However, lack of standards resolution can leave end users at a disadvantage. Just look at the multiple memory card formats used to store digital camera images -- users are hindered by competing formats that can only work with certain devices.
Today's standards battle is brewing in the world of e-mail authentication, a process which seeks to authenticate the sender of a message and help filter out e-mail threats. Industry agreement on authentication standards will significantly improve the security of e-mail communications if the following conditions are met:
E-Mail Authentication Standards: It’s Like Seatbelts And Airbags
Significant progress has already been achieved as Microsoft Caller ID and Meng Weng Wong’s Sender Policy Framework (SPF) came together under the umbrella of the Sender ID Framework. At the same time Yahoo! Domain Keys joined together with Cisco Systems and its Internet Identified Mail to become DomainKeys Identified Mail (DKIM). However, this has left us with two leading authentication methods vying for dominance.
Now it is time for those loyal to Sender ID and DKIM to put their personal agendas aside and move forward to embrace these standards. Let’s get over the standards debate and celebrate a resolution. It is time that the Microsoft camp gets behind DKIM and integrates it with Hotmail. It is time for Yahoo! to get behind Sender ID and integrate it with Yahoo! Mail. Each authentication standard alone is solid, but together they provide a much stronger safety net.
The current debate is akin to seatbelts and airbags -- you certainly wouldn’t get in a car without either of them and using both provides the best passenger safety available. The auto industry started with seatbelts, or in the case of e-mail authentication, Sender ID, but there were still some “holes” or potential for danger. The auto industry added airbags, and in the case of e-mail authentication, DKIM entered the game.
While Sender ID has greater adoption momentum it still must be much more widespread to have a significant impact. Rapid adoption of both standards must happen as the first step toward improving e-mail security.
Authentication Alone Does Not Provide E-Mail Security -- Reputation Must Be A Factor
Unfortunately, even with worldwide adoption of both e-mail authentication standards, e-mail will still be vulnerable.Sender ID validates that the e-mail actually arrived from the domain it claims. DomainKeys Identified Mail validates the domain as well, and makes sure the content is unchanged during transit.
Both are effective, in different ways, at ensuring the e-mail was sent from where it states. However, neither provides any indication of whether that sender is “good” or “bad”…wanted or unwanted.
Once an e-mail is authenticated, a determination must be made of whether that e-mail is wanted. A popular method is to check the domain against a reputation service. This is a step in the right direction, whereby a system can say that all e-mail from "spammersite.com" is unlikely to be wanted whereas e-mail arriving from "goodcompany.com" is likely to be wanted.
Even This Combination Does Not Keep E-mail Safe
But, while reputation services are necessary they are not sufficient. Reputation services today only make decisions on a domain level. In cases where domains send a combination of good and bad messages, reputation services cannot help. Unfortunately, this mixed quality situation is common.
Most users of Internet Service Provider message systems send legitimate e-mail, but it is difficult for an ISP to ensure there is not a single abuser of the system on their network. And companies and other organizations will typically have good senders within their networks, but due to virus and zombie infections, they may have some users that unknowingly send out spam or virus e-mails.
A Safe Road Ahead Is Still Possible
To ensure our e-mail highway is safe, the full lifecycle of an e-mail attack must be monitored and that information leveraged with authenticated e-mail. An end-to-end e-mail attack monitoring system evaluates not just the sender, but also messages, recipient feedback, and the location a message is taking the user to, among other data. Comprehensive data monitoring is imperative to deliver a robust protection system -- the last piece of the puzzle.
It sounds like a steep hill, but we’ve already come a long way. What needs to be done now is simple:
For more great jobs, career-related news, features and services, please visit our .
Web Reputation Filters Battle the Latest Web Malware Threats
IronPort Web Reputation Filters™ are designed to combat the dynamic nature of malware. Today’s threats are no longer found as an email attachment. Instead, they are well orchestrated – utilizing social engineering techniques and target legitimate websites. As the first line of malware defense, IronPort Web Reputation Filters analyze more than 5 billion Web transactions daily – blocking up to 70 percent of malware at the connection level, prior to signature scanning. By leveraging its global footprint of URL traffic data IronPort’s Web reputation system is able to offer an industry-leading 60 percent higher malware catch rate than traditional signature scanners. 
NOTE: Offer valid for U.S., U.S. possessions, & Canada only