Cyberoam Includes Spam DetectionCyberoam Includes Spam Detection
Cyberoam announced it will license spam-defense technology from Commtouch
March 5, 2007

NEWBURYPORT, Mass. -- Cyberoam, a division of Elitecore Technologies and the leading innovator of identity-based unified threat management (UTM) solutions, today announced it will license spam-defense technology from Commtouch (NASDAQ: CTCH), integrating Commtouch Recurrent Pattern Detection(TM) (RPD) solutions into Cyberoam's UTM solutions.
Through an OEM agreement, this partnership will enable Cyberoam's customer base to protect their networks against the mass distribution of spam, including image spam and phishing mail detection. The solution will be available in the upcoming version release of Cyberoam to be launched during this month. Cyberoam has chosen Commtouch for its advanced real-time detection and blocking capability, which is unmatched in the industry. Because most attacks last only a few hours and involve the release of tens of millions of e-mails containing malicious content or spam, the ability to detect malicious activity in real-time is vital to combating threats. In addition, Commtouch’s patented RPD technology is language and content-agnostic, making it adaptive to new methods and activity by malicious hackers and sophisticated spammers. “Spam and malware developers are becoming more sophisticated, so it's important for organizations to be able to protect their network against emerging threats in real-time,” said Ronni Zehavi, Vice President of Business Development of Commtouch. “E-mail threats, such as phishing and pharming, have become prevalent challenges for organizations over the last few years, leaving the market open for solutions that can stop massive spam threats from entering users’ inboxes. This capability, coupled with Cyberoam’s identity-based UTM solution, is expected to provide customers with a robust solution that effectively and efficiently addresses this critical business and security need.” Elitecore Technologies Ltd.
About the Author(s)
Tricks to Boost Your Threat Hunting Game
Nov 06, 2023Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023