Higher Ed Confronts Spam with Proofpoint

Three institutions of higher education--CUNY, Fayetteville State, and St. Cloud State--have gone public with their battle against e-mail spam with long-time use of an application from Proofpoint. Each institution is using Proofpoint Enterprise Protection, a set of tools for anti-spam, anti-virus, e-mail policy enforcement, and data loss prevention. The program lets end users receive digests of blocked messages and can choose which messages they want to release for reading. They can also maintain their own safe and blocked sender lists.

Fayetteville State University adopted Proofpoint in August 2009 as an appliance for inbound e-mail protection to block spam and outbound message filtering to prevent data leakage. Previously, the university's 1,800 faculty and staff e-mail inboxes ran on Cisco IronPort for spam detection and prevention. The North Carolina university also replaced an installation of Symantec's Enterprise Vault for legal e-discovery work with Proofpoint's Enterprise Archive.

St. Cloud State University in Minnesota began using Proofpoint's security appliance in June 2007 to protect 18,000 campus inboxes from viruses and spam. Spam made up about 83 percent of the total inbound mail during 2009. Prior to adopting the appliance, the IT department spent one to two hours each day manually updating a spam filtering service. Now, maintenance takes one to two hours per week, the university said in a statement. St. Cloud State also makes available Symantec anti-virus software free to the campus community to protect their home computers.

City University of New York runs 250,000 campus e-mail boxes across 12 school sites on LSMTP, a high-performance SMTP mail server from L-Soft. After consulting with technology analyst firm Gartner and evaluating several offerings, including Cisco IronPort, CUNY chose in 2004 to license Proofpoint based on pricing, functionality, and customer service.

"CUNY required an easy-to-implement, accurate anti-spam solution to safeguard our faculty, student, and staff's messages," said Phil Craig, e-mail administrator at CUNY. "When we installed Proofpoint, we started tackling this issue with very little adjustment on our part, and everyone from CUNY's senior administration to our students have noticed Proofpoint's spam-blocking impact. In a 30-day span, Proofpoint Dynamic Reputation has dropped over 9 million messages, ensuring that our systems do not even process this high volume of spam."

Editor's note: This article has been modified since its original publication to reflect a change in the name of the product from Proofpoint Enterprise and Protect to Proofpoint Enterprise Protection. [Last updated Sept. 24, 2010 at 9:04 a.m.] --David Nagel

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • person signing a bill at a desk with a faint glow around the document. A tablet and laptop are subtly visible in the background, with soft colors and minimal digital elements

    California Governor Signs AI Content Safeguards into Law

    California Governor Gavin Newsom has officially signed off on a series of landmark artificial intelligence bills, signaling the state’s latest efforts to regulate the burgeoning technology, particularly in response to the misuse of sexually explicit deepfakes. The legislation is aimed at mitigating the risks posed by AI-generated content, as concerns grow over the technology's potential to manipulate images, videos, and voices in ways that could cause significant harm.

  • glowing AI brain composed of geometric lines and nodes, encased within a protective shield of circuit patterns

    NIST's U.S. AI Safety Institute Announces Research Collaboration with Anthropic and OpenAI

    The U.S. AI Safety Institute, part of the National Institute of Standards and Technology (NIST), has formalized agreements with AI companies Anthropic and OpenAI to collaborate on AI safety research, testing, and evaluation.

  • a glowing gaming controller, a digital tree structure, and an open book

    Report: Use of Game Engines Expands Beyond Gaming

    Game development technology is increasingly being utilized beyond its traditional gaming roots, according to the recently released annual "State of Game Development" report from development and DevOps solutions provider Perforce Software.

  • translucent lock composed of interconnected nodes and circuits at the center

    Cloud Security Alliance: Best Practices for Securing AI Systems

    The Cloud Security Alliance (CSA), a not-for-profit organization whose mission statement is defining and raising awareness of best practices to help ensure a secure cloud computing environment, has released a new report offering guidance on securing systems that leverage large language models (LLMs) to address business challenges.