Personal Tech Pipeline | Cloudmark's New Fingerprinting Detects E-mail Viruses

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

March 13, 2006

Cloudmark's New Fingerprinting Detects E-mail Viruses



Courtesy of Messaging Pipeline

Messaging security vendor Cloudmark Inc. today unveiled a new anti-virus fingerprinting algorithm said to disassemble executable code to generate fingerprints that identify new worms and virus strains in real time.

Along with Cloudmark's anti-spam and phishing protection offerings, the anti-virus fingerprinting will be offered to service providers and their customers to automate and accelerate the virus detection and response process. The new algorithm automates the manual "reverse engineering" process that some anti-virus providers rely on to create methods for blocking malware, according to Cloudmark.

The fingerprinting approach will also enable Cloudmark to detect future variants of a virus faster than conventional detection techniques, the company said.

Cloudmark combines its threat detection and removal technology with a network of trusted "reporters" in 160 countries, which provide feedback of messaging threats directly from users.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
Unleash the Power & Opportunity of Grid Computing
Experts will identify trends in grid computing, provide
examples and examine solution options.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Transform your IT infrastructure with IBM
Successful CIOs see IT as a prime stimulus for business innovation-and themselves as key participants in a process that develops business and IT strategies in concert. Read an executive summary and register to download the full IBM paper.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

EMC SAN helps El Camino deliver superior service
EMC CLARiiON and Centera systems are helping El Camino Hospital provide better patient care. The hospital can quickly and effortlessly monitor, modify, and protect the availability of its entire storage environment while saving money ($150,000)

Block or Secure IM Use
IM threats up 250%. Protect your corporate network. Free Download.

Secure & Easy Console Management with Digi CM
The Digi CM console server provides secure, intelligent & easy access to network devices with a serial console port. With Digi CM, you can securely monitor & control servers, routers, switches & other devices even when your network is down.


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
Stellent eSeminar "Approaches to Metadata Design" on March 23
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia