SlideShare une entreprise Scribd logo
1  sur  13
SPAMWALL Anti-Spam
A Smargasy Inc Exclusive
• Junk Email
• Possible Junk Email
• Good Email
Smargasy Spamwall uses a
sophisticated score based
mechanism to decide if an email
should be considered junk. Every in-
coming and out-going email is
assigned a score. Based on this score,
Smargasy Spamwall assigns one of
three categories to the email:
SPAMWALL ANTI-SPAM
Spam free inbox
Scoring criteria
Scoring is done based on several built-in rules.
Every rule in the system can take the score either
in the positive or negative direction. The final
score decides the category of the email. Rules in
Smargasy Spamwall can be further divided into
two categories:
• User defined rules
• Self-learning rules
Types of rules in Smargasy Spamwall for Email filtering
 IP based rules
 Content filters
 Custom filters
 Virus detection
 Challenge response
IP based rules
These rules act on the sender's IP address and include the following.
 RBL - The word "RBL" stands for Real-Time Blackhole List
 SPF Check - The word "SPF" stands for Sender Policy Framework
 Smargasy Spamwall tries to match the SPF record for in-coming messages and assigns a score if
a mismatch is found.Black/White listing
 Administrators can either black list or white list IP addresses in Smargasy Spamwall
Content Filters
 Finger print analysis - Smargasy Spamwall uses a proprietary method of creating a finger print of every
email. This finger print is then compared with future messages to determine if it is part of a bulk-mail
campaign.
 Image analysis - Embedded images in emails are analyzed for patterns.
 Body and Header - Smargasy Spamwall utilizes a two-pass approach to analyze the body of every
message. It then compares it with a known list of keywords containing a score. Rules can be specified for
the following sections:
• Subject
• Body
• Attachments
• Header
Custom Filter
Custom filters are the most powerful and effective filters used in Smargasy Spamwall to detect junk
messages. Often spammers use several tricks to avoid being filtered. These custom filters are specially
designed to detect such tricks. We believe that these custom filters are so effective that leaving just these
filters on you can eliminate 90% of all junk messages
There are two types of virus detection in Smargasy
Spamwall
•Finger print analysis
•Integration with CLAMAV - an open source virus
protection
Virus detection
Adaptive filters are self-learning filters that gets
smarter by analyzing the patterns of previously sent
and received emails.
These filters include:
•Bayesian analysis
•Manually marking messages junk or good
•Sender history tracking
Adaptive filters
Challenge response is a mechanism where the
system sends a challenge email to the sender to
verify if it is a valid message. This type of filter is
disabled by default but can be enabled if the users
want to use it.
Challenge response
SPAMWALL Anti-Spam
A Smargasy Inc Exclusive
Barbara Dolleschal
Vice President/CFO
Bryan Harrison
Business Development Manager
Andreas Dolleschal
President/CEO
1-(239)214-8592

Contenu connexe

Similaire à Spamwall

Spam filtering.pptx
Spam filtering.pptxSpam filtering.pptx
Spam filtering.pptxAkfeteAssefa
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1Dhara Shah
 
final-spam-e-mail-detection-180125111231.pptx
final-spam-e-mail-detection-180125111231.pptxfinal-spam-e-mail-detection-180125111231.pptx
final-spam-e-mail-detection-180125111231.pptxinfotowards
 
Evaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsEvaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsMichael Lamont
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1Dhara Shah
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkGFI Software
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptxWanderer20
 
Email Marketing Inbox Deliverability: POV
Email Marketing Inbox Deliverability: POVEmail Marketing Inbox Deliverability: POV
Email Marketing Inbox Deliverability: POVJosue Sierra
 
3 Best Practices for Email Marketing
3   Best Practices for Email Marketing3   Best Practices for Email Marketing
3 Best Practices for Email MarketingFriday Explorer
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingEditor IJCATR
 
How to avoid being marked as spam christoph pass next lead generation (long v...
How to avoid being marked as spam christoph pass next lead generation (long v...How to avoid being marked as spam christoph pass next lead generation (long v...
How to avoid being marked as spam christoph pass next lead generation (long v...Christoph Pass
 
Hexamail guard anti-spam server spam filtering software - index
Hexamail guard   anti-spam server spam filtering software - indexHexamail guard   anti-spam server spam filtering software - index
Hexamail guard anti-spam server spam filtering software - indexBUSINESS SOFTWARES & SOLUTIONS
 
Configuring Mail Filters
Configuring Mail FiltersConfiguring Mail Filters
Configuring Mail FiltersHTS Hosting
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedDryden Geary
 

Similaire à Spamwall (20)

Spam filtering.pptx
Spam filtering.pptxSpam filtering.pptx
Spam filtering.pptx
 
SPAM FILTERS
SPAM FILTERSSPAM FILTERS
SPAM FILTERS
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
 
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERINGDEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
final-spam-e-mail-detection-180125111231.pptx
final-spam-e-mail-detection-180125111231.pptxfinal-spam-e-mail-detection-180125111231.pptx
final-spam-e-mail-detection-180125111231.pptx
 
Evaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam SolutionsEvaluating and Implementing Anti-Spam Solutions
Evaluating and Implementing Anti-Spam Solutions
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
Presentation2.pptx
Presentation2.pptxPresentation2.pptx
Presentation2.pptx
 
Email Marketing Inbox Deliverability: POV
Email Marketing Inbox Deliverability: POVEmail Marketing Inbox Deliverability: POV
Email Marketing Inbox Deliverability: POV
 
3 Best Practices for Email Marketing
3   Best Practices for Email Marketing3   Best Practices for Email Marketing
3 Best Practices for Email Marketing
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
 
How to avoid being marked as spam christoph pass next lead generation (long v...
How to avoid being marked as spam christoph pass next lead generation (long v...How to avoid being marked as spam christoph pass next lead generation (long v...
How to avoid being marked as spam christoph pass next lead generation (long v...
 
Hexamail guard anti-spam server spam filtering software - index
Hexamail guard   anti-spam server spam filtering software - indexHexamail guard   anti-spam server spam filtering software - index
Hexamail guard anti-spam server spam filtering software - index
 
83517754.ppt
83517754.ppt83517754.ppt
83517754.ppt
 
Email deliverability
Email deliverabilityEmail deliverability
Email deliverability
 
Configuring Mail Filters
Configuring Mail FiltersConfiguring Mail Filters
Configuring Mail Filters
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Spamwall

  • 2. • Junk Email • Possible Junk Email • Good Email Smargasy Spamwall uses a sophisticated score based mechanism to decide if an email should be considered junk. Every in- coming and out-going email is assigned a score. Based on this score, Smargasy Spamwall assigns one of three categories to the email:
  • 4. Scoring criteria Scoring is done based on several built-in rules. Every rule in the system can take the score either in the positive or negative direction. The final score decides the category of the email. Rules in Smargasy Spamwall can be further divided into two categories: • User defined rules • Self-learning rules
  • 5. Types of rules in Smargasy Spamwall for Email filtering  IP based rules  Content filters  Custom filters  Virus detection  Challenge response
  • 6. IP based rules These rules act on the sender's IP address and include the following.  RBL - The word "RBL" stands for Real-Time Blackhole List  SPF Check - The word "SPF" stands for Sender Policy Framework  Smargasy Spamwall tries to match the SPF record for in-coming messages and assigns a score if a mismatch is found.Black/White listing  Administrators can either black list or white list IP addresses in Smargasy Spamwall
  • 7. Content Filters  Finger print analysis - Smargasy Spamwall uses a proprietary method of creating a finger print of every email. This finger print is then compared with future messages to determine if it is part of a bulk-mail campaign.  Image analysis - Embedded images in emails are analyzed for patterns.  Body and Header - Smargasy Spamwall utilizes a two-pass approach to analyze the body of every message. It then compares it with a known list of keywords containing a score. Rules can be specified for the following sections: • Subject • Body • Attachments • Header
  • 8. Custom Filter Custom filters are the most powerful and effective filters used in Smargasy Spamwall to detect junk messages. Often spammers use several tricks to avoid being filtered. These custom filters are specially designed to detect such tricks. We believe that these custom filters are so effective that leaving just these filters on you can eliminate 90% of all junk messages
  • 9. There are two types of virus detection in Smargasy Spamwall •Finger print analysis •Integration with CLAMAV - an open source virus protection Virus detection
  • 10. Adaptive filters are self-learning filters that gets smarter by analyzing the patterns of previously sent and received emails. These filters include: •Bayesian analysis •Manually marking messages junk or good •Sender history tracking Adaptive filters
  • 11. Challenge response is a mechanism where the system sends a challenge email to the sender to verify if it is a valid message. This type of filter is disabled by default but can be enabled if the users want to use it. Challenge response
  • 13. Barbara Dolleschal Vice President/CFO Bryan Harrison Business Development Manager Andreas Dolleschal President/CEO 1-(239)214-8592