Feeds

Mirapoint adds directory to email gateway

Local anti-spam checks mean less network load

High performance access to file storage

Mirapoint has developed what it says is the first secure email gateway with a built-in directory and policy engine. According to the company, this increases security and lightens the load on the gateway because it no longer has to query the corporate directory server through the firewall for every incoming message.

The directory software is now a standard feature on Mirapoint's RazorGate appliances and will be a free upgrade to customers on support contracts, said Mike Dodson, the company's security accounts technical director.

He said that the Mirapoint directory software can copy email addresses and associated policies - but not more sensitive data such as passwords or user names - from a variety of LDAP servers, such as Active Directory, Domino or eDirectory. It also has features to detect and prevent directory harvesting, he added.

"Historically, the gateway would have a steady stream of traffic going back to the directory - checking for valid recipients, whether they can receive that type of attachment, and so on," he explained. "The problem is that spikes in email traffic are passed on to the directory servers.

"Also, email gateways are hardened, but if your gateway server were ever compromised, the attacker would be able to attack your directory. This way, the most they could get is a list of email addresses."

But doesn't the addition of policy enforcement increase the workload on the email appliance, reducing the amount of email it can handle? Dodson claimed not.

"Quite the opposite," he said. "Now when we query the directory it's process-to-process, not over the network, so it works in our favour. We actually get a marginal performance improvement."

He claimed that while the technology to replicate directory data is pretty standard in the metadata world, this is the first time it has been used in an email appliance.

The increasing importance of the directory in messaging means that Mirapoint's competitors are sure to follow suit, but Dodson suggested that integrating the replication technology and the directory into the email appliance, and providing the right management tools, would take them many months. ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.