Blog

Blog

Scaling Postfix on AWS with Elastic Load Balancing

Agari's mission to solve email phishing often presents unique technical challenges. Our data ingestion process involves coping with large-scale inbound SMTP traffic. We've chosen Postfix as our MTA of choice. The traditional way to scale SMTP is simply to maintain MX records for multiple ingestion paths. This works but can be very limiting. Agari's Amazon Web Services-hosted infrastructure...
Blog

Agari Recognized by OTA for Commitment to Online Trust and Security

Fourth consecutive year that Agari is honored for its leadership in brand protection, privacy and security SAN MATEO, Calif. – June 16, 2015 – Agari , the leading provider of data-driven security solutions that detect and prevent advanced email cyber threats, today announced it has been chosen for the Online Trust Alliance (OTA) 2015 Online Trust Honor Roll for the fourth year in a row. Each year...
Blog

Why Email Marketers Need to Know About DMARC and Email Security

By Brad van der Woerd , Director, Market Intelligence & Deliverability at Yesmail Read original post here . Early last year, we published a blog post informing marketers about the occurrences of cyber crime within the email security landscape via methods such as email phishing and domain spoofing. We also shared details about a form of email technology called Domain-based Message Authentication...
Blog

Leveraging AWS to Build a Scalable Data Pipeline

Data-rich companies ( e.g. LinkedIn, Facebook, Google, and Twitter ) have historically built custom data pipelines over bare metal in custom-designed data centers. In order to meet strict requirements on data security, fault-tolerance, cost control, job scalability, and uptime, they need to closely manage their core technology. Like serving systems ( e.g. web application servers and OLTP databases...
Blog

Cyber Security Reflections on 2014

Over a year ago, Target publicly acknowledged the now infamous data breach. For many weeks afterwards, news of the Target breach dominated the headlines. Cyber security was no longer just a topic for security professionals; the topic had gone mainstream. Sadly, 2013 was quickly eclipsed by 2014 in terms of data breaches. In a report released on December 9 th , 2014, the Identity Theft Resource...
Blog

The Fours Types of Senders: Forwarders

Series Introduction l Internal Infrastructure l Third Party Senders John Wilson, Director, Sales Engineering Let’s re-visit our cocktail party scenario to illustrate how this third type of sender works, because who doesn’t love a good party? Someone again hands you a business card, this time with a PayPal logo on it. You ask them how they like working at PayPal, and the person says, “I don’t work...
Blog

The Four Types of Senders: Third Party Senders

Series Introduction l Internal Infrastructure Erika NJ Alperin, Brand Manager Previous article in the series can be found here Let’s go back to the cocktail party scenario I talked about last week . Imagine you are at a cocktail party and someone you don’t know hands you their business card and the card has your company logo on it. Maybe you work for a big company and don’t know all your coworkers...
Blog

Agari Partners with Palo Alto Networks

In a further expansion of the Agari Trust Network’s data exchange program, Agari and Palo Alto Networks have partnered to exchange email-based threat data. The idea is simple, but incredibly powerful. 1) Time to detection accelerated Agari detects potential email-based malware in near real-time. This leads to faster detection of email-based malware than previously possible by any security solution...
Blog

Surprising Information About Your Email Channel

The Four Senders of Your Domain's Email Channel Imagine you are networking at a cocktail party. While there, you find out that someone at the party is handing out business cards with your name and company logo on them. You have no clue who this person is or what their intentions are. Are they maliciously trying to ruin your reputation or is this some kind of awkward misunderstanding? Luckily, in...
Blog

Tales from the Cyber Crypt

By Danielle DeWereWolf One dark and stormy night, Shawn was working late on his computer. Usually he would be in bed by now, but the loud clap of lightning and roar of the wind made sleep impossible. Instead, Shawn thought he would catch up on some email. He walked over to the kitchen and set the kettle on the stove to boil. Sitting back down at the dining room table he opened up his email. Junk...
Blog

Cousin Domain Feature in Agari

Cousin Domain - No Email Threats Should Go Uncovered AgariPRO now gives you the power to find threats that may not yet be uncovered by DMARC with our new Cousin Domain feature. This feature gives companies insight into cousin domains, domain names that are made to look similar to the real domain of a well known brand, with the intent of fooling the email recipient. This gives companies wider...
Blog

Agari Keeps JPMorgan Chase Customers Safe from Email Attacks

JPMorgan Chase said last week that cybercriminals had compromised its systems and obtained customer names, phone numbers and email addresses for 76 million households, and as a result people will be concerned about how their data is being used following the breach. But one recent article suggested that phishing scams are a possible outcome, and in the case of JPMorgan Chase, we can confirm that...
Blog

What is Identifier Alignment?

When you begin to work with DMARC, you realize just how important identifier alignment is. Identifier alignment forces the domains authenticated by SPF and DKIM to have a relationship to the "header From" domain. Header From Domain and the MailFrom domain are different? Yes, they are! Hearing these terms can confuse people. They sound like the same thing, but in reality they are not. The...
Blog

I just got owned.

by Chris Meidinger What’s the most embarrassing thing that could happen to someone in the anti-fraud business? For me, it’s definitely surrendering your credit card details to a scammer. Yeah. That just happened. Embarrassing, but rather than put my tail between my legs and run away I thought I’d use the opportunity to examine the experience and to remind myself to stay hyper-vigilant...
Blog

TLS and DMARC

By Vidur Apparao, CTO As a member of the Netscape browser team in the mid-to-late 90's, I participated on the front lines in the browser wars. I'm not just talking about the competition between Netscape and Microsoft for market share, but the battle between those of us trying to establish the browser as the next-generation application platform and the criminals trying to exploit it for nefarious...
Blog

Agari closes $15M round to prevent Email Cyberattacks

By Patrick Peterson Today, I am excited to share with you that Agari has closed a $15M Series C round of funding led by Scale Venture Partners with participation from existing investors including Alloy Ventures, Battery Ventures, and First Round Capital. This investment triples the amount of capital Agari has raised and will enable the growth of Agari's disruptive security solutions and the...
Blog

A few steps to take before creating your SPF record

Before the excitement that is creating a new SPF record , there are a few steps you should take in order to organize the information you will need to be successful. Here is your “grocery” list of information you should know about your sending outgoing mail traffic: web server in-office mail server (e.g., Microsoft Exchange) your ISP's mail server mail server of your end users' home ISP any other...
Blog

DMARC Deployment Tips & Tricks: Domain Keys and DKIM

This is the second in a new ongoing series for us that gives you the tips and tricks you need for successful DMARC deployment . Read the previous tip here . What are the differences between DomainKeys (DK) and DKIM? DomainKeys Identified Mail (DKIM) is the successor to Yahoo DomainKeys. Both share similarities, however DKIM has the additional aspects of Cisco's Identified Internet Mail standard...
Blog

What are the Differences Between DomainKeys (DK) and DKIM?

This is the second in a new ongoing series for us that gives you the tips and tricks you need for successful DMARC deployment . Read the previous tip here . DomainKeys Identified Mail (DKIM) is the successor to Yahoo DomainKeys. Both share similarities, however DKIM has the additional aspects of Cisco's Identified Internet Mail standard (IIM). The enhancements to this standard gives more security...
Blog

DMARC Deployment Tips & Tricks: PermError SPF

This is the start of a new ongoing series for us that gives you the tips and tricks you need for successful DMARC deployment. What does "PermError SPF Permanent Error: Too many DNS lookups" mean? There are several safeguards put in place with SPF . One of these is a limitation of DNS lookups to help ensure that you do not have timeout issues. SPF will evaluate only 10 DNS mechanism lookups in an...