icon
Infrastructure Security
Solutions
icon
Infrastructure Security
Solutions

Mail Security

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

DTS Solution works with market leading vendors in Mail Security to provide you with the most comprehensive integrated Mail Security solution .

              

Today the majority of the emails traveling through the Internet are considered Spam. Besides the annoying nature of Spam mail and the productivity loss for companies as employees get distracted; the significant risk imposed from spam is when it is used as a transport mechanism for Viruses and Trojans to propagate or when it is used to gain confidential information from employees by lurking them to infected websites.

Business Drivers for Email Security ...
Exchanging emails is not only one of the most important tools in daily business but also in social life. Often information of high value and confidentiality is exchanged via emails. On the other hand the SMTP protocol used for exchanging emails is one of the earliest developed protocols without much focus on security, confidentiality or integrity.
Today the majority of the emails traveling through the Internet are considered Spam. Besides the annoying nature of Spam mail and the productivity loss for companies as employees get distracted; the significant risk imposed from spam is when it is used as a transport mechanism for Viruses and Trojans to propagate or when it is used to gain confidential information from employees by lurking them to infected websites.

DTS Solution works with market leading vendors in Mail Security to provide you with the most comprehensive integrated Mail Security solution .

DTS Mail Security Solution include:

Business Drivers for Email Security ...

Exchanging emails is not only one of the most important tools in daily business but also in social life. Often information of high value and confidentiality is exchanged via emails. On the other hand the SMTP protocol used for exchanging emails is one of the earliest developed protocols without much focus on security, confidentiality or integrity.
Today the majority of the emails traveling through the Internet are considered Spam. Besides the annoying nature of Spam mail and the productivity loss for companies as employees get distracted; the significant risk imposed from spam is when it is used as a transport mechanism for Viruses and Trojans to propagate or when it is used to gain confidential information from employees by lurking them to infected websites.
DTS Solution works with market leading vendors in Mail Security to provide you with the most comprehensive integrated Mail Security solution .
DTS Mail Security Solution include:
Low impact detection methods based on globally observed external malicious behavior (FortiGuard services) or locally observed malicious behaviour (Dynamic Sender Reputation, Connection Rate Limiting). These methods detect and prevent spam with minimal impact on the device, with a high catch rate and low false positive rate. Some new, low volume spam may initially evade these protection methods so other lower level methods are employed.
FortiMail has a unique architecture which does not rely on mail queuing as with other solutions:
FortiMail is designed to perform spam detection in both inbound and outbound direction
The FortiMail architecture has been designed to optimize performance and to detect malicious content as soon as possible, with as little resource impact as possible. Detection is performed in order: Connection based methods:
Header Based Methods:
Full Content Based Methods:
Low impact detection methods based on globally observed external malicious behavior (FortiGuard services) or locally observed malicious behaviour (Dynamic Sender Reputation, Connection Rate Limiting). These methods detect and prevent spam with minimal impact on the device, with a high catch rate and low false positive rate. Some new, low volume spam may initially evade these protection methods so other lower level methods are employed.
FortiMail has a unique architecture which does not rely on mail queuing as with other solutions:
FortiMail is designed to perform spam detection in both inbound and outbound direction
The FortiMail architecture has been designed to optimize performance and to detect malicious content as soon as possible, with as little resource impact as possible. Detection is performed in order: Connection based methods:
Header Based Methods:
Full Content Based Methods:
Header filtering techniques rely on allowing the email exchange to begin, validating the details and looking for anomalies in this phase. These techniques may include:
Full content filtering use the body content, attachments and preceding information (connection/header) combined to identify malicious emails.. These techniques may include:
These methods are the most resource intensive so it is more efficient to detect mail using the previous techniques however, they are utilized to increase the catch rate to the high 99.8%+ levels.
Header filtering techniques rely on allowing the email exchange to begin, validating the details and looking for anomalies in this phase. These techniques may include:
Full content filtering use the body content, attachments and preceding information (connection/header) combined to identify malicious emails.. These techniques may include:
These methods are the most resource intensive so it is more efficient to detect mail using the previous techniques however, they are utilized to increase the catch rate to the high 99.8%+ levels.