Select Page

Cyren Security Blog

The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.

Cyren’s Email Security Engine for IP Reputation

The challenges of keeping unwanted network traffic outside of the network perimeter is never-ending. Spammers and hackers are continually evolving and changing their methods to evade traditional perimeter cybersecurity solutions.

Messaging security vendors can achieve unprecedented performance and detection levels, and block zombie traffic before it even enters customer networks. Utilizing the world’s most comprehensive email security network, Cyren’s GlobalView™, our embedded IP Reputation real-time analysis will:

  • Identification: Identify hundreds of thousands of new compromised accounts and host computers everyday.
  • Tracking: Continuously track traffic from tens of millions of different IP addresses.
  • Classification: Accurately classify billions of email messages per week in real-time.

A Global View Of IP Reputation

Cyren’s GlobalView Security Cloud combines historical and up-to-the-minute sender IP reputation data from its highly diverse traffic sources in every country. It also uses coverage from managed services and network hardware devices to desktop software. Our patented Recurrent Pattern Detection™ (RPD) technology aggregates this high-level view of all senders automatically, distinguishing between legitimate corporate senders, valid publishers, compromised devices, spammers, and phishing and malware distributors/sites.

The Scale Of The ‘Zombie’ Problem for IP Reputation

The following illustrates the scale and scope of the challenge for IP reputation posed by compromised host computers:

  • Compromised computers send 85% of all spam, an estimated 120 billion messages a day
  • Around 200,000-500,000 compromised computers ‘come alive’ everyday
  • A typical botnet sends up to 1 billion messages in a few hours
  • There are typically 10,000–200,000 compromised computers in a single botnet
  • 5–10 million compromised computers are active on any given day

Why Use Cyren’s IP Reputation Intelligence?

  • Ease of Use: With this tool you can quickly and easily expand your messaging or other security solution breadth and value.
  • Customer Retention: Maintain customer loyalty by improving service levels.
  • Sales Increases: Improve sales margins by adding solution value.
  • Reduce Costs: Reduce your customers’ operational overhead – enabling higher throughput for their systems.

Benefits For Your Customers and Overall IP Reputation

  • Lower Resources: Second-tier resource requirements are significantly reduced such as, hardware and network.
  • Save Bandwidth and Enhance Performance: By blocking >85% of unwanted traffic at the perimeter, bandwidth and resource use can be substantially reduced, which improves the Quality of Service for remaining traffic.
  • Increase Security: Filtering traffic from the devices that distribute and host viruses, worms and trojans before they can enter the network increases overall security.
  • Eliminate False Positives: When using rate-limits and temporary rejects, a measured response can virtually eliminate false positives.
  • Improve Detection: Overall detection rate is improved.

How Cyren’s IP Reputation Works for Email

A partner device will identify an incoming SMTP connection request. The device then queries IP Reputation for information about the sender IP address. Based on these results that come from the GlobalView, the connection is accepted, tempfailed, perm- failed, or throttled.

Final Thoughts

Read the data sheet and learn how to use Cyren’s Email Security Engine for IP Reputation with your products, today. Please visit our Threat InDepth page to learn about all of Cyren’s cyber threat intelligence offerings.

 

Feb 14, 2022 | Office 365

You might also like

What is Microsoft Office 365 Advanced Threat Protection?

Office 365 Advanced Threat Protection (also known as ATP and Defender) can provide your organization with advanced security features - keeping you protected from cybersecurity threats. With today's cybersecurity landscape, where new threats appear daily, if not...

The Hidden Costs of Phishing & BEC

By Max Avory A couple of months ago we sat down with Damian Stalls, vCIO director at Fluid Networks to discuss how they dramatically reduced the time their security analysts spent managing the problem of phishing, BEC, and user education. Here were some of the...