Getting on top of unwanted e-mail

F5 Networks and Secure Computing have announced plans to deliver a security option that will enable organisations to eliminate up to 70% of unwanted e-mail from untrustworthy senders.

F5 Networks and Secure Computing have announced plans to deliver a security option that will enable organisations to eliminate up to 70% of unwanted e-mail from untrustworthy senders.

The Big-IP Message Security Module, due in January, will integrate reputation data from Secure Computing’s TrustedSource identity reputation service into F5’s application delivery device.

That will let organisations eliminate unwanted e-mail, dropping connections from sources that TrustedSource deems invalid, before the messages get through the corporate firewall.

To do this, the TrustedSource reputation system analyses IP addresses, domains and URLs to determine if they represent valid senders and destinations, according to company officials.

By rejecting a significant amount of unwanted e-mail before it enters the network, the new module is said to enhance Big-IP’s ability to reduce the load of second-tier spam inspection and cuts down on the number of devices an organisation requires.

It seems like a possible way of cutting down unwanted e-mail. Of course, the proof of the pudding will be in the eating.

Read more on Operating systems software

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close