FireEye Threat Prevention Cloud Evaluation
|
|
|
- Gary Nichols
- 10 years ago
- Views:
Transcription
1 Evaluation Prepared for FireEye June 9, 2015 Tested by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA
2 Table of Contents Executive Summary... 1 Introduction... 1 About ICSA Labs... 1 FireEye Threat Prevention Cloud Overview... 1 Test Environment... 1 Description of Messages in Each Test Set... 2 Test Procedure... 3 Results and Discussion... 4 Conclusions... 6 Appendix A... 7 Test Facility Information... 9 Test Location... 9 Lab Report Date... 9 Page i of i June 9, ICSA Labs. All rights reserved.
3 Executive Summary ICSA Labs conducted a test of the FireEye Threat Prevention Cloud (ETP) service to evaluate its effectiveness in detecting malware and SPAM messages in . The testing was conducted over ten consecutive weekdays beginning March 23, 2015 and ending on April 3, ICSA Labs used a cloudbased mail relay to forward recently in-the-wild SPAM messages and malcode samples extracted from a live SPAM corpus in order to simulate the deployed use of the product to protect an enterprise. During the 20 hour testing period, a total of 15,347 messages were delivered to the ETP (13,845 SPAM messages, 1,424 legitimate messages, and 78 messages with a malcode attachment). The ETP delivered only 76 SPAM messages for a SPAM detection rate of 99.45% and only one message with a malcode sample attached (1.28%). Although 9 legitimate messages were blocked (0.63%), none of those were personal messages. Nor was any message with a legitimate attachment blocked. Every legitimate message that was blocked was either a newsletter or mailing list notification. Introduction About ICSA Labs ICSA Labs, an independent division of Verizon, has been providing credible, independent, third-party product assurance for end-users and enterprises since ICSA Labs provides third-party testing and certification of security and health IT products, as well as network-connected devices, to measure product compliance, reliability and performance for most of the world s top technology vendors. FireEye Threat Prevention Cloud Overview The FireEye Threat Prevention Cloud (ETP) platform provides real-time, dynamic threat prevention without the use of signatures to protect an organization across primary threat vectors, including web, , and files and across different stages of an attack lifecycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence to identify and block cyber-attacks in real time. Test Environment The test environment for the evaluation consisted of a cloud-based virtual machine running CentOS 6.6 with a custom-built mail relay that connected using ESMTP to the ETP Cloud system IP address provided by FireEye. The CentOS server communicated with a server running on-site at ICSA Labs using a VPN tunnel to enable real-time access to the SPAM corpus and access to the MySQL database used for tracking the delivery and receipt status of every message during each test. From the perspective of ICSA Labs, FireEye provided an ESMTP service listening on port 25 on a specified host along with HTTPS access to an administrative interface for monitoring the ETP status and reports. Note that due to the configuration of the test environment, two of the many methods used by the ETP to assist in spam detection could not be leveraged. First enforcement of Sender Policy Framework (SPF) was disabled because it relies on knowing the original source IP address of an incoming message. The ICSA Labs mail relay forwards the message to the ETP so the source IP address that the ETP observes is that of the ICSA Labs system and not the one for the original sender. Page 1 of 9 June 9, 2015
4 Second knowledge of the set of valid recipients for the domain being protected could not be obtained by the ETP because the ICSA Labs next-hop MTA that was receiving messages does not implement recipient validation. FireEye reports that the ETP is designed to learn the addresses of valid users and factor that information into its classification decisions. Description of Messages in Each Test Set Each test set is comprised of a mix of four types of messages described in the table below. Note that prior to its inclusion in the test set, each message is classified as one and only one type. Message Type (#) SPAM (1) HAM Person-to- Person (2) HAM Subscription (3) Malcode (4) Description Unsolicited messages arriving at the ICSA Labs honeypot. Messages of this type should NOT be delivered. Legitimate person-to-person(s) messages. May or may not have one or more attachments. All attachments for this type are known to be free of malcode. Messages of this type should be delivered. Legitimate mailing list messages to which the recipient has subscribed. To be included in the test set, the message must be addressed to the recipient, be delivered by a server with the same IP address as has been used for previous mailing list messages, and have the same top-level domain (e.g., govdelivery.com). If a marketing campaign message met these requirements, it would be included in the test set as HAM Subscription. Messages of this type should be delivered. Legitimate person-to-person(s) messages with a malcode sample attached. Even though the message body is harmless, messages of this type should NOT be delivered because the attachment is malicious. In terms of the SPAM used, ICSA Labs performs automated analysis on each SPAM message received in our honeypot. All of the SPAM messages are stored as files. The identifying characteristics or metadata for each stored SPAM message is kept in a database. The same is done for all mailing list e- mail messages received into the honeypot. Unlike legitimate mailing list and spam messages, legitimate person-to-person(s) messages are created when and as needed for testing as explained later. ICSA Labs controlled the makeup and composition of the messages in each test set as shown in the table below. The values in the table were chosen to reflect conditions encountered by deployed enterprise anti-spam solutions. SPAM (type 1) to non-spam (types 2,3, or 4) 90:10 Of the 10% non-spam: Person-to-Person(s) (type 2) vs. Mailing List (type 3) vs. Malcode (type 4) 80:15:5 25% had clean attachment For the HAM Person-to-Person(s) (type 2) 40% Text, 40% HTML, 20% Text+HTML 80% were to 1 recipient 20% were to between 2-10 recipients Page 2 of 9 June 9, 2015
5 When a spam message or legitimate mailing list message was needed, the controller program contacted the ICSA Labs SPAM and HAM database and requested the most recent message that arrived in the ICSA Labs honeypot matching the desired type. By the time a SPAM or legitimate mailing list message is sent to the ETP, the is typically less than one second old. Legitimate person-to-person(s) message were assembled from sender to addressee(s) to subject to type of message (html, text, both) to body to attachment(s) to closing from a corpus of component parts. In constructing the message, the controller program choose the parts at random to eliminate repeats for that test run while following the ratios and percentages presented in the previous table. In the event that the controller program determines that a legitimate person-to-person(s) message was next to be sent the message was created and sent. A received header with an appropriate time stamp was created making it appear as though the message just arrived into the ICSA Labs honeypot. When a malcode sample was needed, the controller program first assembled a legitimate person-toperson(s) message. Then an attachment was added from ICSA Labs collection of malicious attachments. The collection consisted of attachments that have been extracted from recently arrived messages in the ICSA Labs SPAM corpus. The file name and MD5 digest for each attached sample was provided to FireEye privately along with this report. Test Procedure A total of twenty hours of testing was split into two 10 hour blocks to enable comparison of the two different ETP configurations described in the following section. Testing was conducted over ten consecutive week days as described below. Week 1: March 23-27, 2015 Week 2: March 30 - April 3, 2015 Weekday Test Start Test End (all times GMT -0400) Monday 10:00 12:00 Tuesday 12:00 14:00 Wednesday 14:00 16:00 (week 2: 18:00-20:00) Thursday 18:00 20:00 (week 2: 14:00-16:00) Friday 08:00 10:00 Note that the test sessions were intended to run during the same time window each week for a given weekday in order to reduce the differences introduced by the continually changing composition of SPAM messages on the Internet. However due to an unexpected issue, the time for the test sessions on Wednesday and Thursday in the second week were swapped. For each 2-hour session, the control program began by verifying messages were arriving at the honeypot and the connection to the backend server is available. The control program then generates an ordered list of the types of messages for the current test to match the configured SPAM-to-HAM-to-malcode ratio. For example, the list might begin with seven SPAM, then one person-to-person HAM, then five more SPAM, then a message with a malcode attachment, and so on. The program obtains a message with the most recent arrival time that matches the type prescribed by first entry in the list and relays the message to the ETP using ESMTP. Once delivery to the ETP was confirmed, the program documented the result in the SPAM and HAM database and moved on to the next message type from the ordered list. This process was repeated until the time limit set for the test had been reached. Independent of the sending control program, an MTA was listening on port 2525 to receive whatever messages the ETP attempted to deliver. The ETP delivered the message using standard ESMTP. The Page 3 of 9 June 9, 2015
6 receiving MTA looked up the message in the SPAM and HAM database to determine its classification and updated its delivery status. If the message was supposed to have been blocked, for example because it was SPAM or malcode, a copy of the delivered message was saved to the results directory to assist with any subsequent analysis. The ETP administrative interface was reviewed to determine how it classified the messages in the test session (i.e., Spam, Advanced Threat or Virus). The Policy Violation functionality was not evaluated. Two of many console screenshots taken during the audit are included in Appendix A below. Results and Discussion The table below summarizes the results of each two hour testing session separately, the combined results for each week of testing and for the overall engagement. The definitions for the headings SD and HFP are below the table. Date Total SPAM SPAM SD* HAM HAM HFP* Malcode Malcode msgs sent dlvd (%) sent blkd (%) sent dlvd 3/ / / / / Wk / / / / / Wk Total *SPAM Detection (SD): the percentage of SPAM messages that the ETP attempts to deliver. *HAM False Positive (HFP): the percentage of legitimate messages blocked, dropped or otherwise not delivered by the ETP. During the first week of testing the spam detection was 99.50%, eight HAM messages were blocked by the ETP, and one message with a malcode sample attached was delivered. During the second week of testing the SPAM detection was 99.41%, and only one HAM message was blocked by the ETP. Note that FireEye reported that the only configuration change between the first and second weeks of testing was that a bulk flag was turned off. The bulk flag tunes how aggressively ETP marks some messages as SPAM, particularly marketing mailing list messages that a user may not have knowingly opted-in to receive. These messages may be seen as SPAM for some users but not others, so FireEye provides a flag to help organizations tune this detection. In this test, the bulk mail flag was on for the first week with more aggressive spam tuning and turned off for the second week for more relaxed spam tuning. During the two week testing period, none of the blocked HAM was a person-to-person(s) message. In addition, no legitimate message with a legitimate attachment was blocked. In other words, every personal in the test set, with or without a clean attachment, was properly classified as not SPAM and promptly delivered to its intended recipient(s). Each blocked message was either a notification Page 4 of 9 June 9, 2015
7 containing a post to a mailing list (e.g., nanog or samba) or a Google Alert message ( The ETP detected and blocked 77 out of 78 malcode samples. Each sample was relayed to the ETP as an attachment to an message. The MD5 digest of the single malcode sample not detected by the ETP was provided privately to FireEye for analysis. Subsequent analysis of the SPAM corpus revealed that a SPAM campaign lasting over 150 minutes had begun near the end of the last test session on April 3, Each of the messages received by ICSA Labs had the same Subject and an attachment having a fixed length filename made up of random alphanumeric characters and a *.zip extension. As shown in the image below, the ETP modified the categorization of the messages associated with the campaign from "SPAM and Virus" to "Advanced Threat" after receiving just 11 messages in a little over 2 minutes. Both the number of messages and the time to elevate the risk category were very small when compared to the respective values observed for the overall campaign. In other words the ETP recognized the campaign quickly after analyzing a small fraction of the total number of messages. Note that categorizing the messages as "Advanced Threat" resulted in alerts being sent by the ETP to configured administrative users. Page 5 of 9 June 9, 2015
8 Conclusions The FireEye Threat Prevention Cloud (ETP) service was very effective in detecting malware and SPAM messages in a live feed relayed from the ICSA Labs corpus. Spam detection effectiveness was measured at 99.45% and with the exception of a few newsletters, there were no false positives observed. Page 6 of 9 June 9, 2015
9 Appendix A Screenshot of the Quarantined messages tab in the Threat Prevention Cloud Administrative Interface. A filter has been applied so only those classified as Virus or Advanced Threat will be listed. Page 7 of 9 June 9, 2015
10 Screenshot of the Dashboard in the Threat Prevention Cloud Administrative Interface summarizing the current day s activity Page 8 of 9 June 9, 2015
11 Test Facility Information This report is issued by the authority of the Managing Director, ICSA Labs. Test Location ICSA Labs 1000 Bent Creek Blvd Mechanicsburg, PA Lab Report Date June 9, 2015 Page 9 of 9 June 9, 2015
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
Overview. Accessing the User Interface. Logging In. Resetting your Password
Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive
How to Use Red Condor Spam Filtering
What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
The Network Box Anti-Spam Solution
NETWORK BOX TECHNICAL WHITE PAPER The Network Box Anti-Spam Solution Background More than 2,000 years ago, Sun Tzu wrote if you know yourself but not the enemy, for every victory gained you will also suffer
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
INLINE INGUARD E-MAIL GUARDIAN
INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine [email protected] 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
Emails and anti-spam Page 1
Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
TREND MICRO. InterScan VirusWall 6. SMTP Configuration Guide. Integrated virus and spam protection for your Internet gateway.
TM TREND MICRO TM TM InterScan VirusWall 6 Integrated virus and spam protection for your Internet gateway for Linux TM SMTP Configuration Guide Trend Micro Incorporated reserves the right to make changes
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
Opus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY
Joel Snyder Opus One February, 2015 COMPARING RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION The following analysis summarizes the spam catch and false positive rates of the leading anti-spam vendors.
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Spam Testing Methodology Opus One, Inc. March, 2007
Spam Testing Methodology Opus One, Inc. March, 2007 This document describes Opus One s testing methodology for anti-spam products. This methodology has been used, largely unchanged, for four tests published
Service Launch Guide (US Customer) SEG Filtering
Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.
ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
Quick Start Policy Patrol Mail Security 10
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
Exchange Online Protection In-Depth
Exchange Online Protection In-Depth Mike Crowley Baseline Technologies Session Agenda Introduction to EOP Administration DMARC, SPF & DKIM Advanced Threat Protection EOP Deployment Tips Introduction to
SurfControl EmailFilter for SMTP
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SurfControl EmailFilter for SMTP JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS SurfControl EmailFilter for SMTP SurfControl,
Mimecast Email Security
DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
WatchGuard QMS End User Guide
WatchGuard QMS End User Guide WatchGuard QMS Overview The WatchGuard QMS device enables spam messages from the WatchGuard XCS to be directed to a local quarantine area that provides spam storage for each
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange
GFI Product Comparison GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI MailEssentials Trend Micro ScanMail Suite Microsoft Exchange Server 2003/2007/2010/2013 Integration Option
PineApp Daily Traffic Report
PineApp Daily Traffic Report User Guide PineApp daily traffic report is an email message delivered to all registered users in the Mail-SeCure system. This report includes a list of all messages that were
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
More Details About Your Spam Digest & Dashboard
TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Blackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org
ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 SurfControl Email Filter 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents SurfControl Email Filter Test objectives and scenario...3 Test network...4
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
Comparing Industry-Leading Anti-Spam Services
Comparing Industry-Leading Anti-Spam Services Results from Twelve Months of Testing Joel Snyder Opus One April, 2016 INTRODUCTION The following analysis summarizes the spam catch and false positive rates
Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security
Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to
Mod 08: Exchange Online FOPE
Office 365 for SMB Jump Start Mod 08: Exchange Online FOPE Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall Owner & IT Consultant District Computers 1 Jump Start Schedule
How To Stop Spam From Being A Problem
Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Anti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
ASAV Configuration Advanced Spam Filtering
ASAV Configuration Advanced Spam Filtering Step 1: Login to http://asav.mediaring.sg/ using the login credentials supplied in the Spam, Virus (ASAV) activation email. Step 2: Configuring Protection Level
AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution
AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution The present document offers a comprehensive analysis of the ways to secure corporate email systems. It provides an expert opinion on
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Quarantine Central for end users: FAQs
Quarantine Central for end users: FAQs About is a leading hosted email services company. Founded in 1994, was one of the first companies to offer hosted email security services to the North American market.
Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.
STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication
BitDefender Client Security Workstation Security and Management
BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
Symantec Hosted Mail Security. Console and Spam Quarantine User Guide
Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license
Serial Deployment Quick Start Guide
PaperClip em 4 11/19/2007 Serial Deployment Quick Start Guide This checklist should be completed before installing the em4 Relay. Your answers with the associated screens will enable you to install and
USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
PureMessage for Microsoft Exchange Help. Product version: 4.0
PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9
Do you need to... Do you need to...
TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce
1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5
Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER
Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER FORTINET Global Reputation Monitoring PAGE 2 Overview Fortinet s FortiGuard Security Services delivers two essential
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
IBM Unica emessage Version 8 Release 5 February 19, 2014. Transactional Email Administration Guide
IBM Unica emessage Version 8 Release 5 February 19, 2014 Transactional Email Administration Guide Note Before using this information and the product it supports, read the information in Notices on page
