Test Report June Trend Micro Interscan Gateway Security Appliance. Anti-Spam Technology Report

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Test Report June 2007. Trend Micro Interscan Gateway Security Appliance. Anti-Spam Technology Report"

Transcription

1 Test Report June 2007 Trend Micro Interscan Gateway Security Appliance Anti-Spam Technology Report

2 Vendor Details Name: Trend Micro Address: Trend Micro Inc N. De Anza Blvd, Cupertino, CA , USA Telephone: + 1 (800) / + 1 (408) Website: Product: IGSA Version 1.0 Build 1272 Test Laboratory Details Name: West Coast Labs Address: William Knox House, Britannic Way, Llandarcy, Swansea, UK, SA10 9EL Telephone: +44 (0) Date: June 2007 Issue 1.0 Author: G. Samuel Contact Point Contact name: M. Garrard Contact telephone number: +44 (0) Test Report

3 Contents Introduction 4 Test Network 6 Test Methodology 7 Product Test Reporting 8 Checkmark Certification 9 The Product 10 Test Report 11 Test Results 19 West Coast Labs Conclusion 20 Security Features Buyers Guide 21 Test Report 3

4 Introduction The ever evolving spam threat Two years from now, spam will be solved. Bill Gates Jan At the beginning of 2004, Bill Gates was addressing the World Economic Forum in Switzerland and confidently predicted that Two years from now, spam will be solved. Sadly his prophecy has proved somewhat wide of the mark as reports continue to emerge about the size of the problem. The latter half of 2006 saw an unprecedented rise in spam volumes with SurfControl reporting a 50% increase in spam over the previous half year, and spam now accounting for almost 90% of all traffic on the Internet. The nature of spam has also changed. In 2004 spam content was dominated by pornography, Viagra sales and the infamous Nigerian scam advance-fee fraud spam. Those types of spam are very much still with us but have been added to by phishing attacks, Pump-and-Dump scams (which involve artificially inflating the price of a stock in order to make a quick profit on stock previously purchased cheaply) and spam that tricks users into following URL links to web sites that download malicious code that will compromise their machines. The methods used by spammers to launch their attacks have also transformed over time. The vast majority of unsolicited is now being sent via vast armies of infected PCs known as botnets often these are the machines of home users who are unaware that they are part of the problem. This distributed system approach is making it more difficult to separate out spam s based upon simple network-based criteria, and so companies providing anti-spam technologies are having to provide more intelligent filtering solutions. 4 Test Report

5 In a recent interview, Dr Richard Cullen, distinguished engineer at SurfControl said, The threat landscape has changed dramatically over the past couple of years. Malware attacks are now commercial ventures, with well organized cybercrime gangs harnessing the power of vast botnet armies to launch spam, phishing, DDOS and malware attacks. The spammers are also always trying to find new ways of bypassing antispam defenses. One such technique that is on the increase is image spam s with images containing the spammer s messages within random text designed to foil less sophisticated spam filters. Peter Firstbrook, security research director for Gartner, has reported that image spam went from 6 percent of all spam in Q3 of 2006 to 30 percent by Q4, and it is now thought to make up almost 40% of all spam. Apart from being harder to block, image spam also causes knock-on problems because the spam messages are actually larger than simple text messages. According to some reports, the average size of a spam message has increased by 77% since September last year, from 6.62Kbytes to 11.76K) and continues steadily to grow. This adds to the cost of managing , it wastes bandwidth and also consumes storage if a company needs to archive all incoming mail. And according to the New York Times security columnist John Markoff, one recent botnet outbreak managed to consume 15% of Yahoo s resources while searching for random pieces of text to pad out such image-based messages. As a result, anti-spam vendors are now having to adapt to this new threat by both enhancing existing techniques such as heuristics rules to analyze the characteristics of image-based spam, and by adding new technology layers, such as optical character recognition technologies. Where will it all end? Test Report 5

6 Test Network WCL has a number of domains that collect genuine spam. These domains receive varying levels of spam and are consistent with different environments. To reflect the usage within a corporate environment, within each domain are a number of designated user accounts with a variety of practices and needs including some that are subscribed to a variety of newsgroups and mailing lists. Some user accounts actively contribute to mailing lists. The multiple domains designated for testing purposes were those that, between them, receive spam at a level consistent with the defined requirements of testing. Software solutions included in the test program were installed on servers that meet the minimum specifications required by the vendor. Appliance-based solutions were installed on the network according to the vendor s recommended placing. For hosted services, WCL testes through identified domains and changed the MX records to divert the mail stream through the hosted service. 6 Test Report

7 Test Methodology WCL initially performed the testing with an out-of-the-box configuration, changing only those settings on the solution needed to ensure correct operation inline with the vendors recommended installation and configuration procedures. Further testing was then be performed at following the vendor s advice for the tuning or training of the solution under test. WCL finetuned the solution each day of the test, spending no more than half an hour per day undertaking such work. Throughout the course of testing, a mixture of was be sent to the test domains from other addresses and domains controlled by WCL to mirror genuine activity common in business, for example requesting meetings, sending notifications to groups and non-business related social s. s were also be sent from web-based accounts such as Hotmail and Google s Gmail in order to simulate external users sending nonbusiness related social s, and home workers. Thus, during the testing period the domains received some spam, some list/newsgroup mailings and genuine individual s. Test Report 7

8 Product Test Reporting Product evaluation addresses three specific areas* - Management/ Administration, Functionality, Performance plus Additional Feature Testing. 1. Management/Administration Ease of Setup/Installation Ease of Use Logging and reporting function Rule creation Customization Content Categories 2. Functionality Processing Steps Allow/Blocking of Quarantine Area Additional functionality reporting Steps to Process Block Addresses Blacklist/Whitelist Allow Addresses 3. Performance Volume or Percentage of spam detected False positive rate Spam incorrectly passed through Legitimate mail blocked Legitimate subscription mail blocked 8 Test Report

9 Checkmark Certification Upon completion of the testing, individual product results are analyzed, resulting in accreditation to one of the two Checkmark Certifications for Anti-Spam subject to achieving the following catch rates:- Checkmark Anti-Spam Certification Premium 97% and over Catch Rate Checkmark Anti-Spam Certification Standard 90% and over Catch Rate Test Report 9

10 The Product Introduction Trend Micro s InterScan Gateway (IGSA) M-Series is designed to provide comprehensive protection from security threats for small to medium sized businesses. It achieves this by blocking threats at the Internet gateway to prevent them from entering the network and subsequently causing potential damage. The appliance includes numerous features for monitoring and protecting a network from services such as SMTP, HTTP, FTP and POP3. All testing for this Technology Report was carried out over the SMTP protocol. IGSA utilises the multi-layered antispam protection components incorporated into the device to significantly reduce the amount of Spam received. Specifically, they include the main Trend Micro Anti-Spam engine, Spam pattern file, Approved and Blocked senders lists and Network Reputation Services (RBL+ and QIL), which works in conjunction with IGSA to scan for and filter Spam. The initial protection provided by the Network Reputation Services (RBL+ and QIL), prevents many threats before the engine is invoked to filter Spam and s at the gateway. 10 Test Report

11 Installation and Configuration The in-line, rackmountable, hardware device has an LCD console on the front for initial navigation and configuration. At the rear, there is a power switch and connections available for Power, USB ports, a Serial Connection and gigabit Ethernet ports. There is also a further Ethernet 10/100 port interface available for configuration and management. Initial configuration consists of deciding whether to use a static or dynamic IP Address, and then setting up (if appropriate) the subnet mask, Gateway and primary and secondary DNS Server details. No alterations need to be made to the existing mail server, which means that there is no need to shut it down. This is a great benefit to any Administrator needing to avoid any potential downtime. Test Report 11

12 Interface Once the configuration values are entered, the product s SSL encrypted web-based console can be further used to configure the solution without any difficulty. The Administrator is initially presented with a screen that requires valid authentication details before a successful logon can occur. Upon a successful validation of credentials, there is complete access to the options that relate to the appliance s supported protocols and services, together with the appliance s logging, reporting and other administration features. Licensing is carried out via the webbased console and is a simple process merely consisting of entering the appropriate key. After the licence key validates, individual components and pattern files may be updated to ensure the latest and most current protection for the device. IGSA can protect and update without intervention. From the Update menu an Administrator may choose to configure and customise the different update settings provided with the update service. An Administrator may also choose to download updates manually if required. The navigation menu provides access to the various different categories and services supported such as summary statistics, logging, configuration settings for the various protocols supported, and device configuration. Each menu item expands to sub-categories that relate to the option selected. 12 Test Report

13 The web-based console is simple to navigate and descriptions are concise but helpful. This approach ensures that there is a short learning curve, which means that the Administrator is getting the most from the options, features and services provided by IGSA in a short period of time. Management options are sub-divided into self-explanatory menus with lots of on screen help available to aid less confident Administrators. Test Report 13

14 Configuration and Customisation The Content Scanning and Network Reputation Services menu items found under the Anti-Spam menu are key elements in the protection offered by IGSA - these enable an Administrator to control how IGSA should examine any potential Spam, and to determine the action that the solution should subsequentially take if Spam is detected. From these pages, scanning methods and actions for Spam may be configured to filter Spam against DNS blacklists, signature databases, and linguistic heuristics. Specifically, these include the main Trend Micro Anti-Spam engine, several Keyword Exceptions lists, an IP Profiler filter, an Approved and Blocked senders list that can be built by the company themselves, and Network Reputation Services (including the RBL+ and QIL databases). Configuring the Content Scanning on IGSA to scan SMTP traffic for unsolicited is a two-part process. A Spam detection rate level (Low, Medium, or High) needs to be selected and an appropriate action upon a trigger at this rate needs to be set. There are also optional settings that may be configured by the Administrator including the Approved Senders, Blocked Senders and Keyword Exception lists. 14 Test Report

15 The Low Spam detection level is the most unrestricted and default level of Spam detection that means IGSA will filter only the most obvious and common Spam messages but it is highly unlikely that it will filter false positives. The Medium Spam detection level is utilised by IGSA to monitor at a high level of Spam detection with a moderate chance of filtering false positives. The High Spam detection level is the most rigorous level of Spam detection and IGSA monitors all messages for suspicious files or text but this brings greater chance of false positives. Network Reputation Services also has low and high settings that utilise the Trend Micro Network Anti-Spam Services (RBL+ and QIL), to block Spam at the source. It accomplishes this by validating the IP address of the SMTP server sending the inbound mail to a list of known IP addresses. Both the Real-Time Black List and the QIL service are databases that contain the IP addresses of SMTP servers that originate Spam or are considered to be Spam open relay hosts. The QIL service also provides highly dynamic, real-time detection and blocking of currently active sources that may not yet have a history of sending Spam. For the duration of the training period and test concerned, each detection rate level for Low, Medium and High were individually selected to measure results for each of the settings over differing time periods. For IGSA to achieve optimum performance and best results, both the composite Spam scanning engine and the High setting in the Network Reputation Services screen need to be enabled. To aid statistical analysis, West Coast Labs engineers customised how the appliance handled mail regarded as Spam by setting the device to Pass all messages and prepend the subject line with an Test Report 15

16 Administrator defined string, for example (***SPAM***). This option enabled the engineers to quickly group together and analyse large amounts of and also to check for any messages incorrectly labelled as Spam. Other options available for each of the messages include Quarantine (that allows the device to deliver Spam to the user s Spam Mail folder), and Delete ( the appliance will entirely delete the message and any attachments). 16 Test Report

17 Reporting The Logs menu contains three links for Query, Settings and Maintenance that allow an Administrator to query logs based on certain criteria such as log type, protocol, time period and the number of entries displayed per page. These logs can be filtered for each of the various services supported by the device. Administrators can use many of these incorporated reporting utilities to generate useful status reports that summarise the overall performance of the device. A company may configure IGSA to notify users about Spam messages via , and the solution is also able to perform maintenance on logs, backup logs, or export logs to various alternative formats such as.csv. The Summary screen provides statistical information collected by the device for mail traffic that has been processed. This information may be filtered to make it simple to monitor the status of the device and the network over different periods of time including Today, Previous, Seven Days or Previous Thirty Days. Other useful data displayed on the Summary screen includes statistics for virus and malware detection, spyware/greyware detections, malicious code and various other reports about the common types of traffic (SMTP/POP3/HTTP/FTP). Test Report 17

18 If Spam logging is enabled, IGSA records Spam detections to the Anti- Spam: Content Scanning log or to the Anti-Spam: Network Reputation Services log. An Administrator also can export the contents of the Anti- Spam logs to alternative formats such as.csv for inclusion in external reports, or for further analysis in a spreadsheet application. 18 Test Report

19 Results Type of Mail Detected as Genuine Detected as Spam GENUINE 100% 0% SPAM 2% 98% Trend Micro s IGSA performed well, by delivering 100% of the genuine mail accurately and by rightly classifying 98% of the Spam mail. It is also worth noting that the service delivers a sizeable proportion of grey and list mail as genuine, which offers an organisation the flexibility and opportunity to define policies without missing mail that could potentially be business critical. West Coast Labs is pleased to announce that the Trend Micro s IGSA has reached the required standard for the Premium Anti-Spam Checkmark. Test Report 19

20 Conclusion The appliance is very straightforward to install, and can be quickly customised and configured with ease in a short period of time. The capability of IGSA of transparent functionality will be appreciated by company administrators, and both the administrators and the users alike will welcome the multi-layered protection against Spam that brings less interruptions to the busy working day. Configuration and management of the solution is easily achieved using the SSL encrypted web-based console. The interface for IGSA aids this greatly as it is sub-divided into self-explanatory menus with concise help dialogs. This ensures that administrators of the device do not have to have any specialist knowledge in order to get the device to function at the highest level of capability. The monitoring options available ensure that IGSA can be kept running at optimum performance at all times. The integration of the comprehensive protection and reporting utilities ensures that IGSA will certainly be a valuable asset to any small to medium sized business wanting to increase workplace productivity and to protect against unsolicited 20 Test Report

21 Security Features Buyers Guide IGSA deploys quickly to deliver the most complete, all-in-one defense from viruses, spyware, spam and other threats, before they can damage your network.igsa is designed for medium-sized businesses with between users, with an installed firewall/vpn solution, an IT staff with limited security expertise, and values simplicity and is cost conscious. Benefits to IT staff as stated by Trend Micro Fast, easy installation of appliance with a hardened operating system, pre-installed Secure Content Management software running on performance-optimized hardware One vendor to call saves you save time and money if you have a question Simplifies cleanup of spyware and malware from client desktops Add additional layer of security without impacting existing firewall/vpn Maximizes network uptime ensuring business continuity Updates automatically reducing your management time Reduces storage requirements by blocking more spam Increases network bandwidth by controlling employee Internet activity Enable end-user self-help for sorting spam from work and cleanup of spyware Test Report 21

22 Benefits to the Business Owner as stated by Trend Micro Saves you money - Quickens return on investment Protects information assets - Helps achieve regulatory compliance Helps ensure business continuity - Appliance will fail open if a problem occurs Limits legal liability - Helps with URL Filtering, limit access to objectionable sites Increases employee productivity - Improves employee satisfaction and therefore retention 22 Test Report

23 Security Features Buyers Guide IGSA Top Noteworthy Features All-in-one Internet Gateway Solution protecting both mail and Web with hardware, software, and support packaged together Award-winning Anti-virus and Spyware protection with automated desktop cleanup (Damage Cleanup Services) Multi-layered Spam Blocking with Reputation (AKA Network Reputation Service) removing the majority (up to 80%)of your spam burden, and an optimized spam scanning engine to handle the remainder Remote, Hosted Scanning Services for Spam and URL Filtering - Stop threats at the source, for better security and scanning detection - Offload processor-intensive features, for better appliance performance (blocking spam before it reaches your network gateway) Prevents Data leakage (personal information and confidential company data) through Inbound and Outbound Scanning Intuitive Web UI makes seriously powerful security-simple to live with and requires much less administration Ideal Branch Office Gateway Security solution with centralized management from TMCM (Trend Micro Control Manager) Hardware Flexibility and Scalability, license key upgrades mean no hardware-upgrade needed in the future Support of TrendLabs with 24/7 phone and online service, 2-hour virus support, and all backed by a global team of security experts working tirelessly on your behalf Test Report 23

24 US SALES T EUROPE SALES T GLOBAL HEADQUARTERS West Coast Labs William Knox House Britannic Way Llandarcy Swansea SA10 6EL, UK

MXSweep Hosted Email Protection

MXSweep Hosted Email Protection ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740

More information

Test Report October 2007. InterScan Messaging Security Suite. Anti-Spam Technology Report

Test Report October 2007. InterScan Messaging Security Suite. Anti-Spam Technology Report Test Report October 2007 InterScan Messaging Security Suite Anti-Spam Technology Report Vendor Details Name: Trend Micro Inc. Address: 10101 N. De Anza Blvd., Cupertino, CA - 95014, USA Telephone: + 1

More information

Test Report September 2007. Netcore's Emergic CleanMail Service. Anti-Spam Technology Report

Test Report September 2007. Netcore's Emergic CleanMail Service. Anti-Spam Technology Report Test Report September 2007 Netcore's Emergic CleanMail Service Anti-Spam Technology Report Vendor Details Name: NetCore Solutions Pvt Ltd. Address: 402, Peninsula Chambers, Peninsula Corporate Park, Ganpat

More information

SurfControl EmailFilter for SMTP

SurfControl EmailFilter for SMTP ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SurfControl EmailFilter for SMTP JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS SurfControl EmailFilter for SMTP SurfControl,

More information

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. Email Systems Managed Service. www.westcoastlabs.org

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. Email Systems Managed Service. www.westcoastlabs.org ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 Email Systems Managed Service 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents Email Systems Managed Service Test objectives and scenario...3 Test network...4

More information

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 SurfControl Email Filter 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents SurfControl Email Filter Test objectives and scenario...3 Test network...4

More information

GFI Mail Essentials for Exchange/SMTP

GFI Mail Essentials for Exchange/SMTP ANTI SPAM SOLUTIONS TECHNOLOGY REPORT GFI Mail Essentials for Exchange/SMTP NOVEMBER 2006 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Mail Essentials for Exchange/SMTP GfI Software,

More information

Email Systems Managed Service

Email Systems Managed Service ANTI SPAM SOLUTIONS TECHNOLOGY REPORT Email Systems Managed Service JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Email Systems Email Systems Limited,Cart Lodge,Goodley

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3

More information

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

Technology Report July 2007. Trend Micro InterScan Gateway Security Appliance. Content Filtering Technology Report

Technology Report July 2007. Trend Micro InterScan Gateway Security Appliance. Content Filtering Technology Report Technology Report July 2007 Trend Micro InterScan Gateway Security Appliance Content Filtering Technology Report Vendor Details Name: Trend Micro Address: Trend Micro Inc., 10101 N. De Anza Blvd, Cupertino,

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

Powerful and reliable virus and spam protection for your GMS installation

Powerful and reliable virus and spam protection for your GMS installation Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Stop Spam. Save Time.

Stop Spam. Save Time. Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Protect Your Enterprise With the Leader in Secure Email Boundary Services

Protect Your Enterprise With the Leader in Secure Email Boundary Services Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200 800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A

More information

IronPort C300 for Medium-Sized Enterprises and Satellite Offices

IronPort C300 for Medium-Sized Enterprises and Satellite Offices I r o n P o r t A p p l i a n c e s H I G H - P E R F O R M A N C E E M A I L S E C U R I T Y. C A R R I E R - P R O V E N T E C H N O L O G Y. E N T E R P R I S E - C L A S S M A N A G E M E N T. IronPort

More information

T E C H N I C A L S A L E S S O L U T I O N

T E C H N I C A L S A L E S S O L U T I O N Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg. STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Email Security for Small Businesses: What's the Right Solution For You?

Email Security for Small Businesses: What's the Right Solution For You? Postini White Paper Email Security for Small Businesses: What's the Right Solution For You? The Small Business Dilemma: Fighting Growing Email Threats with Fewer Resources Many small businesses today face

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1 Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Anti Spam Best Practices

Anti Spam Best Practices 53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

Microsoft Exchange 2003

Microsoft Exchange 2003 Microsoft Exchange 2003 Configuration Guide Microsoft Exchange 2003 Configuration Guide Page 1 Table of Contents Introduction... 2 Document and naming conventions... 2 Outbound email protection... 3 SMTP

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even

More information

Websense Web Security Solutions

Websense Web Security Solutions Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86% Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity

More information

TREND MICRO. InterScan VirusWall 6. SMTP Configuration Guide. Integrated virus and spam protection for your Internet gateway.

TREND MICRO. InterScan VirusWall 6. SMTP Configuration Guide. Integrated virus and spam protection for your Internet gateway. TM TREND MICRO TM TM InterScan VirusWall 6 Integrated virus and spam protection for your Internet gateway for Linux TM SMTP Configuration Guide Trend Micro Incorporated reserves the right to make changes

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

QUICK START GUIDE. Cisco C170 Email Security Appliance

QUICK START GUIDE. Cisco C170 Email Security Appliance 1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions. SafeNet Content Security esafe SmartSuite - Security that Thinks Real-time, Smart and Simple Web and Mail Security Solutions Product Overview Malware CONTENT SECURITY Antivirus Malware A secure Web gateway

More information

Symantec AntiVirus Enterprise Edition

Symantec AntiVirus Enterprise Edition Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

Cisco ASA 5500 Series Business Edition

Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

Symantec Messaging Gateway powered by Brightmail

Symantec Messaging Gateway powered by Brightmail The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced

More information

The Advantages of Security as a Service versus On-Premise Security

The Advantages of Security as a Service versus On-Premise Security The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred

More information

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Cisco ASA 5500 Series Content Security Edition for the Enterprise Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources, disrupting business operations and impacting business transactions. The

More information

Panda Cloud Email Protection

Panda Cloud Email Protection Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)

More information

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product

More information

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

Core Protection Suite

Core Protection Suite Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

Hosted Security Integration with Microsoft Office 365

Hosted  Security Integration with Microsoft Office 365 A Trend Micro Integration Guide I July 2016 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365 customers

More information

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Aloaha Mail and Archive

Aloaha Mail and Archive Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

A Guide to Understanding Hosted and Managed Messaging

A Guide to Understanding Hosted and Managed Messaging A Guide to Understanding Hosted and Managed Messaging An Osterman Research White Paper sponsored by Published August 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond,

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

IronPort X1000 Email Security System

IronPort X1000 Email Security System I r o n P o r t A p p l i a n c e s T H E U LT I M AT E E M A I L S E C U R I T Y S Y S T E M F O R T H E W O R L D S M O S T D E M A N D I N G N E T W O R K S. IronPort X1000 Email Security System O v

More information

A D M I N I S T R A T O R V 1. 0

A D M I N I S T R A T O R V 1. 0 A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA

More information

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

IronPort C10 for Small and Medium Businesses

IronPort C10 for Small and Medium Businesses I r o n P o r t A p p l i a n c e s S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A S T R U C T U R E. IronPort

More information

The Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc.

The Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc. The Latest Internet Threats to Affect Your Organisation Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc. Agenda Spam Trends Staying Ahead Blended Threats Spam Trends What Do Dick Cheney & Bill

More information

Cisco IronPort X1070 Email Security System

Cisco IronPort X1070 Email Security System Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The

More information

Tumbleweed MailGate Secure Messenger

Tumbleweed MailGate Secure Messenger EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces

More information

Protecting the Infrastructure: Symantec Web Gateway

Protecting the Infrastructure: Symantec Web Gateway Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Cisco ASA 5500 Series Anti-X Edition for the Enterprise Solution Overview Cisco ASA 5500 Series Anti-X Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources disrupting business operations and impacting business transactions.

More information

Secured email Enterprise eprivacy Suite

Secured email Enterprise eprivacy Suite EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI Product Comparison GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI MailEssentials Trend Micro ScanMail Suite Microsoft Exchange Server 2003/2007/2010/2013 Integration Option

More information

Websense Email Security Transition Guide

Websense Email Security Transition Guide Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011

More information

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control

More information

Implementing MDaemon as an Email Security Gateway to Exchange Server

Implementing MDaemon as an Email Security Gateway to Exchange Server Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with

More information

BitDefender for Microsoft ISA Servers Standard Edition

BitDefender for Microsoft ISA Servers Standard Edition BitDefender for Microsoft ISA Servers Standard Edition Copyright 2006 SOFTWIN Edition 1. How Does It Work? As content entering or leaving your company must meet security policies, it is crucial to choose

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

The Leading Email Security Suites

The Leading Email Security Suites The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server

More information

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current

More information