Anti-spam Technology: The Rule-based Approach

So you think you just need to be able to block spam? Think again. When it comes to anti-spam, detection is important. But so is management. You also need to control incoming and outgoing e-mail content, as well as checking for spam, viruses, specific text, and attachments within a rule-based framework. Find out how to use an integrated e-mail content management package for effective and flexible spam control.

Featured Software Research:

Five Must Have Features for Business VoIP

A growing number of businesses are now grappling with the decision to implement new telephone systems based on voice over IP (VoIP) technology. However, while the primary goal is generally saving money, there are a wide variety of features and functions that must also be considered. This report provides a quick guide to the top five most common services that you should expect from a VoIP-based business phone system. Read More

Best Practices for a BI and Analytics Strategy

  • Source: IDC
  • Written By:
  • Published:
A growing number of organizations are moving toward having more pervasive business intelligence (BI) by turning to evidence-based decision making supported by a range of BI and analytics technology and processes that enable decision makers to have the best possible intelligence about customers, finances, operations, suppliers, and the market. This white paper addresses several questions that BI customers are facing. Read More

You may also be interested in these related documents:

The Roaring Penguin Training Network

A recent paper presented evidence that Bayesian filtering could be effective using a shared Bayes database, even among hundreds or thousands of different users. This lead to the Roaring Penguin Training Network (RPTN), a mechanism for sharing Bayes votes among different CanIt customers. This white paper describes the Roaring Penguin Training Network (RPTN). Read More

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More

How to Defend Against New Botnet Attacks

In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against—and these compromised “robot” computer networks don’t seem to be going away in the near future. Learn about new and sophisticated botnets, how they can affect your business network, and the steps you can take to protect your company from a botnet attack. Read More
 
comments powered by Disqus