The Growing Problem of Outbound Spam
|
|
|
- Ira Lewis
- 10 years ago
- Views:
Transcription
1 y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington Tel: Fax:
2 Executive Summary OVERVIEW Two-thirds of service providers consider dealing with outbound spam to be an important or extremely important issue for them in Outbound spam is also a high priority issue for end users: when asked about their preference for providers that actively ensure that spam is not sent out from their networks, 80% believe that this is important or extremely important. Further, 87% believe it is important or extremely important for providers to actively eliminate zombies a primary source of outbound spam from their networks. BACKGROUND AND METHODOLOGY Osterman Research conducted two surveys specifically for this research report. The first was with 100 knowledgeable individuals at Web hosting companies, Internet access service providers, free service providers and other providers that deal with the issue of spam on a regular basis. The second survey was conducted with 266 end users who were queried about their use of and the Internet at home. The goal of both surveys was to quantify the issues surrounding outbound spam and what service providers and end users can do to remediate the problems they experience. KEY TAKEAWAYS Outbound spam is a serious issue and it is getting worse. There are a number of sources that can generate outbound spam, including compromised accounts, zombies and malicious users. Conventional anti-spam techniques and technologies are not effective in the fight against outbound spam and can result in a very high level of false positives, disgruntled customers, higher costs and lost business. Resolving the outbound spam issue can help service providers to retain customers: our research found that 56% of end users whose outbound was blocked because of their providers outbound spam problem would probably or definitely switch to a provider that would not block innocent users. ABOUT THIS RESEARCH REPORT This report discusses the growing problems associated with outbound spam and the even bigger problems for those service providers that address the problem with inadequate solutions. This document also provides a brief overview of Commtouch s recently introduced outbound spam solution. Outbound Spam is a Serious Problem WHAT EXACTLY IS OUTBOUND SPAM? Although first sent as far back as 1978, inbound spam has been a top-of-mind problem for about the past nine years. For example, in 2001, spam represented roughly one in 2010 Osterman Research, Inc. 1
3 six messages sent across the Internet; today, spam represents upwards of 80% of all . However, this masks the rapidly increasing absolute volume of spam, which doubles roughly every months. Although inbound spam is a serious and perennial problem, outbound spam is a more rapidly growing problem, primarily for service providers who act as the unwilling hosts of this content. Outbound spam that content sent from Web hosting companies, SaaS providers, Internet access service providers, free service providers, and onsite managed service providers creates enormous problems on a number of levels, as discussed later in this report. For example, more than two in five service providers surveyed for this white paper report that outbound spam is a problem 15% report that it is a serious or critical problem. Further, nearly 40% of the service providers we surveyed reported that their IPs have been blocked or blacklisted at some point during just the past 12 months. THE SOURCE OF THE PROBLEM There are three primary sources of outbound spam in service provider networks: Zombies One of the more common sources of outbound spam is zombies that reside on a service provider s network. A zombie is an individual home- or business-based computer, such as one on an Internet Service Provider s (ISP s) network that has been infected by malware specifically designed for control by a remote party. That party can control many thousands of computers for the purpose of sending spam, phishing attempts, malware and other unwanted content. Service providers report that 11.2% of their users accounts are currently part of a botnet that is being used for sending out spam 86% of service providers report that they are actively battling zombies in their networks. Compromised accounts These are accounts that have in some way been compromised other than by malware, such as through the theft of access credentials, that has enabled spammers to use them to send outbound spam. Service providers reported that 12.6% of their users have had their credentials stolen for the purpose of sending outbound spam. Malicious use of accounts Another source of outbound spam is the creation and use of accounts by spammers specifically for the purpose of sending unwanted content. The service providers we queried reported that one in eight users accounts are openly sending out spam and/or malware. Spammers of all three types may make efforts to stay under the radar by sending hundreds of s per day or testing before sending large volumes. Clearly, the problem of outbound spam has not been lost on service providers among those we surveyed, 69% consider dealing with outbound spam to be a priority over the next 12 months Osterman Research, Inc. 2
4 CURRENT SOLUTIONS ARE NOT EFFECTIVE Many service providers, faced with the growing problem of outbound spam, use a variety of conventional techniques and technologies to address the problem. However, most of these solutions are not satisfactory: Use of standard inbound spam technologies in reverse Because many spam detection technologies have a high spam capture rate for content sent into a service providers networks, many assume that simply using these technologies for sent out of the same networks will be effective. Unfortunately, practice has demonstrated that this approach can result in unacceptably high levels of false positives, resulting in a large proportion of valid outbound being identified as spam and subsequently blocked. Blocking of Port 25 for outbound Blocking Port 25 is unacceptable in many cases because it blocks legitimate along with outbound spam, again resulting in a very high level of false positives. For example, if a customer of an ISP needs to send legitimate through a server other than the one provided by their ISP, blocking Port 25 prevents this from happening. Blocking entire ranges of IP addresses Some service providers, in an attempt to block outbound spam from a single IP address, will block a range of IP addresses that may be used by the offending sender. This results in for legitimate senders being blocked. Manual handling by the abuse team Our research also found that 30% of service providers use manual methods to address outbound spam, such as deleting accounts that have been compromised. This can be a slow and ineffective method of dealing with the problem given the large number of compromised accounts hosted by many service providers Osterman Research, Inc. 3
5 Methods Used to Deal With Outbound Spam (% Responding a Problem or Significant Problem) The result of these practices is a very high level of false positives, many customer complaints, and unhappy customers and, as a result, a potentially high level of churn. Our research found that 70% of service providers are not completely satisfied with their current solutions and practices designed to thwart outbound spam. The Consequences of Outbound Spam THERE ARE MANY CONSEQUENCES OF OUTBOUND SPAM For service providers who are suffering the effects of outbound spam sent from their networks, there are a variety of negative consequences: Significantly higher costs of providing service Outbound spam drives up the cost of providing services to customers in several ways, including an unnecessarily large number of calls to technical support staff to address false positives, switching customers to new IP addresses, and additional IT staff time to identify and resolve outbound spam issues. Nearly one-half of the service provider respondents we queried report that outbound spam driving up the cost of doing business is a problem or a significant problem. Among the service providers we surveyed for this white paper, 68% reported that they spend up to $100,000 in both direct and indirect costs associated with outbound spam, including things like help desk calls, unblocking IP addresses, etc. 15% spend in excess of 2010 Osterman Research, Inc. 4
6 $100,000 annually on outbound spam-related expenses and 4% report the cost is more than $250,000 per year. Corporate reputation can be damaged A service provider that sends outbound spam can suffer damage to their reputation. For example, being known as a provider that hosts a large number of zombies or one that blocks an unacceptably high proportion of legitimate outbound is simply not good for business and, ultimately, can put a provider out of business. 49% of the service provider respondents we surveyed report that outbound spam damaging their corporate reputation is a problem or a significant problem. Blacklisted IPs create problems When IP addresses get blacklisted, service providers abuse staff must spend time working with blacklist operators and convince them that they are not spammers, they must deal with dissatisfied customers that may jump to another provider, and spend time resolving problems related to their placement on blacklists. Remediation efforts are poor, resulting in disgruntled customers Using remediation efforts like blocking Port 25 or large numbers of IP addresses in an attempt to block outbound spam will irritate many customers and drive them to other providers that use more sophisticated and more granular approaches to solving the problem. In fact, the survey of service providers reported that one-third view outbound spam as a hindrance to their ability to win new customers. We asked end users what they would do if their current provider blocked an entire IP address range in an attempt to block outbound spam: 12% of end users responded that, if possible, they would definitely switch to a new provider that blocked only zombies, not innocent users; another 43% indicated they would probably switch to a new provider. Increases the amount of network traffic Outbound spam also increases the overall amount of network traffic that a service provider must support. This can force providers unnecessarily to add more capacity over time, driving up their cost of doing business Osterman Research, Inc. 5
7 Problems Associated with Outbound Spam (% Responding a Problem or Significant Problem) THE BENEFITS OF DEALING EFFECTIVELY WITH OUTBOUND SPAM Simply put, the benefits of dealing effectively with the problem of outbound spam are just the opposite of the problems discussed above: the costs associated with supporting customers are reduced, less effort is required to manage a given number of users, corporate reputation is maintained because spammers are blocked in a granular fashion with low false positives, customers are happier and network traffic is minimized. However, our research found that among the service providers that have not yet implemented an outbound spam solution, more than one-half either do not have the resources to implement a solution or they have not found a solution to deal with the problem effectively. That said, 75% of service providers believe an important or extremely important reason to deploy an outbound spam solution is to provide better customer service 72% believe it would provide a competitive differentiation for their company Osterman Research, Inc. 6
8 Reasons to Deploy an Outbound Spam Solution (% Responding an Important or Extremely Important Reason) WHAT FEATURES ARE IMPORTANT IN A SOLUTION? There are a variety of features that any service provider should seek in an outbound spam solution, but three features are critical: Low false positives Any outbound spam solution should produce as low a level of false positives as possible. This certainly means false positives well below 1% and as close to zero as practical. Our survey of service providers found that 74% consider low false positives to be an important or extremely important attribute of any outbound spam solution. Identifying senders of spam A good outbound spam solution will identify individual senders, not simply block the spam itself or a range of IP addresses from which outbound spam originates. This allows individual offenders to be blocked and/or remediation efforts to be directed in a highly granular fashion. For example, a service provider that can identify individual senders of outbound spam can contact each sender and offer them assistance with malware scanning or some other method of resolving the issue. 78% of the service providers we queried for this research study feel that identifying senders is an important or extremely important attribute of an outbound spam solution Osterman Research, Inc. 7
9 Adjusting filtering thresholds A good outbound spam solution will also allow a service provider to adjust filtering thresholds on the fly in response to changing conditions, new zombie outbreaks, recently discovered intelligence on new malware threats, and the like. Desired Attributes of an Outbound Spam Solution (% Responding an Important or Extremely Important Attribute) Summary Our research supports four basic conclusions: Outbound spam is a serious issue today and the problem is getting worse. Conventional remediation efforts and technologies focused on outbound spam are not adequate to fully solve the problem. New technologies and approaches are necessary to ensure that outbound spam is minimized in service provider networks. Many customers will switch to service providers that address the outbound spam problem in a granular way Osterman Research, Inc. 8
10 Commtouch s Outbound Spam Protection Solution Commtouch s Outbound Spam Protection solution has been specifically developed to prevent the potential hazards of outbound spam and protect service providers against this rapidly growing threat. Commtouch s solution includes a number of unique properties essential for protecting against outbound spam: Real-time classification allowing fast detection and blocking of outbound spam. Detection of locally generated outbound spam as well as outbound spam that is part of a global outbreak. Identification of spammers, not only the spam, whether they are compromised accounts, zombies, or legitimate accounts used by spammers to send unsolicited mail. For more information about Commtouch s Outbound Spam Protection solution, visit Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, Laws )) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL Osterman Research, Inc. 9
CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com
CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current
The Cost Effective Migration to Integrated Hybrid SaaS Email Security
y The Cost Effective Migration to Integrated SaaS Email Security An Osterman Research White Paper Published July 2010 SPONSORED BY #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
Anti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
SURVEY REPORT SPON. Identifying Critical Gaps in Database Security. Published April 2016. An Osterman Research Survey Report.
SURVEY REPORT Gaps in Database An Osterman Research Survey Report sponsored by Published April 2016 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel:
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief
EXECUTIVE BRIEF N Sharing Market Forecast, sponsored by An Osterman Research Executive Brief Published May 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
WHITE PAPER SPON. Do Ex-Employees Still Have Access to Your Corporate Data? Published August 2014 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER N Do Ex-Employees Still Have Access to Your Corporate Data? An Osterman Research White Paper Published August 2014 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box
The Cost Benefits of a Hybrid Approach to Security
ed by The Cost Benefits of a Hybrid Approach to Security An Osterman Research White Paper Published February 2010 SPONSORED BY! #$!#%&'()*(!!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
WHITE PAPER. Using DNS RPZ to Protect Against Web Threats SPON. Published June 2015 SPONSORED BY. An Osterman Research White Paper.
WHITE PAPER Using DNS RPZ to Protect An Osterman Research White Paper Published June 2015 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
WHITE PAPER PON SPON. Comparing the Cost of Alt-N MDaemon and Exchange. Published July 2013 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER PON MDaemon and An Osterman Research White Paper Published July 2013 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA
Why Spamhaus is Your Best Approach to Fighting Spam
Page 1 of 10 Executive Summary The spam problem is evolving and while overall spam volumes are down, the problems are getting worse. No longer just a nuisance wasting resources and time, spam is now a
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
PineApp Anti IP Blacklisting
PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
WHITE PAPER SPON. The Cloud Advantage: Increased Security and Lower Costs for SMBs. Published August 2012 SPONSORED BY
WHITE PAPER N Increased Security and Lower Costs for SMBs An Osterman Research White Paper Published August 2012 sponsored by SPONSORED BY! SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
WHITE PAPER. Taking a Strategic Approach to Unified Communications: Best of Breed vs. Single Vendor Solutions SPON. Published February 2013
WHITE PAPER sponsored by Unified Communications: Best of Breed vs. Single Vendor An Osterman Research White Paper Published February 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond,
How To Calculate Total Cost Of Ownership (Tco) For Email Systems
WHITE PAPER N The TCO of Enterprise Email An Osterman Research White Paper Published June 2012 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington
Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education
White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets
Skybox Security Survey: Next-Generation Firewall Management
Skybox Security Survey: Next-Generation Firewall Management November 2012 Worldwide Results Notice: This document contains a summary of the responses to a November 2012 survey of medium- to largesize organizations
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
THE VALUE OF VOICE-ENABLING OFFICE 365. By Mike Osterman President Osterman Research
THE VALUE OF VOICE-ENABLING OFFICE 365 By Mike Osterman President Osterman Research EXECUTIVE SUMMARY The importance of email continues to grow: it s the most widely used communications tool in most organisations,
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange
GFI Product Comparison GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI MailEssentials Trend Micro ScanMail Suite Microsoft Exchange Server 2003/2007/2010/2013 Integration Option
Microsoft Lync Server 2010 and the Unified Communications Market Key Considerations for Adoption, Deployment and Ongoing Management
y Microsoft Lync Server 2010 and the Unified Communications Market Key Considerations for Adoption, Deployment and Ongoing Management An Osterman Research White Paper Published October 2010 SPONSORED BY!
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
WHITE PAPER SPON. What is the Total Value of Ownership for a Hosted PBX? Published September 2012. An Osterman Research White Paper.
WHITE PAPER N What is the Total Value of An Osterman Research White Paper Published September 2012 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
PROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES
PROTECTING YOUR MAILBOXES Features SECURITY OF INFORMATION TECHNOLOGIES In 2013, 50% of businesses would have experienced a virus infection by e-mail. Electronic mail remains one of the preferred vectors
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
WHITE PAPER SPON. Email Archive Migration: Opportunities and Risks. Published February 2014. An Osterman Research White Paper.
WHITE PAPER N Email Archive Migration: An Osterman Research White Paper Published February 2014 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam
Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0
GFI Product Comparison GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0 GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.0 Supports Microsoft Exchange Server 2003
The Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc.
The Latest Internet Threats to Affect Your Organisation Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc. Agenda Spam Trends Staying Ahead Blended Threats Spam Trends What Do Dick Cheney & Bill
Deployment Guides. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Deployment Guides SmarterMail in Individual and Micro-business
Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER
Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER FORTINET Global Reputation Monitoring PAGE 2 Overview Fortinet s FortiGuard Security Services delivers two essential
Deliverability Counts
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
WHITE PAPER SPON. Why Should You Encrypt Email and What Happens if You Don t? Published July 2013. An Osterman Research White Paper.
WHITE PAPER N An Osterman Research White Paper Published July 2013 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 253 630 5839 Fax:
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Protecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
