Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

TrustSphere Solution Targets Spam False-Positives and Social Attacks

TrustSphere, a company that provides reputation and messaging intelligence solutions, has released an email security product that leverages a social graph of trusted senders to block spam and reduce the number of messages erroneously sent to junk mail folders, while at the same time helping to defend against targeted attacks.

TrustSphere, a company that provides reputation and messaging intelligence solutions, has released an email security product that leverages a social graph of trusted senders to block spam and reduce the number of messages erroneously sent to junk mail folders, while at the same time helping to defend against targeted attacks.

TrustSphere LogoDubbed TrustVault, the product maps each email and sender against the graph of trusted users and analyzes the information to ensure proper delivery according to the organization’s policies. Once positively identified as trusted, a sender’s email can always be delivered to intended recipients, even if other systems may have erroneously blocked or quarantined the very same messages, the company explained.

“Socially-based attacks delivered via email are increasingly targeting an organization’s executives and not just rank-and-file employees,” TrustSphere CEO Manish Goel said. “This complicates the task which many of today’s security systems have to perform, forcing them into a trade-off between greater security and ensuring business continuity.”

According to the TrustSphere, TrustVault also uses a proprietary reputation and identity analysis service called TrustCloud before authenticating senders for priority delivery of their messages. TrustCloud serves as a whitelist that validates senders are who they claim to be, and continuously checks their email reputation to protect recipients against spear phishing attacks.

Beyond phishing and spam, the company contends the product can mitigate distributed denial-of-service (DDoS) attacks against businesses by applying logic to identify email senders that are most important to an enterprise. During a DDoS attack, TrustVault supplies that data to the organization’s gateway security systems, which in turn reserve a pool of connections to ensure delivery of messages from these trusted senders.

“The technology advances in our next-generation solution, TrustVault, will have broader implications to enterprises beyond email integrity,” Goel said. “Through TrustVault we will be extending integrity to all forms of enterprise digital communication, including instant messaging and VoIP. TrustSphere has already begun pilot deployments for the use of TrustVault social graph data for more efficient business intelligence.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Phishing

The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even...