March 22, 2004
$1,500 (50 users)
- Ease of Use:
- Value for Money:
- Overall Rating:
: The 'training' of the Bayesian filter may be expedited by distributing the workload among all employees.
: Users cannot inspect their own quarantined spam messages to share the workload, and to improve the timeliness, of releasing any false positives.
: An excellent and comprehensive content filter that is particularly easy to install and configure.
DynaComm i:mail acts as an SMTP gateway, running on a Windows NT/2000/XP/Server 2003 machine, which does not have to be dedicated to the task – it can also host the existing mail server, for example. It is a member of a family of products that together form DynaComm's i:series Enterprise Content Security Suite, which offers other optional components including general Internet access filtering (HTTP and FTP) and controls, and a component called i:scan that monitors file access and downloads across the enterprise in a very wide-ranging way (not just across the Internet) to control confidentiality and misuse of data.
Anti-virus is offered via the ability to use one or more third-party virus scanners, of which the most popular are directly supported. However, almost any scanner can be used provided that it can be invoked by a command line or implemented as a DLL.
Anti-spam uses a combination Bayesian filtering, Real-time Blackhole Lists (RBLs) and a general awareness of known spam techniques. White lists can also be set up to override any spam indications in messages from trusted sources.
We particularly like the way in which Bayesian filtering is implemented in this product because, as well as the usual 'training' of the filter on collections of known spam and legitimate messages, you can perform distributed 'training' from user input using its Bayesian Distributed Trainer. The way this works is that the server attaches 'tags' to each email categorising it as 'spam', 'indeterminate' or 'legitimate' and the user can click on a link to indicate to the server whether he agrees with this classification or not. This approach can speed up training by effectively allowing the workload of 'training' to be shared among all employees, but can be switched off later when classification accuracy rates reach an acceptable level.
Inappropriate content is dealt with by categories such as adult, games, shopping, etc. Such categorisation is based on message content analysis, and not on known blacklisted sources. Custom categories may be created to cover the protection of proprietary or 'company confidential' data, for example, by including product or project names etc.
Action taken is rules based, so messages may be blocked or delivered but logged, for example. Policy configuration of the rules is made very flexible by the use of Boolean operators. Comprehensive reporting is also provided and schedules allow reports and database maintenance to be automated.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry