SlideShare a Scribd company logo
1 of 18
Modern Anti-Spam with NoSpamProxy Protection
Rejection – No Sorting
Thomas Stensitzki
Introduction
Thomas Stensitzki
Principal Enterprise Consultant
Granikos GmbH & Co. KG
MCSM Messaging, MCM: Exchange 2010
MCSE, MCSA, MCITP, MCTS, MCSA, MCSA:M, MCP
E-Mail: thomas.stensitzki@granikos.eu
Web: http://www.granikos.eu
Blog: http://blog.granikos.eu
Spam in numbers
~88% of received messages are spam
~4% of received messages have malicious content
Postini: Only 12% of received emails are legitimate (Feb 2013)
Microsoft: 94% spam, 600 million emails a week
Trend Micro: Spam ratio varies by country
http://bit.ly/GlobalSpamMap
Spam ratio per country (Jan 2014 – Feb 2015)
> 80%
50% - 80%
20% - 50%
< 20%
Source: TrendMicro
Damage and cost
Loss in end-user productivity
Restrained mobile access to company resources
Loss of communication
Loss of network bandwidth
Waste of storage
- Mailbox databases
- Archive storage (expensive)
Example for loss of productivity:
30 spams per day = 5 minutes x 220 working days per year
2 working days per year and employee
Page  5
Rejection
No interruption of end-user routine
False positives easy to handle
Self learning connections and domain
trusts
No waste of mailbox database storage
No waste of archive storage
RFC compliant rejection (NDR)
Reduced administrative intervention
Sorting (classic approach)
Interuption of end-user working routine
Manual action by end-user required
Waste of mailbox database storage
Waste of archive storage
Risk of large number of unhandled spam
messages
Comparison
Page  6
Rejection
Delivered Blocked
Sound email OK
Spam nuisance OK
Sorting (classic approach)
Delivered Blocked
Sound email OK danger
Spam nuisance OK
Comparison
Scanning – Assessment – Rejection
Sound senders are sent a NDR
Spammers are unable to deliver
Risk of false positives is defused
- Sound senders can react on NDR
Receiving – Assessment – Processing
- Deletion, Quarantine, Marking
Depending on product
False Positives
- Danger of important information being lost without
sender and recipient knowing about it
Solution
NoSpamProxy® Protection – Mail Gateway
Rejection instead of sorting
- The alternative approach to spam protection
Sound emails are identified
- Self learning mechanism to identify desired connections and handling domain trusts
Customizable to business needs
- Detailed rule set of filters and actions for incoming and outgoing messages
Scalable Anti-Spam Solution
CYREN Premium Anti-Virus integrated in product
Component of Net at Work Mail Gateway
Legal considerations
Applicable in Germany: § 206 StGB:
„It is a criminal offence to suppress an entrusted communication“
Once an email has been received, its deletion or filtering by a third party is an
offence
- That is the primary reason why even spam must be archived
NoSpamProxy does not accept spam nor does it suppress any communication
entrusted to it
- A regular NDR is being generated
BSI*: Analogy between Spam and unsolicited advertising
*BSI: Federal Office for Information Security
User Interface
Multi-Role server with default rule set
Sound email
Concentrating on negative spam characteristics leads to false positives
Unique Level of Trust technology
Bonus points for desired email connections (sender – recipient)
System learns dynamically about desired connections
Easy authorization of external senders
- Simple send an email to the external sender to authorize incoming messages
Enables applying more stringent spam filtering rules
- Various filters and actions are available
In a nutshell
Acts as a SMTP proxy
Spam is identified while message is in transmission
- Connection can be aborted with a 5xx error status to the sending MTA
Installed as the first SMTP endpoint from the internet
- Next hop can be an Edge server role or an internal Hub server role
Company NetworkNoSpamProxy Protection
Multi-Role
Exchange
Server
Topology example 1
Internet facing servers
not domain joined
Internal server domain
joined
One gateway server
possible, but no
redundancy
1 Gateway Role
1 Intranet Role
AD
Exchange Server
Transport Role
Enterprise Network
NoSpamProxy
Intranet Role
NoSpamProxy Protection
Gateway Rolle
HTTPS
Topology example 2
AD
External
SMTP
servers
Exchange Server
Transport Role
Enterprise Network
NoSpamProxy
Gateway Role
Server1/2
NoSpamProxy
Intranet Role
SMTP
Web Service
Internet facing
servers not domain
joined
Internal server
domain joined
Redundant Email
Servers
N Gateway Role
1 Intranet Role
NoSpamProxy® Encryption (aka enQsig)
Centralized email signing and encryption at the gateway
Supports S/MIME and PGP
Centralized certificate store and cert provisioning
Qualified signatures applied to electronic invoices (INVOIC-Messages)
Password protected emails with PDF Mail
De-Mail connector and interface to Deutschland-Online Infrastruktur (DOI)
Interfaces to ECM- and other email systems
NoSpamProxy® Large File
Large files exchange via secure portal
Email client integration (Outlook)
Portal provided as SSL/TLS secure web server
Access password protected
No use of cloud storage
Summary
No loss of Information – sender is informed
No wasted working hours, no manual ploughing through quarantine
Self learning processes
Fully customizable set of rules
IT Resource saving (bandwidth, storage, maintenance)
Full legal compliance
Additional modules for email encryption and file exchange
- NoSpamProxy Encryption
- NoSpamProxy Large File
Questions
Email: info@granikos.eu
Web: http://www.granikos.eu
Blog: http://blog.granikos.eu
Twitter: @Granikos_DE

More Related Content

Viewers also liked

Presentacion seminario
Presentacion seminarioPresentacion seminario
Presentacion seminariofjsm2004
 
Fuel saving tips
Fuel saving tipsFuel saving tips
Fuel saving tipsYipYan Wong
 
Team3 dayatthemall
Team3 dayatthemallTeam3 dayatthemall
Team3 dayatthemallMrLopez13
 
Lauren Kovin-COLLECTION PRESS
Lauren Kovin-COLLECTION PRESSLauren Kovin-COLLECTION PRESS
Lauren Kovin-COLLECTION PRESSLauren Kovin
 
Kingdom Entertainment
Kingdom EntertainmentKingdom Entertainment
Kingdom EntertainmentRONA FEBRIANA
 
El rol del médico como agente del sistema
El rol del médico como agente del sistemaEl rol del médico como agente del sistema
El rol del médico como agente del sistemaIgnacio Riesgo
 
Học cách sống hòa bình với bệnh khớp
Học cách sống hòa bình với bệnh khớpHọc cách sống hòa bình với bệnh khớp
Học cách sống hòa bình với bệnh khớpjoellen270
 
Speech Presentation :3
Speech Presentation :3Speech Presentation :3
Speech Presentation :3Ki-Pyon
 
Thoái hóa khớp khiến đốt sống cổ 'mọc' gai
Thoái hóa khớp khiến đốt sống cổ 'mọc' gaiThoái hóa khớp khiến đốt sống cổ 'mọc' gai
Thoái hóa khớp khiến đốt sống cổ 'mọc' gaidrucilla571
 
S. Jones Resume - 0215
S. Jones Resume - 0215S. Jones Resume - 0215
S. Jones Resume - 0215Shelly Jones
 
KW_SOON_CAD_DESIGN_PORTFOLIO
KW_SOON_CAD_DESIGN_PORTFOLIOKW_SOON_CAD_DESIGN_PORTFOLIO
KW_SOON_CAD_DESIGN_PORTFOLIOKOK WEE SOON
 
Investment_Attraction_Strategy_2016-2019 (1)
Investment_Attraction_Strategy_2016-2019 (1)Investment_Attraction_Strategy_2016-2019 (1)
Investment_Attraction_Strategy_2016-2019 (1)Kwabena Ansah
 

Viewers also liked (17)

Presentacion seminario
Presentacion seminarioPresentacion seminario
Presentacion seminario
 
Fuel saving tips
Fuel saving tipsFuel saving tips
Fuel saving tips
 
Team3 dayatthemall
Team3 dayatthemallTeam3 dayatthemall
Team3 dayatthemall
 
Lizbeth q
Lizbeth qLizbeth q
Lizbeth q
 
c . v
c . vc . v
c . v
 
1111111111111
11111111111111111111111111
1111111111111
 
Lauren Kovin-COLLECTION PRESS
Lauren Kovin-COLLECTION PRESSLauren Kovin-COLLECTION PRESS
Lauren Kovin-COLLECTION PRESS
 
Kingdom Entertainment
Kingdom EntertainmentKingdom Entertainment
Kingdom Entertainment
 
El rol del médico como agente del sistema
El rol del médico como agente del sistemaEl rol del médico como agente del sistema
El rol del médico como agente del sistema
 
Học cách sống hòa bình với bệnh khớp
Học cách sống hòa bình với bệnh khớpHọc cách sống hòa bình với bệnh khớp
Học cách sống hòa bình với bệnh khớp
 
Speech Presentation :3
Speech Presentation :3Speech Presentation :3
Speech Presentation :3
 
Thoái hóa khớp khiến đốt sống cổ 'mọc' gai
Thoái hóa khớp khiến đốt sống cổ 'mọc' gaiThoái hóa khớp khiến đốt sống cổ 'mọc' gai
Thoái hóa khớp khiến đốt sống cổ 'mọc' gai
 
S. Jones Resume - 0215
S. Jones Resume - 0215S. Jones Resume - 0215
S. Jones Resume - 0215
 
fagu Resume final
fagu Resume finalfagu Resume final
fagu Resume final
 
KW_SOON_CAD_DESIGN_PORTFOLIO
KW_SOON_CAD_DESIGN_PORTFOLIOKW_SOON_CAD_DESIGN_PORTFOLIO
KW_SOON_CAD_DESIGN_PORTFOLIO
 
PRACTICA UPS A10
PRACTICA UPS A10PRACTICA UPS A10
PRACTICA UPS A10
 
Investment_Attraction_Strategy_2016-2019 (1)
Investment_Attraction_Strategy_2016-2019 (1)Investment_Attraction_Strategy_2016-2019 (1)
Investment_Attraction_Strategy_2016-2019 (1)
 

Similar to Modern Anti-Spam Protection - Rejection, no sorting

Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBMChris Sparshott
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxbartholomeocoombs
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
 
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011SpamExperts
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayandreasschuster
 
La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9Eventos Creativos
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...Louis Göhl
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Mimecast Presentation
Mimecast PresentationMimecast Presentation
Mimecast PresentationMichelle6518
 
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platform
Cherry Tree Solutions on Preserv8 Unified Mail Communication PlatformCherry Tree Solutions on Preserv8 Unified Mail Communication Platform
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platformlawriejanes
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCyren, Inc
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
SMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInSMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInFranck Martin
 
What You Need to Know About Email Authentication
What You Need to Know About Email AuthenticationWhat You Need to Know About Email Authentication
What You Need to Know About Email AuthenticationKurt Andersen
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection SystemApollo_n
 

Similar to Modern Anti-Spam Protection - Rejection, no sorting (20)

Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docx
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
 
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
Presentation Nils Decker of SpamExperts @ WHD.local Cologne 2011
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gateway
 
La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Mimecast Presentation
Mimecast PresentationMimecast Presentation
Mimecast Presentation
 
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platform
Cherry Tree Solutions on Preserv8 Unified Mail Communication PlatformCherry Tree Solutions on Preserv8 Unified Mail Communication Platform
Cherry Tree Solutions on Preserv8 Unified Mail Communication Platform
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-final
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
SMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInSMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedIn
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
What You Need to Know About Email Authentication
What You Need to Know About Email AuthenticationWhat You Need to Know About Email Authentication
What You Need to Know About Email Authentication
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection System
 

More from Granikos GmbH & Co. KG

Langzeitarchivierung - Warum ist Archivierung wichtig?
Langzeitarchivierung - Warum ist Archivierung wichtig?Langzeitarchivierung - Warum ist Archivierung wichtig?
Langzeitarchivierung - Warum ist Archivierung wichtig?Granikos GmbH & Co. KG
 
AD FS Workshop | Part 1 | Quick Overview
AD FS Workshop | Part 1 | Quick OverviewAD FS Workshop | Part 1 | Quick Overview
AD FS Workshop | Part 1 | Quick OverviewGranikos GmbH & Co. KG
 
Modernes Anti-Spam - Abweisen, nicht sortieren
Modernes Anti-Spam - Abweisen, nicht sortierenModernes Anti-Spam - Abweisen, nicht sortieren
Modernes Anti-Spam - Abweisen, nicht sortierenGranikos GmbH & Co. KG
 
Long Time Preservation - The Importance of Archiving
Long Time Preservation - The Importance of ArchivingLong Time Preservation - The Importance of Archiving
Long Time Preservation - The Importance of ArchivingGranikos GmbH & Co. KG
 

More from Granikos GmbH & Co. KG (6)

Langzeitarchivierung - Warum ist Archivierung wichtig?
Langzeitarchivierung - Warum ist Archivierung wichtig?Langzeitarchivierung - Warum ist Archivierung wichtig?
Langzeitarchivierung - Warum ist Archivierung wichtig?
 
AD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep DiveAD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep Dive
 
AD FS Workshop | Part 1 | Quick Overview
AD FS Workshop | Part 1 | Quick OverviewAD FS Workshop | Part 1 | Quick Overview
AD FS Workshop | Part 1 | Quick Overview
 
Exchange 2013 Site Mailboxes
Exchange 2013 Site MailboxesExchange 2013 Site Mailboxes
Exchange 2013 Site Mailboxes
 
Modernes Anti-Spam - Abweisen, nicht sortieren
Modernes Anti-Spam - Abweisen, nicht sortierenModernes Anti-Spam - Abweisen, nicht sortieren
Modernes Anti-Spam - Abweisen, nicht sortieren
 
Long Time Preservation - The Importance of Archiving
Long Time Preservation - The Importance of ArchivingLong Time Preservation - The Importance of Archiving
Long Time Preservation - The Importance of Archiving
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Modern Anti-Spam Protection - Rejection, no sorting

  • 1. Modern Anti-Spam with NoSpamProxy Protection Rejection – No Sorting Thomas Stensitzki
  • 2. Introduction Thomas Stensitzki Principal Enterprise Consultant Granikos GmbH & Co. KG MCSM Messaging, MCM: Exchange 2010 MCSE, MCSA, MCITP, MCTS, MCSA, MCSA:M, MCP E-Mail: thomas.stensitzki@granikos.eu Web: http://www.granikos.eu Blog: http://blog.granikos.eu
  • 3. Spam in numbers ~88% of received messages are spam ~4% of received messages have malicious content Postini: Only 12% of received emails are legitimate (Feb 2013) Microsoft: 94% spam, 600 million emails a week Trend Micro: Spam ratio varies by country http://bit.ly/GlobalSpamMap
  • 4. Spam ratio per country (Jan 2014 – Feb 2015) > 80% 50% - 80% 20% - 50% < 20% Source: TrendMicro
  • 5. Damage and cost Loss in end-user productivity Restrained mobile access to company resources Loss of communication Loss of network bandwidth Waste of storage - Mailbox databases - Archive storage (expensive) Example for loss of productivity: 30 spams per day = 5 minutes x 220 working days per year 2 working days per year and employee Page  5
  • 6. Rejection No interruption of end-user routine False positives easy to handle Self learning connections and domain trusts No waste of mailbox database storage No waste of archive storage RFC compliant rejection (NDR) Reduced administrative intervention Sorting (classic approach) Interuption of end-user working routine Manual action by end-user required Waste of mailbox database storage Waste of archive storage Risk of large number of unhandled spam messages Comparison Page  6
  • 7. Rejection Delivered Blocked Sound email OK Spam nuisance OK Sorting (classic approach) Delivered Blocked Sound email OK danger Spam nuisance OK Comparison Scanning – Assessment – Rejection Sound senders are sent a NDR Spammers are unable to deliver Risk of false positives is defused - Sound senders can react on NDR Receiving – Assessment – Processing - Deletion, Quarantine, Marking Depending on product False Positives - Danger of important information being lost without sender and recipient knowing about it
  • 8. Solution NoSpamProxy® Protection – Mail Gateway Rejection instead of sorting - The alternative approach to spam protection Sound emails are identified - Self learning mechanism to identify desired connections and handling domain trusts Customizable to business needs - Detailed rule set of filters and actions for incoming and outgoing messages Scalable Anti-Spam Solution CYREN Premium Anti-Virus integrated in product Component of Net at Work Mail Gateway
  • 9. Legal considerations Applicable in Germany: § 206 StGB: „It is a criminal offence to suppress an entrusted communication“ Once an email has been received, its deletion or filtering by a third party is an offence - That is the primary reason why even spam must be archived NoSpamProxy does not accept spam nor does it suppress any communication entrusted to it - A regular NDR is being generated BSI*: Analogy between Spam and unsolicited advertising *BSI: Federal Office for Information Security
  • 10. User Interface Multi-Role server with default rule set
  • 11. Sound email Concentrating on negative spam characteristics leads to false positives Unique Level of Trust technology Bonus points for desired email connections (sender – recipient) System learns dynamically about desired connections Easy authorization of external senders - Simple send an email to the external sender to authorize incoming messages Enables applying more stringent spam filtering rules - Various filters and actions are available
  • 12. In a nutshell Acts as a SMTP proxy Spam is identified while message is in transmission - Connection can be aborted with a 5xx error status to the sending MTA Installed as the first SMTP endpoint from the internet - Next hop can be an Edge server role or an internal Hub server role Company NetworkNoSpamProxy Protection Multi-Role Exchange Server
  • 13. Topology example 1 Internet facing servers not domain joined Internal server domain joined One gateway server possible, but no redundancy 1 Gateway Role 1 Intranet Role AD Exchange Server Transport Role Enterprise Network NoSpamProxy Intranet Role NoSpamProxy Protection Gateway Rolle HTTPS
  • 14. Topology example 2 AD External SMTP servers Exchange Server Transport Role Enterprise Network NoSpamProxy Gateway Role Server1/2 NoSpamProxy Intranet Role SMTP Web Service Internet facing servers not domain joined Internal server domain joined Redundant Email Servers N Gateway Role 1 Intranet Role
  • 15. NoSpamProxy® Encryption (aka enQsig) Centralized email signing and encryption at the gateway Supports S/MIME and PGP Centralized certificate store and cert provisioning Qualified signatures applied to electronic invoices (INVOIC-Messages) Password protected emails with PDF Mail De-Mail connector and interface to Deutschland-Online Infrastruktur (DOI) Interfaces to ECM- and other email systems
  • 16. NoSpamProxy® Large File Large files exchange via secure portal Email client integration (Outlook) Portal provided as SSL/TLS secure web server Access password protected No use of cloud storage
  • 17. Summary No loss of Information – sender is informed No wasted working hours, no manual ploughing through quarantine Self learning processes Fully customizable set of rules IT Resource saving (bandwidth, storage, maintenance) Full legal compliance Additional modules for email encryption and file exchange - NoSpamProxy Encryption - NoSpamProxy Large File
  • 18. Questions Email: info@granikos.eu Web: http://www.granikos.eu Blog: http://blog.granikos.eu Twitter: @Granikos_DE

Editor's Notes

  1. 1
  2. A little history of Microsoft Learning titles and abbreviations LinkedIn and other social media connections on homepage
  3. http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-spam-map/index.html