Trend Micro™ Email Reputation Services Dynamic Network-Layer Spam Protection

Total Page:16

File Type:pdf, Size:1020Kb

Trend Micro™ Email Reputation Services Dynamic Network-Layer Spam Protection >> ANTI-SPAM Trend Micro™ Email Reputation Services Dynamic Network-Layer Spam Protection Trend Micro™ Email Reputation Services identify and stop spam at its source—before it can flood your messaging infrastructure, overload mail gateway security, and burden system resources. These services block spam at the network level by verifying IP addresses against the world’s largest, most trusted reputation database—managed by the Trend Micro Threat Prevention Network—with 1.6 billion IP addresses rated for spamming activity. As the first line of defense, Email Reputation Services block up to 80% of incoming spam with almost zero false positives. By reducing the volume of spam, it significantly improves corporate messaging security. While continually updating the reputation database, Trend Micro Threat Prevention Network also maintains a fully dynamic blacklist, utilizing heuristics, advanced algorithms, and real-time behavior monitoring to identify new sources of spam, including zombies and botnets, as they first begin to spam. Key Advantages Stops spam at its source Easy to set up, scale, and maintain With spam accounting for 75% of total email volume*, IT resources Trend Micro Email Reputation Services are installed through a and gateway spam filters are often overwhelmed. Trend Micro simple configuration of the MTA and can scale easily to combat the Email Reputation Services stops spam at the IP connection level— growing volume of spam—unlike appliance solutions that require identifying the source—even sources that are difficult to track, such additional hardware. Plus, there is no additional software required as zombies and botnets. By blocking spam before it can traverse and no need for manual tuning of policies—a key advantage over the enterprise perimeter, it relieves the burden on mission-critical traditional spam filtering solutions. messaging systems—a key advantage over application-based anti-spam solutions that manage spam after it enters your network. Lowers cost of ownership *(Metagroup, November 2004) By blocking up to 80% of spam before it hits the corporate network, reputation services prevent junk mail from wasting your employees’ Blocks spam with almost zero false positives valuable time, clogging bandwidth, and hogging system resources. The extensive reputation database contains IP addresses with The costs for both storage and administrative review are greatly comprehensive spamming histories and spam samples. To ensure reduced. Unlike appliance-based and traditional software-based accuracy and reliability, Trend Micro Threat Prevention Network, a solutions, Email Reputation Services are not hardware dependent, team of highly trained spam investigators, carefully monitors and which translates into lower equipment costs. maintains reputation ratings, minimising false positives. This high level of service is a critical component that you do not get with free Industry-Leading Reputation Technology and Service blacklists, which are often outdated and unreliable. Email Reputation Services are built on innovative methodologies that are now the industry standard for DNS lookups used to check IP address blacklists and whitelists. In addition, the services are supported by Trend Micro Threat Prevention Network, our team of highly trained spam investigators. Threat Prevention Network Reputation Manages the Email Reputation DNS Services Standard and Server Advanced Databases DNS Query Response with rating End-user With Trend Micro™ Email Reputation Services, the MTA queries the IP reputation database, Internet End-user rejecting spam at the connection Spam is rejected level—before it can enter your network. Spammer MTA or Firewall Mail Server Quarantine w/content and virus filtering >> ANTI-SPAM Trend Micro™ Email Reputation Services Advanced and Trend Micro™ Email Reputation Standard The family of Trend Micro™ Email Reputation Services includes Trend Micro™ Email Trend Micro Threat Prevention Reputation Service Standard and Trend Micro™ Email Reputation Service Advanced, which Network Trend Micro Reputation Services are powered combines standard and dynamic real-time spam blocking—for the most comprehensive by high-quality service from Trend Micro Threat network layer spam protection. The key features and benefits of these services are outlined Prevention Network, a global team of in the chart below: experienced spam investigators who research, collect, process, and distribute reputation ratings Trend Micro Email on IP addresses. These highly trained Key Features Reputation Key Benefits Anti-Spam Services specialists operate around the clock to monitor Service Standard spam activity, develop information on spam Dynamic Real-Time Spam Blocking • Stops spam at its source in real time sources, verify the accuracy of reputation as it is being sent—before it can ratings, and work with organisations to ensure Identifies suspect behaviour with invade the network the service is tracking spammers correctly. For advanced algorithms, heuristics, and • Protects against the newest sources of real-time monitoring spam, including zombies and botnets, more information about Trend Micro Threat which are hard to track and stop Prevention Network service and support, go to: Rates reputation of new spam sources • Continually updates the database as www.trendmicro-europe.com/tpn/ with dynamic rating technology new attacks occur; only blocks active sources Trend Micro, Inc. Trend Micro, Inc., is a global leader in network Comprehensive Reputation Database • Effectively blocks spam at the source—with few false-positives antivirus and Internet content security software Verifies IP addresses against largest, • Enables administrators to make and services, focused on helping customers most reliable reputation database of 1.6 informed decisions whether to block, prevent and minimise the impact of network billion IP addresses accept ot quarantine messages viruses and mixed-threat attacks through its Provides comprehensive spam histories award-winning Trend Micro™ Enterprise and spam samples Protection Strategy. Trend Micro has worldwide Mixed-Threat Security • Reduces burden on gateway security operations and trades stock on the Tokyo Stock solutions—for improved effectiveness Exchange and NASDAQ. Blocks viruses, spyware, and grayware • Blocks phishing-related emails that that use spamming tactics to propagate lure victims to give out credit card Trend Micro (UK) Limited Protects agains phishing attacks numbers, user names, passwords, etc. Pacific House Guards against directory harvesting • Prevents spammers from harvesting Third Avenue attacks corporate directories, which consumes Globe Business Park resources and leads to higher spam Marlow volume Buckinghamshire Compatibility with Leading Systems • Easily configurated to work with SL7 1YL existing MTA England Supports leading MTAs, including • Provides the first layer of protection, Tel: +44 (0) 1628 400500 Postfix, qmail, and Sendmail reducing the volume of spam that Fax: +44 (0) 1628 400511 must be filtered at the messaging Complements Trend Micro Spam www.trendmicro-europe.com gateway Prevention Solution System Requirements For Microsoft™ Windows™, Linux™, or Sun™ Solaris™ • Trend Micro Email Reputation Services Standard currently supports any of the MTAs listed below. • Trend Micro Email Reputation Services Advanced currently supports the MTAs listed in red. 4th Dimension, WebSTAR V Kerio Mail Server Surfcontrol Aladin, eSafe McAfee, WebShield Sybari, Antigen Alt-N, Mdaemon Macintosh, OS X Mail Server Symantec, AntiVirus for SMTP Gateway Clearswift, MailSweeper Microsoft, Exchange 2003 Symantec, Firewall CMS, Praetor Mirrorpoint Symantec, Mail Security for Microsoft Exchange Deerfield, VisNetic Mail Server NetIQ, NetIQ MailMarshal Trend Micro™ InterScan™ Messaging Security Suite* Eudora Internet Mail Server Postfix Tumbleweed, MailGate exim, exim Internet Mailer Proofpoint Protection Server Watchguard, SpamScreen Gordano, Gordano Messaging Server qmail Xwall Gwava Sendmail Zix Corp, Message Inspector IronPort Secure Computing, Sidewinder *InterScan Messaging Security Suite for Windows requires Service Pack 4 ©2002 - 2007 by Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the prior written consent of Trend Micro Incorporated. Trend Micro and the t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [DS01NRS050714GB].
Recommended publications
  • Exim the Mail Transfer Agent.Pdf
    ,Title.10724 Page 1 Tuesday, October 9, 2001 9:25 AM Exim The Mail Transfer Agent ,Title.10724 Page 2 Tuesday, October 9, 2001 9:25 AM ,Title.10724 Page 3 Tuesday, October 9, 2001 9:25 AM Exim The Mail Transfer Agent Philip Hazel Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo ,Copyright.10561 Page 1 Tuesday, October 9, 2001 9:25 AM Exim: The Mail Transfer Agent by Philip Hazel Copyright © 2001 O’Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472. Editor: Andy Oram Production Editor: Mary Brady Cover Designer: Ellie Volckhausen Printing History: June 2001: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of an aye-aye and Exim is a trademark of O’Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Library of Congress Cataloging-in-Publication Data Hazel, Philip Exim: the mail transfer agent/by Philip Hazel p.cm. ISBN 0-596-00098-7 1. Exim (Computer program) 2.
    [Show full text]
  • Mailarchiva Enterprise Edition V1.9
    MailArchiva Enterprise Edition Administration Guide Willkommen Bienvenidos Welkom Bienvenue Welcome MailArchiva Enterprise Edition v1.9 INSTALLATION AND AMINISTRATION GUIDE For Windows / Linux MailArchiva Enterprise Edition Administration Guide 1 INDEX 1 INDEX ............................................................................................................. 2 2 IMPORTANT NOTICE ....................................................................................... 4 3 CONTACT INFORMATION ................................................................................. 4 TECHNICAL REQUIREMENTS .................................................................................. 5 4 OVERVIEW ...................................................................................................... 6 5 HIGH-LEVEL FEATURES ................................................................................... 7 6 ARCHITECTURE ............................................................................................... 9 7 INSTALLATION .............................................................................................. 10 7.1 EXCHANGE SERVER CONFIGURATION .................................................................... 11 7.2 SERVER INSTALLATION (ON WINDOWS ) ................................................................ 14 7.3 SERVER INSTALLATION (ON LINUX ) ..................................................................... 15 7.4 MICROSOFT EXCHANGE ...................................................................................
    [Show full text]
  • Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods*
    Int. J. Communications, Network and System Sciences, 2013, 6, 88-99 http://dx.doi.org/10.4236/ijcns.2013.62011 Published Online February 2013 (http://www.scirp.org/journal/ijcns) Efficient Spam Filtering System Based on Smart * Cooperative Subjective and Objective Methods Samir A. Elsagheer Mohamed1,2 1College of Computer, Qassim University, Qassim, KSA 2Electrical Engineering Department, Faculty of Engineering, Aswan University, Aswan, Egypt Email: [email protected], [email protected] Received September 17, 2012; revised January 16, 2013; accepted January 25, 2013 ABSTRACT Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time con- suming and resource demanding. They are inaccurate and require continuous update to cope with newly invented spammer’s tricks. On the other side, the existing subjective proposals have some drawbacks like the attacks from mali- cious users that make them unreliable and the privacy. In this paper, we propose an efficient spam filtering system that is based on a smart cooperative subjective technique for content filtering in addition to the fastest and the most reliable non-content-based objective methods. The system combines several applications. The first is a web-based system that we have developed based on the proposed technique. A server application having extra features suitable for the enter- prises and closed work groups is a second part of the system. Another part is a set of standard web services that allow any existing email server or email client to interact with the system.
    [Show full text]
  • ESET MAIL SECURITY Installation Manual and User Guide
    ESET MAIL SECURITY Installation Manual and User Guide (intended for product version 4.0 and higher) Linux, BSD and Solaris Contents 1. Introduction..................................................................3 1.1 Main .........................................................................................3functionality 1.2 Key features.........................................................................................3 of the system 2. Terminology..................................................................5 and abbreviations 3. System..................................................................6 requirements 4. Installation..................................................................7 5. Architecture..................................................................8 Overview 6. Integration..................................................................10 with Email Messaging System 6.1 Bi-directional.........................................................................................11 email message scanning in MTA 6.2 Scanning.........................................................................................11 of inbound email messages 6.3 Scanning.........................................................................................11 of outbound email messages 6.4 Scanning of email messages downloaded from POP3/IMAP.........................................................................................11 server 6.5 Alternative.........................................................................................12
    [Show full text]
  • Kaspersky Security for Mail Server
    KASPERSKY SECURITY FOR MAIL SERVER Kaspersky Security for Mail Server protects mail and groupware servers from malicious programs and spam. The product includes applications that protect mail traffi c for all popular servers, including Microsoft® Exchange, Lotus® Domino®, Sendmail, qmail, Postfi x, Exim and CommuniGate Pro. The solution can also be used to set up a dedicated mail gateway. PRODUCT HIGHLIGHTS* MAIL SERVER PROTECTION REDUCED TRAFFIC LOAD Anti-malware and anti-spam protection of mail traffi c Cloud-enabled, intelligent spam fi ltering signifi cantly for all popular mail systems. reduces traffi c load. SYSTEM RESOURCE OPTIMISATION ZETA SHIELD TECHNOLOGY A powerful antivirus engine, load balancing of server (Linux and Exchange servers) resources and scan exclusions all reduce the load Kaspersky ZETA (Zero-day Exploits and Targeted on your system. Attacks) Shield defends against advanced persistent threats (APTs) which take advantage of zero-hour KSN INTEGRATION FOR ANTISPAM vulnerabilities. Increases spam and malware detection rates thanks to integration with Kaspersky Lab’s cloud-based threat identifi cation engine (KSN). FEATURES • Integrated protection of mail servers from all types • Complete protection of Microsoft Exchange Server of malicious programs and compatibiliy with DAG (Database Availability • Effi cient protection against spam Group) • Real-time antivirus protection • Backup storage of data prior to disinfection • On-schedule scanning of emails and databases or deletion • Protection for Sendmail, qmail, Postfi x, Exim
    [Show full text]
  • Opensmtpd: Current State of Affairs
    From: "Gilles Chehade" <[email protected]> To: "Ah, Jacques Cousteau" <[email protected]> Date: Sun, 24 Sep 2017 CET Subject: OpenSMTPD, current state of affairs The plan - Made tons of slides, I'll just skip over some if needed... - Sick AF, may need to run out during the talk… - Should this happen, stay calm and don’t panic, I’ll be back :-) $ whoami - Gilles Chehade <[email protected]> - I'm also @poolpOrg on twitter and github - I live in the beautiful city of Nantes, France (west coast riprizent !) - OpenBSD user since 2.6 (1999), OpenBSD developer since 4.2 (2007) - Also used NetBSD and FreeBSD a lot in the past, I enjoyed all BSD systems - Started working on smtpd in 2007 as personal project for my own needs - pyr@, reyk@ and henning@ tricked me into turning it into OpenSMTPD - "It will be fun", they said with a grin. $ whoami - Currently a Lead-Developer for the Vente-Privée Group - Platinum Sponsor of EuroBSDCon 2017 btw, woohoo ! - We are hiring. We are hiring. We are hiring. We are hiring. Mail me ;-) - I no longer do R&D work in the mail industry - Still do mail experiments in private though ;-) - My daily job has NOTHING to do with mails whatsoever, no conflicts of interest - Vente-Privée has a few OpenSMTPD instances as main MTA - I wasn't sure, I had to ask Miky Mike, the guy who knows this stuff - We also have a few OpenBSD installs, not sure I can say where and why, so… The OpenSMTPD crew - Eric Faurot <[email protected]> aka "The Doctor" - Sunil Nimmagadda <[email protected]> - Jung Joerg <[email protected]> - We tend to cc: our diffs to Todd Miller <[email protected]> - We receive a few contributions from the community - Mostly Linux people, just saying..
    [Show full text]
  • Release Notes for Debian 7.0 (Wheezy), S/390
    Release Notes for Debian 7.0 (wheezy), S/390 The Debian Documentation Project (http://www.debian.org/doc/) November 20, 2018 Release Notes for Debian 7.0 (wheezy), S/390 This document is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License, version 2, as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. The license text can also be found at http://www.gnu.org/licenses/gpl-2.0.html and /usr/ share/common-licenses/GPL-2 on Debian. ii Contents 1 Introduction 1 1.1 Reporting bugs on this document . 1 1.2 Contributing upgrade reports . 1 1.3 Sources for this document . 2 2 What’s new in Debian 7.0 3 2.1 Supported architectures . 3 2.2 What’s new for S390? . 4 2.3 What’s new in the distribution? . 4 2.3.1 CDs, DVDs and BDs . 5 2.3.2 Multiarch . 5 2.3.3 Dependency booting . 5 2.3.4 systemd . 5 2.3.5 Multimedia . 5 2.3.6 Hardened security . 5 2.3.7 AppArmor . 6 2.3.8 The stable-backports section .
    [Show full text]
  • Messaging Platforms for Service Providers - Market Quadrant 2017 ∗
    . The Radicati Group, Inc. www.radicati.com . THE RADICATI GROUP, INC. Messaging Platforms for Service Providers - Market Quadrant 2017 ∗ ........ An Analysis of the Market for Messaging Platforms for Service Providers, Revealing Top Players, Trail Blazers, Specialists and Mature Players. June 2017 SM ∗ Radicati Market Quadrant is copyrighted June 2017 by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market QuadrantsSM should not be considered an endorsement, but rather a measure of The Radicati Group’s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market QuadrantsSM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof. Messaging Platforms for Service Providers - Market Quadrant 2017 TABLE OF CONTENTS RADICATI MARKET QUADRANTS EXPLAINED .................................................................................. 2 MARKET SEGMENTATION – MESSAGING PLATFORMS FOR SERVICE PROVIDERS ............................
    [Show full text]
  • AREDN Documentation Release 3.19.3.0
    AREDN Documentation Release 3.19.3.0 AREDN Jul 05, 2020 Guía de inicio 1 Información general de AREDN®3 2 Seleccionando el Hardware de Radio5 3 Descargando el Firmware AREDN®7 4 Instalación del Firmware AREDN®9 5 Basic Radio Setup 21 6 Estado del Nodo 25 7 Mesh Status Display 31 8 Advanced Configuration 35 9 Resumen de redes 51 10 Network Topologies 53 11 Características del espectro radioeléctrico 57 12 Planificación de canales 63 13 Network Modeling 73 14 AREDN® Services Overview 79 15 Chat Programs 83 16 Email Programs 91 i 17 File Sharing Programs 95 18 VoIP Audio/Video Conferencing 99 19 Video Streaming and Surveillance 107 20 Computer Aided Dispatch 115 21 Other Possible Services 119 22 Firmware Upgrade Tips 125 23 Comparing SISO and MIMO Radios 127 24 How-to Use PuTTYGen on Windows to Make SSH Keys and Use Them on AREDN® Nodes 131 25 Settings for Radio Mobile 141 26 Test Network Links with iperf 145 27 Tools for Developers 147 28 Frecuencias y canales 153 29 Información adicional 155 ii AREDN Documentation, Release 3.19.3.0 Version 3.20.3.0 Esta documentación está compuesta de diferentes secciones, las cuales se muestran en el panel de navegación. • La Guía de inicio recorre el proceso de configuración de un nodo radio de AREDN® como parte de una red mallada. • La Guía de diseño de red proporciona información general y consejos para planificar y desplegar una red mallada de forma robusta. • La Guía de aplicaciones y servicios analiza los tipos de programas o servicios que pueden ser utilizados a través de la red mallada.
    [Show full text]
  • Sendmail Evolution: 8.10 and Beyond
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference Monterey, California, USA, June 6–11, 1999 Sendmail Evolution: 8.10 and Beyond Gregory Neil Shapiro and Eric Allman Sendmail, Inc. © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Sendmail Evolution: 8.10 and Beyond Gregory Neil Shapiro [email protected] Eric Allman [email protected] Sendmail, Inc. 6603 Shellmound Street Emeryville,California 94608 ABSTRACT SendmailTM has been the de facto mail transfer agent implementation since the dawn of the Internet. Today, sendmail development is still drivenbyacontinually changing set of network requirements and user demands. Lately,two new driving forces have also contributed to sendmail development. First, as more open source mail transfer agents, such as Exim and Postfix,become available, a newfriendly competition has developed in which the authors of the various MTAs share their ideas via open source and help to advance open standards as opposed to advancing their own particular implementation. Second, a new“hybrid” company, Sendmail, Inc., has been created to offer commercial versions of the open source software while continuing to fuel open source development.
    [Show full text]
  • Investigating the Leakage of Sensitive Personal and Organisational Information in Email Headers
    Investigating the leakage of sensitive personal and organisational information in email headers Jason R. C. Nurse∗, Arnau Erola, Michael Goldsmith, and Sadie Creese Cyber Security Centre, Department of Computer Science, University of Oxford. Abstract Email is undoubtedly the most used communications mechanism in society today. Within business alone, it is estimated that 100 billion emails are sent and received daily across the world. While the security and privacy of email has been of concern to enterprises and individuals for decades, this has predominately been focused on protecting against malicious content in incoming emails and explicit data exfiltration, rather than inadvertent leaks in outgoing emails. In this paper, we consider this topic of outgoing emails and unintentional information leakage to better appreciate the security and privacy concerns related to the simple activity of sending an email. Specifically, our research seeks to investigate the extent to which potentially sensitive information could be leaked, in even blank emails, by considering the metadata that is a natural part of email headers. Through findings from a user-based experiment, we demonstrate that there is a noteworthy level of exposure of organisational and personal identity information, much of which can be further used by an attacker for reconnais- sance or develop a more targeted and sophisticated attack. Keywords: Email analysis, Information leakage, Digital forensics, Unintentional information ex- posure, Attack reconnaissance, Security and privacy risks 1 Introduction For enterprises and individuals alike, the security and privacy of applications, systems and data is a crucial concern. Recent reports and the spate of successful breaches (e.g., at Target, JP Morgan and others [2, 11]) highlight the range of attacks being launched and the lengths to which criminals are willing to go to achieve their malevolent goals.
    [Show full text]
  • Evaluierung Von Groupware-Systemen Für Den Einsatz in Der Abteilung Technische Infrastruktur (ATIS)
    Universität Karlsruhe (TH) Fakultät für Informatik Institut für Telematik Cooperation & Management Evaluierung von Groupware-Systemen für den Einsatz in der Abteilung technische Infrastruktur (ATIS) Studienarbeit von Botzenhart Stefan Verantwortlicher Betreuer: Prof. Dr. Sebastian Abeck Betreuender Mitarbeiter: Dipl. Math. Klaus Scheibenberger Bearbeitungszeit: 01. Mai 2006 – 17. November 2006 Universität Karlsruhe (TH) ⋅ Institut für Telematik ⋅ Geb. 20.20 ⋅ Zirkel 2 ⋅ 76128 Karlsruhe Ehrenwörtliche Erklärung iii Ehrenwörtliche Erklärung Ich erkläre hiermit, die vorliegende Arbeit selbstständig verfasst und keine anderen als die angegebenen Quellen und Hilfsmittel verwendet zu haben. Karlsruhe, den 17.November 2006 Stefan Botzenhart Forschungsgruppe C&M Inhaltsverzeichnis v Inhaltsverzeichnis 1 Einführung ................................................................................................................ 6 1.1 Begriff Groupware, Szenario............................................................................ 6 1.2 Istzustand in der ATIS...................................................................................... 6 1.3 Sollzustand in der ATIS.................................................................................... 7 1.4 Ziel der Arbeit................................................................................................... 7 1.5 Aufbau und Organisation.................................................................................. 8 2 Analyse der Anforderungen...................................................................................
    [Show full text]