Internet Service Providers
This white paper details the growth of SMS Spam. Spammers are turning to SMS as a means to reach recipients and elicit illicit revenue. As a result, the number of unique SMS spam campaigns quadrupled in the first half of 2012 and the overall rate of receipt grew by 300% from 2011 to 2012. | White Paper
This white paper presents a methodology for handling SMTP traffic from an unknown number of IPv6 source address senders with unknown intentions. Traditional blacklists and related technologies used successfully in IPv4 networks do not map well into IPv6 networks. | White Paper
As unallocated IPv4 address space approaches exhaustion, IPv6 deployment becomes more critical for fixed line operators, mobile operators, and enterprises alike. Messaging industry understanding of how IPv6 impacts anti-abuse mechanisms is on the increase, but requires a broader acceptance of some of the risks involved with IPv6 connectivity and associated transition and translation technologies. | White Paper
One of the most effective techniques available for combating spam is the widespread application of collaborative filtering, where members of a community identify spam messages. We present data and analysis of our success in applying a collaborative filter, originally designed for anti-spam, to the anti-virus problem. We show that not only is a collaborative filter effective for filtering viruses, but also that the community begins filtering the virus within minutes of its initial detection-and with an extremely low false positive rate. | White Paper
In this paper, we describe the collaborative, reputation-based approach to fighting spam that has been developed by Cloudmark. Two core components of our technology are described in depth, namely the Global Threat Network and the Trust Evaluation System. The Global Threat Network rapidly gathers and correlates reports of suspect messages from millions of globally-distributed honeypots, customers, and various other sensors. The Cloudmark Trust Evaluation System (TES) analyzes the reports, assigns a reputation to the suspect messages based upon the reputation of the reporters, and then determines a new reputation for each reporter based upon their historical performance at correctly identifying unwanted content. Because the reputation-based collaborative system does not draw blanket conclusions about terms, hosts, or people, this approach reduces false positives and false criticals, while simultaneously decreasing administration costs. | White Paper
In order to develop effective strategies and solutions to combat the phishing problem, businesses need to understand the infrastructure in which phishing economies thrive. Cloudmark has conducted extensive research to uncover phishing network. The result is a sociological and economic analysis of phishers based on data collected from 3.9 million phishing email messages, 220,000 messages from 13,000 chat rooms, and 48,000 users that were spread across six chat networks and 4,400 compromised hosts used in botnets. This paper presents these research results offering deep insight into the behavior of this criminal subculture. | White Paper
Conventional anti-virus software relies on a staff of researchers to isolate and analyze viruses, and then write and test rules to block them. This process can take up to 24 hours and often blindly blocks many legitimate messages with attached executable code. In contrast, Cloudmark uses a fingerprinting algorithm to identify each incoming message, combined with a reputation-based, trusted community of users to accurately identify malicious viruses in real-time. Using the Cloudmark Trust Evaluation System (TES), Cloudmark is able to corroborate reports from the Cloudmark Global Threat Network. Cloudmark's virus fingerprinting algorithm automates the time-intensive 'reverse engineering' analysis of conventional technologies allowing its system to identify and stop new worms and virus strains in zero-hours. | White Paper
This document describes how Cloudmark Authority, Cloudmark's message content anti-spam/virus filtering solution, can be deployed to ensure that no data that is private to subscribers is sent offsite. In this scenario, Cloudmark is completely compliant with the strictest privacy laws such as those of Switzerland, Russia and Germany. | White Paper
With our anticipated growth and previous configuration, it would have required a 400% increase in edge appliances to handle the user load, but with Cloudmark, we required less than one tenth of that number. In fact, with the Cloudmark implementation, we have saved $400,000 in capital expenses alone, and a further $185,000 in operating costs. That's well worth the investment.
- Phil Siebel
Cloudmark came highly recommended and we noticed a distinctive productivity improvement in just two days. The technology behind the Cloudmark Authority plug-in for SpamAssassin really works and we plan to use Cloudmark to protect the core services of our network.
- Demian Sellfors
CEO, Media Temple