05.04.2015 Views

Cloudmark Sender Intelligence Datasheet

Cloudmark Sender Intelligence Datasheet

Cloudmark Sender Intelligence Datasheet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Product <strong>Datasheet</strong><br />

<strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong><br />

Key Features<br />

Global Identification of Spam<br />

Sources<br />

<strong>Cloudmark</strong> customers provide valuable<br />

statistics on received messages, including<br />

the message volume from each IP<br />

address and its categorization of spam<br />

or legitimate. This data originates from<br />

more than 120 ISPs and 35,000 enterprises<br />

globally, providing <strong>Cloudmark</strong><br />

<strong>Sender</strong> <strong>Intelligence</strong> with a comprehensive<br />

data set for analysis.<br />

Complete Coverage of Attacks and<br />

Threats<br />

The <strong>Cloudmark</strong> Global Threat Network<br />

tracks sender behavior, adjusts reputation<br />

scores accordingly, and supplies<br />

<strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong> with<br />

the information necessary to track<br />

both high and low volume attacks as<br />

well as aggregated attacks from multiple<br />

senders.<br />

Customized Analysis<br />

The <strong>Cloudmark</strong> security operations task<br />

force team provides human analysis of<br />

customer specific traffic, complimenting<br />

its automated analysis to ensure<br />

that operators get the ultimate protection<br />

against future attacks.<br />

Real-Time Threat Analysis<br />

Feedback from the <strong>Cloudmark</strong> Global<br />

Threat Network enables <strong>Cloudmark</strong><br />

<strong>Sender</strong> <strong>Intelligence</strong> to analyze traffic<br />

patterns, feedback, and fingerprint<br />

correlation statistics to establish and<br />

adjust sender reputation scores in near<br />

real time.<br />

Dynamically Updated Protection<br />

<strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong><br />

updates its data in real time, allowing<br />

customers to download updates within<br />

minutes. Traditional technologies<br />

require 30 minutes or more to<br />

download updates, many requiring<br />

an Internet query for each message,<br />

resulting in dangerous latency.<br />

Reputation <strong>Intelligence</strong> at the Network Edge<br />

Operators rely on protocol level filtering as their first level of defense against<br />

messaging abuse. As spam, phishing and malware attacks continue to evolve in<br />

complexity, service providers of all sizes are seeking more granular and automated<br />

ways of filtering their messaging traffic. While traditional DNS blacklists provide<br />

a basic level of insight for these policies, operators are searching for a more<br />

comprehensive form of reputation data that allows greater control over their<br />

protocol filtering management.<br />

<strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong> adds a layer of security to traditional sender<br />

reputation services, delivering a comprehensive sender reputation service that<br />

enables operators to prevent messaging abuse. Our service combines a global<br />

data set with specific feedback from your customers. Automated analysis is<br />

complemented by expert human analysis, ensuring that your infrastructure<br />

is protected against current and future attacks. Data from <strong>Cloudmark</strong> <strong>Sender</strong><br />

<strong>Intelligence</strong> can be integrated into network perimeter devices, such as edge mail<br />

transfer agents (MTAs) to protect messaging infrastructure.<br />

Multiple Reputation Sources<br />

<strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong> analyzes multiple data sources to construct sender<br />

profiles, resulting in more accurate characterization of senders. <strong>Cloudmark</strong> leverages<br />

statistics from the vast <strong>Cloudmark</strong> Global Threat Network, including more than 2<br />

billion mailboxes and millions of honeypot sources, to classify and analyze sender<br />

characteristics. Additionally, <strong>Cloudmark</strong> employs a variety of proprietary sender<br />

identification systems and third-party data to provide additional classification of<br />

senders beyond reputation. Examples include Newsletter <strong>Sender</strong> Logic, which<br />

<strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong> Reputation Analysis


Product <strong>Datasheet</strong><br />

identifies newsletter senders, Mail Forwarders Identification, which identifies public mail forwarders, and Dynamic Space<br />

Analysis, which verifies that an IP is contained within a service provider’s dynamic IP address range.<br />

Sophisticated analysis delivers a more detailed and accurate profile of sender reputation, volume, and classification which<br />

enables more granular policies and improved accuracy. The depth and breadth of the <strong>Cloudmark</strong> Global Threat Network<br />

and knowledgable security experts enable <strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong> to identify additional rogue senders that may go<br />

undetected by other reputation services. This typically yields an additional 50 percent filter rate for messages missed by<br />

traditional services.<br />

The <strong>Cloudmark</strong> Advantage<br />

Most sender reputation services rely solely on traffic pattern statistics. While this can be an effective approach for<br />

establishing reputation, it is a reactive approach that introduces latency during which environments are vulnerable to new<br />

spam sources. As attackers grow their botnets and use dynamic IP addresses to generate spam, traffic pattern analysis alone<br />

is no longer sufficient. <strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong> provides several unique advantages:<br />

• Faster, more accurate sender categorization - <strong>Cloudmark</strong> closes this vulnerability gap by combining fingerprint<br />

correlation statistics, user feedback statistics and honeypots to quickly identify spammers and good senders. By<br />

analyzing the correlation of multiple fingerprints in different messages, both spam and legitimate, <strong>Cloudmark</strong> <strong>Sender</strong><br />

<strong>Intelligence</strong> proactively and reliably detects suspicious activity during the zero-hour attack phase.<br />

• Unique protection against targeted attacks - the <strong>Cloudmark</strong> Security Operations Center is comprised of email security<br />

experts who focus their attention on operator data to stop targeted attacks. These measures go beyond analyzing a<br />

base level of IP reputation data.<br />

<strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong> with <strong>Cloudmark</strong> Security Platform for Email<br />

<strong>Cloudmark</strong> <strong>Sender</strong> <strong>Intelligence</strong> data<br />

enables <strong>Cloudmark</strong> Security Platform<br />

for Email to automatically apply policy<br />

to senders based on their reputation.<br />

Complete connection management<br />

based on sender reputation provides<br />

a more granular method of limiting<br />

potentially malicious content from<br />

entering networks. Throttling can<br />

be applied on a per-IP address<br />

basis, and on groups of IP addresses<br />

sharing a common reputation score<br />

or characteristic. <strong>Cloudmark</strong> <strong>Sender</strong><br />

<strong>Intelligence</strong> enables intelligent<br />

connection and flow control<br />

techniques, such as dropping<br />

connections from malicious senders,<br />

throttling connections from suspicious<br />

senders, and allowing good senders<br />

through without delay.<br />

<strong>Cloudmark</strong> Industry Affiliations:<br />

<strong>Cloudmark</strong> Security Platform for Email<br />

More Information:<br />

www.cloudmark.com<br />

Americas Headquarters<br />

<strong>Cloudmark</strong>, Inc.<br />

San Francisco, USA<br />

Asia Pacific<br />

<strong>Cloudmark</strong>, Inc.<br />

Singapore<br />

Japan<br />

<strong>Cloudmark</strong> Japan<br />

Tokyo, Japan<br />

Europe<br />

<strong>Cloudmark</strong> Europe Ltd.<br />

London, UK<br />

<strong>Cloudmark</strong> Threat Report<br />

© 2001-2013 <strong>Cloudmark</strong>, Inc. All rights reserved. <strong>Cloudmark</strong>, the <strong>Cloudmark</strong> logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of <strong>Cloudmark</strong> and its subsidiaries<br />

in the United States and in foreign countries. Other brands and products are trademarks of their respective holders. All product information is subject to change without notice. DS317.2013Q2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!