SonicWALL Security Products Partners | Contact Sales 1-800-509-1265

 •   • 

The Anti-Spam & Email Security Platform IP Reputation & Connection Management

Dell SonicWALL Advanced Reputation Management utilizes not only a message’s sender IP reputation, but also the reputation of its content, structure, links, images, attachments and more. Moreover, Advanced Reputation Management also provides directory harvest attack (DHA) protection, Denial of Service (DoS) protection, backscatter/NDR protection and more, all with comprehensive logging and reporting.

IP Reputation & Connection Management+

IP Reputation & Connection Management

IP Reputation & Connection Management+

IP Reputation & Connection Management

More than sender IP reputation.

Dell SonicWALL keeps reputation scores for multiple elements of an email. With traditional IP reputation, the spammer can quickly change the sending IP address to mitigate this technique.   Since spammers use Botnets to distribute over 90% of spam from millions of unique systems. Sender IP Reputation reliant systems can be slow to react to spam attacks. With Dell SonicWALL – the sender IP, links, content, structure, image, attachments, etc – all must be changed to avoid detection. The multiple layers of reputation mean that Dell SonicWALL protected systems present a poor target for spammers, because other systems that rely heavily on Sender IP reputation are easier to defeat.

Directory Harvest Attack (DHA) Protectio+

Directory Harvest Attack (DHA) Protectio

Enahanced connection management techniques.

Dell SonicWALL includes several other techniques in its connection management module. Enabling BATV ensures that NDR or Blowback spam is blocked. Directory Harvest Attack protection deletes, rejects or stores in a junk box, messages to users not listed in LDAP.

Denial of Service Attack Protection+

Denial of Service Attack Protection

Quality of service.

Connection Management also includes quality of service capabilities. This allows an email system to protect itself against Denial of Service attacks by blocking or throttling those connections. In addition, connections from any server can be allowed, blocked throttled or rejected as desired.