IronPort Security Products
|
|
- Alfred McDonald
- 6 years ago
- Views:
Transcription
1 IronPort Security Products PROTECTING OVER 350 MILLION BOXES WORLDWIDE Mirko Schneider, IronPort Systems Soft-Tronik Security Day, Bratislava June 6 th 2007 I need to say that the appliance is the best system that I ve been testing for our magazine since I need to find a way to bring it out objectively. Otherwise nobody will believe me... (an editor of a German IT magazine, Feb 2006)
2 Who is IronPort? Founded by pioneers from in 2000 from Hotmail, ListBot, Yahoo idea: building the fastest and strongest gateway appliance based in USA, California, Silicon Valley Investors: General Motors, Chevron-Texaco, NTT, Menlo Ventures, Allegis Capital raised over 90 million USD Worldwide 500+ employees 75 in Europe (UK, Germany, Sweden, France, Spain, Italy) revenue 2005: ~ 70m USD, 2006: ~125m USD With Soft-Tronik in CZ/SK since 2006
3 Hot News: CISCO acquires IronPort
4 The Principles of Industry Leadership Analyst Leadership Recognized as the leader by Gartner, Meta, Radicati, IDC, Forrester, Bloor Customer Leadership 52 of the World s Largest 100 Companies 20+% of Global of the 15 largest ISPs Technology Leadership First with custom, high performance MTA First with Reputation Filtering First with Virus Outbreak Filters Global Leadership Operations in 35 countries, 600+ partners IronPort infrastructure currently operating in 75+ countries
5
6 Success in Czech Republic Czech News Agency (ČTK) - customer since December a case study available soon! UPC Czech Republic - customer since December 2006 E.ON Czech Republic - customer since December 2006 EZPADA Czech Republic - customer since December 2006 Air Navigation Services (RLP) - customer since March 2007
7 IronPort: Technology Leadership Magic Quadrant for Security Boundary 2006 Source: Gartner RAS Core Research You need that competitive analysis? Mail me at
8 IronPort gets stronger! After PostX acquisition announcement Nov 06: Regard this acquisition as a positive enhancement that improves IronPort's competitive position... However, consider switching to IronPort at the next technology "refresh" to reduce administration overhead and costs... After CISCO acquisition announcement Jan 07: Place Cisco/IronPort at the top of your shortlists...
9 IronPort Gateway Security Products IronPort SenderBase Internet Security Appliance WEB Security Appliance Security MANAGEMENT Appliance
10 IronPort Security Appliances High Performance Security Appliances Stopping Spam, Viruses, and Enforcing Compliance IronPort X1050 IronPort C100 IronPort C350/C650
11 Product Consolidation at the Network Perimeter For Security, Reliability and Lower Maintenance Before IronPort After IronPort Internet Internet Firewall Firewall MTAs Anti-Spam Anti-Virus Policy Enforcement IronPort Security Appliance Mail Routing Groupware Groupware Users Users
12 IronPort Architecture for Multi-Layered Security MANAGEMENT TOOLS SPAM DEFENSE VIRUS DEFENSE POLICY ENFORCEMENT AUTHENTICATION THE IRONPORT ASYNCOS PLATFORM
13 IronPort AsyncOS Unmatched Scalability and Security MANAGEMENT TOOLS SPAM DEFENSE VIRUS DEFENSE POLICY ENFORCEMENT AUTHENTICATION THE IRONPORT ASYNCOS PLATFORM AsyncOS scalable and secure OS optimized for messaging Advanced Controls protect reputation and downstream systems Standards-based Integration replaces legacy systems with ease
14 IronPort AsyncOS Revolutionary Platform Traditional Gateways And Other Appliances IronPort Security Appliance 200 Incoming/Outgoing Connections Low Performance/ DoS Potential 10,000 Incoming/Outgoing Connections High Performance/ Sure Delivery Single Queue For all Destinations Queue Backup Delays All Mail Per-Destination Queues Fault-Tolerance and Custom Control
15 Advanced Controls Only Available from IronPort Destination Controls Virtual Gateway Technology? Internet New Company Bounces Internet Protect Your Groupware Servers Rate Limit Mail Sent Per Destination Enforce TLS Encryption Per- Destination Safeguard Your Reputation Send Different Types of Mail Via Separate IPs IronPort Patent Pending Technology
16 Multi-layer Spam Defense Best of Breed MANAGEMENT TOOLS SPAM DEFENSE VIRUS DEFENSE POLICY ENFORCEMENT AUTHENTICATION THE IRONPORT ASYNCOS PLATFORM IronPort Reputation Filters the outer layer defense IronPort Anti-Spam - stops the broadest array of threats spam, phishing, fraud
17 Spam volumes grow 70 Average Daily Spam Volume (billions msgs) % Okt 05 Nov 05 Dez 05 Jan 06 Feb 06 Mrz 06 Apr 06 Mai 06 Jun 06 Jul 06 Aug 06 Sep 06 Okt 06
18 Image Spam Explodes % Spam with an Embedded Image % % 0 Okt 05 Nov 05 Dez 05 Jan 06 Feb 06 Mrz 06 Apr 06 Mai 06 Jun 06 Jul 06 Aug 06 Sep 06 Okt 06
19 Spam Gets Sneakier Image Spam! 1. Polka dots 2. Slice & Dice
20 New Spam Attacks Spam Techniques Even More Difficult to Combat Image Spam 2.0 Attempts to mask itself as a legitimate picture by adding greeting card like border Inserts shapes such as rectangles and pies to spoof powerpoint / excel charts Wavy text more difficult for OCR technologies to decipher ASCII Art Based Spam uses a series of numbers to spell out a stock symbol numbers randomized in different order for each to evade signatures similar to image spam in that there are no actual words in the for anti-spam engines to key on
21
22 Multi-Layered Security Preventive + Reactive = Defense in Depth Preventive Layer + Reactive Layer blocks ~ 80% of spam Immediate Reaction to Threats Extremely High Performance Coarse Outer Layer Blocks or Rate Limits Adapts Over Time Computationally Intensive Fine-grained Inner Layer Delete or Quarantine
23 IronPort SenderBase Network Global Reach Yields Benchmark Accuracy The Dominant Force in Global and Web Traffic Monitoring Results in Accuracy and Advanced Protection Spam Caught by Reputation IronPort CipherTrust BorderWare 40% 50% 80% Network Reach (Contributing Networks) IronPort CipherTrust BorderWare 4,000 8, ,000 5B+ queries daily and Web parameters 25% of the World s Traffic Virus Protection Lead IronPort McAfee, Trend, Symantec, Sophos, CA, F-Secure 13 hours* * 6/2005 6/ outbreaks identified. Calculated as publicly published signatures from the listed vendors. Source: and August 6, 2006
24 IronPort SenderBase Data Makes the Difference 150 Parameters Complaint Reports Threat Prevention in Realtime Spam Traps Message Composition Data Global Volume Data URL Lists Compromised Host Lists A Broad Data Set Drives Accuracy SenderBase Data Data Analysis/ Security Modeling SenderBase Reputation Scores -10 to +10 Web Crawlers IP Blacklists & Whitelists Additional Data
25 IronPort Reputation Filters Stop 80% of Hostile Mail at the Door. Known good is delivered Reputation Filtering (preventive) Anti-Spam Engine (reactive) Suspicious is rate limited & spam filtered Incoming Mail Good, Bad, and Grey or Unknown Known bad is deleted/tagged Reputation Filters is a switch point IronPort uses identity & reputation to apply policy Sophisticated response to sophisticated threats
26 Reputation-Based Filtering: A Powerful Technique Beyond blacklisting a granular view of behavior Scores calculated in real-time Pre-configured policies applied dynamically
27 IronPort Reputation Filters Dell Case Study Dell s challenge: Dell currently receives 26M messages per day Only 1.5M are legitimate messages 68 existing gateways running Spam Assassin were not accurate IronPort solution: Reputation Filters block over 19M messages per day 5.5M messages per day scanned by anti-spam engine Replaced 68 servers with 8 IronPort C60s Accuracy of spam filtering increased 10x Servers consolidated by 70% Operating costs reduced by 75% IronPort has increased the quality and reliability of our network operations, while reducing our costs. -- Tim Helmsetetter Manager, Global Collaborative Systems Engineering and Service Management, DELL CORPORATION
28 Multi-Layered Security Preventive + Reactive = Defense in Depth Preventive Layer + Reactive Layer Immediate Reaction to Threats Extremely High Performance Coarse Outer Layer Blocks or Rate Limits Adapts Over Time Computationally Intensive Fine-grained Inner Layer Delete or Quarantine
29 IronPort AntiSpam Broadens the Context with Web Reputation Effectiveness TODAY Where? Web Reputation Where does the call to action take you? Who? Reputation Who is sending you this message? How? Message Structure How was this message constructed? Time What? Message Content What content is included in this message? Content filtering techniques alone are inadequate reputation systems improved protection Combating new attacks demands Web reputation
30 URL No attachment - Payload delivered via web
31 IronPort SenderBase Network Global Reach Yields Benchmark Accuracy The Dominant Force in Global and Web Traffic Monitoring Results in Accuracy and Advanced Protection Spam Caught by Reputation IronPort CipherTrust BorderWare 40% 50% 80% Network Reach (Contributing Networks) IronPort CipherTrust BorderWare 4,000 8, ,000 5B+ queries daily and Web parameters 25% of the World s Traffic Virus Protection Lead IronPort McAfee, Trend, Symantec, Sophos, CA, F-Secure 13 hours* * 6/2005 6/ outbreaks identified. Calculated as publicly published signatures from the listed vendors. Source: and August 6, 2006
32 Web Reputation Data Makes the Difference Parameters URL Blacklists URL Whitelists URL Categorization Data HTML Content Data URL Behavior Global Volume Data Domain Registrar Information Dynamic IP Addresses Compromised Host Lists Web Crawler Data Network Owners Known Threats URLs Offline data (F500, G2000 ) Web Site History SenderBase Data THREAT PREVENTION IN REALTIME Data Analysis/ Security Modeling Web Reputation Scores (WBRS) -10 to +10
33 IronPort Anti-Spam Customer Leadership Trusted Throughout the World Installed in over 20% of Fortune 100 Companies Deployed at over 2,000 customers in over 40 countries
34 IronPort Anti-Spam Press Reviews 2007 Technology of the Year: Best Anti-Spam Jan 2007 Competitors tested: Symantec, Microsoft, Mirapoint, ProofPoint easy setup excellent spam filtering no tuning necessary the fewest false positives of any solution tested Anti-Spam Bake-Off Winner Dec 2006 Competitors tested: CipherTrust, Borderware, Sophos, SonicWall The superiority of IronPort... seems abundantly clear We did not have to rescue a single legitimate message (IronPort) is the absolute must from this test
35 Multi-layer Virus Defense Best of Breed MANAGEMENT TOOLS SPAM DEFENSE VIRUS DEFENSE POLICY ENFORCEMENT AUTHENTICATION THE IRONPORT ASYNCOS PLATFORM IronPort Virus Outbreak Filters stop outbreaks 13 hours ahead of signatures Sophos Anti-Virus signature based solution with industry leading accuracy
36 IronPort Virus Outbreak Filters First Line of Defense Early Protection with IronPort Virus Outbreak Filters
37 Traditional AV Solutions Aren t Responding Quickly Enough... Mytob-HJ: Bagle-GT: Virus Volume First AV Signature Available Virus Volume First AV Signature Available :00 9:00 14:00 19:00 0:00 Tim e (GMT) 5:00 10:00 15:00 20:00 23:45 3:30 7:15 11:00 Tim e (GMT) 14:45 18:30 22:15 FeebsDI-Q: Kukudro-A: Virus Volume First AV Signature Available Virus Volume First AV Signature Available 19:00 22:45 2:30 6:15 10:00 Tim e (GMT) 13:45 17:30 21:15 9:30 10:20 11:10 12:00 12:50 Tim e (GMT) 13:40 14:30 15:20 Calculated as publicly published signatures from the following vendors: Sophos, Trend Micro, Computer Associates, F-Secure, Symantec and McAfee. If signature time is not available, first publicly published alert time is used.
38 IronPort SenderBase Network First, Biggest, Best Reputation System Global and Web Traffic Monitoring What is going on RIGHT NOW? Over 100,000 contributing networks Over 20M IP addresses tracked globally View into over 25% of traffic Over 150 parameters tracked
39 Introducing Virus Outbreak Filters Mytob-HJ: 32 hrs 57 mins Lead Time! Bagle-GT: 18 hrs 28 mins Lead Time! Virus Volume VOF Protection Starts First AV Signature Available Virus Volume VOF Protection Starts First AV Signature Available 4:00 9:00 14:00 19:00 0:00 Tim e (GMT) 5:00 10:00 15:00 20:00 23:45 3:30 7:15 11:00 Tim e (GMT) 14:45 18:30 22:15 FeebsDI-Q: 21 hrs 59 mins Lead Time! Kukudro-A: 3 hrs 38 mins Lead Time! Virus Volume VOF Protection Starts First AV Signature Available Virus Volume VOF Protection Starts First AV Signature Available 19:00 22:45 2:30 6:15 10:00 Tim e (GMT) 13:45 17:30 21:15 9:30 10:20 11:10 12:00 12:50 Tim e (GMT) 13:40 14:30 15:20 Calculated as publicly published signatures from the following vendors: Sophos, Trend Micro, Computer Associates, F-Secure, Symantec and McAfee. If signature time is not available, first publicly published alert time is used.
40 How IronPort Virus Outbreak Filters Work Dynamic Quarantine In Action Messages Scanned & Deleted T = 0 T = 5 mins T = 10 mins T = 8 hours zip (exe) files -zip (exe) files -Size 50 to 55 KB. zip (exe) files Size 50 to 55KB Price in the name file Release messages if signature update is in place preventive protection reactive protection
41 IronPort Virus Outbreak Filters Advantage Virus Name Date Virus Description Lead Time (hh:mm) Kukudro-A 6/27/06 Virus that spreads via zipped word document. 3:38 Feebs.AG 6/21/06 Arrives as an attachment claiming to be sent via "Protected service. 17:46 Troj/Stinx-W 6/15/06 IRC backdoor Trojan. 11:12 Yabe.G 5/16/06 Trojan that attempts to download further malicious code. 13:09 Bagle-GT 4/21/06 Installs backdoor and communicates via HTTP, thus bypassing firewall filters. Mytob-HJ 4/19/06 Turns off anti-virus applications of infected PC to avoid detection. 18:28 32:57 Nyxem-D (Kama Sutra) 1/16/06 Deletes most documents on third day of every month. 1:27 Looksky.G 1/6/06 Installs keystroke loggers onto infected PCs. 35:40 Average lead time* over 13 hours Outbreaks blocked * 175 outbreaks Total incremental protection*.over 94 days *June 2005 July Calculated as publicly published signatures from the following vendors: Sophos, Trend Micro, Computer * June Associates, 2005 July F-Secure, Symantec and McAfee. If signature time is not available, first publicly published alert time is used.
42 IronPort Outbreak Filters Protect G2000 Company From MyDoom.BB MyDoom Variant MyDoom.BB (February 15, 2005) G2000 Company Protected By IronPort s Virus Outbreak Filters IronPort Threat Level Raised to 3 And Protection Starts 18:08 GMT First Anti-virus Signature Published 22:54 GMT (Next Day) 28 hours 46 minutes 6503 files quarantined 17:00 18:00 19:00 20:00 21:00 22:00 23:00 24:00 1:00 2:00 3:00 4:00 5:00 6:00 7:00 8:00 9:00 10:00 11:00 12:00 13:00 14:00 20:00 21:00 22:00 23:00 24:00 February 15, 2005 February 16, 2005 Note: All times shown are in GMT $65K $200/desktop, 5% infected
43 IronPort Policy Enforcement Inbound/Outbound Content Filtering for Compliance MANAGEMENT TOOLS SPAM DEFENSE VIRUS DEFENSE POLICY ENFORCEMENT AUTHENTICATION THE IRONPORT ASYNCOS PLATFORM Flexible Policy Engine from Blocking Attachments to Enforcing Regulatory Compliance Compliance Solutions and Encryption keep communications private and secure
44 Flexible Policy Engine From Blocking Attachments to Enforcing Compliance Graphical Representation of Per-Recipient Policies LDAP Integration Reduces Need for Repetitive Modifications Customizable Notification Templates Robust Conditions and Actions
45 Compliance Solutions Next Generation Compliance Filters Pre-Packaged Policies and Lexicons for Common Regulations Multi-Category Pattern Matching Significantly Reduces False Positives High Performance TLS Encryption Configured Keeps Business Communications Private PRE-PACKAGED LEXICONS
46 Hot news: Teaming Up To Fix
47 IronPort Acquires PostX Global Reach And Innovative Technology The Dominant Force in Global and Web Security Combined with the leader in Encryption 8/10 of the world s largest ISPs 42/100 of the world s largest corporations 25% of the World s Traffic 450 employees #1 World s Largest Bank #1 F500 Largest Insurance Company #1 World s Largest Credit Card Company 60 employees
48 Encryption References
49 Authentication Superior Security and Identity Protection MANAGEMENT TOOLS SPAM DEFENSE VIRUS DEFENSE POLICY ENFORCEMENT AUTHENTICATION THE IRONPORT ASYNCOS PLATFORM DomainKey Signing - establishes and protects your identity on the Internet IronPort Bounce Verification protects from misdirected bounce attacks Directory Harvest Attack Prevention blocks attempts to steal directory information
50 The Misdirected Bounce Threat Makes Up 9% of all Internet * Misdirected Bounces Not Discernible From Legitimate Bounces Misdirected Bounces Not Discernible From End User Confusion: Legitimate Bounces Why did I receive this message? *Source: IronPort Threat Operations Center, INTERNET TRAFFIC EMERGENCY: SPAM BOUNCE MESSAGES ARE COMPROMISING NETWORKS, April 2006.
51 The Misdirected Bounce Threat Makes Up 9% of all Internet * Zombies Recipients: joe1@enterprise.com, jane88@enterprise.com Incoming Gateway Sender: billing@yourcompany.com RETURN TO SENDER yourcompany.com Millions of Misdirected Bounces Outgoing Gateway More than 55% of of F500s have experienced disruption of of service or or a total denial of of service due to to misdirected bounces *Source: IronPort Threat Operations Center, INTERNET TRAFFIC EMERGENCY: SPAM BOUNCE MESSAGES ARE COMPROMISING NETWORKS, April 2006.
52 IronPort Bounce Verification Protects Against Misdirected Bounce Attacks BV Internet BV + All Outgoing Mail Stamped Allowing Legitimate Bounces to be Identified on Return Transparent to End Users, No Industry Adoption Required Eliminates Help Desk Calls and End User Confusion Another IronPort Technical First"
53 Management for the Largest Enterprises MANAGEMENT TOOLS SPAM DEFENSE VIRUS DEFENSE POLICY ENFORCEMENT AUTHENTICATION THE IRONPORT ASYNCOS PLATFORM Security Manager unified policy management Security Monitor enterprise-class reporting system Management Interfaces simple integration and increased productivity
54 IronPort Security Manager Single view of policies for the entire organization Categories: by Domain, Username, or LDAP Allow all media files Quarantine executables IT Mark and Deliver Spam Delete Executables SALES Archive all mail Virus Outbreak Filters disabled for.doc files LEGAL Security Manager serves as a single, versatile dashboard to manage all the services on the appliance. -- PC Magazine 2/22/05
55 IronPort Centralized Management Log in anywhere, control everywhere Interface assures configuration consistency Apply changes to a machine, group, or cluster Test on single system, promote to cluster SJ1 Machine SJ2 Machine D1 Machine D2 Machine T1 Machine T2 Machine SJ3 Machine Bratislava Group D3 Machine Prague Group IRONPORT CLUSTER T3 Machine Berlin Group
56 IronPort Security Monitor Advanced Reporting System Integrated Real-Time Graphical Reports CSV Export Scheduled Delivery Search by Domain Security Monitor
57 System Monitoring Easy Integration with Existing Processes Alert Center Log Subscriptions Alert Subscriptions per Admin Distinct Areas of Management SNMP Exclusive IronPort MIB Integrates with any SNMP-compatible tools 20+ Log Types Supported Transfer via FTP, SCP, Syslog
58 IronPort Evaluation Policy Free evaluation for 30 days starts with activation of keys on unit can be extended on request any size and any way you get the right unit for your individual needs different ways of testing (life/ stealth, parallel, offline) full support, full functionality About 85% of users who evaluate become happy customers!
59 Get In Contact Mirko Schneider Channel Manager Eastern Europe & Russia IronPort Systems Munich / Germany Tel: Fax: Mobile: Web: mschneider@ironport.com
IronPort Security Products
IronPort Email Security Products PROTECTING OVER 300 MILLION EMAIL BOXES WORLDWIDE Mirko Schneider, IronPort Systems I need to say that the appliance is the best system that I ve tested for our magazine
More informationIronPort Messaging Security. IronPort Messaging Security. CISCO EXPO Croatia 2008 CISCO S NEW STRATEGY AGAINST SPAM, VIRUSES AND SPYWARE
IronPort Messaging Security IronPort Messaging Security CISCO S NEW STRATEGY AGAINST SPAM, VIRUSES AND SPYWARE Mirko Schneider Territory Manager Eastern Europe & Russia IronPort - A CISCO Systems Business
More informationIronPort Messaging Security
IronPort Messaging Security PROTECTING OVER 350 MILLION EMAIL BOXES WORLDWIDE Mirko Schneider, IronPort, A CISCO Business Unit Soft-Tronik Security Day The Evolution of Reputation Filters to Self Defending
More informationCisco s Appliance-based Content Security: IronPort and Web Security
Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.
More informationIronPort C100 for Small and Medium Businesses
I R O N P O R T E M A I L S E C U R I T Y A P P L I A N C E S S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A
More informationIronPort X1000 Security System
I r o n P o r t E M A I L S E C U R I T Y A P P L I A N C E S T H E U LT I M AT E E M A I L S E C U R I T Y S Y S T E M F O R T H E W O R L D S M O S T D E M A N D I N G N E T W O R K S. IronPort X1000
More informationOffice 365 Buyers Guide: Best Practices for Securing Office 365
Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationCloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection
Cloud Email Security & Advance Threat Protection Cloud Email Security & Advance Threat Protection Overview Over the years Cyber criminals have become more inventive in their attack methods to infiltrate
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationSales Training
Sales Training Extensible Content Security 16.03.2010 2009 WatchGuard Technologies Market Opportunity Total Addressable Market, ($M) Total Addressable Market by Segment, ($M) 16,000 14,000 11.2% CAGR 16,000
More informationGFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5
GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5 Features GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.5 Integrates with Microsoft Exchange
More informationCisco Security: Advanced Threat Defense for Microsoft Office 365
Cisco Email Security: Advanced Threat Defense for Microsoft Office 365 Microsoft Office 365 has become the standard productivity platform in organizations large and small around the world. It is a cost-effective
More informationGFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall
GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall Features GFI MailEssentials Barracuda Spam Firewall Integrates with Microsoft Exchange Server 2007/2010/2013 Scans incoming and outgoing
More informationSymantec Hosted Services. Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1
Symantec Hosted Services Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1 Agenda What is SaaS The SaaS Shift SaaS Key Objections Symantec Hosted Services Portfolio SaaS as an SLA Insurance service
More informationGFI product comparison: GFI MailEssentials vs. McAfee Security for Servers
GFI product comparison: GFI MailEssentials vs. McAfee Security for Email Servers Features GFI MailEssentials McAfee Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing
More informationWeb Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates
Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationPineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO
PineApp Mail Secure SOLUTION OVERVIEW David Feldman, CEO PineApp Mail Secure INTRODUCTION ABOUT CYBONET CORE EXPERIENCE PRODUCT LINES FACTS & FIGURES Leader Product Company Servicing Multiple Vertical
More informationINSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic
Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationUsing Centralized Security Reporting
This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the
More informationSymantec Endpoint Protection 14
Symantec Endpoint Protection Cloud Security Made Simple Symantec Endpoint Protection 14 Data Data Sheet: Sheet: Endpoint Endpoint Security Security Overview Last year, we saw 431 million new malware variants,
More informationVendor: Cisco. Exam Code: Exam Name: ESFE Cisco Security Field Engineer Specialist. Version: Demo
Vendor: Cisco Exam Code: 650-153 Exam Name: ESFE Cisco Email Security Field Engineer Specialist Version: Demo Question No : 1 In the C-160's factory default configuration, which interface has ssh enabled
More informationGFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange
GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange Features GFI MailEssentials Trend Micro ScanMail Suite for Microsoft Exchange Integrates with Microsoft
More informationSymantec Endpoint Protection
Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,
More informationOutbreak Filters. Overview of Outbreak Filters. This chapter contains the following sections:
This chapter contains the following sections: Overview of, page 1 How Work, page 2 How the Feature Works, page 8 Managing, page 11 Monitoring, page 20 Troubleshooting The Feature, page 21 Overview of protects
More informationMESSAGING SECURITY GATEWAY. Solution overview
MESSAGING SECURITY GATEWAY Solution overview April 2017 CONTENTS Executive Summary...3 The case for email protection and privacy... 3 Privacy in email communication... 3 LinkedIn Phishing Sample...4 Messaging
More informationSender Reputation Filtering
This chapter contains the following sections: Overview of, on page 1 SenderBase Reputation Service, on page 1 Editing Score Thresholds for a Listener, on page 4 Entering Low SBRS Scores in the Message
More informationUnderstanding the Pipeline
This chapter contains the following sections: Overview of the Email Pipeline, page 1 Email Pipeline Flows, page 2 Incoming / Receiving, page 4 Work Queue / Routing, page 6 Delivery, page 10 Overview of
More informationServices solutions for Managed Service Providers (MSPs)
McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive
More informationOn the Surface. Security Datasheet. Security Datasheet
Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record
More informationSolarWinds Mail Assure
TECHNICAL PRODUCT DATASHEET SolarWinds Mail Assure Email Protection & Email Archive SolarWinds Mail Assure provides best-in-class protection against email-based threats, such as spam, viruses, phishing,
More informationSymantec Security.cloud
Data Sheet: Messaging Security filters unwanted messages and protects mailboxes from targeted attacks. The service has selflearning capabilities and Symantec intelligence to deliver highly effective and
More informationESFE Cisco Security Field Engineer Specialist
ESFE Cisco Email Security Field Engineer Specialist Number: 650-153 Passing Score: 825 Time Limit: 60 min File Version: 4.3 http://www.gratisexam.com/ Exam A QUESTION 1 In the C-160's factory default configuration,
More informationAnti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections:
This chapter contains the following sections: Scanning Overview, page 1 Sophos Filtering, page 2 McAfee Filtering, page 4 How to Configure the Appliance to Scan for Viruses, page 6 Sending an Email to
More informationGet BitDefender Client Security 2 Years 30 PCs software suite ]
Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -
More informationTest-king q
Test-king 700-280 64q Number: 700-280 Passing Score: 800 Time Limit: 120 min File Version: 28.5 http://www.gratisexam.com/ 700-280 Email Security for Field Engineers Passed on 2-02-15 with an 890. Dump
More informationCisco Download Full Version :
Cisco 650-153 ESFE Cisco Email Security Specialist Field Engineer Download Full Version : http://killexams.com/pass4sure/exam-detail/650-153 QUESTION: 90 When a message is matched on by a DLP policy, and
More informationPhishing Activity Trends Report August, 2006
Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account
More informationSecurity Market,
THE RADICATI GROUP, INC. A TECHNOLOGY MARKET RESEARCH FIRM Email Security Market, 2007-2011 http://www.radicati.com Cost US $3,000 by company P.O. or $2,500 by credit card A comprehensive analysis of the
More informationPhishing Activity Trends Report August, 2005
Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial
More informationMarshal s Defense-in-Depth Anti-Spam Engine
Marshal s Defense-in-Depth Anti-Spam Engine January 2008 Contents Overview 2 Features 3 Summary 6 This whitepaper explores the underlying anti-spam and anti-phishing defense technology in Marshal s world
More informationGetting Started with the Cisco Cloud Security
Getting Started with the Cisco Cloud Email Security This chapter contains the following sections: What's New in Async OS 11.1, on page 1 What s New in Async OS 11.0, on page 4 Where to Find More Information,
More informationINTRODUCING SECURITYPLUS FOR MDAEMON
INTRODUCING SECURITYPLUS FOR MDAEMON Alt-N Technologies is introducing SecurityPlus for MDaemon as a new product name for the next version of AntiVirus for MDaemon. Because SecurityPlus will include additional
More informationKaspersky Security Network
The Kaspersky Security Network (KSN) is a complex distributed infrastructure dedicated to intelligently processing cybersecurity-related data streams from millions of voluntary participants around the
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationSecuring the Modern Data Center with Trend Micro Deep Security
Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public
More informationDMARC Continuing to enable trust between brand owners and receivers
DMARC Continuing to enable trust between brand owners and receivers February 2014 1 DMARC Defined DMARC stands for: Domain-based Message Authentication, Reporting & Conformance (pronounced dee-mark ) 2
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationIntegrate Cisco IronPort Security Appliance (ESA)
Integrate Cisco IronPort Email Security Appliance (ESA) Publication Date: January 4, 2017 Abstract This guide provides instructions to configure Cisco IronPort Email Security Appliance (ESA) to send the
More informationComputer Associates etrust Antivirus v 7.1
Product Advisor Charlotte Dunlap Analyst, Information Security Andrew Braunberg Senior Analyst, Information Security Contents Product Assessment Summary Current Perspective Product Strengths & Weaknesses
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationBuilding Resilience in a Digital Enterprise
Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.
More informationCommtouch Messaging Security for Hosting Providers
Commtouch Messaging Security for Hosting Providers September 2009 nospam@commtouch.com www.commtouch.com blog.commtouch.com About Commtouch Since 1991 NASDAQ: CTCH Profitable Double digit growth Over 100
More informationTrend Micro and IBM Security QRadar SIEM
Trend Micro and IBM Security QRadar SIEM Ellen Knickle, PM QRadar Integrations Robert Tavares, VP IBM Strategic Partnership February 19, 2014 1 Agenda 1. Nature of the IBM Relationship with Trend Micro
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationIntegrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation
Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Configuration Example March 2018 2018 Juniper Networks, Inc. Juniper Networks, Inc. 1133
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationetrust Antivirus Release 7.1
D A T A S H E E T etrust Antivirus Release 7.1 etrust Antivirus provides superior protection from the perimeter to the PDA against today s most prevalent security threat viruses. It eliminates virus infections,
More informationSpamCheetah manual. By implementing protection against botnets we can ignore mails originating from known Bogons and other sources of spam.
SpamCheetah manual SpamCheetah is the spam control technique from Gayatri Hitech. SpamCheetah achieves spam control by way of employing an SMTP proxy which invokes various virus scanning, spam control
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationEnterprise Cybersecurity Best Practices Part Number MAN Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationSmart Protection Network. Raimund Genes, CTO
Smart Protection Network Raimund Genes, CTO Overwhelmed by Volume of New Threats New unique samples added to AV-Test's malware repository (2000-2010) 20.000.000 18.000.000 16.000.000 14.000.000 12.000.000
More informationSteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)
Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized
More informationService Provider View of Cyber Security. July 2017
Service Provider View of Cyber Security July 2017 Quick Stats Caribbean and LatAm: 3 rd largest population of Internet Users You Are Here Visualization from the Opte Project of the various routes through
More informationGFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual
GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and
More informationSSL VPNs or IPsec VPNs The Challenges of Remote Access. February 2 nd, 2007 Chris Witeck- Director of Product Marketing
SSL VPNs or IPsec VPNs The Challenges of Remote Access February 2 nd, 2007 Chris Witeck- Director of Product Marketing Agenda Remote access challenges Drivers for remote access New challenges for IT Remote
More informationMavenir Spam and Fraud Control
SOLUTION BRIEF Assuring Operator Revenue and A2P Grey Route Monetization Operators are realizing the scale and potential of A2P (Application to Person) messaging revenues, and how advances in messaging
More information2018 Edition. Security and Compliance for Office 365
2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,
More informationPhishing: When is the Enemy
Phishing: When E-mail is the Enemy Phishing, once only a consumer worry, is creating headaches for e-mail administrators as businesses become the next target. CONTENTS Understanding the Enemy 2 Three Things
More informationProtecting from Attack in Office 365
A hacker only needs one person to click on their fraudulent link to access credit card, debit card and Social Security numbers, names, addresses, proprietary information and other sensitive data. Protecting
More informationTechnical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.
Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple
More informationDeployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy,
SECURITY APPLIANCES True Security Appliances reduce the complexity and increase the reliability of network security, while enhancing control, efficiency, and overall functionality for enterprises of all
More informationKERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE
KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,
More informationFIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode
This chapter contains the following sections: Overview, on page 1 Configuration Changes in FIPS Mode, on page 1 Switching the Appliance to FIPS Mode, on page 2 Encrypting Sensitive Data in FIPS Mode, on
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationMultilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.
SOLUTION OVERVIEW Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms. What is a mobile protection product? A mobile protection
More informationGFI Product Comparison. GFI MailEssentials vs Sophos PureMessage
GFI Product Comparison GFI MailEssentials vs PureMessage GFI MailEssentials Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing emails Scans internal emails within
More informationPhishing Activity Trends
Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received rose to 24,853 in, an increase of over 1, from February but still more than
More informationSYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet
SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document
More informationAnti-Spam Product Not Working? What more companies are switching to and why
Anti-Spam Product Not Working? What more companies are switching to and why What more companies are switching to and why MORE CUSTOMERS SWITCHING FROM APPLIANCES, SOFTWARE AND LIMITED SERVICES As spam
More informationIntroduction. Logging in. WebMail User Guide
Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks
More informationMcAfee Security Management Center
Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability
More informationUnderstanding Network Access Control: What it means for your enterprise
Understanding Network Access Control: What it means for your enterprise Network access control is a term that is highly used, but not clearly defined. By understanding the reasons for pursuing a network
More informationUntitled Page. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Antispam Administration SmarterMail comes equipped with a number
More informationBe certain. MessageLabs Intelligence: May 2006
Be certain MessageLabs Intelligence: May 2006 Introduction Welcome to the May edition of the MessageLabs Intelligence monthly report. This report provides the latest threat trends for May 2006 to keep
More informationEU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux
EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider
More informationManaging SonicWall Gateway Anti Virus Service
Managing SonicWall Gateway Anti Virus Service SonicWall Gateway Anti-Virus (GAV) delivers real-time virus protection directly on the SonicWall security appliance by using SonicWall s IPS-Deep Packet Inspection
More informationEBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.
EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have
More informationImperva Incapsula Product Overview
Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security
More informationBusiness Advantages. In this age of heightened awareness of information security issues...
In this age of heightened awareness of information security issues... Businesses of every size, in every industry both regulated and nonregulated are recognizing the critical value of DeliverySlip. DELIVERYSLIP.COM
More informationSecurity Deployment Guide. Revision: H2CY10
Email Security Revision: H2CY10 Who Should Read This Guide This guide is intended for the reader with any or all of the following: 100 1000 connected employees Up to 20 branches with approximately 25 employees
More informationAND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING
PROTECTING BANKING AND FINANCIAL INSTITUTIONS FROM CYBER FRAUD Enabling the financial industry to become proactively secure and compliant Overview In order to keep up with the changing digital payment
More informationA Unified Threat Defense: The Need for Security Convergence
A Unified Threat Defense: The Need for Security Convergence Udom Limmeechokchai, Senior system Engineer Cisco Systems November, 2005 1 Agenda Evolving Network Security Challenges META Group White Paper
More information