- Industries
-
Produits
Mobile Operators
Fournisseurs d’Accés Internet
Réseaux sociaux
- Partenaires
- Société
- Actualités
- Ressources
- Support
Cloudmark Livres blancs *en Anglais
-
Télécharger(639KB)
Voir les détailsThis white paper details the growth of SMS Spam. Spammers are turning to SMS as a means to reach recipients and elicit illicit revenue. As a result, the number of unique SMS spam campaigns quadrupled in the first half of 2012 and the overall rate of receipt grew by 300% from 2011 to 2012. | Livre blanc
-
SMTP Abuse Prevention in IPv6 Networks
Télécharger(492KB)
Voir les détailsThis white paper presents a methodology for handling SMTP traffic from an unknown number of IPv6 source address senders with unknown intentions. Traditional blacklists and related technologies used successfully in IPv4 networks do not map well into IPv6 networks. | Livre blanc
-
BCP for Near Term SMTP Deployments in IPv6 Networks
Télécharger(454KB)
Voir les détailsAs unallocated IPv4 address space approaches exhaustion, IPv6 deployment becomes more critical for fixed line operators, mobile operators, and enterprises alike. Messaging industry understanding of how IPv6 impacts anti-abuse mechanisms is on the increase, but requires a broader acceptance of some of the risks involved with IPv6 connectivity and associated transition and translation technologies. | Livre blanc
-
Applying Collaborative AntiSpam Techniques to AntiVirus Problem
Télécharger(287KB)
Voir les détailsOne of the most effective techniques available for combating spam is the widespread application of collaborative filtering, where members of a community identify spam messages. We present data and analysis of our success in applying a collaborative filter, originally designed for anti-spam, to the anti-virus problem. We show that not only is a collaborative filter effective for filtering viruses, but also that the community begins filtering the virus within minutes of its initial detection-and with an extremely low false positive rate. | Livre blanc
-
Reputation Based Approach for Efficient Filtration of Spam
Télécharger(430KB)
Voir les détailsIn this paper, we describe the collaborative, reputation-based approach to fighting spam that has been developed by Cloudmark. Two core components of our technology are described in depth, namely the Global Threat Network and the Trust Evaluation System. The Global Threat Network rapidly gathers and correlates reports of suspect messages from millions of globally-distributed honeypots, customers, and various other sensors. The Cloudmark Trust Evaluation System (TES) analyzes the reports, assigns a reputation to the suspect messages based upon the reputation of the reporters, and then determines a new reputation for each reporter based upon their historical performance at correctly identifying unwanted content. Because the reputation-based collaborative system does not draw blanket conclusions about terms, hosts, or people, this approach reduces false positives and false criticals, while simultaneously decreasing administration costs. | Livre blanc
-
Télécharger(565KB)
Voir les détailsIn order to develop effective strategies and solutions to combat the phishing problem, businesses need to understand the infrastructure in which phishing economies thrive. Cloudmark has conducted extensive research to uncover phishing network. The result is a sociological and economic analysis of phishers based on data collected from 3.9 million phishing email messages, 220,000 messages from 13,000 chat rooms, and 48,000 users that were spread across six chat networks and 4,400 compromised hosts used in botnets. This paper presents these research results offering deep insight into the behavior of this criminal subculture. | Livre blanc
-
Zero-Hour, Real Time Computer Virus Defense Through Collaborative Filtering
Télécharger(115KB)
Voir les détailsConventional anti-virus software relies on a staff of researchers to isolate and analyze viruses, and then write and test rules to block them. This process can take up to 24 hours and often blindly blocks many legitimate messages with attached executable code. In contrast, Cloudmark uses a fingerprinting algorithm to identify each incoming message, combined with a reputation-based, trusted community of users to accurately identify malicious viruses in real-time. Using the Cloudmark Trust Evaluation System (TES), Cloudmark is able to corroborate reports from the Cloudmark Global Threat Network. Cloudmark's virus fingerprinting algorithm automates the time-intensive 'reverse engineering' analysis of conventional technologies allowing its system to identify and stop new worms and virus strains in zero-hours. | Livre blanc
-
Cloudmark Authority Data Exchange and Privacy
Télécharger(252KB)
Voir les détailsThis document describes how Cloudmark Authority, Cloudmark's message content anti-spam/virus filtering solution, can be deployed to ensure that no data that is private to subscribers is sent offsite. In this scenario, Cloudmark is completely compliant with the strictest privacy laws such as those of Switzerland, Russia and Germany. | Livre blanc
- Pour en savoir plus sur les produits Cloudmark
- Cloudmark DesktopOne
- Cloudmark Authority