Product of the Day: CanIt-PRO Anti-Spam Solution
The need to provide a creative approach to fight spam is a necessary ingredient in the war against spam and viruses. Each user's needs are unique. What one person calls spam is another person's must-read message. How do we define what is spam? Roaring Penguin Software offers an email server-side anti-spam solution that provides the flexibility and end user control to deal with the unique needs of every user. CanIt-PRO combines global filtering policies with end-user control. It can be deployed in any enterprise e-mail environment, including on all Linux and UNIX servers.
For spam detection CanIt-PRO uses a variety of techniques that include keyword search, header analysis, message format, Bayesian statistical analysis, blacklists, whitelists, greylist, open proxy list and DNS verification. The software incorporates MIMEDefang, the most widely used UNIX Milter, SpamAssassin one of the most effective spam detectors in the market and Clam Anti-Virus an open source anti-virus solution. Version 3.0 has just been released and offers a new level of customizability to select the filters to define what is spam. "CanIt-PRO 3.0 enhances individual users' ability to opt-in to spam filtering and to manage the details of their personal filters using an attractive, efficient new user interface," said David Skoll, Roaring Penguin's President and CEO.
CanIt-PRO includes the option to filter outbound e-mail, an important feature for many organizations to protect the reputation of their domains. With CanIt-PRO 3.0, administrators can now easily identify what mail will and will not be filtered--including mail leaving one's own domain as well as mail circulating within a domain. This is important in the fight against "zombie" spamming machines and other threats. The software is completely customizable in Perl and the full source code is included. It will work with Linux, FREE BSD, Solaris, HP-UX and Tru64 UNIX operating systems. As a stand-alone gateway appliance, CanIt-PRO can protect e-mail environments running non-UNIX servers, such as Microsoft Exchange, Lotus Notes and Novell Groupwise. The architecture is highly scalable and it can accommodate installations with 120,000+ users.
CanIT Pro was recently installed (November 2004) in the Northshore School district of Bothel, Washington, to protect the district's 3,500 e-mail users. The results of the deployment saw a 60% decrease in the level of incoming spam. The software is ideal for campuses, ISP's and large organizations where there is a need for global filtering policies balanced with the need of the individual user/department to define what is spam for each user. Roaring Penguin has extensive experience in the education market as CanIt-PRO has been installed at the University of North Carolina, University of Kansas, Ithaca College and other educational institutions in the USA and Canada.
CanIT-PRO is based on opensource software so their are no client software licenses. It is priced on a per user with discounts available for education institutions. A trial version of CanIt-PRO can be obtained here.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Death of RoboVM
- The Humble Hacker?
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide