Continued from page 1
Other mitigating factors were behind
decline in blacklist and whitelist effectiveness. In
end,
failure of these lists as email security solutions was largely due to their inability to factor message quality into
equation.
Second-Generation Reputation Systems
The next iteration of reputation systems built on
failure of blacklists and whitelists to maintain control over
spam flood. While
lists remained an integral component, new features briefly increased second-generation reputation systems’ efficiency and effectiveness. With time, however, spammers adapted their habits to evade detection.
Among improvements seen in second-generation reputation systems were dynamic lists, necessary to combat
introduction of “zombies” into
email security landscape; automatic updates, which removed
administrative burden of manually uploading lists; and message scoring, which assesses a message’s likelihood of being spam and assigns a corresponding “score.”
The Next-Generation Reputation System
Today’s spammers are more clever than ever, so today’s reputation systems must be equally sophisticated. An effective reputation system must be dynamic, comprehensive and precise, and based on actual enterprise email traffic in order to keep
spammers from gaining any advantage. To that end, CipherTrust developed TrustedSource,
most precise and comprehensive reputation system available. TrustedSource keeps enterprises ahead of
spammers by leveraging research generated by CipherTrust’s industry-leading network of customers. In developing TrustedSource, CipherTrust has succeeded in defining to a reputation for every IP address in use across
Internet (all 4.2 billion!), not just those that have been encountered in
past.
By combining years of industry-leading research with
unmatched capabilities of IronMail’s Message Profiler, CipherTrust has made some ground-breaking discoveries about
email sending behavior of IP addresses. TrustedSource merges CipherTrust’s unmatched knowledge base and global customer network of over 1,400 companies with generally available data such as traffic patterns, white/blacklists and network characteristics. This powerful combination allows TrustedSource to assign accurate scores to any IP address encountered by IronMail, considering both sender history and message characteristics.
Trust Your Reputation to Ours
A traditional email security approach that relies solely on identifying messages based on content and/or characteristics, or an approach that relies solely on blacklists and whitelists, is incapable of generating adequate data about senders. In order to accurately identify messages as wanted or unwanted, corporations must embrace an approach that includes a comprehensive reputation system like TrustedSource. To learn more about TrustedSource and how it can help you take control of your enterprise email security, download CipherTrust’s free whitepaper, “TrustedSource: Reputation Redefined.”

CipherTrust is the leader in anti-spam and email security. Learn more by downloading our free whitepaper, “TrustedSource: Reputation Redefined.” or by visiting www.ciphertrust.com.