e-Secure Distribution has announced the launch of IronMail 6.5, the latest gateway security appliance enhancement from global messaging security market leader, CipherTrust.
IronMail 6.5 includes two new distinct modules - the Advanced Compliance Module and the Image Analysis Module (both powered by CipherTrust`s patented Compliance Profiler technology), making CipherTrust the first messaging security vendor to offer category-based compliance optimised to reduce the administrative burden associated with protecting sensitive corporate information.
Industry and government regulations dictate that companies exercise close control over many types of electronic data, and organisations are looking for ways to maintain the integrity of their corporate information. Although content filtering technologies have been available for quite some time, they have been increasingly difficult to manage in terms of time associated with creating dictionaries, assigning thresholds and other activities related to the analysis of described content.
CipherTrust`s Compliance Profiler analyses multiple file types, including images, uses artificial intelligence technologies. It reduces the administration time associated with simple content filtering technologies by automatically "learning" which data is sensitive and eliminating the need to build manual dictionaries, applying simple high-level rules defined for classes of content rather than complicated individual threshold rules, enforcing role-based administration with compliance review interface and workflow capabilities, analysing many document formats, including 85 different image types and more than 200 file types, and by supporting multiple languages, including French, German, Korean, Japanese, Portuguese, Simplified Chinese and Traditional Chinese, for customised dictionaries and content analysis, translated versions of all reports, rule and policy input in any supported language, and more.
"CipherTrust has incorporated content-filtering techniques on outbound traffic since 2001," says Francois van Hirtum, Business Unit Manager at eSecure Distribution. "Since then, CipherTrust Research has focused on developing innovative approaches to make these solutions more robust and easier to use," he continues. "The Compliance Profiler uses artificial intelligence techniques that automatically define and enforce policies, replacing the legacy content filtering solutions that organisations struggle to use and maintain."
CipherTrust`s Compliance Profiler technology powers both the Advanced Compliance Module and the Image Analysis Module. Both modules are integrated with CipherTrust Central, providing a single management framework for administration, reporting and policy configuration.
The advanced compliance module features three main innovations. Adaptive lexical analysis adaptively learns the type of content that is considered confidential by training with public and private documents to identify key phrases, accounting for misspellings, intentionally obfuscated text, and similar patterns close to matching confidential text.
Clustering allows the profiler to consider individual words within a sensitive document and evaluate a message based on the frequency of the words and how they correlate to other words within a document.
Fingerprinting generates digital fingerprints of documents to prevent any attempts to send a sentence or paragraph from a confidential document outside the network.
CipherTrust Research has found that 10% of all messages contain pornographic images or are related to pornographic content, with the majority of those images being .gif and .jpg files. CipherTrust`s Image Analysis Module is fully integrated and goes far beyond basic "flesh-finder" technology to identify and block those messages, which can compromise corporate integrity and take up valuable server space. CipherTrust`s Imaged Analysis Module provides support for 85 image types and characteristics, detects pornographic or sexually offensive images embedded within or attached to an e-mail message, and detects and controls the sending and receiving of pornographic images through e-mail to block pornographic spam and comply with corporate policy.
Tunable configuration options give administrators the flexibility to implement customised corporate tolerance policies across users, groups or domains, while flexible rule sets allow actions such as drop part, subject rewrite, copy as attachment, forward as attachment, drop message and quarantine message to be enforced based on policies to deal with offensive images.
eSecure Distribution distributes four niche data network security products in South Africa through a reseller network, and boasts the technical competence to design, implement, install and configure complete security solutions.
Editorial contacts


