The attack vectors are no more in the form of simple mail attachments that can be blocked or deleted easily. Rather these viruses now traverse the Net space as embedded, malicious URLs in the e-mail body.
Highlighting the emerging trends in e-mail virus, Varun Kohli, Product
Marketing Manager of California-based Secure Computing Corporation, says
the use of artificial intelligence techniques in spamming, which started
with simple image spam, are rising at an alarming rate. There are a host
of new spamming techniques such as SPIM, SPLOG, SMOG, Image Spam, PDF
But everything is not so bad after all! Such virus attacks, feels Varun,
can still be tackled with proactive protection using “reputation-based”
technology which adds an essential protection layer against most threats
including insidious Web-borne malware, morphing viruses, targeted phishing
So what is reputation technology? This involves creating a “reputation” profile for malicious viruses entering the system. This is done by enterprise gateway security solutions such as Secure Computing’s TrustedSource, used for the purpose. These software eliminate as much as 90 per cent of incoming spam before they enter the network gateway. This saves significant bandwidth usage too.
The system accumulates data from over 7000 sensors in 82 countries, creating
a real-time profile of all suspicious activity and content, and then watches
for deviations based on the expected behaviour. This information is then
converted into “reputation scores” that enable it to quickly and proactively
identify and accurately reject or quarantine unwanted traffic from illegitimate
or “suspect” sources.
This new system of tackling viruses using ‘glocal’ solutions, says Varun, is the ideal one. Glocal solutions, coined by the combination of the terms - Global and Local - provide “global” reputation of the sender, message, attachment, domain and URL coupled with advanced filtering techniques using “local” inbox policies.
Want to invest in Stock Market? Get expert advice on your mobile
So, are there any clean procedures that a user can follow to save himself from virus attacks? Yes, says Varun. Virus infections can be rendered harmless by following the 3P and R strategy —
proactive protection using reputation-based solutions, predictive protection using anomaly detection and file threat systems, preventive protection like blocking transfer of potentially hazardous file types and reactive protection using AV signatures at the desktop and at the gateway level.
More India business stories | Get the latest Sensex update
Secure mail, says Varun, offers all these services at one stroke. This latest email solutions from the US company provides a secure email connection between an enterprise network and a public network It also has multiple detection techniques to ensure that both formatted data (credit card numbers, social security numbers, etc.) as well as unformatted data (engineering schematics, contracts, customer lists, etc.) are discovered while in transit.