Cloudmark Messaging Security Technology
Cloudmark solutions leverage patented Advanced Message Fingerprinting and sender intelligence technology, combined with corroborated feedback from a Global Threat Network of trusted reporters, automated and anonymous traffic analysis and dedicated security analysts to detect and stop messaging abuse. Only Cloudmark provides real-time automated response with unparalleled accuracy and the fastest response to stopping new messaging threats and abuse across multiple vectors.
Developed by world-renowned experts in messaging security, Cloudmark's technologies were designed with three goals in mind:
- Automatically stop current attacks, including their polymorphic variations
- Stay ahead of new attack vectors
- Filter large message streams with high efficiency and scalability
The Cloudmark Approach
Click to enlarge
- Cloudmark research
- advanced message fingerprinting algorithms
- Cloudmark service
- traffic analysis system
- expert analysis
- trust evaluation system
- Global Threat Network
- Cloudmark installations
threats
enterprise mobile operators consumer SMB service provider- fingerprint updates
- Fingerprint Statistics
- real-time feedback
Advanced Message Fingerprinting
Advanced Message Fingerprinting algorithms form Cloudmark's core intellectual property, allowing automatic detection of messaging threats. Cloudmark's fingerprinting algorithms target different threat attributes embedded in messages. As each message arrives, these algorithms generate "fingerprints" that represent unique aspects of the message. Once a fingerprint has been determined to be associated with a verified spam, phishing or virus attack, all current and future messages containing that fingerprint will be immediately blocked. As a result, Cloudmark is able to identify mutations and variants in near real time.
Cloudmark leverages intelligent fingerprinting algorithms to identify and track spam, phishing, and virus attacks throughout the network. These sophisticated algorithms work in tandem to identify all attributes and mutations in a given attack. This unique text-agnostic threat analysis enables Cloudmark to stop spam in all languages and formats.
The Cloudmark Global Threat Network systems detect and monitor the latest threats in mobile network operator environments globally freeing operations staff from this task. This process is automated by a combination of message feedback, traffic analysis and a trust evaluation system.
Global Threat Network
For new outbreaks, Cloudmark provides rapid response through its Global Threat Network, the largest and most sophisticated in the industry. With Cloudmark, threat monitoring is not limited to a single department within a company, but extended to a worldwide network of over 2 billion reporting sources in over 165 countries. The Global Threat Network consists of service provider abuse teams, systems administrators, honeypots and trusted users around the world. Feedback from these reporters enables Cloudmark to block the latest threats within minutes of attack origination.
Cloudmark Services and Trust Evaluation System
All feedback by the Global Threat Network is corroborated and analyzed by Cloudmark's Trust Evaluation System. This system tracks the reporter's reputation and determines fingerprint classification based on the number of reports and the reporter's reputation. Reputation or "trust" is earned over time by consistently reporting correct feedback. It preserves the integrity of reports and ensures an extremely accurate system. Since feedback is continuously corroborated, any inaccuracies in message classification, such as false positives or false negatives, are corrected without manual intervention. No other system offers this continuous feedback review and seamless remediation.
The Trust Evaluation System is a key component of Cloudmark's Services, which perform the backend analysis to determine whether a message is legitimate or a threat, and categorizes threats by type and then distributes threat intelligence to Cloudmark customers.