SlideShare a Scribd company logo
Spam Is More Than
Just Annoying

Topical White Paper
Topical White Paper       Spam is More Than Just Annoying



       A Growing Problem in Corporate E-Mail Boxes

       Spam has become an increasingly common problem in our everyday lives. It is a problem that
       affects not only home users but also corporate computer users as well. Enterprises, governments
       and ISPs are trying to address this epidemic but have not been able to find the solution. More than
       simply a nuisance, spam significantly impacts worker productivity, creates legal liabilities, introduces
       malicious code and constrains network bandwidth.

       Reduces Worker Productivity
       Unsolicited e-mail messages are often compared to the traditional       "Spam fighting is a difficult and
       paper junk mail many people receive in their mailboxes at home          ever-evolving game. Gartner clients
       or at work. They are similar in the sense that they are unwanted,       with tools to measure spam report
       they are not requested and they are often times unneeded.               that as much as 30 percent to 50
       Another similarity they share is that it takes time to separate and     percent of the messages they receive
       throw away the unwanted items versus the ones that are                  are identified as spam. The
       legitimate. Unfortunately with e-mail, the cost to produce and          content is becoming increasingly
       send Spam is minimal compared to traditional post office mail           objectionable, coloring the working
       and as a result, the volume is dramatically larger. For an              environment of unprotected
       individual, sorting out spam can take minutes out of your day.          companies and creating human
       On a larger enterprise scale, it can mean hundreds of lost hours        resources issues."
       of productivity every day.
                                                                               Joyce W.Graff
                                                                               Research Analyst
       Increases Legal Liabilities                                             Gartner, Inc.
       Spam can come in many forms: chain mail, jokes, advertisements,
       newsletters or images. Since a user has no control over the
       content received, this exposes the individual and the company to potential legal liabilities.
       Harassment complaints can be filed by employees who receive lewd and obscene Spam in their
       corporate e-mail boxes from external sources and co-workers. Some e-mail applications and Web-
       enabled e-mail clients automatically display the HTML and JPEG images embedded within a
       message. As a result, child pornography, hate-related messages targeting race, religion or creed and
       other inappropriate content could be found in corporate e-mail boxes without ever being requested.
       A human resource and legal nightmare.

       Constrains Network Bandwidth
       Static HTML graphics, JPEG or GIF pictures, interactive flash demonstrations and video files are
       bandwidth intensive by themselves. Now imagine an organization receiving multiple e-mail
       messages containing these items and these being sent to all the employees of an organization. This
       would not only bottleneck all traffic coming into the organization but would also constrain the
       ability for e-mails to be sent out from the organization as well. The deluge of Spam can significantly
       impact network bandwidth and cripple the ability to perform simple everyday functions. This could
       lead to the need for additional bandwidth that would increase costs and would not be necessary
       under controlled circumstances.
Topical White Paper                    Spam is More Than Just Annoying



         Introduces Malicious Code, Viruses, Etc.
         There are many threats that Spam can pose to an
         organization and introducing mobile malicious code into
         a corporate network is among the most dangerous of
         them. Malicious code, viruses, worms and Trojans can be
         carried into an organization through innocent looking e-
         mail messages without the computer user ever knowing.
                                                                                                                                                            Spam on the Rise
         This can lead to the infection of computers, SMTP
         servers, file servers, Web servers and database servers.
         With federal regulations such as HIPAA (Health
         Insurance Portability and Accountability Act) for
         healthcare, GLBA (Gramm-Leach-Bliley Act) for finance
         and the EU Directive on Data Protection, organizations
         can be held liable for the inappropriate maintenance,                                                                                              Quarterly, from March 2002 to June
                                                                                                                                                            2003, the peak number of daily spam
         inadequate protection and data integrity of the information they store                                                                             e-mails detected and blocked by
         in their networks.                                                                                                                                 America Online.



         ROI Factors
         There are many Spam control solutions available in the marketplace today however, it is important
                                                                                            for organizations to accurately evaluate the
                       Spam Statistics 2003
                                                                                            ROI they receive by purchasing these point
  Percent of E-Mails Considered to be Spam                        40% of all e-mails        products. Although the initial purchase
  Daily Spam E-mails sent                                         12.4 billion              price of a point product may be less
  Daily Spam received per person                                  6                         expensive, the total cost of ownership must
  Annual Spam received per person                                 2200                      be considered. Implementation time, staff
  Spam costs for US corporations in 2002                          $8.9 billion              training and ease of management in day-to-
  Estimated Spam increase by 2007                                 63%
                                                                                            day activities can drive up the total cost of
  Annual Spam in 1000 employee company                            2.1 million
  Corporate E-Mail that is consider to be Spam                    15-20%                    ownership significantly. Gartner
  Wasted corporate time per Spam E-Mail                           4.5 seconds               recommends organizations implement
                 Source: Spam Filter Review (www.spamfilterreview.com/spam-statistics.html) content security solutions that integrate
                                                                                            best-of-breed technology into one platform
         allowing network administrators and staff to manage multiple applications from various vendors
         from one management console.

         About Finjan
         Finjan Software’s Vital Security™ is the only complete and integrated Secure Content Management
         solution in which individual best-of-breed security applications work together in concert to
         proactively respond to changing security threats today and tomorrow. Supplementing traditional
         security methods, Vital Security defends enterprises against Malicious Mobile Code using intelligent
         behavior analysis and comprehensive policy management. Vital Security is designed with high
         availability and scalability, for enterprises of all sizes, including those with over 100,000 users. Finjan
         is recognized by analyst firm IDC as the leader in the worldwide Malicious Mobile Code security
         market. For more information, visit http://www.finjan.com.
                    Printed in the U.S.A.
                    USA SPAMWP2.0 02.04EN
                    © 2004 by Finjan Software, Inc., and/or its subsidiaries.
                    WWW.FINJAN.COM
                    Finjan, Finjan logo, and Vital Security are trademarks or registered trademarks of Finjan Software, Inc. and/or its subsidiaries. All other trademarks are the sole property of their
                    respective owners. The Finjan Software products described in this document are protected by one or more of the following U.S. Patents: 6092194, 6167520, 6480962, 6209103,
                    6298446, and 6353892 and may be protected by other U.S. Patents, foreign patents, or pending applications.

More Related Content

What's hot

beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
FindWhitePapers
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
Essential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeEssential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscape
Unified Communications Online
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET Journal
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Jason Hong
 
CMIT 425 RISK ASSESSMENT PAPER
CMIT 425 RISK ASSESSMENT PAPERCMIT 425 RISK ASSESSMENT PAPER
CMIT 425 RISK ASSESSMENT PAPER
HamesKellor
 
Perimeter Security Case Study
Perimeter Security Case StudyPerimeter Security Case Study
Perimeter Security Case Studynmullen
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017
Gary Chambers
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Gerard Keenan
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
Javier Gonzalez
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
GFI Software
 
LinkedIn Stats 07 04 11
LinkedIn Stats 07 04 11LinkedIn Stats 07 04 11
LinkedIn Stats 07 04 11
Simon Penny
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms
Actiance, Inc.
 
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFTPrint - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
Gerry Skipwith
 

What's hot (20)

beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
Essential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeEssential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscape
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
CMIT 425 RISK ASSESSMENT PAPER
CMIT 425 RISK ASSESSMENT PAPERCMIT 425 RISK ASSESSMENT PAPER
CMIT 425 RISK ASSESSMENT PAPER
 
Perimeter Security Case Study
Perimeter Security Case StudyPerimeter Security Case Study
Perimeter Security Case Study
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
LinkedIn Stats 07 04 11
LinkedIn Stats 07 04 11LinkedIn Stats 07 04 11
LinkedIn Stats 07 04 11
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms
 
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFTPrint - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
 

Viewers also liked

VMware Partner Program P&L Analysis
VMware Partner Program P&L AnalysisVMware Partner Program P&L Analysis
VMware Partner Program P&L AnalysisElliott Lowe
 
Dorset superfast business conference jan 2015
Dorset superfast business conference jan 2015Dorset superfast business conference jan 2015
Dorset superfast business conference jan 2015
Superfast Business
 
RSA Conference 2008 Marketing Plan
RSA Conference 2008 Marketing PlanRSA Conference 2008 Marketing Plan
RSA Conference 2008 Marketing PlanElliott Lowe
 
Contact Database Gap Analysis
Contact Database Gap AnalysisContact Database Gap Analysis
Contact Database Gap AnalysisElliott Lowe
 
VMware Partner Program Plan
VMware Partner Program PlanVMware Partner Program Plan
VMware Partner Program PlanElliott Lowe
 
Marketing Plan Presentation Template
Marketing Plan Presentation TemplateMarketing Plan Presentation Template
Marketing Plan Presentation Template
Demand Metric
 

Viewers also liked (6)

VMware Partner Program P&L Analysis
VMware Partner Program P&L AnalysisVMware Partner Program P&L Analysis
VMware Partner Program P&L Analysis
 
Dorset superfast business conference jan 2015
Dorset superfast business conference jan 2015Dorset superfast business conference jan 2015
Dorset superfast business conference jan 2015
 
RSA Conference 2008 Marketing Plan
RSA Conference 2008 Marketing PlanRSA Conference 2008 Marketing Plan
RSA Conference 2008 Marketing Plan
 
Contact Database Gap Analysis
Contact Database Gap AnalysisContact Database Gap Analysis
Contact Database Gap Analysis
 
VMware Partner Program Plan
VMware Partner Program PlanVMware Partner Program Plan
VMware Partner Program Plan
 
Marketing Plan Presentation Template
Marketing Plan Presentation TemplateMarketing Plan Presentation Template
Marketing Plan Presentation Template
 

Similar to Anti-Spam Topical White Paper from Finjan

Network Threats
Network ThreatsNetwork Threats
Network Threats
Dan Oblak
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
GFI Software
 
Data security
 Data security  Data security
Data security
Laura Breese
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
Nathan CAVRIL
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
GFI Software
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
Anindita Ghatak
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
Topsec Technology
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
Brafton
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
mallisonshavon
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
thinkwithniche
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
HabFg
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
Web Werks Data Centers
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
MallTake
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
IndusfacePvtLtd
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
ijccsa
 

Similar to Anti-Spam Topical White Paper from Finjan (20)

Network Threats
Network ThreatsNetwork Threats
Network Threats
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Data security
 Data security  Data security
Data security
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Information security
Information securityInformation security
Information security
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
Spam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a ThreatSpam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a Threat
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 

More from Elliott Lowe

Finjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperFinjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperElliott Lowe
 
Malicious Mobile Code Fact Sheet from Finjan
Malicious Mobile Code Fact Sheet from FinjanMalicious Mobile Code Fact Sheet from Finjan
Malicious Mobile Code Fact Sheet from FinjanElliott Lowe
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetElliott Lowe
 
Contact Management Plan
Contact Management PlanContact Management Plan
Contact Management Plan
Elliott Lowe
 
Contact Discovery Vendor Process
Contact Discovery Vendor ProcessContact Discovery Vendor Process
Contact Discovery Vendor Process
Elliott Lowe
 
Contact Discovery Requirements For Jigsaw
Contact Discovery Requirements For JigsawContact Discovery Requirements For Jigsaw
Contact Discovery Requirements For Jigsaw
Elliott Lowe
 
Using The Contact Gap Analysis Report
Using The Contact Gap Analysis ReportUsing The Contact Gap Analysis Report
Using The Contact Gap Analysis Report
Elliott Lowe
 
Account Based Marketing Project Proposal
Account Based Marketing Project ProposalAccount Based Marketing Project Proposal
Account Based Marketing Project ProposalElliott Lowe
 
Event Marketing Best Practices
Event Marketing Best PracticesEvent Marketing Best Practices
Event Marketing Best PracticesElliott Lowe
 
Contact Management Project Proposal
Contact Management Project ProposalContact Management Project Proposal
Contact Management Project Proposal
Elliott Lowe
 
Webcast Marketing Best Practices
Webcast Marketing Best PracticesWebcast Marketing Best Practices
Webcast Marketing Best PracticesElliott Lowe
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best PracticesElliott Lowe
 

More from Elliott Lowe (12)

Finjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White PaperFinjan Vital Security For eMail Technical White Paper
Finjan Vital Security For eMail Technical White Paper
 
Malicious Mobile Code Fact Sheet from Finjan
Malicious Mobile Code Fact Sheet from FinjanMalicious Mobile Code Fact Sheet from Finjan
Malicious Mobile Code Fact Sheet from Finjan
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheet
 
Contact Management Plan
Contact Management PlanContact Management Plan
Contact Management Plan
 
Contact Discovery Vendor Process
Contact Discovery Vendor ProcessContact Discovery Vendor Process
Contact Discovery Vendor Process
 
Contact Discovery Requirements For Jigsaw
Contact Discovery Requirements For JigsawContact Discovery Requirements For Jigsaw
Contact Discovery Requirements For Jigsaw
 
Using The Contact Gap Analysis Report
Using The Contact Gap Analysis ReportUsing The Contact Gap Analysis Report
Using The Contact Gap Analysis Report
 
Account Based Marketing Project Proposal
Account Based Marketing Project ProposalAccount Based Marketing Project Proposal
Account Based Marketing Project Proposal
 
Event Marketing Best Practices
Event Marketing Best PracticesEvent Marketing Best Practices
Event Marketing Best Practices
 
Contact Management Project Proposal
Contact Management Project ProposalContact Management Project Proposal
Contact Management Project Proposal
 
Webcast Marketing Best Practices
Webcast Marketing Best PracticesWebcast Marketing Best Practices
Webcast Marketing Best Practices
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best Practices
 

Recently uploaded

Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
Adani case
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 

Recently uploaded (20)

Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 

Anti-Spam Topical White Paper from Finjan

  • 1. Spam Is More Than Just Annoying Topical White Paper
  • 2. Topical White Paper Spam is More Than Just Annoying A Growing Problem in Corporate E-Mail Boxes Spam has become an increasingly common problem in our everyday lives. It is a problem that affects not only home users but also corporate computer users as well. Enterprises, governments and ISPs are trying to address this epidemic but have not been able to find the solution. More than simply a nuisance, spam significantly impacts worker productivity, creates legal liabilities, introduces malicious code and constrains network bandwidth. Reduces Worker Productivity Unsolicited e-mail messages are often compared to the traditional "Spam fighting is a difficult and paper junk mail many people receive in their mailboxes at home ever-evolving game. Gartner clients or at work. They are similar in the sense that they are unwanted, with tools to measure spam report they are not requested and they are often times unneeded. that as much as 30 percent to 50 Another similarity they share is that it takes time to separate and percent of the messages they receive throw away the unwanted items versus the ones that are are identified as spam. The legitimate. Unfortunately with e-mail, the cost to produce and content is becoming increasingly send Spam is minimal compared to traditional post office mail objectionable, coloring the working and as a result, the volume is dramatically larger. For an environment of unprotected individual, sorting out spam can take minutes out of your day. companies and creating human On a larger enterprise scale, it can mean hundreds of lost hours resources issues." of productivity every day. Joyce W.Graff Research Analyst Increases Legal Liabilities Gartner, Inc. Spam can come in many forms: chain mail, jokes, advertisements, newsletters or images. Since a user has no control over the content received, this exposes the individual and the company to potential legal liabilities. Harassment complaints can be filed by employees who receive lewd and obscene Spam in their corporate e-mail boxes from external sources and co-workers. Some e-mail applications and Web- enabled e-mail clients automatically display the HTML and JPEG images embedded within a message. As a result, child pornography, hate-related messages targeting race, religion or creed and other inappropriate content could be found in corporate e-mail boxes without ever being requested. A human resource and legal nightmare. Constrains Network Bandwidth Static HTML graphics, JPEG or GIF pictures, interactive flash demonstrations and video files are bandwidth intensive by themselves. Now imagine an organization receiving multiple e-mail messages containing these items and these being sent to all the employees of an organization. This would not only bottleneck all traffic coming into the organization but would also constrain the ability for e-mails to be sent out from the organization as well. The deluge of Spam can significantly impact network bandwidth and cripple the ability to perform simple everyday functions. This could lead to the need for additional bandwidth that would increase costs and would not be necessary under controlled circumstances.
  • 3. Topical White Paper Spam is More Than Just Annoying Introduces Malicious Code, Viruses, Etc. There are many threats that Spam can pose to an organization and introducing mobile malicious code into a corporate network is among the most dangerous of them. Malicious code, viruses, worms and Trojans can be carried into an organization through innocent looking e- mail messages without the computer user ever knowing. Spam on the Rise This can lead to the infection of computers, SMTP servers, file servers, Web servers and database servers. With federal regulations such as HIPAA (Health Insurance Portability and Accountability Act) for healthcare, GLBA (Gramm-Leach-Bliley Act) for finance and the EU Directive on Data Protection, organizations can be held liable for the inappropriate maintenance, Quarterly, from March 2002 to June 2003, the peak number of daily spam inadequate protection and data integrity of the information they store e-mails detected and blocked by in their networks. America Online. ROI Factors There are many Spam control solutions available in the marketplace today however, it is important for organizations to accurately evaluate the Spam Statistics 2003 ROI they receive by purchasing these point Percent of E-Mails Considered to be Spam 40% of all e-mails products. Although the initial purchase Daily Spam E-mails sent 12.4 billion price of a point product may be less Daily Spam received per person 6 expensive, the total cost of ownership must Annual Spam received per person 2200 be considered. Implementation time, staff Spam costs for US corporations in 2002 $8.9 billion training and ease of management in day-to- Estimated Spam increase by 2007 63% day activities can drive up the total cost of Annual Spam in 1000 employee company 2.1 million Corporate E-Mail that is consider to be Spam 15-20% ownership significantly. Gartner Wasted corporate time per Spam E-Mail 4.5 seconds recommends organizations implement Source: Spam Filter Review (www.spamfilterreview.com/spam-statistics.html) content security solutions that integrate best-of-breed technology into one platform allowing network administrators and staff to manage multiple applications from various vendors from one management console. About Finjan Finjan Software’s Vital Security™ is the only complete and integrated Secure Content Management solution in which individual best-of-breed security applications work together in concert to proactively respond to changing security threats today and tomorrow. Supplementing traditional security methods, Vital Security defends enterprises against Malicious Mobile Code using intelligent behavior analysis and comprehensive policy management. Vital Security is designed with high availability and scalability, for enterprises of all sizes, including those with over 100,000 users. Finjan is recognized by analyst firm IDC as the leader in the worldwide Malicious Mobile Code security market. For more information, visit http://www.finjan.com. Printed in the U.S.A. USA SPAMWP2.0 02.04EN © 2004 by Finjan Software, Inc., and/or its subsidiaries. WWW.FINJAN.COM Finjan, Finjan logo, and Vital Security are trademarks or registered trademarks of Finjan Software, Inc. and/or its subsidiaries. All other trademarks are the sole property of their respective owners. The Finjan Software products described in this document are protected by one or more of the following U.S. Patents: 6092194, 6167520, 6480962, 6209103, 6298446, and 6353892 and may be protected by other U.S. Patents, foreign patents, or pending applications.