The Network Box Anti-Spam system scans and blocks spam and other malicious emails from entering your network. With support for SMTP, POP3 and IMAP email protocols, the system provides 25 anti-spam engines, combining several different techniques, and is backed by a database of over 30 million signatures.


In addition to spam detection, the system also comprehensively scan emails for malware, intrusion, and company policy conformance.







Co-operative Spam Checksums

This technique involves breaking apart a message, and taking cryptographic checksums of each component of the message.


Signatures and Spam Scoring

Lists of signatures which match aspects of spam messages.


White lists and Black lists

A list of words / patterns which make a message Ham (good email) or Spam.



By examining behaviour, tests can be designed to determine if an e-mail is Spam.


Real-Time IP Blacklists

Lists of gateways known to be either known sources of spam, known open-relays (allowing third-party relaying of messages), or known dial-up networks.


Real-Time URL Blacklists

Lists of URLs used by Spammers.


URL to IP Mapping and Blacklists

Lists of IP addresses used by Spammers.



URL Categorization

Using the on-board database, URLs can be categorised.


Domain Age

If a domain is very young this can be an indicator of Spam.


Bayesian Filtering

Statistical (or Bayesian) filters can be used to automatically maintain word / pattern white lists and blacklists, together with statistical probabilities as to whether the given word / pattern makes the message Spam / Ham.


Challenge / Response Systems

Network Box can challenge previously unknown senders to check they are not Spammers.


Digital Signatures

This technique is normally used to indicate that an email message is Ham, and is not used to determine Spam.


Optical Character Recognition (OCR)

Spams sent as pictures can be interpreted as text and hence detected.




Spam Traps

Additionally, Network Box offers a Spam Trap facility which is integrated into the email scanner technology. The Spam Trap works by monitoring a configured list of email addresses. Messages arriving on those addresses are accepted and scanned, and automatically transmitted to the centralized Spam Trap facility. The emails are then blocked and classified both ‘spam’ and ‘trapped’.


Once the spam emails arrive at the centralized Spam Trap facility, they are analysed using exactly the same anti-spam technology and signatures rules as on customer boxes. Any missed spams are forwarded on to the Security Response Outbreak Spam System for analysis and release of protection signatures. Any executable attachments are analyzed for malware and suspicious attachments are forwarded on to the Security Response Outbreak System for further analysis.


Spam Traps




Key Features

Engines and Singnatures

25 Engines

30 million+ Spam Signatures*

High detection accuracy

99.7% Detection Accuracy*

0.01% False-Positive Rate

Extremely configurable

Extremely configurable. Individual engines can be enabled or disabled, based on your requirements.


*For more information and real-time statistics:

Go to Security Response site