Perimeter Email Security, who has it?
Tags :Technical
I have found I read and get to play with
technology a lot here. Well the theory (and a recent read from Messaging
News) on Perimeter Email Security Appliances caught my eye. Instead
of just tossing mail over the fence into the company and then tossing things
back out, the appliance is to watch the behavior of traffic as well. Not
just spam and virus, but learning from the amount at one time as well as
source. For example:
- If a lot of mail is coming in for non-legitimate addresses, then it can be directory harvesting or even a DoS attack
- If mail is going to large groups at one time, and not from an internal or approved course, it would be tagged as spam if from a single source
- Mail flowing between people in the organization can be checked as well
Plus, if the mail is encrypted (Notes), then how would many of these appliances even read the message to begin with? There is no ability to track content then. Then how do the users manage retrieving the mail that has been quarantined by the appliance? What interface is available? Do administrators have to do this manually? How are the signature and content files updated? What is the support for blacklists, whitelists and even SPF or Domain Keys? Just things to think about.
blog comments powered by Disqus
On Tuesday, April 26th, 2005 by Chris Miller