Risk
2/15/2012
03:56 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Commtouch Launches Outbound Spam Protection Module For Parallels Plesk Panel

Solution prevents blacklisting of hosting provider networks

ORLANDO, Fla. and SUNNYVALE, Calif., Feb. 15, 2012 /PRNewswire/ -- Commtouch' (NASDAQ: CTCH) today announced the availability of its Outbound Spam Protection as a fully integrated module within Parallels Plesk Panel. The announcement was made in Orlando during Parallels Summit 2012, an event that attracts a global audience of over 1,200 leading participants from across the cloud and hosting industry.

The outbound spam problem differs significantly from that of inbound spam, and Commtouch has therefore developed a distinctive approach to protect Parallels hosting provider partners against this rapidly growing threat. Blacklisting, caused by outbound spam, malware and phishing emails, can result in customer loss, damage to hosting providers' reputation and brand and increased operational costs. Commtouch's Outbound Spam Protection module integrates with the Parallels Plesk Panel email server to provide a range of functions, including:

-- Blocking of local and global outbound spam to dramatically reduce blacklisting incidents. -- Immediate identification of the spammer, enabling appropriate management of the source of the problem, rather than just the symptoms. Hosters can also proactively reach out to infected customers. -- Delivery of sent-spam metrics to anti-abuse teams. -- Comprehensive reporting tools that allow administrators to view the quality of SMTP traffic at a glance. "Too rigid blacklisting of email can degrade customer satisfaction and severely impact a hoster's ability to operate profitably," said John Zanni, Parallels VP of Service Provider Marketing and Alliances. "We're pleased to see Commtouch joining the Parallels ecosystem of APS-certified applications to help service providers better manage email."

The Outbound Spam Protection solution implements the same patented Recurrent Pattern Detection(TM) (RPD) technology used in Commtouch's GlobalView(TM) Cloud to analyze local hosting provider traffic, detecting outbound spam within seconds -- with almost no false positives. Designed specifically to combat outbound spam, Commtouch's solution overcomes the limitations of other options, such as rate-limiting and reversed inbound spam filters, which result in blocked email, false positives and lost employee productivity.

"Commtouch's Outbound Spam Protection has proven highly effective in detecting outbound spam and spammers -- even those that consistently eluded hosting providers," said Amir Lev, Commtouch's chief technology officer. "Integration of our solution into Parallels Plesk Panel allows hosting providers of all sizes to easily add the same best-of-breed functionality that is already installed in the networks of hosters such as Superb and Hostway."

The Commtouch Outbound Spam Protection solution is currently available in Parallels Key Administrator licensing system for its partners. Parallels' partners can contact sales managers for more information.

As part of the launch, Commtouch and Parallels will be providing a free one-month trial of the solution. Commtouch's team will be available at Parallels Summit 2012 from February 14-16 in Orlando, Florida, to discuss its technologies and to issue promotional service deals to interested hosting providers.

More Information

To learn more about Commtouch's Outbound Spam Protection solution, visit http://www.commtouch.com/outbound-spam-protection

About Commtouch Commtouch' (NASDAQ: CTCH) safeguards the world's leading security companies and service providers with cloud-based Internet security services. Real-time threat intelligence from Commtouch's GlobalView(TM) Cloud powers its Web filtering, email security and antivirus solutions, protecting thousands of organizations and hundreds of millions of users worldwide. Information about Commtouch can be found at http://www.commtouch.com or by writing to info@commtouch.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.