Cyberoam Includes Spam DetectionCyberoam Includes Spam Detection
Cyberoam announced it will license spam-defense technology from Commtouch
March 5, 2007
NEWBURYPORT, Mass. -- Cyberoam, a division of Elitecore Technologies and the leading innovator of identity-based unified threat management (UTM) solutions, today announced it will license spam-defense technology from Commtouch (NASDAQ: CTCH), integrating Commtouch Recurrent Pattern Detection(TM) (RPD) solutions into Cyberoam's UTM solutions.
Through an OEM agreement, this partnership will enable Cyberoam's customer base to protect their networks against the mass distribution of spam, including image spam and phishing mail detection. The solution will be available in the upcoming version release of Cyberoam to be launched during this month. Cyberoam has chosen Commtouch for its advanced real-time detection and blocking capability, which is unmatched in the industry. Because most attacks last only a few hours and involve the release of tens of millions of e-mails containing malicious content or spam, the ability to detect malicious activity in real-time is vital to combating threats. In addition, Commtouch’s patented RPD technology is language and content-agnostic, making it adaptive to new methods and activity by malicious hackers and sophisticated spammers. “Spam and malware developers are becoming more sophisticated, so it's important for organizations to be able to protect their network against emerging threats in real-time,” said Ronni Zehavi, Vice President of Business Development of Commtouch. “E-mail threats, such as phishing and pharming, have become prevalent challenges for organizations over the last few years, leaving the market open for solutions that can stop massive spam threats from entering users’ inboxes. This capability, coupled with Cyberoam’s identity-based UTM solution, is expected to provide customers with a robust solution that effectively and efficiently addresses this critical business and security need.” Elitecore Technologies Ltd.
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment