IronPort is certainly a leading email security device. I like IronPort's C-Series mail gateways, which use Bounce Address Tag Validation (BATV). One spam attack that IronPort prevents is known as "joe-job," or a misdirected bounce attack. To execute this attack, a spammer sends emails with the intended recipient's address spoofed as the return address. This causes mail systems to inadvertently bounce the spam to the real victim. Bounce...
Address Tag Validation safeguards outgoing mail, adding an encrypted verification check to the SMTP FROM: field that makes it easier to distinguish between real addresses and fake bounced ones. What's great about this type of verification is that, unlike other email authentication technologies, it can be effective, even if other mail servers are not required to adopt it.
While I can't speak to your concerns about exposing IP addresses, it may help to know that each mail server that processes a message inserts a Received: header at the top of its list. The header includes the sender's IP address and provides a continuous track of a message's route. So, even if the sender uses a false email address when contacting the receiving server, modern mail transfer programs record the correct IP address of the sender. Thus an email message's "Received:" headers show how it has been routed to its destination. The IP address of the sender is more or less the only part of an email message that cannot be faked. It is next to impossible to spoof the IP address for the duration of the SMTP conversation. This is why IP addresses are a key component in combating antispam efforts and identifying known bad or good senders.
Dig deeper on Email Security Guidelines, Encryption and Appliances
Related Q&A from Michael Cobb
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it.continue reading
Do you know some of the best third-party patch deployment tools? See expert Michael Cobb's recommendations on which tools would work best for your ...continue reading
Users in the enterprise may unknowingly be exposed to 'Gchat' security risks. Expert Michael Cobb discusses Internet application security best ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.