SmartAdvice: Look Beyond Filtering Techniques When Evaluating Anti-Spam Products - InformationWeek
12:15 AM
Ransomware: Latest Developments & How to Defend Against Them
Nov 01, 2017
Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly ar ...Read More>>

SmartAdvice: Look Beyond Filtering Techniques When Evaluating Anti-Spam Products

From blacklists to Bayesian learning, look at the kind of spam problems your company has and evaluate products based on business need, The Advisory Council says. Also, plan for the company's continuation when drafting disaster-recovery plans.

Editor's Note: Welcome to SmartAdvice, a weekly column by The Advisory Council (TAC), an advisory service firm. The feature answers two questions of core interest to you, ranging from career advice to enterprise strategies to how to deal with vendors. Submit questions directly to

Question A: What factors should we consider in selecting an anti-spam solution?

Our advice: Fighting spam is a lot like maintaining a healthy weight -- it's a constant problem and there are no quick solutions. A year after CAN-SPAM, we are besieged with spam E-mail, some claiming compliance with the law and some flouting it. Although top spammer Jeremy Jaynes recently was convicted under Virginia's anti-spam law, the spam cases against his sister and another business partner have been thrown out. Anti-spam measures seem to make one big step forward and two small steps backward.

Businesses still face problems of lost productivity, compliance risk, and security hazards resulting from spam. Yet successful elimination of spam can result in immediate payback from improved productivity. It also will result in reduced legal and financial liability.

Currently there are four classes of technical solutions to provide spam-free E-mail: desktop software, server software, gateway appliances, and managed services. Desktop software is most appropriate to small businesses. Server software provides an Internet E-mail gateway for larger businesses. A spam gateway appliance provides the same capability as server software, without the need to install and maintain software. A managed E-mail service filters all incoming mail at the service provider's data center; only spam-free mail enters the client firm's infrastructure.

Related Links

MIT 2005 Spam Conference

All of these products use a cocktail approach to fending off unwanted E-mail. Anti-spam techniques include blacklists, whitelists, Bayesian learning, and heuristic rules. Vendors have access to the same anti-spam research. To evaluate anti-spam products, you need to look beyond simple filtering statistics and consider factors that are specific to your business.

Evaluating Anti-Spam Techniques
Our recommended list of evaluation criteria includes:

  • Total cost of ownership: How much time and manpower will be needed to maintain the solution's effectiveness?

  • Performance and availability: E-mail is mission critical in many businesses; will the solution scale in messages/second and guarantee the required uptime?

  • Response to new attacks: How fast is the solution updated as spammers introduce new methods?

  • Technical support: What is the service level that the vendor can guarantee for software, hardware, or service support?

In addition, each firm must evaluate the anti-spam solution's feature set against its own business needs. Postini, for example, is a managed-service firm that has done a good job in meeting the anti-spam needs of the legal community. Its service has a number of anti-spam features that should be considered in selecting an anti-spam solution. These features include: proactive detection of mail zombies, flexible policies, user-selectable thresholds and rules, per-user mail quarantine, support for encrypted mail, memory-based mail filtering, and WebTrust security certification.

To effectively eliminate spam in your organization, start with the users, and determine exactly what types of spam are causing problems for them. Then evaluate the available solutions to your spam problem, using the criteria we have outlined.

-- Frederick Scholl

1 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll