Select Page

Cyren Security Blog

The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.

Cyren’s Email Security Engine for IP Reputation

The challenges of keeping unwanted network traffic outside of the network perimeter is never-ending. Spammers and hackers are continually evolving and changing their methods to evade traditional perimeter cybersecurity solutions.

Messaging security vendors can achieve unprecedented performance and detection levels, and block zombie traffic before it even enters customer networks. Utilizing the world’s most comprehensive email security network, Cyren’s GlobalView™, our embedded IP Reputation real-time analysis will:

  • Identification: Identify hundreds of thousands of new compromised accounts and host computers everyday.
  • Tracking: Continuously track traffic from tens of millions of different IP addresses.
  • Classification: Accurately classify billions of email messages per week in real-time.

A Global View Of IP Reputation

Cyren’s GlobalView Security Cloud combines historical and up-to-the-minute sender IP reputation data from its highly diverse traffic sources in every country. It also uses coverage from managed services and network hardware devices to desktop software. Our patented Recurrent Pattern Detection™ (RPD) technology aggregates this high-level view of all senders automatically, distinguishing between legitimate corporate senders, valid publishers, compromised devices, spammers, and phishing and malware distributors/sites.

The Scale Of The ‘Zombie’ Problem for IP Reputation

The following illustrates the scale and scope of the challenge for IP reputation posed by compromised host computers:

  • Compromised computers send 85% of all spam, an estimated 120 billion messages a day
  • Around 200,000-500,000 compromised computers ‘come alive’ everyday
  • A typical botnet sends up to 1 billion messages in a few hours
  • There are typically 10,000–200,000 compromised computers in a single botnet
  • 5–10 million compromised computers are active on any given day

Why Use Cyren’s IP Reputation Intelligence?

  • Ease of Use: With this tool you can quickly and easily expand your messaging or other security solution breadth and value.
  • Customer Retention: Maintain customer loyalty by improving service levels.
  • Sales Increases: Improve sales margins by adding solution value.
  • Reduce Costs: Reduce your customers’ operational overhead – enabling higher throughput for their systems.

Benefits For Your Customers and Overall IP Reputation

  • Lower Resources: Second-tier resource requirements are significantly reduced such as, hardware and network.
  • Save Bandwidth and Enhance Performance: By blocking >85% of unwanted traffic at the perimeter, bandwidth and resource use can be substantially reduced, which improves the Quality of Service for remaining traffic.
  • Increase Security: Filtering traffic from the devices that distribute and host viruses, worms and trojans before they can enter the network increases overall security.
  • Eliminate False Positives: When using rate-limits and temporary rejects, a measured response can virtually eliminate false positives.
  • Improve Detection: Overall detection rate is improved.

How Cyren’s IP Reputation Works for Email

A partner device will identify an incoming SMTP connection request. The device then queries IP Reputation for information about the sender IP address. Based on these results that come from the GlobalView, the connection is accepted, tempfailed, perm- failed, or throttled.

Final Thoughts

Read the data sheet and learn how to use Cyren’s Email Security Engine for IP Reputation with your products, today. Please visit our Threat InDepth page to learn about all of Cyren’s cyber threat intelligence offerings.

 

Feb 14, 2022 | Office 365

You might also like

Phishing with QR codes

Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To In 1994, a type of the matrix barcode known as the Quick Response code, now widely known as QR code, was invented by Masahiro Hara from a Japanese company Denso Wave. The purpose of the...