Symantec Protection Suite Add-On for Hosted Security

Similar documents
Symantec Security.cloud

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Office 365 Buyers Guide: Best Practices for Securing Office 365

Symantec Endpoint Protection

Securing Office 365 with Symantec

CloudSOC and Security.cloud for Microsoft Office 365

Symantec Client Security. Integrated protection for network and remote clients.

Security Gap Analysis: Aggregrated Results

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Seqrite Endpoint Security

Symantec Enterprise Solution Product Guide

Symantec Advanced Threat Protection: Endpoint

Symantec Intelligence Quarterly: Best Practices and Methodologies October - December, 2009

Symantec Endpoint Protection 14

Symantec Hosted Services. Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Symantec Endpoint Protection

Kaspersky Security Network

: Administration of Symantec Endpoint Protection 14 Exam

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE

Symantec Small Business Solutions

On the Surface. Security Datasheet. Security Datasheet

FRISK Software International F-Prot AVES Managed Security Service

At a Glance: Symantec Security.cloud vs Microsoft O365 E3

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

NetDefend Firewall UTM Services

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Future-ready security for small and mid-size enterprises

Symantec Multi-tier Protection

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

CA Host-Based Intrusion Prevention System r8

Protecting from Attack in Office 365

IBM Managed Security Services for Security

MESSAGING SECURITY GATEWAY. Solution overview

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Symantec Secure One Services Program Brief

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Product Guide. McAfee Web Gateway Cloud Service

McAfee Public Cloud Server Security Suite

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Layer by Layer: Protecting from Attack in Office 365

The business case for end-toend data protection

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Anti-Spam Product Not Working? What more companies are switching to and why

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Cisco s Appliance-based Content Security: IronPort and Web Security

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

The McAfee MOVE Platform and Virtual Desktop Infrastructure

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

KASPERSKY SECURITY FOR MICROSOFT OFFICE s are sent every second. It only takes one to bring down your business.

Choosing the Right Solution for Strategic Deployment of Encryption

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

CAS Quick Deployment Guide January 2018

Three Steps to Protect Your Virtual Systems

KEEP YOUR BUSINESS SECURE WITH ESET. Proven. Trusted.

Carbon Black PCI Compliance Mapping Checklist

Technical Brochure F-SECURE THREAT SHIELD

Office 365 Integration Guide Software Version 6.7

Service Provider View of Cyber Security. July 2017

Securing Today s Mobile Workforce

Endpoint Security for DeltaV Systems

IronPort C100 for Small and Medium Businesses

A Review Paper on Network Security Attacks and Defences

Protecting Your Digital World

USG2110 Unified Security Gateways

Product Guide. McAfee Web Gateway Cloud Service

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

with Advanced Protection

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

TREND MICRO SMART PROTECTION SUITES

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition

A leading antivirus software company outsmarts viruses and malware and makes the Internet safer.

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Symantec Network Access Control Starter Edition

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

Coupon BitDefender Corporate Security 3 Years 10 PCs internet download software for pc ]

Free Download BitDefender Business Security 3 Years 5 PCs full version free software download ]

Intrusion Prevention Signature Failures Symantec Endpoint Protection

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Symantec Security Monitoring Services

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Building Resilience in a Digital Enterprise

Cloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection

Symantec Endpoint Protection 11.0

THE ACCENTURE CYBER DEFENSE SOLUTION

9 Steps to Protect Against Ransomware

INSIDE. Overview of Intelligent Message Filter Integration. Symantec Enterprise Security

Transcription:

Symantec Protection Suite Add-On for Hosted Email Security

Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money from businesses through the internet and these attacks are getting more sophisticated and more frequent. Malware can be introduced into your environment via two primary routes: at your endpoints (laptops, desktops, servers) or from the Internet via Web and email traffic. It is critical to secure each potential route of entry used by these threats. However establishing a comprehensive defense can be a daunting task; Symantec offers advanced technologies that help to provide proactive protection for laptops, desktops, servers, mobile devices, messaging and Web environments. Symantec Protection Suites offer an array of solutions to create a protected endpoint, messaging, and Web environment that is secure against today s complex Internet threats, and is quickly recoverable in the event of failure. Now, with the introduction of a hosted email security add-on from Symantec Hosted Services, Symantec Protection Suite users can use the power of cloud computing to help secure and manage email traffic through an integrated, Web-based management console without requiring hardware or software on-site. The Symantec Hosted Services add-on can help combat malware and spam threats at the Internet level before they reach your network and help to control sensitive information (including email, select attachments, and images) preventing it from leaving you network or entering your environment. It helps lower administration costs through automatic content updates and feature enhancements while delivering exceptional accuracy. Because it is maintained by Symantec and backed by an industryleading Service Level Agreement (SLA), you can confidently focus staffing resources on more critical tasks. Together, this comprehensive group of offerings includes proven hosted and on-site technologies from Symantec, the market leading endpoint security, hosted messaging security, and backup and recovery vendor. The purpose of this paper is to provide an introduction to the hosted email security add-on (known as Symantec Hosted Security Email Protect and Control) available to you for use with Symantec Protection Suites.

Why Should You Consider Using a Hosted Service? Hosted services operate in the cloud. They provide a way of outsourcing hardware, software and management of solutions to deliver a cost effective alternative to on-site management. Generally, no software or hardware needs to be installed on your premises and IT administration is performed through an easy-to-use Web portal. As a hosted service provider, Symantec Hosted Services is able to scan email for malware and inappropriate content safely away from your systems while assuming the burden of processing in our infrastructure. How Does it Work? The Symantec Hosted Services add-on for email security consists of several hosted services working in tandem to provide you with a comprehensive set of security and content controls. Easy to manage and maintain, they work together to help you both protect your organization and enforce proper email use. Hosted Email Security features help to defend organizations from email-borne malware and unsolicited messages to deliver clean, approved content and promote secure and productive email use. This is accomplished by combining multiple commercial anti-virus and anti-spam scanning engines with Skeptic TM, our proprietary heuristic technology. The result is a multi-layered defense against known, new and targeted email-based threats and spam messages. The add-on also helps to defend against positively identified viral URL links contained within emails through its link-following capability. This is an especially effective defense against attempts to bypass anti-virus detection and lure users to malware bearing Web sites. Link-following looks at the Web pages referenced within an email and checks them for malware. If a threat is found on those Web sites, the suspicious link is confirmed as viral and the email is blocked. Because links are examined in our infrastructure safely away from your network, the burden of examination is placed squarely on our infrastructure, not your own. Email attachments are examined to detect and help prevent malware and file exploits from compromising systems or installing malware. Attachments that contain identified threats are detected and stopped at the internet level while the service monitors keywords and manages file formats to limit attachment volume or file size. As a result, the service is able to safeguard storage and bandwidth from being wasted on these files and preserve its use for legitimate communications. The accuracy of the add-on service s anti-virus detection is maintained through continuous, automatic updates that are performed across our network using a global database replication architecture. This approach allows us to protect our customers from zero-hour threats that emerge in other corners of the globe and block them long before they appear locally and well before traditional anti-virus signatures are available. Email Policy Management capabilities assist to identify and manage oversized, confidential, malicious or inappropriate email content and images sent or received by your organization. This helps to reduce the risk of data loss and reinforces your email Acceptable Use Policy, so that employee email use can be more productive and safe. The add-on service looks for inappropriate content by analyzing multiple components including email body, subject and headers. It also examines text within supported Microsoft Office documents (Word, Excel, and PowerPoint versions 2000 2007) and PDFs that are embedded within emails or sent as attachments. Any content that matches administrator created rules is subject to a range of actions while approved messages continue to pass through to their intended recipients.

Email messages and attachments can be scanned for keywords, phrases, URL lists or alphanumeric formulas (such as credit card, National Insurance or Social Security Numbers), as determined by the administrator. This provides comprehensive content analysis across all email components, helping to maintain the appropriateness of all incoming and outgoing messages. Images are also scanned including those within emails and attachments to help identify, control and block inappropriate images from entering or leaving your organization. Images are subjected to Image Composition Analysis (ICA) technology which uses neural nets for the accurate detection of pornographic images. Administrators can add their own permitted or blocked image signatures to a local database to provide local control over imagery such as confidential or legitimate images. This helps to stop inappropriate images while permissable images are allowed to pass outside the organization. Finally, if users require special priviledges, approved sender and recipient lists can be used to specify which individuals (both internal and external), should be permitted to send and receive messages without having content and image scanning applied to their messages. Backed by an Industry-Leading Service Level Agreement The Symantec Hosted Services add-on for email security is backed by a highly aggressive and comprehensive Service Level Agreement (SLA) that includes money back or other remedies if the following performance levels are not met: Email Antivirus Effectiveness 100% protection against known and unknown email viruses Email Antivirus Accuracy - no more than 0.0001% false positives Email AntiSpam Effectiveness 99% spam capture (95% for email with Asian characters) Email AntiSpam Accuracy no more than 0.0003% false positives Email Delivery 100% email delivery Latency - average Email scanning time within 60 seconds Availability 100% service uptime Technical Support - specific response times for critical, major, and minor calls. The services are delivered through a global infrastructure of 14 highly available data centers located across four continents. These data centers are load balanced and housed in secure, well-established telecommunications centers located at major Internet exchange points. Because the data centers are load balanced, Symantec Hosted Services is able to offer redundancy and handle spikes in traffic. This allows us to offer a Service Level Agreement target of 100% service uptime. These performance levels have been selected because Symantec Hosted Services has a track record of meeting or exceeding these targets. Ease of Management & Service Reliability The Symantec Hosted Services add on for email security can be quickly deployed, typically in hours. Support is delivered by global hosted services specialists 24x7 and included with your service fee. The service also offers configurable reporting and notifications that increase visibility into security and help shorten resolution times.

Summary By deploying the Symantec Hosted Services add on for email security, you can enhance your defenses with zero-hour protection from email-borne malware and emerging spam techniques while controling content and images sent or received by your organization. Because it is delivered as a hosted service, threats and inappropriate content are blocked before they reach your network. With easy management features, superior performance, and an industry leading service level agreement, this comprehensive hosted service offering enables you to focus on running your businesses with confidence. Offering Details Symantec Protection Suite Enterprise Edition Endpoint security, on-premise messaging & web security, backup & recovery Symantec Protection Suite Small Business Edition Endpoint security, on-premise messaging security for Microsoft Exchange, backup & recovery Symantec Hosted Security Email Protect and Control Add-On for Symantec Protection Suite Hosted email security, policy management, content and image control About Symantec Hosted Services: Symantec Hosted Services is the world s leading provider of hosted services for securing and managing email, Web, and IM traffic (or communications). Over 30,000 organizations and over 9 million end users in 99 countries employ Symantec Hosted Services to protect against viruses,spam, phishing, inappropriate Internet use, spyware and other organization-damaging threats. About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at http:///business/theme.jsp?themeid=hostedservices For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 Copyright 2010 Symantec Corporation. All rights reserved. Symantec, MessageLabs, the Symantec Logo and the Symantec Hosted Services Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. All product information is subject to change without notice. Part No. 21005054