Test Report September Netcore's Emergic CleanMail Service. Anti-Spam Technology Report

Size: px
Start display at page:

Download "Test Report September 2007. Netcore's Emergic CleanMail Service. Anti-Spam Technology Report"

Transcription

1 Test Report September 2007 Netcore's Emergic CleanMail Service Anti-Spam Technology Report

2 Vendor Details Name: NetCore Solutions Pvt Ltd. Address: 402, Peninsula Chambers, Peninsula Corporate Park, Ganpat Rao Kadam Marg, Lower Parel (West), Mumbai ,India. Website: Product: Emergic CleanMail Service Test Laboratory Details Name: West Coast Labs, Unit 9 Oak Tree Court, Mulberry Drive Cardiff Gate Business Park, Cardiff, CF23 8RS, UK Telephone: +44 (0) Date: June 2007 Issue: 1.0 Author: M. Garrad Contact Point Contact name: M. Garrad Contact telephone number: +44 (0)

3 Contents Introduction 4 Test Network 6 Test Methodology 7 Product Test Reporting 8 Checkmark Certification 9 The Product 10 Test Report 11 Test Results 17 West Coast Labs Conclusion 18 Security Features Buyers Guide 19 3

4 Introduction The ever evolving spam threat Two years from now, spam will be solved. Bill Gates Jan At the beginning of 2004, Bill Gates was addressing the World Economic Forum in Switzerland and confidently predicted that Two years from now, spam will be solved. Sadly his prophecy has proved somewhat wide of the mark as reports continue to emerge about the size of the problem. The latter half of 2006 saw an unprecedented rise in spam volumes with SurfControl reporting a 50% increase in spam over the previous half year, and spam now accounting for almost 90% of all traffic on the Internet. The nature of spam has also changed. In 2004 spam content was dominated by pornography, Viagra sales and the infamous Nigerian scam advance-fee fraud spam. Those types of spam are very much still with us but have been added to by phishing attacks, Pump-and-Dump scams (which involve artificially inflating the price of a stock in order to make a quick profit on stock previously purchased cheaply) and spam that tricks users into following URL links to web sites that download malicious code that will compromise their machines. The methods used by spammers to launch their attacks have also transformed over time. The vast majority of unsolicited is now being sent via vast armies of infected PCs known as botnets often these are the machines of home users who are unaware that they are part of the problem. This distributed system approach is making it more difficult to separate out spam s based upon simple network-based criteria, and so companies providing anti-spam technologies are having to provide more intelligent filtering solutions. 4

5 In a recent interview, Dr Richard Cullen, distinguished engineer at SurfControl said, The threat landscape has changed dramatically over the past couple of years. Malware attacks are now commercial ventures, with well organized cybercrime gangs harnessing the power of vast botnet armies to launch spam, phishing, DDOS and malware attacks. The spammers are also always trying to find new ways of bypassing antispam defenses. One such technique that is on the increase is image spam s with images containing the spammer s messages within random text designed to foil less sophisticated spam filters. Peter Firstbrook, security research director for Gartner, has reported that image spam went from 6 percent of all spam in Q3 of 2006 to 30 percent by Q4, and it is now thought to make up almost 40% of all spam. Apart from being harder to block, image spam also causes knock-on problems because the spam messages are actually larger than simple text messages. According to some reports, the average size of a spam message has increased by 77% since September last year, from 6.62Kbytes to 11.76K) and continues steadily to grow. This adds to the cost of managing , it wastes bandwidth and also consumes storage if a company needs to archive all incoming mail. And according to the New York Times security columnist John Markoff, one recent botnet outbreak managed to consume 15% of Yahoo s resources while searching for random pieces of text to pad out such image-based messages. As a result, anti-spam vendors are now having to adapt to this new threat by both enhancing existing techniques such as heuristics rules to analyze the characteristics of image-based spam, and by adding new technology layers, such as optical character recognition technologies. Where will it all end? 5

6 Test Network WCL has a number of domains that collect genuine spam. These domains receive varying levels of spam and are consistent with different environments. To reflect the usage within a corporate environment, within each domain are a number of designated user accounts with a variety of practices and needs including some that are subscribed to a variety of newsgroups and mailing lists. Some user accounts actively contribute to mailing lists. The multiple domains designated for testing purposes were those that, between them, receive spam at a level consistent with the defined requirements of testing. Software solutions included in the test program were installed on servers that meet the minimum specifications required by the vendor. Appliance-based solutions were installed on the network according to the vendor s recommended placing. For hosted services, WCL testes through identified domains and changed the MX records to divert the mail stream through the hosted service. 6

7 Test Methodology WCL initially performed the testing with an out-of-the-box configuration, changing only those settings on the solution needed to ensure correct operation inline with the vendors recommended installation and configuration procedures. Further testing was then be performed at following the vendor s advice for the tuning or training of the solution under test. WCL finetuned the solution each day of the test, spending no more than half an hour per day undertaking such work. Throughout the course of testing, a mixture of was be sent to the test domains from other addresses and domains controlled by WCL to mirror genuine activity common in business, for example requesting meetings, sending notifications to groups and non-business related social s. s were also be sent from web-based accounts such as Hotmail and Google s Gmail in order to simulate external users sending nonbusiness related social s, and home workers. Thus, during the testing period the domains received some spam, some list/newsgroup mailings and genuine individual s. 7

8 Product Test Reporting Product evaluation addresses three specific areas* - Management/ Administration, Functionality, Performance plus Additional Feature Testing. 1. Management/Administration Ease of Setup/Installation Ease of Use Logging and reporting function Rule creation Customization Content Categories 2. Functionality Processing Steps Allow/Blocking of Quarantine Area Additional functionality reporting Steps to Process Block Addresses Blacklist/Whitelist Allow Addresses 3. Performance Volume or Percentage of spam detected False positive rate Spam incorrectly passed through Legitimate mail blocked Legitimate subscription mail blocked 8

9 Checkmark Certification Upon completion of the testing, individual product results are analyzed, resulting in accreditation to one of the two Checkmark Certifications for Anti-Spam subject to achieving the following catch rates:- Checkmark Anti-Spam Certification Premium 97% and over Catch Rate Checkmark Anti-Spam Certification Standard 90% and over Catch Rate 9

10 The Product Introduction Emergic CleanMail Service, referred to as ECM, from NetCore is a managed service providing companies with powerful and wellperforming antispam protection. As with all managed services, this solution will best suit those companies looking to outsource certain aspects of IT security, or to reduce the workload of IT Administrators or Network Teams. 10

11 Installation and Configuration As this is a managed service, configuration is mostly carried out by the technical teams at NetCore. The procedure for a new client is simple and straightforward - the administrator need only provide them with basic networking information, such as domain and a target collection server, and the rest is taken care of. NetCore engineers then inform the administrator, via , when the service is ready to be used. Included within this are the login details such as address, username, and password for the SSL-encrypted web-based interface. From this interface the administrator is able to further interact with the service. 2

12 Operations and Features Once logged in, the administrator is presented with a clear and concise interface that provides a quick learning curve thanks to the well-designed and intuitive layout. By reducing the time needed to become familiar with the solution, the administrator can almost immediately begin customizing the ECM solution. The interface contains menu links for the various categories and sub-categories along the top, with page content being displayed within the main area of the screen just below. By default, the administrator is directed to the Reports category, whilst other options include Administer, Settings, and Logout. Each major menu category contains several further sub-categories, providing a rich source of configuration options and report types. Once the engineers at NetCore have carried out the initial setup, the administrator is free to further customize the service through the use of these option categories. This customization includes the setup of Dictionary Checks, as well as the provision of Black and Whitelists for both domain names and IP addresses. Black and White Lists of users add additional filtering options so that so that any s not 12

13 specifically addressed to one of the users are either automatically blocked or allowed. The setup of Dictionary Checks allows the administrator to help control one of the most common features found upon first implementing an antispam solution false positives. To give an example, a medical research company using ECM may enter the word Viagra as acceptable, a term that may otherwise cause a work-related to be blocked. This flexibility demonstrates the amount of careful thought and planning that Netcore have put into making this solution a good fit for all types of business. Although configuration of the service is quick and easy, any queries can also be quickly resolved due to the provision of a structured and informative Administrators Guide along with descriptive text on each of the option pages inside the interface. Any changes made to the configuration are adopted almost instantly, thus ensuring that the service constantly meets the demands of NetCore s clients. For further ease of use, ECM has three levels of scanning that employ different options within the solution to varying degrees. The administrator can quickly switch between these three levels to best suit the requirements of the client company. These three levels are Aggressive, Mild, and Simple - allowing a fire-and-forget method of setting up the solution to those administrators not wishing to deviate 13

14 from any of the default settings, or working with time constraints. When handling those messages defined as Spam, NetCore defaults to delivering the messages with a prepended Spam tag in the subject line. Should any messages be blocked before they reach a user's inbox, the administrator may view details of each message including the sender address, subject line, and the date of receipt. 14

15 Reporting The Reports section, the default page presented at login, provides data for all the messages processed by ECM. This information is displayed in various charts and tables, providing an extensive statistical breakdown that will please even the most analytical of administrators. Contained within the Reports section are eleven individual report subcategories, each displaying their data in with standardised formatting allowing for instant familiarity with the layout of the data. Counts are kept for the number of blocked, delivered, and bounced messages, along with the total file size of the data that has been transferred. Each type of message is easily distinguished and this can serve to further enhance the administrator s understanding of the client company s mail profile and raise their ability to assess the level of both genuine and Spam mail being received by the company. Some of the report pages offer drill-down options to enable deeper analysis of the data. For example, the value next to the RBL Blocked Messages category on the Usage Reports screen is a hyperlink, and clicking on this link displays further information relating to messages blocked by the Real-time Blackhole Lists. 15

16 One of the key features of ECM is Netcore s Spam Digest technology. Spam Digest allows users to view a summary of blocked messages that were originally intended for them and have been stopped by the system. If an administrator wishes, the user can also be provided with a link to their private quarantine area so that any genuine messages can be released. Such user interaction releases a burden on Administrators and Support Teams who might otherwise be required to spend time researching whether the message is genuine or not, and then releasing the message to the user. To ease the setup of this function, a pre-existing list of user s addresses may be uploaded directly to the ECM interface. The administrator may then choose the frequency with which the digest should be sent, selecting between either Daily or Weekly. For those administrators wishing to take copies or backups of report data, ECM provides a link to a printer friendly version of the report, along with a link for a downloadable version. 16

17 Results Type of Mail Detected as Genuine Detected as Spam GENUINE 100% 0% SPAM 1% 99% Emergic CleanMail Service performed well from the outset, delivering 100% of the genuine mail correctly and correctly classifying 99% of the Spam mail. It is also worth noting that Emergic CleanMail Service delivers a good proportion of grey and list mail as genuine. This gives an organisation the flexibility and opportunity to define policies that prevent messages being blocked that could potentially be business critical. Based on the results above, West Coast Labs is pleased to award the Emergic CleanMail Service, the Checkmark Anti-Spam Premium certification. 17

18 Conclusion Emergic CleanMail from NetCore is a feature-rich and flexible service, providing for companies up to enterprise level with a multi-layered defense against Spam. This solution is ideal for those companies serious about removing Spam, or for any supplier offering a security service who wishes to add a well-established and highly performing Spam solution. During testing the blocking, tagging, and quarantining of Spam provided an effective method of targeting, recognising, and removing Spam from the end user s inboxes. This is enhanced by the customization options provided to the administrator via the interface. Reports are both detailed and wide-ranging and provide an excellent overview of both incoming and outgoing traffic. Administrators under pressure should find the provision of the Spam Digest a particularly useful feature as it can potentially reduce some of the processing time overheads. From the outset of testing, ECM performed exceptionally well. Within a very short time, the solution had attained the Premium level of certification and continued to improve throughout the duration of the test period. This is due in no small part, to the method with which samples are submitted and processed by NetCore, and also the ability of the company to feed samples from each of their customers into a central solution to enhance coverage for all of their customers. Overall the ECM service handled both Spam and genuine mail in a highly efficient manner, successfully scanning all incoming mail for Spam with minimal impact on the delivery of genuine mail. NetCore is the first Indian Company to get Checkmark certification on Hosted Anti-Spam Service. 18

19 Security Features Buyers Guide Emergic CleanMail provides multi-layered protection against Spam and Virus and facilitates enhanced, secure messaging performance. borne threats are eliminated right at the Internet level, much before they even touch the corporate network resulting in increased productivity, irregular bandwidth and lost of data. Backed by a 24x7 active response team with continuous real time database updates and detailed reports, CleanMail ensures 100% virus protection and 99% spam protection Business Benefits.as stated by NetCore Eliminates threats and quarantines spam at Internet level, saving connectivity and storage costs. Emergic CleanMail(ECM) Service leverages the benefit of Managed Services model and saves time and money wasted in procurement of hardware, software, implementation and management of a In-housed solution. Extensive reporting system provides organizations a complete update on their ROI. Low Total Cost Of Ownership. Increased Employee Productivity by eliminating spam Leverage Mangaed Service Providers investment in HA environment assuring you a 24x7 uninterrupted service. Per user revenue and service model, makes costs of expansion controllable and predictable. CleanMail is Business ready, the model can be easily used to resell and co-brand without any additional effort. 19

20 Technical Benefits.as stated by NetCore Multilayered spam blocking produces the industry's lowest false-positive rate while blocking as much as 99% of all inbound spam Domain & User level Quarantine Access The Personal Spam Manager enables end users to manage their own spam without the intervention of IT administration Dashboard with In-depth Reporting Disaster Recovery Spooling (Queues the mail incase mailserver is not reachable) Domain Specific Whitelist and Blacklist Global Data Centres delivering % uptime with 24x7 active response team CleanMail s beyond perimeter protection technique, keeps attacks like DoS and DDoS far away from the network The Recurrent Pattern Detection technique ensures that latest spam outbreaks are automatically detected without any special effort url : ( 20

21 Security Features Buyers Guide NetCore Emergic CleanMail Service developments in the last 12 months A number of new technologies have been developed and integrated into CleanMail s Hosted Service over the last twelve months. Recurrent Pattern Detection (RPD) :- Emergic CleanMail (ECM) added the Recurrent Pattern Detection technique patented by Commtouch to its powerful detection engine to guarantee efficient detection of new spam outbreaks in realtime. Other techniques used to detect spam outbreaks include manual identification of spam patterns from outbreaks appearing in decoy. However these techniques do not guarantee a realtime detection of new outbreaks. With addition of RPD ECM has guaranteed that its users are free of spams even during these outbreaks. Virus Outbreak Detection (VOD) :- ECM made its Virus Outbreak detection capabilities more powerful with the implementation of VOD technology from Commtouch. With the implementation of this technology ECM now provides two layers of protection to its users during the Zero Hour Window. Recipient Address Verification (RAV) :- ECM's innovative Recipient Address Verification protects the organizations from Directory Harvest Attacks. This check also helps ECM to identify bad IP addresses broadcasting spams and throttle them based on the invalid recipient mails they are sending. Sender Policy Framework module has also been developed 21

22 Additional Noteworthy Product Features Transport Layered Security (TLS) provides assurred encrypted delivery Encrypted web portal ensures privacy and protection of sensitive information Web bug detection capabilities which ensures that security exploits don't creep in through s. Online dashboard provides an extensive reports supported by graphical pattern indicators and provides granular control of the filter engine Recipient Address Verification(RAV) techniques saves organizations from Directory Harvest Attacks. Global DataCentres with load balancing and redundant hardwares means no single point of failure True "Zero Hour" Anti-Virus technology based on Real Time Detection, negating risks of early stage viruses evading traditional scanners. 100% audit record of every message relayed by the service accessible by administrators and end-users if required. Beyond perimeter protection technique, keeps attacks like DoS and DDoS far way from the network 24x7 active Response team ensures that any major incidents are identified, managed and alerted to the customer before they can do damage. 22

23 US SALES T +1 (717) EUROPE SALES T GLOBAL HEADQUARTERS West Coast Labs Unit 9 Oak Tree Court Mulberry Drive Cardiff Gate Business Park Cardiff CF23 8RS, UK

Test Report October 2007. InterScan Messaging Security Suite. Anti-Spam Technology Report

Test Report October 2007. InterScan Messaging Security Suite. Anti-Spam Technology Report Test Report October 2007 InterScan Messaging Security Suite Anti-Spam Technology Report Vendor Details Name: Trend Micro Inc. Address: 10101 N. De Anza Blvd., Cupertino, CA - 95014, USA Telephone: + 1

More information

SurfControl EmailFilter for SMTP

SurfControl EmailFilter for SMTP ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SurfControl EmailFilter for SMTP JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS SurfControl EmailFilter for SMTP SurfControl,

More information

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 SurfControl Email Filter 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents SurfControl Email Filter Test objectives and scenario...3 Test network...4

More information

GFI Mail Essentials for Exchange/SMTP

GFI Mail Essentials for Exchange/SMTP ANTI SPAM SOLUTIONS TECHNOLOGY REPORT GFI Mail Essentials for Exchange/SMTP NOVEMBER 2006 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Mail Essentials for Exchange/SMTP GfI Software,

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3

More information

Do you need to... Do you need to...

Do you need to... Do you need to... TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

E-Mail Security. on your terms SOFTSCAN

E-Mail Security. on your terms SOFTSCAN E-Mail Security on your terms SOFTSCAN With fraudulent and offensive emails delivered in vast quantities to businesses every day a foolproof email security system is essential. Setting the standards SoftScan

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007 COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different

More information

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

Recurrent Patterns Detection Technology. White Paper

Recurrent Patterns Detection Technology. White Paper SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware

More information

Ipswitch IMail Server with Integrated Technology

Ipswitch IMail Server with Integrated Technology Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Features and benefits guide for partners and their customers

Features and benefits guide for partners and their customers and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information

Websense Email Security Transition Guide

Websense Email Security Transition Guide Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011

More information

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

Stop Spam. Save Time.

Stop Spam. Save Time. Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Anti Spam Best Practices

Anti Spam Best Practices 53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:

More information

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and

More information

Security. Help Documentation

Security. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with

More information

Who will win the battle - Spammers or Service Providers?

Who will win the battle - Spammers or Service Providers? Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. ([email protected]) Abstract Spam is abuse

More information

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

Email Security 8.0 User Guide

Email Security 8.0 User Guide Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to

More information

How to Use Red Condor Spam Filtering

How to Use Red Condor Spam Filtering What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Premium Email Filtering MX Verify, Redundancy, Virus & Spam. Why E-mail Sorting Solutions? Why Vircom?

Premium Email Filtering MX Verify, Redundancy, Virus & Spam. Why E-mail Sorting Solutions? Why Vircom? Premium Email Filtering MX Verify, Redundancy, Virus & Spam Why E-mail Sorting Solutions? Why Vircom? Why? Focused on Managed Messaging SaaS Security Systems Own Superior-Architected Infrastructure DATACENTERS:

More information

An Advanced Reputation Management Approach to Stopping Emerging Email Threats

An Advanced Reputation Management Approach to Stopping Emerging Email Threats An Advanced Reputation Management Approach to Stopping Emerging Email Threats CONTENTS The Evolution of Reputation Management 2 Emerging Security Threats 2 Advanced Reputation Management (ARM) 3 How ARM

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even

More information

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200 800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A

More information

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level

More information

Thexyz Premium Webmail

Thexyz Premium Webmail Webmail Access all the benefits of a desktop program without being tied to the desktop. Log into Thexyz Email from your desktop, laptop, or mobile phone, and get instant access to email, calendars, contacts,

More information

Basic Email Funneling MX Verify and Redundancy. Why E-Mail Sorting Solutions? Why Vircom?

Basic Email Funneling MX Verify and Redundancy. Why E-Mail Sorting Solutions? Why Vircom? Basic Email Funneling MX Verify and Redundancy Why E-Mail Sorting Solutions? Why Vircom? Why? Focused on Managed Messaging SaaS Security Systems Own Superior-Architected Infrastructure DATACENTERS: Carrier-class

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Symantec Email Security.cloud - Skeptic Whitepaper

Symantec Email Security.cloud - Skeptic Whitepaper TECHNICAL BRIEF: SYMANTEC EMAIL SECURITY.CLOUD........................................ Symantec Email Security.cloud - Skeptic Whitepaper Who should read this paper This white paper outlines the technical

More information

Panda Cloud Email Protection

Panda Cloud Email Protection Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Barracuda Email Security Service

Barracuda Email Security Service Barracuda Networks Technical Documentation Barracuda Email Security Service Administrator s Guide Version 1.0 RECLAIM YOUR NETWORK Copyright Notice Copyright (c) 2004-2011, Barracuda Networks, Inc., 3175

More information

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration

Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration 1.1 How do I access the records of the domain(s) that I administer? To access the domains you administer, you

More information

PineApp Anti IP Blacklisting

PineApp Anti IP Blacklisting PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Anti-spam Comparison Report

Anti-spam Comparison Report January 2009 Anti-spam Comparison Report www.westcoastlabs.com 1 Test Laboratory Details US Headquarters and Test Facility West Coast Labs, 16842 Von Karman Avenue, Suite 125 Irvine, CA 92606, U.S.A.,

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32 IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Feature Comparison Guide

Feature Comparison Guide Feature Comparison Guide Stay Secure Portal Autumn 2015 Contents Introduction... 3 Description on some of the new features... 5 Customer overview from partner portal... 5 Partner & customer portal linkage...

More information

Solution Brief: Enterprise Security

Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................

More information

Mailwall Remote User Guide Hosted Email Security

Mailwall Remote User Guide Hosted Email Security Hosted Email Security Manual version 2.2 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad Ltd technical

More information

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control

More information

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.

More information

The Advantages of Security as a Service versus On-Premise Security

The Advantages of Security as a Service versus On-Premise Security The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

Mail-SeCure for virtualized environment

Mail-SeCure for virtualized environment OUR INNOVATION YOUR SECURITY Mail-SeCure for virtualized environment OVERVIEW More and more companies are moving towards a virtualized IT-environment, where several network services (email, web surfing

More information

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.

More information