Kaspersky Lab Bolsters Linux Mail Server Protection
Kaspersky Lab has announced that its latest Maintenance Pack (MP1) for Kaspersky Security for Linux Mail Server is now publicly available for installation. This new suite of enhancements includes significant improvements to the management capabilities and overall security effectiveness of the solution, which has already demonstrated outstanding test results in independent testing.
The newly-enhanced Kaspersky Security for Linux Mail Server will now feature full integration with the Kaspersky Security Network, which uses the cloud to deliver real-time threat intelligence from millions of our users around the world to our company’s experts, ensuring our customers are protected from the latest emerging threats. The Maintenance Pack enables improved detection of spam and new phishing detection capabilities, flagging malicious phishing links in emails that passed through the spam filter. Another new mail filtering setting allows administers to block or limit mass mailings from legitimate (non-spam) sources, resulting in lower network traffic and fewer distractions for employees.
Most notably, Kaspersky Security for Linux Mail Server now features new URL analysis techniques which analyze the links within email messages and determine if they would direct the user to a malicious website. This is particularly useful in cases where legitimate websites have been recently compromised and infecting visitors with malware, this new Kaspersky Lab technology will automatically scan the seemingly-harmless link and discover the infection attempt waiting on the other end, and block the link from being delivered to users.
These new technologies now add to Kaspersky Security for Linux Mail Server’s already impressive array of security tools, including the company’s advanced ZETA Shield technology which is designed to defeat malware that exploits flaws in other software, a technique commonly used in targeted attacks. Zeta Shield works by scanning data streams – such as attachments contained within in-bound emails – for certain pieces of code that are commonly used by attackers attempting to exploit software flaws.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.