100% protection against spam with positive filter strategy Rottweil, 09 November 2010 the Christmas business is booming unfortunately even under the spammers who suspect the big deal with illegal funds. The last months of the year are weddings for sender of malicious emails. In December 2009 the worldwide spam volumes reached a new record with 97.5 percent of the entire E-Mail traffic. E-Mail-management expert REDDOXX (www.reddoxx.com) offers a solution with Spamfinder, which includes an automated sender verification as a spam protection by 100 percent. Here, Caterpillar expresses very clear opinions on the subject. The Spamfinder is also part of the email management system REDDOXX 2.0, which includes also the modules MailDepot and MailSealer. The filtering technology used in REDDOXX Spamfinder allows individual configuration of the system according to the individual requirements of the company. Using the recommended strategies of the filter an incoming email passes through following process: first the electronic message for viruses is checked.
It contains malware, it filters out the solution and eliminates malware using the integrated virus scanner. Then kickstart are sorted out reliably through a mix of freely definable filters. The intuitive console allows the email recipient to check the filtered messages and to deliver targeted if necessary. These functionalities can also be integrated into MS Outlook. A daily quarantine report informs about filtered out emails on request. Optionally, the user in a third step has the ability to enable the patented CISS filtering to get a 100% spam protection.
Patented CISS system channel verification many spam filters are repeatedly outsmarted by spam robots. By means of the patented process of the CISS, prevents REDDOXX of this danger. On the basis of sender verification, the solution allows for only emails from known senders. The E-Mail from an unknown sender reaches the REDDOXX appliance, it goes through the REDDOXX virus - and spam filter first. Has that Email no undesirable features on the CISS method of attack.