SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
GFI White Paper

      How to keep spam
       off your network
What features to look for in anti-spam technology

      A buyer’s guide to anti-spam software,
   this white paper highlights the key features
    to look for in anti-spam solutions and why.
Contents
                 Introduction                              3
                 The growth and cost of spam               3
                 Choosing the correct anti-spam software   3
                 Bayesian filtering technology             3
                 How GFI MailEssentials tackles spam       5
                 About GFI®                                6




How to keep spam off your network                              2
Introduction
This paper helps you identify key features needed to effectively deal with spam.

The growth and cost of spam
According to M86 Security Labs, spam volumes increased dramatically in 2009, to over 200 billion per day, while
the Radicati Group estimates that more than 80% of global email traffic will consist of spam mail by 2013.
This means that employees must dedicate part of their work time to dealing with spam, which results in
a decrease in productivity (and an increase in frustration!). Loss of productivity is the main cost of spam,
particularly as so many spam mails are received per day. There is also the cost of bandwidth wasted by
spam, as well as other storage and network infrastructure costs. Furthermore, with the influx of spam and its
deletion, an important message could accidentally be trashed along with the unsolicited mail in the rush to
clear one’s inbox of junk mail.
Ferris Research calculated that if an employee receives just five spam mails a day and spends 30 seconds
on each, he will waste 15 hours a year on junk mail - now multiply that by the hourly rate of each employee
in your company and you will have a very conservative idea of the cost of spam to your organization. Ferris
Research, a San Francisco-based IT market research firm, estimates that spam cost a total of $130 billion
worldwide in 2009.
It is essential to put a stop to spam to save time, money and bandwidth. One step towards achieving this is to
advise your network users to keep their email address private (no postings to message boards etc.). However,
apart from applying common sense, you also need to deploy an effective server level anti-spam tool.

Choosing the correct anti-spam software
Many software packages are available on the market to help you combat spam; but not all are incisive enough
in dealing with spam. A number of key features/issues that you should look for are discussed below.
Server-based or client-based?
Battling spam at client level is much more time-intensive than at the server level. It requires you to
deploy anti-spam software to all workstations on your network and involves frequently returning to those
workstations to update the anti-spam rules on each of them. It also means that your email infrastructure is
being taxed by spam, as your server message stores are filling up with useless emails waiting for deletion.
What’s more, it also involves time on the part of your users, who have to identify spam or update their rule
sets: This is the very thing you are trying to oppose in your bid to block spam!
In addition it does not have the information and resources that a server-based anti-spam software has - it
does not allow you to perform sending server checks, for example. To block spam effectively, you need to
have a server-based anti-spam product, because it offers these advantages:
»»   Installation at the gateway eliminates the deployment and administration hassle involved with desktop-
     based products
»»   Far cheaper to license
»»   Prevents spam from even entering your email infrastructure, meaning that your email stores are not full of
     spam messages
»»   Server-based anti-spam software has more information, and can do more to detect spam effectively.

Bayesian filtering technology
A few years ago, most anti-spam products simply used a list of keywords to identify spam. A good set of
keywords could catch plenty of spam. However, nowadays keyword-based spam catching generates too
many false positives and requires too much manual updating.
It’s now widely acknowledged by leading experts and publications that the best way to catch spam is using


How to keep spam off your network                                                                                 3
a Bayesian filter. A Bayesian filter uses a mathematical approach based on known spam and ham (valid email).
This gives it a tremendous advantage over outdated spam technology that just checks for keywords or relies
on downloading signatures of known spam.
More information about Bayesian filtering can be found in the whitepaper ‘Why Bayesian filtering is the most
effective anti-spam technology’ at http://www.gfi.com/whitepapers/why-bayesian-filtering.pdf.
In short, Bayesian filtering has the following advantages:
»»   Looks at the whole spam message, not just keywords or known spam signatures
»»   Learns from your outbound mail (ham) and therefore reduces false positives greatly
»»   Adapts itself over time by learning about new spam and new valid mail
»»   Dataset is unique to company, making it impossible to bypass
»»   Multilingual and international.
Tailored ham data file for Bayesian filter
It is very important that the Bayesian filter uses a dataset that is custom-created for your installation: the ham
data MUST be collected from your outbound mail (this way, the Bayesian filter is tailored to your company
through an initial training period). Some anti-spam software uses a general ham data file that ships with the
product. An example is the Outlook spam filter or the Exchange Server Internet Message filter. Although this
technology does not require the initial learning period, it has two major flaws:
»»   The ham data file is publicly available and can thus be hacked by professional spammers and therefore
     bypassed. If the ham data file is unique to your company, then hacking the ham data file is useless. For
     example, there are hacks available to bypass the Microsoft Outlook 2003 spam filter.
»»   Secondly the ham data file is a general one, and since it’s not tailored to your company it cannot be as
     effective as a customized one. You will suffer from noticeably higher false positives. For example, a financial
     institution might use the word “mortgage” many times over and would therefore get a lot of false positives
     if using a general ham data file.




Reviewing spam is easy if it’s stored in a subfolder of a user’s mailbox



How to keep spam off your network                                                                                    4
Automatically updated spam data file for Bayesian filter
The spam data file of the Bayesian filter must be constantly updated with the latest spam by the anti-spam
software. This will ensure that the Bayesian filter is aware of the latest spam tricks, resulting in a high spam
detection rate (note: this is achieved once the required initial two-week learning period is over). Choose an
anti-spam product that will collect this spam data for you and allow you to automatically download these
updates!
Spam handling to efficiently review spam
Inherent in anti-spam technology is the fact that there will be false positives, i.e., mail being flagged as spam
even though it is not actually spam. Therefore good anti-spam software should provide an easy way for users
to review mail marked as spam in a fast and efficient manner.
To save administrators time and hassle, anti-spam software had best include an option to direct mail identified
as spam to individual users’ junk mail folders. In addition, the software should sort the spam into different
folders depending on what identified it as spam. This quick access to mail marked as spam greatly helps
the user review his/her spam efficiently. Some anti-spam products require the user to login to a web-based
system and review their mail one by one – in practice; this is cumbersome for the user and will lead to the
feature being rarely used.
Flexible whitelists to reduce false positives
Anti-spam software must have an efficient way to automatically build extensive Whitelists. Whitelists should
identify all valid business partners, so that their mail is never flagged as spam. Good anti-spam software
should include the facility to automatically create and update these whitelists.

How GFI MailEssentials tackles spam
GFI MailEssentials’ approach to spam detection is based on the following key methods and technologies:
»»   Tackles spam at the server level – GFI MailEssentials installs on your Exchange 2000/2003 Server, or in front
     of your mail server (if using Exchange 5.5 or another mail server). It detects spam BEFORE it reaches your
     mail server. This way, spam does not tax your email infrastructure, and any spam detection rule updates
     need only be deployed on the GFI MailEssentials machine. Whitelists (domains/email addresses you
     always wish to receive mail from) and blacklists (domains/email addresses from which you do not want to
     receive mail) can be used at server level.
»»   Greylisting – For each incoming message, three elements are examined in the early part of the SMTP
     conversation: the IP address of the sender, the sender email address, and the recipient email address. If
     this is the first time this email “relationship” has been identified, a temporary deferral message is issued to
     the sending mail server, before the DATA portion of the email is sent. That relationship is then “greylisted.”
     If or when within a finite period that same set of sender IP address, sender email address, and recipient
     email address is seen again – as would be expected with any legitimate email – that combination is
     “whitelisted”, so that that message, as well as any future message with that relationship, is passed through
     without the temporary deferral. After a message passes through the greylisting, that message is processed
     as usual, so that any spam message that is retried will still be subjected to the same message analysis
     techniques as in cases where greylisting is not used.
»»   Analyzes the content of the mail using Bayesian filtering and uses ham data specific to your company.
     The spam data is automatically updated by downloading the latest spam data from the GFI™ website. For
     more information on Bayesian filtering, check this white paper at
     http://www.gfi.com/whitepapers/why-bayesian-filtering.pdf.
»»   Reduces false positives through an automatic whitelist – GFI MailEssentials includes a patent-pending
     automatic whitelist management tool. This means that all business partners are automatically added to
     your whitelist – without any need for administration – and their mail will not be passed through the spam
     filter, greatly reducing false positives.




How to keep spam off your network                                                                                   5
»»   Flexible spam handling – After a mail is found to be spam, it can be forwarded to a sub folder in the
     user’s mailbox. If they find a valid email (for example, a newsletter which they wish to receive), users can
     add the sender to the whitelist.
»»   GFI MailEssentials includes keyword checking capabilities so that administrators can further tune their
     anti-spam filters. For added protection, Bayesian filtering is supplemented by a number of other spam
     detection technologies, including intelligent mail header analysis and by checking senders against
     custom blacklists and public blacklists such as ORDB or SpamHaus.

About GFI
GFI Software provides web and mail security, archiving, backup and fax, networking and security software and
hosted IT solutions for small to medium-sized enterprises (SME) via an extensive global partner community.
GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery
models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique
requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices
in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia,
Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations
worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a
Microsoft Gold Certified Partner.
More information about GFI can be found at http://www.gfi.com.




How to keep spam off your network                                                                                   6
USA,»CANADA»AND»CENTRAL»AND»SOUTH»AMERICA
15300 Weston Parkway, Suite 104 Cary, NC 27513, USA
Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
ussales@gfi.com



UK»AND»REPUBLIC»OF»IRELAND
Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK
Telephone: +44 (0) 870 770 5370
Fax: +44 (0) 870 770 5377
sales@gfi.co.uk



EUROPE,»MIDDLE»EAST»AND»AFRICA
GFI House, San Andrea Street, San Gwann, SGN 1612, Malta
Telephone: +356 2205 2000
Fax: +356 2138 2419
sales@gfi.com



AUSTRALIA»AND»NEW»ZEALAND
83 King William Road, Unley 5061, South Australia
Telephone: +61 8 8273 3000
Fax: +61 8 8273 3099
sales@gfiap.com




Disclaimer

© 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.

The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but
not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential
damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the
accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-
of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in
this document.

If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.

Weitere ähnliche Inhalte

Was ist angesagt?

E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentationnewsan2001
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam FilteringiNazneen
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works Pinpointe On-Demand
 
A Survey: SMS Spam Filtering
A Survey: SMS Spam FilteringA Survey: SMS Spam Filtering
A Survey: SMS Spam Filteringijtsrd
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemA multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemcsandit
 
Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSijsrd.com
 
The Path to the Inbox Part 2
The Path to the Inbox Part 2The Path to the Inbox Part 2
The Path to the Inbox Part 2Infusionsoft
 
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesOverview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesIRJET Journal
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Pinpointe On-Demand
 
Overview of Existing Methods of Spam Mining and Potential Usefulness of Sende...
Overview of Existing Methods of Spam Mining and Potential Usefulness of Sende...Overview of Existing Methods of Spam Mining and Potential Usefulness of Sende...
Overview of Existing Methods of Spam Mining and Potential Usefulness of Sende...IDES Editor
 

Was ist angesagt? (20)

E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Spam
Spam Spam
Spam
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Sendgrid Deliverability Guide
Sendgrid Deliverability GuideSendgrid Deliverability Guide
Sendgrid Deliverability Guide
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works
 
A Survey: SMS Spam Filtering
A Survey: SMS Spam FilteringA Survey: SMS Spam Filtering
A Survey: SMS Spam Filtering
 
Spam, security
Spam, securitySpam, security
Spam, security
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Spam
SpamSpam
Spam
 
A multi layer architecture for spam-detection system
A multi layer architecture for spam-detection systemA multi layer architecture for spam-detection system
A multi layer architecture for spam-detection system
 
Jt3616901697
Jt3616901697Jt3616901697
Jt3616901697
 
Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBS
 
The Path to the Inbox Part 2
The Path to the Inbox Part 2The Path to the Inbox Part 2
The Path to the Inbox Part 2
 
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesOverview of Anti-spam filtering Techniques
Overview of Anti-spam filtering Techniques
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 
Spam
SpamSpam
Spam
 
Overview of Existing Methods of Spam Mining and Potential Usefulness of Sende...
Overview of Existing Methods of Spam Mining and Potential Usefulness of Sende...Overview of Existing Methods of Spam Mining and Potential Usefulness of Sende...
Overview of Existing Methods of Spam Mining and Potential Usefulness of Sende...
 

Ähnlich wie How to Keep Spam Off Your Network

Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam filtering.pptx
Spam filtering.pptxSpam filtering.pptx
Spam filtering.pptxAkfeteAssefa
 
Fighting Spam for fun and profit
Fighting Spam for fun and profitFighting Spam for fun and profit
Fighting Spam for fun and profitGiovanni Bechis
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1Dhara Shah
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedDryden Geary
 
Help Now Guardian Mail
Help Now Guardian MailHelp Now Guardian Mail
Help Now Guardian MailHelp Now, LLC
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email DeliverabilityGetResponse
 
Securing the e marketing site
Securing  the e marketing siteSecuring  the e marketing site
Securing the e marketing sitegaurav jain
 
Seminar on web mail filter
Seminar   on   web mail filterSeminar   on   web mail filter
Seminar on web mail filterShalini Gs
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Web design premium
Web design premiumWeb design premium
Web design premiumjeannined_1
 

Ähnlich wie How to Keep Spam Off Your Network (20)

Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam filtering.pptx
Spam filtering.pptxSpam filtering.pptx
Spam filtering.pptx
 
Fighting Spam for fun and profit
Fighting Spam for fun and profitFighting Spam for fun and profit
Fighting Spam for fun and profit
 
402 406
402 406402 406
402 406
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 
Help Now Guardian Mail
Help Now Guardian MailHelp Now Guardian Mail
Help Now Guardian Mail
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email Deliverability
 
Securing the e marketing site
Securing  the e marketing siteSecuring  the e marketing site
Securing the e marketing site
 
Seminar on web mail filter
Seminar   on   web mail filterSeminar   on   web mail filter
Seminar on web mail filter
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Email deliverability
Email deliverabilityEmail deliverability
Email deliverability
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Web design premium
Web design premiumWeb design premium
Web design premium
 

Mehr von GFI Software

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013GFI Software
 
Network Environments
Network EnvironmentsNetwork Environments
Network EnvironmentsGFI Software
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data BackupsGFI Software
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class SeriesGFI Software
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™GFI Software
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementGFI Software
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerGFI Software
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security SolutionsGFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Binary translation
Binary translationBinary translation
Binary translationGFI Software
 

Mehr von GFI Software (20)

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Data Backups
Data BackupsData Backups
Data Backups
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class Series
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Greylisting
GreylistingGreylisting
Greylisting
 
Binary translation
Binary translationBinary translation
Binary translation
 

Kürzlich hochgeladen

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Kürzlich hochgeladen (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

How to Keep Spam Off Your Network

  • 1. GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer’s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam solutions and why.
  • 2. Contents Introduction 3 The growth and cost of spam 3 Choosing the correct anti-spam software 3 Bayesian filtering technology 3 How GFI MailEssentials tackles spam 5 About GFI® 6 How to keep spam off your network 2
  • 3. Introduction This paper helps you identify key features needed to effectively deal with spam. The growth and cost of spam According to M86 Security Labs, spam volumes increased dramatically in 2009, to over 200 billion per day, while the Radicati Group estimates that more than 80% of global email traffic will consist of spam mail by 2013. This means that employees must dedicate part of their work time to dealing with spam, which results in a decrease in productivity (and an increase in frustration!). Loss of productivity is the main cost of spam, particularly as so many spam mails are received per day. There is also the cost of bandwidth wasted by spam, as well as other storage and network infrastructure costs. Furthermore, with the influx of spam and its deletion, an important message could accidentally be trashed along with the unsolicited mail in the rush to clear one’s inbox of junk mail. Ferris Research calculated that if an employee receives just five spam mails a day and spends 30 seconds on each, he will waste 15 hours a year on junk mail - now multiply that by the hourly rate of each employee in your company and you will have a very conservative idea of the cost of spam to your organization. Ferris Research, a San Francisco-based IT market research firm, estimates that spam cost a total of $130 billion worldwide in 2009. It is essential to put a stop to spam to save time, money and bandwidth. One step towards achieving this is to advise your network users to keep their email address private (no postings to message boards etc.). However, apart from applying common sense, you also need to deploy an effective server level anti-spam tool. Choosing the correct anti-spam software Many software packages are available on the market to help you combat spam; but not all are incisive enough in dealing with spam. A number of key features/issues that you should look for are discussed below. Server-based or client-based? Battling spam at client level is much more time-intensive than at the server level. It requires you to deploy anti-spam software to all workstations on your network and involves frequently returning to those workstations to update the anti-spam rules on each of them. It also means that your email infrastructure is being taxed by spam, as your server message stores are filling up with useless emails waiting for deletion. What’s more, it also involves time on the part of your users, who have to identify spam or update their rule sets: This is the very thing you are trying to oppose in your bid to block spam! In addition it does not have the information and resources that a server-based anti-spam software has - it does not allow you to perform sending server checks, for example. To block spam effectively, you need to have a server-based anti-spam product, because it offers these advantages: »» Installation at the gateway eliminates the deployment and administration hassle involved with desktop- based products »» Far cheaper to license »» Prevents spam from even entering your email infrastructure, meaning that your email stores are not full of spam messages »» Server-based anti-spam software has more information, and can do more to detect spam effectively. Bayesian filtering technology A few years ago, most anti-spam products simply used a list of keywords to identify spam. A good set of keywords could catch plenty of spam. However, nowadays keyword-based spam catching generates too many false positives and requires too much manual updating. It’s now widely acknowledged by leading experts and publications that the best way to catch spam is using How to keep spam off your network 3
  • 4. a Bayesian filter. A Bayesian filter uses a mathematical approach based on known spam and ham (valid email). This gives it a tremendous advantage over outdated spam technology that just checks for keywords or relies on downloading signatures of known spam. More information about Bayesian filtering can be found in the whitepaper ‘Why Bayesian filtering is the most effective anti-spam technology’ at http://www.gfi.com/whitepapers/why-bayesian-filtering.pdf. In short, Bayesian filtering has the following advantages: »» Looks at the whole spam message, not just keywords or known spam signatures »» Learns from your outbound mail (ham) and therefore reduces false positives greatly »» Adapts itself over time by learning about new spam and new valid mail »» Dataset is unique to company, making it impossible to bypass »» Multilingual and international. Tailored ham data file for Bayesian filter It is very important that the Bayesian filter uses a dataset that is custom-created for your installation: the ham data MUST be collected from your outbound mail (this way, the Bayesian filter is tailored to your company through an initial training period). Some anti-spam software uses a general ham data file that ships with the product. An example is the Outlook spam filter or the Exchange Server Internet Message filter. Although this technology does not require the initial learning period, it has two major flaws: »» The ham data file is publicly available and can thus be hacked by professional spammers and therefore bypassed. If the ham data file is unique to your company, then hacking the ham data file is useless. For example, there are hacks available to bypass the Microsoft Outlook 2003 spam filter. »» Secondly the ham data file is a general one, and since it’s not tailored to your company it cannot be as effective as a customized one. You will suffer from noticeably higher false positives. For example, a financial institution might use the word “mortgage” many times over and would therefore get a lot of false positives if using a general ham data file. Reviewing spam is easy if it’s stored in a subfolder of a user’s mailbox How to keep spam off your network 4
  • 5. Automatically updated spam data file for Bayesian filter The spam data file of the Bayesian filter must be constantly updated with the latest spam by the anti-spam software. This will ensure that the Bayesian filter is aware of the latest spam tricks, resulting in a high spam detection rate (note: this is achieved once the required initial two-week learning period is over). Choose an anti-spam product that will collect this spam data for you and allow you to automatically download these updates! Spam handling to efficiently review spam Inherent in anti-spam technology is the fact that there will be false positives, i.e., mail being flagged as spam even though it is not actually spam. Therefore good anti-spam software should provide an easy way for users to review mail marked as spam in a fast and efficient manner. To save administrators time and hassle, anti-spam software had best include an option to direct mail identified as spam to individual users’ junk mail folders. In addition, the software should sort the spam into different folders depending on what identified it as spam. This quick access to mail marked as spam greatly helps the user review his/her spam efficiently. Some anti-spam products require the user to login to a web-based system and review their mail one by one – in practice; this is cumbersome for the user and will lead to the feature being rarely used. Flexible whitelists to reduce false positives Anti-spam software must have an efficient way to automatically build extensive Whitelists. Whitelists should identify all valid business partners, so that their mail is never flagged as spam. Good anti-spam software should include the facility to automatically create and update these whitelists. How GFI MailEssentials tackles spam GFI MailEssentials’ approach to spam detection is based on the following key methods and technologies: »» Tackles spam at the server level – GFI MailEssentials installs on your Exchange 2000/2003 Server, or in front of your mail server (if using Exchange 5.5 or another mail server). It detects spam BEFORE it reaches your mail server. This way, spam does not tax your email infrastructure, and any spam detection rule updates need only be deployed on the GFI MailEssentials machine. Whitelists (domains/email addresses you always wish to receive mail from) and blacklists (domains/email addresses from which you do not want to receive mail) can be used at server level. »» Greylisting – For each incoming message, three elements are examined in the early part of the SMTP conversation: the IP address of the sender, the sender email address, and the recipient email address. If this is the first time this email “relationship” has been identified, a temporary deferral message is issued to the sending mail server, before the DATA portion of the email is sent. That relationship is then “greylisted.” If or when within a finite period that same set of sender IP address, sender email address, and recipient email address is seen again – as would be expected with any legitimate email – that combination is “whitelisted”, so that that message, as well as any future message with that relationship, is passed through without the temporary deferral. After a message passes through the greylisting, that message is processed as usual, so that any spam message that is retried will still be subjected to the same message analysis techniques as in cases where greylisting is not used. »» Analyzes the content of the mail using Bayesian filtering and uses ham data specific to your company. The spam data is automatically updated by downloading the latest spam data from the GFI™ website. For more information on Bayesian filtering, check this white paper at http://www.gfi.com/whitepapers/why-bayesian-filtering.pdf. »» Reduces false positives through an automatic whitelist – GFI MailEssentials includes a patent-pending automatic whitelist management tool. This means that all business partners are automatically added to your whitelist – without any need for administration – and their mail will not be passed through the spam filter, greatly reducing false positives. How to keep spam off your network 5
  • 6. »» Flexible spam handling – After a mail is found to be spam, it can be forwarded to a sub folder in the user’s mailbox. If they find a valid email (for example, a newsletter which they wish to receive), users can add the sender to the whitelist. »» GFI MailEssentials includes keyword checking capabilities so that administrators can further tune their anti-spam filters. For added protection, Bayesian filtering is supplemented by a number of other spam detection technologies, including intelligent mail header analysis and by checking senders against custom blacklists and public blacklists such as ORDB or SpamHaus. About GFI GFI Software provides web and mail security, archiving, backup and fax, networking and security software and hosted IT solutions for small to medium-sized enterprises (SME) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold Certified Partner. More information about GFI can be found at http://www.gfi.com. How to keep spam off your network 6
  • 7. USA,»CANADA»AND»CENTRAL»AND»SOUTH»AMERICA 15300 Weston Parkway, Suite 104 Cary, NC 27513, USA Telephone: +1 (888) 243-4329 Fax: +1 (919) 379-3402 ussales@gfi.com UK»AND»REPUBLIC»OF»IRELAND Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) 870 770 5370 Fax: +44 (0) 870 770 5377 sales@gfi.co.uk EUROPE,»MIDDLE»EAST»AND»AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: +356 2205 2000 Fax: +356 2138 2419 sales@gfi.com AUSTRALIA»AND»NEW»ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: +61 8 8273 3000 Fax: +61 8 8273 3099 sales@gfiap.com Disclaimer © 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out- of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.