK for the Motion Picture Association Contents Overview Major Findings MPA Member Company* Losses Piracy Rates by Country Dollar Losses by Country Worldwide Motion Picture Industry
More informationIt s critical to be able to correlate threats pre-emptively and respond to them immediately.
Security has become a much deeper executive discussion because of the modern diversity of channels through which businesses can be attacked. Mobility, bring your own device, virtualisation, the cloud,
More informationCisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
More informationCONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES
CONSUMERS' ACTIVITIES WITH MOBILE PHONES IN STORES Global GfK survey February 2015 1 Global GfK survey: Consumers activities with mobile phones in stores 1. Methodology 2. Global results 3. Country results
More informationAgenda. Company Platform Customers Partners Competitive Analysis
KidoZen Overview Agenda Company Platform Customers Partners Competitive Analysis Our Vision Power the backend of the post- web enterprise Key Challenges of the Mobile Enterprise Enterprise systems integration
More informationIDS or IPS? Pocket E-Guide
Pocket E-Guide IDS or IPS? Differences and benefits of intrusion detection and prevention systems Deciding between intrusion detection systems (IDS) and intrusion prevention systems (IPS) is a particularly
More informationEmail Systems Managed Service
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT Email Systems Managed Service JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Email Systems Email Systems Limited,Cart Lodge,Goodley
More informationBuilding a Global Internet Company: Driving Traffic to Your Site. Benjamin Edelman Harvard Business School
Building a Global Internet Company: Driving Traffic to Your Site Benjamin Edelman Harvard Business School Mumbai, India January 20, 2012 About me Assistant Professor, Harvard Business School Teaching:
More informationZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE
The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances
More information