Portal Home |  IS News Menu |  Portal Menu |  ISB Menu |  Main Content
CipherTrust Introduces Category-Based Compliance
15 Jun 07:42

CipherTrust, Inc. has launched IronMail 6.5, the latest version of the Company's gateway security appliance. IronMail 6.5 includes two new distinct modules - an Advanced Compliance Module and an Image Analysis Module, enabling category-based compliance.

Industry and government regulations dictate that companies exercise close control over many types of electronic data and organisations are looking for ways to maintain the integrity of their corporate information. Although content filtering technologies have been available for quite some time, they have been increasingly difficult to manage in terms of time associated with creating dictionaries, assigning thresholds and other activities related to the analysis of described content. CipherTrust's Compliance Profiler analyses multiple file types, including images, uses artificial intelligence technologies and reduces the administration time associated with simple content filtering technologies by:

  • Automatically "learning" which data is sensitive and eliminating the need to build manual dictionaries
  • Applying simple high-level rules defined for classes of content rather than complicated individual threshold rules
  • Enforcing role-based administration with compliance review interface and workflow capabilities
  • Analysing many document formats, including 85 different image types and more than 200 file types
  • Supporting multiple languages, including French, German, Korean, Japanese, Portuguese, Simplified Chinese and Traditional Chinese, for customised dictionaries and content analysis, translated versions of all reports, rule and policy input in any supported language, and more.

CipherTrust's Compliance Profiler technology powers both their Advanced Compliance Module and their Image Analysis Module. Both modules are integrated with CipherTrust Central, providing a single management framework for administration, reporting and policy configuration.

Advanced Compliance Module

  • Adaptive lexical analysis - Adaptively learns the type of content that is considered confidential by training with public and private documents to identify key phrases, accounting for misspellings, intentionally obfuscated text, and similar patterns close to matching confidential text
  • Clustering - Considers individual words within a sensitive document and evaluates a message based on the frequency of the words and how they correlate to other words within a document
  • Fingerprinting - Generates digital fingerprints of documents to prevent any attempts to send a sentence or paragraph from a confidential document outside the network.

Image Analysis Module
CipherTrust Research has found that 10 per cent of all messages contain pornographic images or are related to pornographic content, with the majority of those images being .gif and .jpg files. CipherTrust's Image Analysis Module is fully integrated and goes far beyond basic "flesh-finder" technology to identify and block those messages, which can compromise corporate integrity and take up valuable server space. CipherTrust's Imaged Analysis Module provides:
  • Support for 85 image types and characteristics - Detects pornographic or sexually offensive images embedded within or attached to an e-mail message
  • Inbound and outbound message filtering - Detects and controls the sending and receiving of pornographic images through e-mail to block pornographic spam and comply with corporate policy
  • Tunable configuration options - Gives administrators the flexibility to implement customised corporate tolerance policies across users, groups or domains
  • Flexible rule sets to enforce actions - Enforces actions based on policy to deal with offensive images, including drop part, subject rewrite, copy as attachment, forward as attachment, drop message and quarantine message.

[Sounds attractive of it really works... I wonder how legitimate porn companies cope with these filters. ---Ed].

Related links: (Open in a new window.)
External link www.ciphertrust.com

View Printable View printable version (opens in new window)
Back Back