Spam: Not Only A Nuisance
Over 90% of email delivered to a typical U.S.
company is unsolicited Junk Mail according to the average data
reports of over 3 million U.S. Internet customers in July 2004.
A study by leading communications research firm Ferris Research
indicates that corporate organizations incur three major costs for
spam, totaling between $9 and $10 per user per month:
Loss of Productivity - The costs associated with users wading
through spam messages.
Consumption of IT Resources - The costs incurred by an IT department
as spam consumes bandwidth, storage space, and e-mail
Help Desk Burden - The costs incurred by a help desk when users log
Spam costs U.S. companies $874 per employee per year in lost
productivity, Darwin Magazine, July 8, 2003.
Faced with a sexual harassment suit, based on a spam email
circulated within its offices, Chevron settled a $2.2 million
employee lawsuit. “Internet Week, 6/23/03”.
How 99% of Spam Filters
The most common deployed spam technology fails
to produce highly effective results.
Blacklisting (as a sole remedy)
and numerous other Mathematical Equations
Countless studies have shown major flaws with
burden is placed on IT department to manage and adjust the
spam filter settings
Positive returns can become a series problem and a source of
February 25, 2003, PC Magazine tests 11 spam
filters. The best missed 7% of inbound mail with 8.4% False
Positives. The average missed 30% of inbound mail with 7% False
Positives. This is unacceptable.
Why SpamCanner Is Unique
creators of the software we use took a lesson from the
anti-virus companies and created a signature architecture
anti-virus companies rely on two main sources for catching
the latest virus signatures or definitions: (1) managed
networks of “spam traps” and (2) the user community which
reports back new virus outbreaks.
signatures are used to update their virus scanning software.
When’s the last time your anti-virus software experienced a
anti-virus companies, SpamCanner uses “spam traps” and a 3
million user community to capture signature files on spam.
utilization of signature file technology has allowed
SpamCanner filtering to achieve a high rate of spam
detection with the lowest false positive returns in the
We Do It
Over 1,200 “spam traps” are systematically
networked across the front lines of the Internet where a vast
majority of Spam first originates.
Large scale attraction methods are deployed to the most popular spam
producing segments of the Internet to populate these traps. Examples
website created with technical contact information posted
By September of 2002, each “spam trap” was receiving in excess of
500 spam messages per day.
The software developers placed a reporting engine in each spam trap,
which creates a signature file on every spam message received. The
signature files are instantly relayed to a central database to be
used for message verification.
Additional signature files are obtained from spam notifications
provided by a vast user community and entered into a dynamic
SpamCanner also deploys User Verify techniques to prevent Direct
Harvest Attacks, along with seven Real Time Black Lists (RBLs) and
special trick identifiers to effectively scan every message coming
through our filtering infrastructure. When an exact match occurs,
the email is labeled and contained, or it can simply be deleted.
How We Do It:
The SpamCanner Infrastructure
The Net Result
For the month of July, 2004, SpamCanner on
average blocked 94.0% of the entire mail flow coming into an
organization. The industry average for competing solutions is
roughly half this amount.
98.1% of total spam running through SpamCanner is stopped based on
the average customer experience.
A near 0% false positive rate is experienced by our customers.
The majority of email borne viruses are contained via our uniquely
configured anti-virus layers. A special focus is placed on malicious
self replicating worm viruses.
The Complete Solution: A Multi-Layer Scanning Architecture
time Black List checks are performed based on per-domain
user verification ensures only email destined to real users
Black List checks can be customized for each company and
are compared to a signature file similar to virus signature
virus scans are applied to messages that are not determined
to be spam.
rules are applied based on spam/virus preferences for the
Step 1: The first step in the deployment
process is to complete the new account Setup form which allows us to
prepare the servers to accept the incoming MX Record.
Step 2: Once we have set up the account, a notification will be sent
to the primary contacts listed in the Setup form indicating our
system is ready to accept the MX Record for the Domain(s) to be
Step 3: Upon receipt of the notification, the customer makes the
address change to their MX record.
Step 4: For short period of time, we recommend new customers create
a mailbox called Spam@theirdomain.com where we will push all their
filtered spam for initial review and verification purposes. They may
also elect to have their Spam placed within our online Quarantine.
Step 5: That’s it, this account is now enjoying the benefits of
Pricing & Terms
based on number of users within a given domain.
||No cost, no
obligation, 30-day trial.
||A seven day
grace period is provided after the initial setup
notification to allow customers to point their MX record.
(This allows for a full 30 day trail.)
protection – included.
statements sent monthly.
Call us today for
quote and a free 30-day Trial!