Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Similar documents
Technical Brochure F-SECURE THREAT SHIELD

Protection Service with Continuity

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

6 Ways Office 365 Keeps Your and Business Secure

Symantec Protection Suite Add-On for Hosted Security

KASPERSKY SECURITY FOR MICROSOFT OFFICE s are sent every second. It only takes one to bring down your business.

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Seqrite Endpoint Security

BUFFERZONE Advanced Endpoint Security

Sophos Central Admin. help

MESSAGING SECURITY GATEWAY. Solution overview

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Protect your business in today s fast-changing security and risk environment.

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Symantec Small Business Solutions

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

The professional IT management platform

MODERN DESKTOP SECURITY

Symantec Enterprise Solution Product Guide

Office 365 Buyers Guide: Best Practices for Securing Office 365

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

with Advanced Protection

Office 365 Integration Guide Software Version 6.7

PEOPLE CENTRIC SECURITY THE NEW

Cloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection

2018 Edition. Security and Compliance for Office 365

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

CloudSOC and Security.cloud for Microsoft Office 365

BUFFERZONE Advanced Endpoint Security

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

Security Gaps from the Field

ISO27001 Preparing your business with Snare

Synchronized Security

Kaspersky Security Network

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

CAS Quick Deployment Guide January 2018

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

CA Host-Based Intrusion Prevention System r8

Protecting from Attack in Office 365

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Hello! we are here to share some stories

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Product Guide. McAfee Web Gateway Cloud Service

Security Gap Analysis: Aggregrated Results

OUR CUSTOMER TERMS CLOUD SERVICES MCAFEE ENDPOINT PROTECTION ESSENTIAL FOR SMB

Measuring cloud-based anti-malware protection for Office 365 user accounts

Artificial Intelligence Drives the next Generation of Internet Security

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

What is Zemana AntiLogger?

Sophos Central Admin. help

2017 Annual Meeting of Members and Board of Directors Meeting

Computer Security. Solutions

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

Managed Endpoint Defense

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

SaaS Flyer for Trend Micro

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

SolarWinds Mail Assure

Why Continuity Matters

Get Max Internet Security where to buy software for students ]

Office 365 Report. the inside track to threat protection

Kaspersky Open Space Security

Modern attacks and malware

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Product Guide. McAfee Web Gateway Cloud Service

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

The Mimecast Security Risk Assessment Quarterly Report May 2017

Layer by Layer: Protecting from Attack in Office 365

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Panda Security. Protection. User s Manual. Protection. Version PM & Business Development Team

Service Provider View of Cyber Security. July 2017

Automated Context and Incident Response

Security and Compliance for Office 365

Introducing the CSC SSM

IronPort C100 for Small and Medium Businesses

RSA INCIDENT RESPONSE SERVICES

Ryan KS office thesee

SentinelOne Technical Brief

Cyber security tips and self-assessment for business

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

The security challenge in a mobile world

Symantec Security.cloud

Maximum Security with Minimum Impact : Going Beyond Next Gen

Protection FAQs

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic

Transcription:

Security Solutions Our security suite protects against email spam, viruses, web-based threats and spyware while delivering disaster recovery, giving you peace of mind so you can focus on what matters most: growing your business.

PROTECT YOUR BUSINESS Security is a crucial part of any business, particularly when it comes to email and the Internet. We understand the importance of cyber security and are proud to offer an integrated platform of services specifically designed to meet the needs of your business. Our suite of security solutions includes protection from time-wasting junk mail and fastbreaking viruses as well as stopping web-based security threats and unproductive or illegal browsing activity. TO ASSIST BUSINESSES THAT RELY ON EFFICIENT EMAIL COMMUNICATIONS: MPmail Key Benefits: MPmail Fraud & Phishing Protection Organisations users are protected from fraudulent phishing emails attempting to access personal or business-related information. MPmail Content & Attachment Filtering Automatic filtering identifies and blocks unwanted, inappropriate and malicious content in email body copy and attachments before it enters or leaves your organisation. Multi-Layer Protection Business-grade email spam and virus protection. Multi-layered strategy successfully keeps out 99% of harmful messages. No Interruption During Outage During an email outage, your staff can continue to communicate from their existing email addresses using integrated webmail. Once connectivity is restored, all outage-period email activity is synchronised with your primary system. Archived Emails MPmail s 90-day email archive allows you to search, view and re-send any messages to your mailbox that have been sent/received in the last 90 days. Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary. Convenience Conveniently modify email protection, establish group filtering policies, customise corporate policies and stay abreast of message traffic flow and trends. "Spam accounts for more than 80% of all email traffic" Intel Security Threat Centre

Introduction to MPmail and MPmail Advanced Threat Protection Our advanced security solutions assist businesses relying on efficient email communication eliminate email threats that sap productivity, increase storage, bandwidth and administrative costs and put their networks, and in turn their business, at risk. MPmail and MPmail Advanced Threat Protection (ATP) were developed to meet the unique needs of businesses looking for an affordable, effective and easy to use email security solution with automatic updates that protect against the latest threats. Why MPmail? MPmail s Stacked Classification Framework spam detection system utilises a voting algorithm, a patented method of identifying and controlling spam based on a sophisticated form of intelligent reasoning. This provides highly precise threat protection with industry-leading low false positive rates (legitimate emails misidentified as spam).

TO PROVIDE ALL OF THE SECURITY OF MPMAIL WITH ADDITIONAL PROTECTION: MPmail Advanced Threat Protection Why MPmail ATP? In addition to the protection MPmail provides, MPmail ATP includes advanced email security for your business, including: Real-time notification of attacks As soon as MPmail ATP detects an attack, an alert is sent to the respective company s IT security team to inform them immediately about a possible threat, providing various details on the nature and objective of the attack, the sender and reason for interception. Sandbox engine Attachments are carried out in a variety of system environments and their behaviour analysed. Protects against ransomware and blended attacks. URL rewriting and scanning The MPmailURL rewriting engine secures all internet calls from emails against a sophisticated reputation database. A document (such as a PDF, Microsoft Office) attached to an email may contain links. These cannot be replaced, as this would violate the integrity of the document. The MPmailURL scanning engine leaves the document in its original form, only checking the target of such links. Freezing If an email cannot be clearly classified and appears suspicious, it is retained for a short period of time with freezing. A thorough test is then performed with updated signatures. Ex-post alerting Ex-post alerting quickly contains a dangerous situation by notifying a company s IT security team if a potentially harmful email is delivered. Targeted fraud forensics (CEO fraud) Targeted fraud forensics detects targeted personalised attacks without malware or links using the following mechanisms

Options Ultimate Access Ultimate Defense Anti-Spam Anti-virus Content Filtering Outbound filtering Message Queuing Full Message Continuity The ongoing battle to protect email communication within your business from spam, viruses and other threats is finally over

TO PROTECT YOUR CLIENTS FROM WEB BASED THREATS: MPweb Key Benefits: Security Stop known and unknown virus, phishing and malware attacks before they reach your network. Productivity Measure and manage internet abuse and time-wasting non-work-related web site browsing and downloads. Compliance Control access to inappropriate, illegal and offensive sites by category and file types. Reduced Ownership Cost No hardware or software to purchase and maintain. Reporting Real-time forensic reporting logs display which sites and downloads users have attempted to access and whether or not they were allowed. Introduction to MPweb Security solutions are often only associated with protection against cyber attacks. However, these same technologies can also be utilized to increase productivity, reduce costs and improve regulatory compliance. MPweb is designed to combat external threats while simultaneously improving internal business operations. Internet Access Control & Management MPweb has DNS Protection and Threat Intelligence, a cloud-based security solution that proactively prevents communication between your network and web-based threats. You have the ability to monitor all DNS requests from clients, instantly blocking responses for malicious sites while allowing requests for safe sites to proceed. Why MPweb? With no hardware or software to manage, a lower total cost of ownership and better protection against external threats and internal time-wasting, MPweb is a comprehensive solution designed to replace or enhance your company s existing security infrastructure. Service Features Integrated anti-spyware protection provided by award-winning technology URL filtering and file/content type. Set internet use policies according to group or user level. Detailed real-time and scheduled reporting. Stop web based threats and workplace abuse of the internet

TO PROTECT YOUR CUSTOMERS AGAINST DESKTOP BASED VIRUSES AND THREATS: MPAV Key Benefits: Simple, effortless activation Free up IT resources and reduce costs Secure the integrity of business communications Increase employee productivity and control Around-the-clock protection against threats and attacks Introduction to MPAV Manage Protect Endpoint Anti-Virus Protection (MPAV) is an innovative solution designed to prevent malware infections and offering unique real-time, cloud-driven security intelligence that protects your business without slowing users down. Phishing accounted for 90% of successful breaches in 2017. Why MPAV? MPAV scans for threats that come from email, web browsing, file attachments, hyperlinks, display ads, social media apps, and connected devices like USB drives. Capable, feature-rich and requires minimal space on your hard drive Real-time detection and protection of malware Provides protection even when a user is offline Anti-phishing technology blocks risks with 99% accuracy Verizon 2017 Data Breach Investigations Report