The Essurance System
The metaSwarm Essurance system provides personal and commercial information assurance. It promotes Internet trust by providing certainty—certainty that a message or website originated from the authorized sender entity, certainty that it is delivered or posted unaltered, and certainty that it is a message or website of an appropriate content type. In addition, it provides a proactive mechanism for discovering brand hijacking attempts.
The Essurance system also provides information about a message or website that enables a user, whether an individual or a corporation, to make informed decisions with respect to that message or website.
metaSwarm believes that the only effective way to build Internet trust is through automation. The originators of spam, fraudulent (phishing) messages, fraudulent websites (pharms), and brand hijackers use automation to reach millions of people cheaply. Only a small percentage of people need to fall victim to spam and phishing attacks for such attacks to be profitable, and thereby encourage increasing numbers of attacks.
For the same reason that Internet abuse is so effective that it continues to grow, so will the metaSwarm Essurance system be effective against it—that reason is automation.
Essurance Automated Protection
With its ground breaking technologies, the MetaSwarm Essurance system has begun to build a suite of products that effectively protect users of all levels from the Internet abuse that exists today—and that may exist tomorrow.
Essurance validation functions are algorithmic, so they provide automated protection that can stop phishing and pharming attacks at their first appearance.
The Essurance system is language-independent, so it can process messages in any language. Also, because Essurance monitoring and filtering processes are algorithmic, no humans are involved in any message classification or categorization—so message privacy is maintained.
Once users set their monitoring and filtering preferences, the Essurance system automatically processes messages and monitors websites accordingly.
The analysis tools can be automated to search continually, for example, for trademark infringements, phishing attacks, or for a specific torrent file distribution. They also provide automated notification that enable human resources to follow up on particular search results.