Become a Columnist Microsoft Exchange Site Microsoft Support SiteMSDN Exchange Site

   

h
 
NEMX Software Corporation  
John Young's Column  
 
Using Real-Time Blackhole Lists For Filtering Email
Filtering email requires finding patterns that distinguish spam from business email. Patterns must match the greatest set of spam as defined by your email policy, while matching only the smallest set of business email. Messages incorrectly identified as spam are considered false positives. Alternatively, messages incorrectly identified as legitimate mail are considered false negatives.
 
Network vs. Perimeter: How to Choose the Best Defense for Your Enterprise
Between spam, viruses, corporate espionage, and workplace harassment, the need to protect your Exchange messaging system has never been more clear. But with so many options available, how do you choose the best defense for your enterprise?
 
John Young About the Author & Nemx Software Corporation:

John Young, President of Nemx Software Corporation, has more than 20 years of experience in software development. Nemx's family of secure content management anti-spam and antivirus products for the Exchange Server environment offers all the features and capabilities of a Fortune 500 solution, tailored to the specific needs of SMBs. Nemx's Power Tools for Microsoft Exchange 2000 is the first native Exchange product to employ multiple weighted real-time Reverse Blacklist Technology (RBL), enabling users to effectively "kill" 85% of incoming spam, increase overall Exchange performance, decrease message storage requirements, and provide efficient control of inaccurate blacklist databases.

Visit Nemx at http://www.nemx.com

Other Articles
Using Real-Time Blackhole Lists For Filtering Email
Network vs. Perimeter: How to Choose the Best Defense for Your Enterprise
www.nemx.com  

Disclaimer: Your use of the information contained in these pages is at your sole risk. All information on these pages is provided "as is", without any warranty, whether express or implied, of its accuracy, completeness, fitness for a particular purpose, title or non-infringement, and none of the third-party products or information mentioned in the work are authored, recommended, supported or guaranteed by Stephen Bryant or Pro Exchange. OutlookExchange.Com, Stephen Bryant and Pro Exchange shall not be liable for any damages you may sustain by using this information, whether direct, indirect, special, incidental or consequential, even if it has been advised of the possibility of such damages.

Copyright Stephen Bryant 2008