SlideShare uma empresa Scribd logo
1 de 34
Next Generation Protection  Against a Dangerous  New Generation of Spam  Abaca  The world’s most effective spam filter
Agenda ,[object Object],[object Object],[object Object],[object Object]
A History of  Flawed Anti-spam Approaches Blacklists Slow and insufficient Punishes the innocent Rules-based Slow and labor intensive Content inspection Relies on end users reporting Consumes much memory Decoys and Honeypots Relies on slow humans to write rules,  Trouble differentiating similar messages Collaborative checksum Reactive — damage already done Checksums can be defeated Greylisting Unacceptable delay  easy for a spammer to defeat
Accuracy Claims have been  Greatly Exaggerated Vendors trade false positives for accuracy
About Abaca ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Abaca Delivers Critical Component Of Messaging Security Effectiveness  /Accuracy Ease of  Administration Messaging Security : Large and Growing Market IDC: worldwide messaging security market 11.5% CAGR
Customer Successes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Next Generation Anti-spam Technology ,[object Object],Abaca © 2010, All rights reserved
Abaca Works Because Spam Obeys Some Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Envelope Contains the Key not the message From: To:
Receiver Reputation: A Unique and Protected Algorithm ,[object Object],[object Object],[object Object],[object Object]
90% Spam 75% Spam 50% Spam 25% Spam 10% Spam Recipient Spam % = Receiver Reputation ReceiverNet ™  Receiver Reputation Legitimate Email Legitimate Email Spam Email Spam Email
90% Spam 75% Spam 50% Spam 25% Spam 10% Spam Based on the Reputation of the Recipients  this Message is Spam ReceiverNet ™  Receiver Reputation Legitimate Email Spam Email Spam Email Spam Email
90% Spam 75% Spam 50% Spam 25% Spam 10% Spam Based on the Reputation of the Recipients  this Message is Legitimate ReceiverNet ™  Receiver Reputation Legitimate Email Spam Email Legitimate Email Legitimate Email
ABACA PRODUCTS ,[object Object],Abaca © 2010, All rights reserved
CLX :  Carrier Class Anti-spam Solution CLX Outbound Spam Filter CLX Spam Rating Engine  CLX Solution CLX Spam Quarantine *  Optionally deployed in-line as supplemental filter  *
Simple Integration,  Rapid Deployment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reduces Anti-spam Expenses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Abaca © 2010, All rights reserved
Abaca CLX Inbound Solution Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scalable CLX Inbound Architecture CLX Server CLX Server Internet Quarantine Quarantine Email Server Email Server CLX Server Email Server Message rating CLX Admin Inbound Outbound MTA abacam MTA abacam MTA abacam SPAM
CLX Outbound Solution Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* Note the  abacam  client is run on a standard MTA)
Outbound Spam Filter Deployment CLX Outbound Quarantine Email Server Email Server CLX Outbound Server Inbound training information Email Server Admin Rate request Outbound CLX Outbound Server CLX Outbound Server CLX Outbound Quarantine Rate response Feedback Outbound Outbound MTA abacam MTA abacam MTA abacam MTA abacam SPAM
Abaca CLX Clustering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Abaca CLX Cluster Architecture CLX Rating Cluster Client (abacam) … Client (abacam) Client (abacam) ,[object Object],[object Object],[object Object],[object Object],Load Balancer (abacam) CLX Rating Server CLX Rating Server ,[object Object],[object Object],[object Object],Cluster Exploded View > 50 million mailboxes - Mail flow partitioned between CLX servers < 50 million mailboxes – Round-robin partitioning used Blue fill indicates Abaca components
Abaca CLX Multi-site Support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Abaca Multi-site CLX Deployment CLX Server CLX Server CLX Server CLX Server Feedback and outbound synchronization Failover Rate requests Rate requests
Abaca Difference ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For more information Abaca © 2010, All rights reserved ,[object Object],[object Object],[object Object],[object Object]
ADDITIONAL SLIDES Abaca © 2010, All rights reserved
Attack Prevention Technique ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
When it Comes to Filtering Accuracy Matters * For a 1,000 person entity whose employees receive 50 messages / day
>100 times faster than other approaches ,[object Object],[object Object],[object Object],[object Object]
Accurate rating allows a personalized greyzone ,[object Object],[object Object],[object Object]
Accuracy increases over time ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who Uses Abaca? Market Solution Product Enterprise CLX Hosted Solution CLX Solution CLX Outbound Cloud Service (beta) xSPs Complete Solution Abaca Rating Engine Outbound Spam Filter CLX Solution CLX Engine Only CLX Outbound VMware Customers Virtual Appliance VPG SMBs Hardware Appliance EPG Education Hardware Appliance Virtual Appliance Outbound Spam Filter EPG VPG Outbound Filter

Mais conteúdo relacionado

Mais procurados

Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingAmazon Web Services
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web ServicesAmazon Web Services
 
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...Simplilearn
 
Text categorization
Text categorizationText categorization
Text categorizationKU Leuven
 
Invertible Denoising Network: A Light Solution for Real Noise Removal
Invertible Denoising Network: A Light Solution for Real Noise RemovalInvertible Denoising Network: A Light Solution for Real Noise Removal
Invertible Denoising Network: A Light Solution for Real Noise Removalivaderivader
 
Zero shot-learning: paper presentation
Zero shot-learning: paper presentationZero shot-learning: paper presentation
Zero shot-learning: paper presentationJérémie Kalfon
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud ComputingLiming Liu
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingMohammed Sajjad Ali
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud ComputingNephoScale
 
Introduction to Machine Learning with TensorFlow
Introduction to Machine Learning with TensorFlowIntroduction to Machine Learning with TensorFlow
Introduction to Machine Learning with TensorFlowPaolo Tomeo
 
Introduction to Cloud and Eucalyptus
Introduction to Cloud and EucalyptusIntroduction to Cloud and Eucalyptus
Introduction to Cloud and EucalyptusLester Wade
 
AWS solution Architect Associate study material
AWS solution Architect Associate study materialAWS solution Architect Associate study material
AWS solution Architect Associate study materialNagesh Ramamoorthy
 
Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...
Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...
Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...Simplilearn
 
Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,Dr Neelesh Jain
 

Mais procurados (20)

Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud Computing
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web Services
 
The Advantages and Disadvantages of Cloud Computing
The Advantages and Disadvantages of Cloud ComputingThe Advantages and Disadvantages of Cloud Computing
The Advantages and Disadvantages of Cloud Computing
 
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
 
Text categorization
Text categorizationText categorization
Text categorization
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Platform as a Service (PaaS)
Platform as a Service (PaaS)Platform as a Service (PaaS)
Platform as a Service (PaaS)
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
Big data security
Big data securityBig data security
Big data security
 
Invertible Denoising Network: A Light Solution for Real Noise Removal
Invertible Denoising Network: A Light Solution for Real Noise RemovalInvertible Denoising Network: A Light Solution for Real Noise Removal
Invertible Denoising Network: A Light Solution for Real Noise Removal
 
Zero shot-learning: paper presentation
Zero shot-learning: paper presentationZero shot-learning: paper presentation
Zero shot-learning: paper presentation
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Fundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud ComputingFundamental Concepts-and-Models Cloud Computing
Fundamental Concepts-and-Models Cloud Computing
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
 
Introduction to Machine Learning with TensorFlow
Introduction to Machine Learning with TensorFlowIntroduction to Machine Learning with TensorFlow
Introduction to Machine Learning with TensorFlow
 
Introduction to Cloud and Eucalyptus
Introduction to Cloud and EucalyptusIntroduction to Cloud and Eucalyptus
Introduction to Cloud and Eucalyptus
 
AWS solution Architect Associate study material
AWS solution Architect Associate study materialAWS solution Architect Associate study material
AWS solution Architect Associate study material
 
Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...
Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...
Deep Learning With Python | Deep Learning And Neural Networks | Deep Learning...
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 
Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,
 

Semelhante a Abaca: The World's Most Effective Spam Filter

Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection SystemApollo_n
 
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)Harold Wong
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityHarold Wong
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLaboraDK
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Truong Minh Yen
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBMChris Sparshott
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate wayvfmindia
 
Net druid new presentation
Net druid new presentationNet druid new presentation
Net druid new presentationnikhilpatil49
 
FBScanner: IBSurgeon's tool to solve all types of performance problems with F...
FBScanner: IBSurgeon's tool to solve all types of performance problems with F...FBScanner: IBSurgeon's tool to solve all types of performance problems with F...
FBScanner: IBSurgeon's tool to solve all types of performance problems with F...Alexey Kovyazin
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayINSPIRIT BRASIL
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Carl Blume
 
Tef con2016 (1)
Tef con2016 (1)Tef con2016 (1)
Tef con2016 (1)ggarber
 

Semelhante a Abaca: The World's Most Effective Spam Filter (20)

Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
Spamtitan_brochure_V3
Spamtitan_brochure_V3Spamtitan_brochure_V3
Spamtitan_brochure_V3
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection System
 
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
 
Anatomy Web Attack
Anatomy Web AttackAnatomy Web Attack
Anatomy Web Attack
 
ecm
ecmecm
ecm
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 Security
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
 
Net druid new presentation
Net druid new presentationNet druid new presentation
Net druid new presentation
 
FBScanner: IBSurgeon's tool to solve all types of performance problems with F...
FBScanner: IBSurgeon's tool to solve all types of performance problems with F...FBScanner: IBSurgeon's tool to solve all types of performance problems with F...
FBScanner: IBSurgeon's tool to solve all types of performance problems with F...
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
Tef con2016 (1)
Tef con2016 (1)Tef con2016 (1)
Tef con2016 (1)
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Abaca: The World's Most Effective Spam Filter

  • 1. Next Generation Protection Against a Dangerous New Generation of Spam Abaca The world’s most effective spam filter
  • 2.
  • 3. A History of Flawed Anti-spam Approaches Blacklists Slow and insufficient Punishes the innocent Rules-based Slow and labor intensive Content inspection Relies on end users reporting Consumes much memory Decoys and Honeypots Relies on slow humans to write rules, Trouble differentiating similar messages Collaborative checksum Reactive — damage already done Checksums can be defeated Greylisting Unacceptable delay easy for a spammer to defeat
  • 4. Accuracy Claims have been Greatly Exaggerated Vendors trade false positives for accuracy
  • 5.
  • 6. Abaca Delivers Critical Component Of Messaging Security Effectiveness /Accuracy Ease of Administration Messaging Security : Large and Growing Market IDC: worldwide messaging security market 11.5% CAGR
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. 90% Spam 75% Spam 50% Spam 25% Spam 10% Spam Recipient Spam % = Receiver Reputation ReceiverNet ™ Receiver Reputation Legitimate Email Legitimate Email Spam Email Spam Email
  • 12. 90% Spam 75% Spam 50% Spam 25% Spam 10% Spam Based on the Reputation of the Recipients this Message is Spam ReceiverNet ™ Receiver Reputation Legitimate Email Spam Email Spam Email Spam Email
  • 13. 90% Spam 75% Spam 50% Spam 25% Spam 10% Spam Based on the Reputation of the Recipients this Message is Legitimate ReceiverNet ™ Receiver Reputation Legitimate Email Spam Email Legitimate Email Legitimate Email
  • 14.
  • 15. CLX : Carrier Class Anti-spam Solution CLX Outbound Spam Filter CLX Spam Rating Engine CLX Solution CLX Spam Quarantine * Optionally deployed in-line as supplemental filter *
  • 16.
  • 17.
  • 18.
  • 19. Scalable CLX Inbound Architecture CLX Server CLX Server Internet Quarantine Quarantine Email Server Email Server CLX Server Email Server Message rating CLX Admin Inbound Outbound MTA abacam MTA abacam MTA abacam SPAM
  • 20.
  • 21. Outbound Spam Filter Deployment CLX Outbound Quarantine Email Server Email Server CLX Outbound Server Inbound training information Email Server Admin Rate request Outbound CLX Outbound Server CLX Outbound Server CLX Outbound Quarantine Rate response Feedback Outbound Outbound MTA abacam MTA abacam MTA abacam MTA abacam SPAM
  • 22.
  • 23.
  • 24.
  • 25. Abaca Multi-site CLX Deployment CLX Server CLX Server CLX Server CLX Server Feedback and outbound synchronization Failover Rate requests Rate requests
  • 26.
  • 27.
  • 28. ADDITIONAL SLIDES Abaca © 2010, All rights reserved
  • 29.
  • 30. When it Comes to Filtering Accuracy Matters * For a 1,000 person entity whose employees receive 50 messages / day
  • 31.
  • 32.
  • 33.
  • 34. Who Uses Abaca? Market Solution Product Enterprise CLX Hosted Solution CLX Solution CLX Outbound Cloud Service (beta) xSPs Complete Solution Abaca Rating Engine Outbound Spam Filter CLX Solution CLX Engine Only CLX Outbound VMware Customers Virtual Appliance VPG SMBs Hardware Appliance EPG Education Hardware Appliance Virtual Appliance Outbound Spam Filter EPG VPG Outbound Filter

Notas do Editor

  1. Unprecedented accuracy Accuracy monotonically increases as time and the number of protected users increases Easy to identify mistakes: Quarantine is ranked with rigorously calculated likelihood of the observation being correct so that virtually all mistakes are in the email “greymail” report Real-time rating: reaction times are nearly instantaneous Content independent: works on image spams, foreign spams, word salads, etc. 100% language-independent High performance Highly decisive; greymail list is typically &lt;1% of all emails No training/ramp up period Immune to human rating errors User feedback is optional (personal preferences). No tuning (whitelists, blacklists, high-medium-low settings, etc)