CipherTrust's upgraded reputation filter tracks 50 million IP addresses to help determine whether a message is spam.
E-mail security company CipherTrust Inc. last week rolled out an upgrade to its E-mail reputation filter, TrustedSource 3.0. The upgrade, which is available free to existing customers and will be integrated into the company's IronMail message security appliance, tracks some 50 million IP addresses that send E-mail to CipherTrust's network of customers. TrustedSource 3.0 uses the data to help determine whether a message is spam.
A number of other E-mail security companies also filter based on reputation, including IronPort Systems, MessageLabs, Postini, and Symantec's Brightmail. Not all anti-spam vendors, however, handle enough messages to effectively evaluate senders' reputations.
"The key thing in establishing an effective reputation service is it's all about the volume," says Matt Cain, senior VP at research firm Meta Group. "The more data points you can gather, the more reliable that information becomes over time. Given that CipherTrust has one of the best-selling products out there, they do have a broad enough network where they can build a fairly effective reputation service."
CipherTrust has found that 30% of the average enterprise's incoming messages originate from IP addresses that seldom send E-mail. These addresses, the company says, have a high probability of being zombie machines spewing spam. CipherTrust's network detects 18,000 new zombies an hour.
Reputation is only one of many metrics used to determine whether an E-mail message should be blocked. Bayesian analysis, heuristics, header analysis, content filtering, and spam signatures all have their uses in evaluating messages, as well.
But because spammers have become so sophisticated in the techniques to bypass content filters, many in the industry see reputation as a more promising approach.
Says Matt Anthony, director of product marketing at CipherTrust, "We think reputation is really going to be critical to E-mail security going forward."
[Interop ITX 2017] State Of DevOps ReportThe DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.