AdminCamp 2009 Gelsenkirchen, September 2009

Similar documents
20 years of Lotus Notes and a look into the next 20 years Lotusphere Comes To You

Effective PMR Submission Best Practice. IBM Learn Customer Support

What s New in the IBM Lotus Notes Client. Kevin O Connell, Consulting Manager, IBM Asia Pacific

IBM Next Generation Intrusion Prevention System

Lotus Technical Night School XPages and RDBMS

IBM InfoSphere Data Replication s Change Data Capture (CDC) Fast Apply IBM Corporation

Optimize Your Heterogeneous SOA Infrastructure

Security Gap Analysis: Aggregrated Results

Extending the value of your current collaboration investments now and in the future

Collaboration for a Greener World. Kevin O' Connell Consulting Manager, Lotus Software, IBM Asia Pacific

Uffe Sorensen. Lotus Messaging & Collaboration Director. IBM Software Group Northeast Europe, Middle-East & Central / South Africa. dk.ibm.

IBM Security Network Protection Solutions

IBM Lotus Sametime and Unified Communications and Collaboration. Strategy and Technical Roadmap

Technical Deep Dive Session

IBM Db2 Warehouse on Cloud

What's New in IBM Notes 9.0 Social Edition IBM Corporation

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation

WebSphere Commerce Developer Professional

that will impact New IoT Technology Trends Production Automation

IBM Lotus Notes 8.5 Version to Version Comparison IBM Corporation

WebSphere Commerce Professional

IBM SPSS Statistics Desktop

IronPort X1000 Security System

IBM SPSS Text Analytics for Surveys

IBM Lotus Notes in XenApp Environments

IBM BigFix Lifecycle 9.5

IBM Social Rendering Templates for Digital Data Connector

Lotusphere IBM Collaboration Solutions Development Lab

ID106 - What's New in IBM Lotus Notes 8.5.1

IBM Lotus Instant Messaging Gateway

SOLUTION MANAGEMENT GROUP

2010 Exceptional Web Experience

WebSphere Commerce Developer Professional 9.0

Get Started Installing IBM Lotus Sametime You Too Can Be a WAS Admin! OR 140 Slides In 60 Minutes

SolarWinds Mail Assure

Your Notes and Domino in the Cloud

Innovate 2013 Automated Mobile Testing

Symantec Security.cloud

Rational Asset Manager V7.5.1 packaging October, IBM Corporation

How to Develop Responsive Applications with IBM MQ Light (beta) Matthew Whitehead WebSphere MQ Development 1st July 2014

for businesses with more than 25 seats

IronPort C100 for Small and Medium Businesses

MESSAGING SECURITY GATEWAY. Solution overview

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

for businesses with more than 25 seats

Open Mic Webcast: Troubleshooting freetime (busytime) issues in Lotus Notes

IBM Infrastructure Suite for z/vm and Linux: Introduction IBM Tivoli OMEGAMON XE on z/vm and Linux

IBM Proventia Management SiteProtector. Scalability Guidelines Version 2.0, Service Pack 7.0

Lotus Protector for Mail Security

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

Symantec Protection Suite Add-On for Hosted Security

Unlocking increased collaboration, innovation and productivity.

Symantec Protection Center Getting Started Guide. Version 2.0

Lotus Symphony. Siew Chen Way Lotus Technical Consultant

IBM Lotus Domino Product Roadmap

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Symantec Enterprise Solution Product Guide

Security Support Open Mic Build Your Own POC Setup

Symantec Multi-tier Protection

Ensuring a smooth upgrade to Sametime and IFR 1

Notes/Domino MythBusters

IBM Lotus Notes and Lotus Domino 7 software: the new face of business collaboration and communications.

Cisco Security: Advanced Threat Defense for Microsoft Office 365

IBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber

What's New in IBM Notes 9.0 Social Edition

Lotusphere IBM Collaboration Solutions Development Lab

Evaluation Program for Symantec Mail Security Appliances

GX vs XGS: An administrator s comparison of the two products

Lotus Business Solutions Catalogs

Simplify IP Telephony with System i. IBM System i IP Telephony

Terminal Applications Scalability testing using Rational Performance Tester version 8.1

Office 365 Integration Guide Software Version 6.7

IBM Security Network Protection Open Mic - Thursday, 31 March 2016

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

IBM Threat Protection System: XGS - QRadar Integration

10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control

Introducing IBM Lotus Sametime 7.5 software.

ISAM Advanced Access Control

How to Secure Your Cloud with...a Cloud?

BUILDING A NEXT-GENERATION FIREWALL

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Lotus Protector for Mail Security

IBM Lotus Domino 7 Performance Improvements

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

Red Condor had. during. testing. Vx Technology high availability. AntiSpam,

SaaS Flyer for Trend Micro

IBM Sametime Administration WebSphere Demystified

Kunal Mahajan Microsoft Corporation

Domino Clouds Public AND Private. Collin Murray Program Director, Lotus Domino Product Management

Cisco Security Appliances

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

REST APIs on z/os. How to use z/os Connect RESTful APIs with Modern Cloud Native Applications. Bill Keller

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

Introducing Lotus Domino 8, Designer 8 and Composite Applications

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Whitepaper on AuthShield Two Factor Authentication with SAP

InfoSphere Warehouse with Power Systems and EMC CLARiiON Storage: Reference Architecture Summary

IBM SmartCloud Notes Security

Transcription:

Mittwoch, 30. Sept. 2009 Track: 4 - Session: 8 Lotus Protector Referenten: Detlev Poettgen, acocon Andreas Schulte, IBM Deutschland GmbH AdminCamp 2009 Gelsenkirchen, 28.-30. September 2009

V 2.5a 2009 IBM Corporation

Notes/Domino: The Gold Standard for e-mail Security W orld's largest deployed public key infrastructure Every user operate with an RSA-based certificate Application level security guards against Internet-style attacks Resists address book harvesting, worms, executables Execution control lists (ECLs) that mistrust by default Security foundation In the DNA Certificates, strong passwords, file/protocol encryption Object level access control, roles-based security, revocation

E-mail security is harder, more important than ever Spam, Phishing, and Malware comprise up to 90% of all SMTP traffic Costly in bandwidth and CPU Company image and employee satisfaction Attacks now a sophisticated, specialized, for-profit business Organized crime and terrorist funding Targeted industrial espionage and financial fraud Sensitive information and risk proliferates Intentional and inadvertent loss of confidential content Theft of data and interception of data in motion

E-mail-borne attacks change rapidly Spam URL Lifespans Spam Volumes Spam Types Source: IBM X-Force Research 2009 Spam Domains

Dynamics of Security Integration Effort / Complexity Silo Security Integrated Security Effectiveness

Optimized SMTP Protection For Lotus Domino Enterprise grade spam filtering software Featuring IBM Proventia Spam/Malware blocking technology Dynamic Host Reputation (IP Filtering) Multi-layered message analysis Signature and Behavioral Antivirus URL matching for phishing and spyware End user quarantines, block/allow lists Optimized for Lotus Domino customers Easy to acquire, deploy, administer and support Aggressive integration roadmap (vertical/horizontal) Preemptive protection against threats Rules/Policy engine for content protection (incoming/outgoing) Integrated IBM Proventia intrusion prevention system

Notes/Domino integration World class technology Proventia Deployment Flexibility Per-User Software License Virtual Appliance...But works for all e-mail systems! Physical Appliance (IBM x 3250, x3350, x3650 M2)

Capabilities, packaging, and release dates subject to change Roadmap Q3 2010 Lotus Protector for Mail Security 3.0 New filter form factors Q3 2009 Lotus Protector for Mail Security 2.5 Q3 2008 Lotus Protector for Mail Security 2.1 Initial Lotus release 6th generation of core technology Dynamic IP Reputation Filtering TLS encryption Appliance or VMware form factors Standardized Linux platform Additional Notes/Domino integration Enhanced Notes sender management features Native Notes spam folders Domino Administrator integration Enhanced directory support Optional protection for Sametime, Quickr, Connections Uses standard xseries hardware Vertical Notes/Domino integration Notes-based Block/Allow list, quarantine management Zero level analysis Scalability and performance Active/active clustering Internationalization, automated licensing On-Domino filtering Cloud-based (SaaS) filtering

Notes Inbox Integration Gives end users complete control over ALL unwanted e- Objective Spam Pharma, sexual, stock scams etc. Protector for Mail Security stops objective spam cold at the gateway Subjective Spam Newsletters, mailing lists, event invitations etc. Notes integration lets users block subjective spam senders permanently

See something you don't want in your inbox? Block sender forever!

Manage blocked messages both spam and blocked senders right within Notes!

Manage your blocked senders

Allow senders you trust

Zero Layer Analysis (ZLA) How we're staying ahead of the spammers with IBM X-Force Innovation Today: Two main types of spam filters IP Reputation (SMTP layer) Drops connections from known bad domains or IP addresses PROBLEM: More than half of spam is now originating from trusted domains Tune low and lose effectiveness; tune high and overblock Content analysis (e-mail received) Detects spams through sophisticated analysis, using multiple specialized modules PROBLEM: computationally intensive (write to disk, read to memory, analyze, delete) Ever-increasing spam volume can overwhelm best filters

Zero Layer Analysis (ZLA) An innovative approach to high performance and high efficacy Real-time inspection of e-mail Zero Layer Analysis Uses optimized subset of full filters Analyzes bits sequentially in streaming mode Drops SMTP connection instantly when determined to be spam E-mail that passes ZLA is still inspected by full filter set Benefit: Massive increase in throughput with no loss of efficacy ZLA Spams Caught IP Connection Filter Content Filter

Popular Filter Deployment Options There are multiple approaches to spam and virus filtering, often with redundancy Edge appliances and cloud services filter SMTP, but don t see internal mail Cloud services allow less control by the customer and tends to have less filter efficacy Server tasks clean all mail, but impose cost to server CPU INTERNET Edge Appliances Clean Server Tasks Clean

Filter Process

IBM X-Force Research Proprietary Research URL Database Bayesian Filter, URL Checker, Meta Heuristics, Flow Control, Structure Analysis, Phishing detection, Fuzzy Fingerprints, Behavioral Antivirus... 9.3 billion evaluated web pages and images 150 million new pages each month 150,000 new categorized sites each day 100 million URL filter entries 68 categories of spam URLs Spam/Phishing Database 80 million spam signatures in the database 2 million new signatures per day > 98% effective against spam < 0.001% false-positives

Policy Editor Granular Policy Control 2009 IBM Corporation 24

IBM xseries deployment options 1. No operating system needed. Lotus Protector softw are includes a Linux operating system 2. Different CPUs w ill w ork and may only change throughput results 3. Different memory sizes w ill w ork and may only change throughput results 4. Requires a DVD ROM minimum to install Lotus Protector 5. Controllers BR10i, MR10i, BR10il required for Raid. MR10i must be used w ith more than 2 Raid mirror sets 6. The 10k or 15k RPM disk speed is recommended. Different disk sizes and speeds w ill w ork and may only change throughput results. Minimum storage size if you do not plan to retain blocked spam = 40GB. If you plan to retain blocked spam, your approximate minimum storage per disk = 40GB + (emails/day x retention days x 0.000007 GB) 7. A redundant pow er supply is not required but provides more reliability 8. These netw ork cards have been verified for this use. 9. Minimum w arranty. Many other w arranty and repair options can be selected 10. Measured filtering of incoming internet emails of average 19kB size w ith pre-filters turned off. IP pre-filtering and SMTP pre-filtering increase throughput.

Resources www.ibm.com/lotus/protector/mailsecurity Feature Description Brochure Specifications White Papers Demo, Video ICSA Certification X-Force Statistics Graphs Support How to buy Product Documentation

Questions? http://www.ibm.com/software/lotus/products/protector/

Vielen Dank

Legal Disclaimers IBM Corporation 2008. All Rights Reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this publication to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way.