Leveraging DMARC as a Key Component of a Comprehensive Fraud Program Summary: Fraudulent messages and orchestrated attacks have eroded trust in email as a communications medium to such an extent that it is nearly impossible for major financial institutions, retailers and marketers to authentically reach their customers. Fortunately, the DMARC draft specification, created by a group of leading email providers, shows great promise for securing email channels, reducing the amount of spoofed email that gets received and improving threat intelligence and visibility around targeted attacks. This white paper explains the DMARC draft specification, and how to leverage it to reduce phishing attacks and strengthen customer trust in your email communication. < Table of Contents 1 2 3 4 5 6 Why Email is Worth Saving Email as a global communications medium has become so polluted that companies and individuals are moving to other channels such as social media to regain the ability to have a trusted conversation. But email is worth saving because it is still the most efficient and effective way to communicate with customers and other businesses. An Introduction to DMARC While email authentication is not a new idea, DMARC is a technical specification that has been developed by leading email providers to deliver an Internet-scale, federated policy, authentication, and enforcement framework for trusted email delivery. As such, it has the potential to transform email security as we know it. Why DMARC Matters, and Who Can Benefit DMARC's rapid and widespread adoption is finally standardizing efforts to verify that emails are actually from who they say they're from. This has positive implications for any organization that seeks to securely correspond and interact with their customers, which is to say, all organizations. Challenges with Standalone DMARC Solutions DMARC is a huge step forward for message authentication, but there are other email security issues that DMARC doesn't address. Standalone DMARC solutions are often inefficient, incomplete and expensive, since they only solve a portion of the fraud problems plaguing the email channel. A much more comprehensive anti-fraud strategy is necessary to protect your brand and customers. DMARC Compass ™ with Detect Monitoring Service: Compliance and Attack Takedown DMARC Compass from Easy Solutions directly integrates DMARC reporting data to quantify email abuse, facilitate attack deactivation, and to protect users. When combined with Detect Monitoring Service (DMS), your organization receives phishing attack takedowns, compromised card monitoring, brand intelligence and much more to give you a truly comprehensive anti-phishing and fraud protection solution. About Easy Solutions Easy Solutions is the only security vendor focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. 2 Why Email is Worth Saving 1 Phishing attacks are wearing away trust in the email channel as a means to communicate with customers, and are often at the root of major data breaches. To cite just one example, the Target breach was set in motion by a phishing attack launched against a third-party vendor that worked with Target, starting the chain of events that led to the theft of the credit cards and personal information of 110 million customers. And that's just the beginning of the problem; 100 billion spam e-mails are sent around the world every day,1 resulting in over 2 billion dollars a year in losses due to phishing attacks.2 Email as a means to correspond globally has become so corrupted that organizations are starting to move their communications to other channels like social media, in the hopes that they can once again regain the ability to have a trusted conversation. This just opens up a new set of risks and privacy concerns. In fact, we are already seeing phishing attacks being launched through social media and mobile applications. Cybercriminals will always try attacks wherever potential victims might be lurking. Changing the communications channel only briefly postpones the new wave of attacks. So let's not declare that using email to communicate with customers and other businesses is dead just yet. Email is an overlooked hero of the global economy, a medium of communication that may not be glamorous but remains the best way to stay in contact. Facebook, Snapchat, Whatsapp, and other supposed email replacements are simply not adequate substitutes for personal business-to-customer communication and sensitive peer-to-peer messaging, let alone robust, secure communication between businesses. Email is worth saving and protecting because it remains the best way for companies to communicate with clients and other businesses. But something effective must still be done to stop phishing; over 120,000 phishing attacks were launched in the first half of 2014 alone.3 The Anti-Phishing Working Group reported that unique phishing attacks are launching at the highest level in five years, even with all of the varied security solutions that are available purporting to solve this problem. Emerging standards of email authentication and encryption offer the best hope yet for making email communication more secure. These are not new ideas, but the problem with most forms of email authentication that have been developed up until now is that they depend on non-technically savvy end users to make those systems function and keep them working. A system that has a chance of succeeding has to be intuitive or most email senders and receivers just won't use it. Fortunately, an Internet-scale, federated policy, authentication and enforcement framework for trusted email delivery is already available, and the skeleton of this system is already deployed and supported by the biggest email receivers on the planet. It's called DMARC, and it has the potential to greatly reduce the phishing attacks plaguing the email channel. ¹ http://www.esecurityplanet.com/network-security/almost-100-billion-spam-e-mails-sent-daily-in-q1-2013.html ² http://www.mcafee.com/sg/resources/reports/rp-economic-impact-cybercrime.pdf ³ http://www.cbsnews.com/news/apple-users-targeted-in-phishing-scams/ 3 An Introduction to DMARC 2 DMARC stands for Domain-based Message Authentication, Reporting & Conformance, and it is an emerging email delivery standard that improves trust between email senders and receivers while also providing unparalleled external email visibility. DMARC was developed by a group of primary email receivers such as Gmail, Hotmail, Yahoo and others in an effort to restore trust to the email sender/receiver relationship by reducing email threats such as phishing, brand impersonation and email-delivered malware. DMARC relies on senders to provide a method for authenticating messages, and for receivers to check this authentication and follow a specific enforcement policy provided by the sender to accept, quarantine or reject each message. All of this is done in a completely invisible way to the people on either end. DMARC relies on two other standards, SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail), to allow senders to sign their outbound email and announce authorized email servers on each domain. SPF is an open standard that prevents the impersonation of email senders through a record placed on a sender's domain's public DNS servers. Receiving mail exchangers can check that incoming mail being sent from a host authorized by the domain's administrators, and decide what to do with those messages that fail SPF validation. This standard lowers spam and messages with forged sender addresses, because those kinds of illegitimate messages will get caught in spam filters that check the SPF record. In this way, an SPF-protected domain is less likely to be blacklisted by a spam filter and legitimate messages from that domain are more likely to get through. 4 2 An Introduction to DMARC DKIM is just like SPF, in that its purpose is to allow email senders and receivers to verify the authenticity of a message. But in the case of DKIM, every email sent from a legitimate mail server includes a digital signature in the header. This digital signature can then be validated by the recipient through use of the signer's public key in their DNS record. While SPF validates a message's envelope (i.e. the SMTP bounce address or the header that says who a message is from), DKIM signs a message's contents, including the headers. SPF validates the sender's address compared to the source server, and publishes a record that authorizes the IP addresses that are permitted to send on behalf of a domain, while DKIM validates the message header and body through cryptography. Essentially, DMARC leverages both of these widely used mechanisms to create a transparent handshake between the email and sender via DMARC policy records presented as DNS TXT records. If a received email fails both DKIM and SPF under a DMARC policy, the sender will then be asked what to do with the mail (accept, quarantine or reject it). In addition to unifying policy around SPF and DKIM, DMARC also provides visibility into the email channel, so that organizations can see what attacks are being launched and assess fraud patterns. DMARC-compliant mailbox providers give feedback about every message that can't be authenticated in the form of two different reports: Aggregate (RUA) and Failure (RUF) reports. The RUA report contains consolidated Number of email messages spoofing PayPal that were rejected information about all emails processed by destination servers, during the 2013 holiday buying season thanks to DMARC arriving in an XML format, usually within a zip file. RUA reports monitoring. include information about the IP address of the sending server, the sender domain, the number of sent messages, whether the messages passed DKIM and SPF policies, and what action was taken with the message after it passed or failed. The RUF is only sent after a failed email is detected, with detailed information about the message including the contents of the body of the email and the phishing domains its links contain, in an .msg attachment. RUA reports are always sent, but some email providers decide not to send RUF reports. These two reports provide visibility into the current health of your email channel. 25,000,000 RUA- Report s Fraudulent email: Genuine email: The DMARC standard has remarkable promise, because when it is fully standardized and globally deployed, it can fix a fundamental flaw in the technology underpinning the Internet: the easy anonymity that allows cybercriminals to impersonate other entities to launch attacks. While it is not an official Internet protocol yet, DMARC has already shown so much progress and potential in cutting down phishing and spam that it is already supported by 70% of all email mailboxes around the world, about 2 billion in total, including the planet's top 10 email receivers. A number of prominent brands have already seen email abuse drop by more than 50% when DMARC is deployed. ⁴ ⁴ http://www.dmarc.org/ 5 Why DMARC Matters 3 Counterfeit emails enable the perpetration of phishing, malware and spam. Established brands are often the lure used to trick unsuspecting customers. If a brand suffers numerous impersonation attacks, its communications with customers won't be trusted. Brands need to protect their businesses and clients with aggressive attempts to reduce spam, phishing and spoofing that leverage their trademarks and name. The time and resources spent on brand awareness and engagement through email marketing can be undone in an instant with a successful, massive phishing incident; a recent poll found that 71% of U.S. adults with bank accounts would be at least somewhat likely to change banks if they became a victim of an online banking fraud attack at their present bank, to cite just one example.⁵ DMARC offers organizations a way to vastly reduce the possibility of falling victim to such an attack. “We saw a reduction of 5000% in the amount of spoofing email claiming to be from a major corporation during their busiest season after implementing a DMARC reject policy” – John RaeGrant, Gmail Product Manager DMARC is important because previous efforts to verify that emails were authentic were not standardized, and tended to try and authenticate in isolation from every other part of the email chain. Receivers made decisions about how to evaluate email authenticity on their own, and domain owners could never be sure if receivers were getting messages from imposters. DMARC solves this problem of many uncoordinated efforts to prove that emails are genuine by bringing them all together under one standard that all email senders and receivers are invited to use. A reliable way to determine real messages from fake ones is taking shape, which will make the email ecosystem a little bit safer in the near future and potentially a whole lot safer in the long term, improving the quality of the email communication that is so necessary for businesses and their marketing teams to thrive. This means that any organization that relies on or sees value in a trusted email-based communications channel with their customers stands to benefit from DMARC's implementation. A few examples are illustrated in more detail below: Banks – If your customers cannot figure out which emails are actually from your financial institution, and which are from phishers, this dilutes customer confidence in your brand. This is not just an academic question. In the case of Experi-Metal, Inc. v. Comerica Bank in 2011, an employee from a Michigan metal works company clicked on a phishing email that was supposedly from Comerica bank, of which the company was a customer. Following a link in the email, the employee entered their credentials to enter the banking site, which was actually a fake site put up by cybercriminals. As a result, the cybercriminals were able to gain access to the company's accounts with the bank, and fraudulent transfers totaling more than half a million dollars were made and never recovered. Courts later held Comerica liable for those losses, and now that a legal precedent has been set, there's no telling which bank may be next. DMARC can make sure the vast majority of fraudulent emails never reach unsuspecting customers in the first place. Retailers – Recent breaches at a number of prominent retailers, including Target, Neiman Marcus and Home Depot, have shown vulnerabilities that exist at various points along the payments processing chain. But a breach is not the end of the damage that retailers and their customers suffer. Information stolen in these breaches is used to launch phishing attacks against the victim, oftentimes with the brand of the retailer at which the breach happened prominently displayed, offering help to mitigate the damage. But it's not just companies that have suffered a breach that could be affected. Fake emails leveraging retailer brands offer discounts, promotions, coupons, promises of salacious content, and any other incentive they can think of to goad users into clicking on what is really a phishing message. By the time the customer and retailer realize what has happened, cybercriminals have claimed another victim and the retailer's ability to engage customers through email has been battered. DMARC can maintain retailer brand reputations and their customers by shutting down these kinds of emails before they ever arrive in an inbox. ⁵ http://blogs.wsj.com/riskandcompliance/2013/08/23/survey-roundup-malware-resurfaces-mobile-app-privacy-worries/ 6 Why DMARC Matters Marketers – Ever wonder why your email marketing campaign doesn't seem to be showing any results? You've spent the money, collected the email addresses, and crafted a compelling message, but nothing seems to be coming from it. Before DMARC, marketers had little idea of the level of risk they might be exposed to from phishing or spoofed emails. But with all the data DMARC provides about email authentication, marketers can be more proactive in singling out and stopping attacks while making sure that their legitimate messages are the ones their targeted customers actually open. Spam emails don't even get delivered, and open rates for your email campaigns will go up as your customers will click on fewer spoofed emails and have more trust in the emails your organization actually does send. Bottom line: if you communicate with your clients over email, DMARC provides a clear path to being able to preserve a monopoly on emails being sent in your organization's name, so that the trust crucial to making thcat ommunication effective is protected. 7 3 Challenges with Standalone DMARC Solutions 4 Contracting a security provider to help implement a DMARC policy can be helpful, especially during the process to calibrate compliance with the policy. The process to organize internal email flows to the point where an organization can be confident that its DMARC policy is only deleting unauthorized messages can take from one to two years for a large company, and adjusting an effective DMARC policy requires a lot of precision. DMARC compliance encourages a number of excellent best practices regarding hygienic and trusted email flows, including increased use of email signing and stronger domain management processes. The value of any DMARC analytics solution is that it provides clients the tools to further adopt DMARC, reach 100% compliance and eventually move to what is called “p=reject”, where any email sent in the organization's name and domain can be safely rejected without having to worry about genuine communications being rejected by accident, and permitting a consistent policy to be applied to unauthenticated messages. But the benefit of a standalone DMARC tool purchased just for this process diminishes sharply once full compliance is reached. When an organization adopts a policy that can tell the global Internet to delete all unauthenticated emails, the value of a standalone DMARC tool that offers no further benefits will be called into question, especially if the cost of such a tool is high. DMARC is not a complete solution to the problem of email-based fraud and phishing attacks. One issue that DMARC doesn't solve is that cybercriminals could conceivably create domain names that are similar to the target they are attempting to leverage in an attack, so-called “sister” or “cousin” domains. The deceitful domains could even be DMARC compliant, ironically enough. But because they are not attempting to spoof the full original name of the organization, DMARC can't catch them. And if DMARC can't catch them, a tool that only offers DMARC compliance can't stop such attacks either, and your organization can remain vulnerable even while paying an exorbitant price for a tool that just puts a dent in the amount of attacks. Another issue is full adoption by all email providers and potential phishing targets. It is unclear when smaller banks and brands on the sending side of the equation will comply, or when smaller receiving organizations will do the same. In the meantime, DMARC can't authenticate what non-compliant organizations won't allow it to see. There is no way for a DMARC policy that is not universally adopted to block fraudulent emails unless sending and receiving organizations make the effort to identify which messages should be rejected. In addition, there is no standardized way to respond to DMARC reporting; as noted earlier, compliant organizations may monitor, quarantine or reject emails, and many organizations worried about rejecting legitimate messages have not been able to calibrate their policies confidently enough to go the full “p=reject” route. That means fraudulent messages can continue to cause trouble, even on DMARC compliant domains. Standalone DMARC solutions are often inefficient, incomplete and expensive. DMARC compliance is much more valuable as a feature of a comprehensive threat detection and mitigation approach. DMARC will not be a cure-all that eliminates all attacks, and when attacks still get through, a standalone DMARC tool will have nothing else to offer. A more holistic security strategy can comprehensively fight email fraud and phishing attacks however they are delivered. It is helpful to think of fraud as a concept in three separate stages of its life cycle. The first stage is planning, where a cybercriminal begins searching for vulnerabilities in an organization's infrastructure to exploit. Then there is the launching stage, where a criminal is able to infect an unsuspecting user with malware or steals user passwords for access to sensitive information and accounts. Finally, a typical attack ends with the cashing stage, when a cybercriminal is actually able to remove money from an account. 8 Challenges with Standalone DMARC Solutions 4 If phishing emails are arriving to your customers' inboxes, then cybercriminals are already well on their way to accomplishing the second phase of the attack cycle. Your customers are only an ill-advised click away from allowing their devices to be infected. DMARC allows you to remove emails from the Internet before your customers receive them; ultimately stopping attacks at the planning stages. But as was mentioned before, DMARC can only stop attacks that attempt to spoof your domains. Phishing attacks using sister domains, or sent through social networks and mobile application stores will still get through to your end users even if your p=reject policy is calibrated perfectly to stop spoofed domains from sending emails in your organization's name. Rudimentary DMARC solutions have no way to stop these kinds of attacks, and are only solving a small, if important, part of the phishing and fraud equation. DMARC is great as a control that can reduce the number of attacks delivered to your customers, but most solutions bolt on thirdparty threat mitigation, and can't handle it strategically. But that's not something you can tell your customers if they get phished using a spoofed domain outside of DMARC's protective abilities. DMARC is just the beginning of getting control of phishing attacks targeting your organization; it must be complemented by other multi-layered security strategies that stop attacks that DMARC is not designed to deal with. 9 DMARC CompassTM with Detect Monitoring Service: Compliance and Attack Takedown 5 DMARC Compass gives your organization the power to gain visibility into all message flows, proactively filtering attacks and restoring trust in your email channel. Your organization can see analytics on all sent email associated with your domain using the intuitive DMARC Compass portal, which lets you follow up on the results of SPF and DKIM validation tests as they are happening and provides an array of dynamic charts and graphs that give you an instant snapshot of your current DMARC compliance. With the data-driven DMARC Compass readiness workflow, you can accurately measure the gaps that your organization must still fill to get to full DMARC deployment, identify any configuration errors, see which domains sending emails have the most authentication problems and stop any unauthorized 3rd-party vendors that might be sending emails on your behalf. Integrated policy generation tools let you quickly and easily migrate to global blocking of fraudulent emails and make sure that your customers only receive genuine messages from your brand. There is no new hardware or software to install since DMARC Compass runs entirely in the cloud, and it can go live start blocking attacks immediately. Once DMARC Compass is in place, you will be able to publish a DMARC policy that can parse RUA and RUF reports on a daily basis, leading to a dramatic reduction in attacks to mitigate and greatly reduced attack takedown times. How does the calibration of a DMARC policy developed by DMARC Compass work so that your organization is able to block spoofed emails and enable the sending and receiving of legitimate messages? Easy Solutions initially recommends the deployment of a DMARC “Monitor” policy when first testing the waters of the standard. This policy only provides reporting and doesn't have any receiver-side enforcement, which guarantees no interruption of your mail flow, but still allows data to still be collected from participating receivers. DMARC Compass is still fully operational without 100% DKIM deployment and without SPF, and Easy Solutions recommends that DMARC be deployed first in order to gain complete visibility into the state of your internal DKIM and SPF policies. As the data shows that legitimate traffic is passing authentication checks, organizations can change their policy to request that failing messages be quarantined. Then, as organizations grow confident that no legitimate messages are being incorrectly quarantined, they can move to a "reject" policy, with full DMARC readiness and 100% adoption of SPF and DKIM for all internal and 3rd party senders. Spam, malware, and phishing attacks are eliminate Your Organization’s Email 10 Only genuine messages arriving to your customers on: Yahoo, Outlook, Gmail, Hotmail, LinkedIn, Facebook and more DMARC CompassTM with Detect Monitoring Service: Compliance and Attack Takedown 5 DMARC Compass combined with our fraud monitoring solution Detect Monitoring Service (DMS), goes several steps beyond any other DMARC providers, stopping a wider range of attacks. Other DMARC solutions provide reporting, but DMS offers you the ability to glean intelligence from that reporting and use it to shut down attacks. Essentially, DMARC Compass limits the attacks delivered, and DMS cleans up the ones that still manage to sneak through. DMARC Compass with DMS provides complete visibility into email streams, with real time attack monitoring, reporting and takedown, something other DMARC solutions are not equipped to deliver. Unifying the compliance of DMARC Compass with the proactive threat intelligence of DMS gives your organization a truly comprehensive way to combat fraud against your brand. 11 DMARC CompassTM with Detect Monitoring Service: Compliance and Attack Takedown 5 Additionally, when DMARC Compass parses RUF and RUA reports, which include detailed information about fraudulent emails and/or phishing attacks, they are sent to the DMS platform for analysis and response. If phishing sites are found in these emails, they are taken down. This means that DMARC Compass can even stop attacks that DMARC compliance checks miss, either because they are not spoofing a protected domain or because they are sent to mailboxes that are not using a DMARC policy. In fact, increased use of maliciously registered domains and subdomains is one of the main reasons that phishing attacks are on the rise.⁶ By taking phishing sites off the Internet entirely, DMS gives DMARC Compass a set of tools to pull out phishing attacks by the root and stop attacks that the most properly-adjusted DMARC policies are not meant to shut down. DMS can take down phishing attacks from any domain, not just those covered by DMARC, in an average of 3.6 hours, with attacks shut down proactively 76% of the time, meaning before our customers or their clients even knew an attack was happening. The DMS portal also provides advanced analytics to help clients visualize DMARC aggregate reporting data and work towards full DMARC compliance. No other DMARC platform or vendor can deliver monitoring of all phishing analytics and complete attack takedown in one place. DMARC compliance and attack takedown are just the beginning of the fraud prevention capabilities that DMS can provide. DMS also contains a number of other unique features for stopping cross-channel fraud, including: Black Market Monitoring – DMS keeps tabs on black markets where stolen credit and debit card information and credentials are sold, so that organizations have a head start protecting customers after retail breaches. Once we recover this information, it is immediately relayed to our clients so that they can proactively safeguard their customers' accounts from possible fraud. By preemptively detecting cards that have been stolen but not yet used by fraudsters, DMS makes sure that banks can pinpoint the cards they need to reissue and avoid the customer losses that happen when they are cloned. There is very little banks can do to prevent these breaches, since they happen on infrastructure out of banks' control, but DMS can give your organization the tools to insulate your assets from the fallout and reputational damage that usually accompany such breaches. Brand Intelligence – Convert brand mentions into strong fraud intelligence. DMS goes beyond phishing, pharming and malware detection and deactivation, also monitoring mentions of your brand across thousands of social media platforms, blogs and mobile app stores, giving your business an easy way to comply with FFIEC guidelines for managing risk in social media. DMS also monitors for malicious sister domains, in addition to identifying and stopping deceitful activity that aims to goad your customers into clicking on fraudulent websites or download malicious attachments. By constantly scanning all of these potential fraud environments, you can be sure that anytime your brand is mentioned you will be aware of it first. Collaborative Protection – When DMS is integrated with Detect Safe Browsing (DSB), Easy Solutions' secure navigation platform, it offers collaborative protection that safeguards your entire customer population. Information collected from malware detected on customer devices running the DSB client can then be used to shut down the sites spreading the malware using DMS. It is not a matter of if your brand will be phished, but when. If you are not protecting your brand with every available tool at your disposal, you are inviting cybercriminals to phish it. While there is no doubt that the hackers will advance and come up with new social engineering schemes and methods to continue to perpetrate phishing attacks, DMARC has remarkable promise to shut many of them down. If and when it is fully standardized and deployed globally, it can fix an underlying defect in the technology that has underpinned the Internet from the very beginning to let anonymous hackers send spoofed emails from another person's domain. Opportunities like this do not come along very often, and it is up to the security community at large to rally behind this standard's adoption. Information security, online trust, and anti-fraud are all adversarial pursuits and, like American football, a game of inches. Any chance we get to complicate the efforts of our adversaries while simplifying ours -- making theirs more expensive and more time-consuming -- is a small victory in a long game. The compliance assistance offered by DMARC Compass is the first step on the road to making your organization a harder target for phishing and other email-based attacks, ensuring reliable risk management no matter how the fraud environment evolves. ⁶ http://docs.apwg.org/reports/APWG_Global_Phishing_Report_1H_2014.pdf 12 About Easy Solutions 6 Easy Solutions is a leading security provider focused on the comprehensive detection and prevention of electronic fraud across all devices, channels and clouds. Our products range from anti-phishing and secure browsing to multifactor authentication and transaction anomaly detection, offering a one-stop shop for multiple fraud prevention services. The online activities of over 60 million customers of more than 220 leading financial services companies, security firms, retailers, airlines and other entities in the United States and abroad are protected by Easy Solutions fraud prevention systems. Easy Solutions is a proud member of such key security industry organizations as the Anti-Phishing Working Group (APWG), the American Bankers Association (ABA) the Bank Administration Institute (BAI), the FIDO (Fast Identity Online) Alliance and the Florida Bankers Association (FBA). For more information, visit http://www.easysol.net or follow us on Twitter @goeasysol Latin America – Tel. +57 1- 7425570 Headquarters – Tel. +1-866-5244782 APAC – Tel. ++81-90-8349-4073 EMEA –Tel. +44 (0) 77917-798861 info@easysol.net Easy Solutions, Inc. All rights reserved worldwide. Easy Solutions®, the Easy Solutions® logo, DetectID, DetectID in the Cloud, DetectID in the Cloud for SugarCRM , DetecTA, DetectCA, DetectID Web Authenticator, Total Fraud Protection, Detect Safe Browsing, Detect ATM, Detect Monitoring Service, Detect Vulnerability Scanning Service, Detect Social Engineering Assessment, Protect Your Business and Detect Professional Services are either registered trademarks or trademarks of Easy Solutions, Inc. All other trademarks are property of their respectiveowners. Specificationsand contentin this document are subject to change without notice. 13