SlideShare ist ein Scribd-Unternehmen logo
1 von 22
21 August 2014 © 2014 CYREN Confidential and Proprietary
OUTBOUND SPAM:
DON’T RISK THE BLACKLIST!
December 4, 2013
© 2014 CYREN Confidential and Proprietary
2
AGENDA
 Introduction
 The Business Challenge of Outbound Spam
 The Limitations of Traditional Approaches
 The CYREN Approach
 Summary
 Q&A
© 2014 CYREN Confidential and Proprietary
3
POLL QUESTION #1
Have you had an IP address blocked or
blacklisted in the last 12 months?
(Yes/No)
© 2014 CYREN Confidential and Proprietary
4
OUTBOUND SPAM IS A HEADACHE
 66% of providers rate outbound spam an important
or extremely important issue
 87% believe email providers must actively eliminate
zombies
 ~40% have had IPs blocked or blacklisted in last 12
months
 49% report outbound spam is damaging their
corporate reputation
 56% of customers with email blocked due to
provider spam problems would switch to one that
does not block innocent users
Source: Osterman Research/CYREN
© 2014 CYREN Confidential and Proprietary
5
OUTBOUND SPAMMING METHODS
 Acquire compromised user accounts
 A valid account, compromised by phishing or malware
 Bot/Zombie is leveraged by external spammer to
propagate spam
 Create user accounts just for spamming
© 2014 CYREN Confidential and Proprietary
6
BUSINESS IMPACT
 Blocked IP Ranges
 Appearing in IP reputation DBs
 Lost Revenue and Profit
 Removing addresses from blacklists
 Increased support for unhappy customers
 Customer churn
 Reputational damage
 Recurring Attacks
 Spamming continues at lower volumes
© 2014 CYREN Confidential and Proprietary
7
POLL QUESTION #2
What best describes your process for
getting removed from blacklists?
1) No fixed process
2) Phone calls/emails by operations
3) Automated (nobody has to do anything)
4) No process – we never get blacklisted
© 2014 CYREN Confidential and Proprietary
8
LIMITATIONS OF TRADITIONAL APPROACHES
 Block port 25
 Disrupts legitimate usage
 Reverse Inbound Spam Filter
 Slow response to new outbreaks
 Ineffective locally and regionally
 Increased risk of false positives
 Throttling/Rate Limiting
 Spammers learn to send below the limit
These approaches are ineffective because they only treat
symptoms, not the underlying problem
© 2014 CYREN Confidential and Proprietary
9
LEADING PROVIDER OF INTERNET
SECURITY TECHNOLOGY AND
CLOUD-BASED SERVICES
NASDAQ: CYRN
© 2014 CYREN Confidential and Proprietary
10
CYREN IS A TRUSTED SECURITY PARTNER TO THE LEADERS
180+ Partners with over 550 million End Users
© 2014 CYREN Confidential and Proprietary
11
GLOBAL REACH
OFFICESDATA CENTERS
© 2014 CYREN Confidential and Proprietary
© 2014 CYREN Confidential and Proprietary
12
© 2014 CYREN Confidential and Proprietary
12
WHAT MAKES US
DIFFERENT
© 2014 CYREN Confidential and Proprietary
13
WHAT MAKES US DIFFERENT
+
SPEED  ACCURACY  REAL-TIME INSIGHT
We see more than anyone else.
RECURRENT PATTERN DETECTION
Our patented detection
technology
GLOBALVIEW™ CLOUD
The most robust transaction base in
the industry - 12 Billion/day
© 2014 CYREN Confidential and Proprietary
14
 We focus on our core
competencies so you can
focus on yours.
 Products designed for partners
 Won’t compete for your business
COMMITTED TO PARTNER SUCCESS
WHAT MAKES US DIFFERENT
© 2014 CYREN Confidential and Proprietary
© 2014 CYREN Confidential and Proprietary
15
THE UNIQUE CYREN APPROACH TO OUTBOUND SPAM
 Block based on global patterns
 Block using local patterns
 Identify and Report senders
 Manage approved users
Providing effective blocking and the information needed to
resolve the root cause of outbound spam
© 2014 CYREN Confidential and Proprietary
16
Local RPD
Analyze local traffic
Detect patterns
Store signatures
2
HOW DOES IT WORK?
Global RPD
Analyze billions of global emails/day
Detect recurrent patterns
Store signatures of spam emails
Compare email signatures
to find global and local
spam
Service
Provider
Outbound
Spam
Engine
Internet
1
3
 Uses the common characteristic of all spam - mass distribution
 Global RPD identifies outbreaks instantly by distribution patterns
 Local RPD detects based on local patterns with configurable thresholds
GlobalView Cloud
© 2014 CYREN Confidential and Proprietary
17
IN AN EMBEDDED DEPLOYMENT MODEL
 Service Integration via SDK
 Integrates directly into your infrastructure
 Simple to configure and deploy
 Stops Outbound Spam
 Identifies Compromised Legitimate Accounts
 Highlights Malicious Spam Accounts
 Simple, Easy Deployment
 Unzip CYREN Daemon On MTA or Other Server
 Open .conf file and insert the license key and connection string
 Start running traffic
© 2014 CYREN Confidential and Proprietary
18
IDENTIFYING OUTBOUND SPAM ACCOUNTS
© 2014 CYREN Confidential and Proprietary
19
SUMMARY: CYREN OUTBOUND ANTISPAM (OAS)
 Outbound Spam causes significant issues and cost
 Traditional approaches yield poor results
 CYREN OAS uniquely deals with outbound spam by:
 Blocking spam at source - even when unique to a network
 Pinpointing the accounts - whether compromised or pre-built
 Documenting the root cause
 OAS provides a comprehensive solution to:
 Avoid costly blacklisting
 Reduce customer churn
 Increase profitability
© 2014 CYREN Confidential and Proprietary
“Our customers now enjoy the very highest level of protection from
the nuisance of spam emails, without risk of having their critical
communications erroneously blocked” CTO – Web.com
“Spammers were using phished accounts to send spam from our
network. We needed a solution to recover compromised accounts,
block spammers and prevent our IP addresses from being blacklisted”
EVP, Hostway
“We have gone from being blacklisted every week, to not being
blacklisted at all for the last 18 months” SVP, Hoster
© 2014 CYREN Confidential and Proprietary
QUESTIONS?
© 2014 CYREN Confidential and Proprietary
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (15)

2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
 
Cloudflare Speed Week Recap
Cloudflare Speed Week RecapCloudflare Speed Week Recap
Cloudflare Speed Week Recap
 
2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
OWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls PresentationOWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls Presentation
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
Secure Messaging Done Right
Secure Messaging Done RightSecure Messaging Done Right
Secure Messaging Done Right
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 

Ähnlich wie Don't Risk the Blacklist - Stop Outbound Spam

HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
Cyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
Cyren, Inc
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
CipherCloud
 

Ähnlich wie Don't Risk the Blacklist - Stop Outbound Spam (20)

Dual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle CybercrimeDual Detection Engines - Using Layered Security to Battle Cybercrime
Dual Detection Engines - Using Layered Security to Battle Cybercrime
 
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOURHOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
HOW TO LAUNCH WEB SECURITY IN THE CLOUD - IN AN HOUR
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
Webinar: Is There A Blind Spot In Your Cyberthreat Vision?
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
LinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security PolicyLinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security Policy
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
Commtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-finalCommtouch outbound-anti spam-webinar-201312-final
Commtouch outbound-anti spam-webinar-201312-final
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 

Mehr von Cyren, Inc

Mehr von Cyren, Inc (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015CYREN Investor Presentation - January, 2015
CYREN Investor Presentation - January, 2015
 
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend reportWebinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
 
Insights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend ReportInsights from CYREN's Q2 2014 Internet Threats Trend Report
Insights from CYREN's Q2 2014 Internet Threats Trend Report
 

Kürzlich hochgeladen

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 

Kürzlich hochgeladen (20)

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 

Don't Risk the Blacklist - Stop Outbound Spam

  • 1. 21 August 2014 © 2014 CYREN Confidential and Proprietary OUTBOUND SPAM: DON’T RISK THE BLACKLIST! December 4, 2013
  • 2. © 2014 CYREN Confidential and Proprietary 2 AGENDA  Introduction  The Business Challenge of Outbound Spam  The Limitations of Traditional Approaches  The CYREN Approach  Summary  Q&A
  • 3. © 2014 CYREN Confidential and Proprietary 3 POLL QUESTION #1 Have you had an IP address blocked or blacklisted in the last 12 months? (Yes/No)
  • 4. © 2014 CYREN Confidential and Proprietary 4 OUTBOUND SPAM IS A HEADACHE  66% of providers rate outbound spam an important or extremely important issue  87% believe email providers must actively eliminate zombies  ~40% have had IPs blocked or blacklisted in last 12 months  49% report outbound spam is damaging their corporate reputation  56% of customers with email blocked due to provider spam problems would switch to one that does not block innocent users Source: Osterman Research/CYREN
  • 5. © 2014 CYREN Confidential and Proprietary 5 OUTBOUND SPAMMING METHODS  Acquire compromised user accounts  A valid account, compromised by phishing or malware  Bot/Zombie is leveraged by external spammer to propagate spam  Create user accounts just for spamming
  • 6. © 2014 CYREN Confidential and Proprietary 6 BUSINESS IMPACT  Blocked IP Ranges  Appearing in IP reputation DBs  Lost Revenue and Profit  Removing addresses from blacklists  Increased support for unhappy customers  Customer churn  Reputational damage  Recurring Attacks  Spamming continues at lower volumes
  • 7. © 2014 CYREN Confidential and Proprietary 7 POLL QUESTION #2 What best describes your process for getting removed from blacklists? 1) No fixed process 2) Phone calls/emails by operations 3) Automated (nobody has to do anything) 4) No process – we never get blacklisted
  • 8. © 2014 CYREN Confidential and Proprietary 8 LIMITATIONS OF TRADITIONAL APPROACHES  Block port 25  Disrupts legitimate usage  Reverse Inbound Spam Filter  Slow response to new outbreaks  Ineffective locally and regionally  Increased risk of false positives  Throttling/Rate Limiting  Spammers learn to send below the limit These approaches are ineffective because they only treat symptoms, not the underlying problem
  • 9. © 2014 CYREN Confidential and Proprietary 9 LEADING PROVIDER OF INTERNET SECURITY TECHNOLOGY AND CLOUD-BASED SERVICES NASDAQ: CYRN
  • 10. © 2014 CYREN Confidential and Proprietary 10 CYREN IS A TRUSTED SECURITY PARTNER TO THE LEADERS 180+ Partners with over 550 million End Users
  • 11. © 2014 CYREN Confidential and Proprietary 11 GLOBAL REACH OFFICESDATA CENTERS © 2014 CYREN Confidential and Proprietary
  • 12. © 2014 CYREN Confidential and Proprietary 12 © 2014 CYREN Confidential and Proprietary 12 WHAT MAKES US DIFFERENT
  • 13. © 2014 CYREN Confidential and Proprietary 13 WHAT MAKES US DIFFERENT + SPEED ACCURACY REAL-TIME INSIGHT We see more than anyone else. RECURRENT PATTERN DETECTION Our patented detection technology GLOBALVIEW™ CLOUD The most robust transaction base in the industry - 12 Billion/day
  • 14. © 2014 CYREN Confidential and Proprietary 14  We focus on our core competencies so you can focus on yours.  Products designed for partners  Won’t compete for your business COMMITTED TO PARTNER SUCCESS WHAT MAKES US DIFFERENT © 2014 CYREN Confidential and Proprietary
  • 15. © 2014 CYREN Confidential and Proprietary 15 THE UNIQUE CYREN APPROACH TO OUTBOUND SPAM  Block based on global patterns  Block using local patterns  Identify and Report senders  Manage approved users Providing effective blocking and the information needed to resolve the root cause of outbound spam
  • 16. © 2014 CYREN Confidential and Proprietary 16 Local RPD Analyze local traffic Detect patterns Store signatures 2 HOW DOES IT WORK? Global RPD Analyze billions of global emails/day Detect recurrent patterns Store signatures of spam emails Compare email signatures to find global and local spam Service Provider Outbound Spam Engine Internet 1 3  Uses the common characteristic of all spam - mass distribution  Global RPD identifies outbreaks instantly by distribution patterns  Local RPD detects based on local patterns with configurable thresholds GlobalView Cloud
  • 17. © 2014 CYREN Confidential and Proprietary 17 IN AN EMBEDDED DEPLOYMENT MODEL  Service Integration via SDK  Integrates directly into your infrastructure  Simple to configure and deploy  Stops Outbound Spam  Identifies Compromised Legitimate Accounts  Highlights Malicious Spam Accounts  Simple, Easy Deployment  Unzip CYREN Daemon On MTA or Other Server  Open .conf file and insert the license key and connection string  Start running traffic
  • 18. © 2014 CYREN Confidential and Proprietary 18 IDENTIFYING OUTBOUND SPAM ACCOUNTS
  • 19. © 2014 CYREN Confidential and Proprietary 19 SUMMARY: CYREN OUTBOUND ANTISPAM (OAS)  Outbound Spam causes significant issues and cost  Traditional approaches yield poor results  CYREN OAS uniquely deals with outbound spam by:  Blocking spam at source - even when unique to a network  Pinpointing the accounts - whether compromised or pre-built  Documenting the root cause  OAS provides a comprehensive solution to:  Avoid costly blacklisting  Reduce customer churn  Increase profitability
  • 20. © 2014 CYREN Confidential and Proprietary “Our customers now enjoy the very highest level of protection from the nuisance of spam emails, without risk of having their critical communications erroneously blocked” CTO – Web.com “Spammers were using phished accounts to send spam from our network. We needed a solution to recover compromised accounts, block spammers and prevent our IP addresses from being blacklisted” EVP, Hostway “We have gone from being blacklisted every week, to not being blacklisted at all for the last 18 months” SVP, Hoster
  • 21. © 2014 CYREN Confidential and Proprietary QUESTIONS?
  • 22. © 2014 CYREN Confidential and Proprietary THANK YOU