Test Report June Trend Micro Interscan Gateway Security Appliance. Anti-Spam Technology Report
|
|
- Beatrice Campbell
- 8 years ago
- Views:
Transcription
1 Test Report June 2007 Trend Micro Interscan Gateway Security Appliance Anti-Spam Technology Report
2 Vendor Details Name: Trend Micro Address: Trend Micro Inc N. De Anza Blvd, Cupertino, CA , USA Telephone: + 1 (800) / + 1 (408) Website: Product: IGSA Version 1.0 Build 1272 Test Laboratory Details Name: West Coast Labs Address: William Knox House, Britannic Way, Llandarcy, Swansea, UK, SA10 9EL Telephone: +44 (0) Date: June 2007 Issue 1.0 Author: G. Samuel Contact Point Contact name: M. Garrard Contact telephone number: +44 (0) Test Report
3 Contents Introduction 4 Test Network 6 Test Methodology 7 Product Test Reporting 8 Checkmark Certification 9 The Product 10 Test Report 11 Test Results 19 West Coast Labs Conclusion 20 Security Features Buyers Guide 21 Test Report 3
4 Introduction The ever evolving spam threat Two years from now, spam will be solved. Bill Gates Jan At the beginning of 2004, Bill Gates was addressing the World Economic Forum in Switzerland and confidently predicted that Two years from now, spam will be solved. Sadly his prophecy has proved somewhat wide of the mark as reports continue to emerge about the size of the problem. The latter half of 2006 saw an unprecedented rise in spam volumes with SurfControl reporting a 50% increase in spam over the previous half year, and spam now accounting for almost 90% of all traffic on the Internet. The nature of spam has also changed. In 2004 spam content was dominated by pornography, Viagra sales and the infamous Nigerian scam advance-fee fraud spam. Those types of spam are very much still with us but have been added to by phishing attacks, Pump-and-Dump scams (which involve artificially inflating the price of a stock in order to make a quick profit on stock previously purchased cheaply) and spam that tricks users into following URL links to web sites that download malicious code that will compromise their machines. The methods used by spammers to launch their attacks have also transformed over time. The vast majority of unsolicited is now being sent via vast armies of infected PCs known as botnets often these are the machines of home users who are unaware that they are part of the problem. This distributed system approach is making it more difficult to separate out spam s based upon simple network-based criteria, and so companies providing anti-spam technologies are having to provide more intelligent filtering solutions. 4 Test Report
5 In a recent interview, Dr Richard Cullen, distinguished engineer at SurfControl said, The threat landscape has changed dramatically over the past couple of years. Malware attacks are now commercial ventures, with well organized cybercrime gangs harnessing the power of vast botnet armies to launch spam, phishing, DDOS and malware attacks. The spammers are also always trying to find new ways of bypassing antispam defenses. One such technique that is on the increase is image spam s with images containing the spammer s messages within random text designed to foil less sophisticated spam filters. Peter Firstbrook, security research director for Gartner, has reported that image spam went from 6 percent of all spam in Q3 of 2006 to 30 percent by Q4, and it is now thought to make up almost 40% of all spam. Apart from being harder to block, image spam also causes knock-on problems because the spam messages are actually larger than simple text messages. According to some reports, the average size of a spam message has increased by 77% since September last year, from 6.62Kbytes to 11.76K) and continues steadily to grow. This adds to the cost of managing , it wastes bandwidth and also consumes storage if a company needs to archive all incoming mail. And according to the New York Times security columnist John Markoff, one recent botnet outbreak managed to consume 15% of Yahoo s resources while searching for random pieces of text to pad out such image-based messages. As a result, anti-spam vendors are now having to adapt to this new threat by both enhancing existing techniques such as heuristics rules to analyze the characteristics of image-based spam, and by adding new technology layers, such as optical character recognition technologies. Where will it all end? Test Report 5
6 Test Network WCL has a number of domains that collect genuine spam. These domains receive varying levels of spam and are consistent with different environments. To reflect the usage within a corporate environment, within each domain are a number of designated user accounts with a variety of practices and needs including some that are subscribed to a variety of newsgroups and mailing lists. Some user accounts actively contribute to mailing lists. The multiple domains designated for testing purposes were those that, between them, receive spam at a level consistent with the defined requirements of testing. Software solutions included in the test program were installed on servers that meet the minimum specifications required by the vendor. Appliance-based solutions were installed on the network according to the vendor s recommended placing. For hosted services, WCL testes through identified domains and changed the MX records to divert the mail stream through the hosted service. 6 Test Report
7 Test Methodology WCL initially performed the testing with an out-of-the-box configuration, changing only those settings on the solution needed to ensure correct operation inline with the vendors recommended installation and configuration procedures. Further testing was then be performed at following the vendor s advice for the tuning or training of the solution under test. WCL finetuned the solution each day of the test, spending no more than half an hour per day undertaking such work. Throughout the course of testing, a mixture of was be sent to the test domains from other addresses and domains controlled by WCL to mirror genuine activity common in business, for example requesting meetings, sending notifications to groups and non-business related social s. s were also be sent from web-based accounts such as Hotmail and Google s Gmail in order to simulate external users sending nonbusiness related social s, and home workers. Thus, during the testing period the domains received some spam, some list/newsgroup mailings and genuine individual s. Test Report 7
8 Product Test Reporting Product evaluation addresses three specific areas* - Management/ Administration, Functionality, Performance plus Additional Feature Testing. 1. Management/Administration Ease of Setup/Installation Ease of Use Logging and reporting function Rule creation Customization Content Categories 2. Functionality Processing Steps Allow/Blocking of Quarantine Area Additional functionality reporting Steps to Process Block Addresses Blacklist/Whitelist Allow Addresses 3. Performance Volume or Percentage of spam detected False positive rate Spam incorrectly passed through Legitimate mail blocked Legitimate subscription mail blocked 8 Test Report
9 Checkmark Certification Upon completion of the testing, individual product results are analyzed, resulting in accreditation to one of the two Checkmark Certifications for Anti-Spam subject to achieving the following catch rates:- Checkmark Anti-Spam Certification Premium 97% and over Catch Rate Checkmark Anti-Spam Certification Standard 90% and over Catch Rate Test Report 9
10 The Product Introduction Trend Micro s InterScan Gateway (IGSA) M-Series is designed to provide comprehensive protection from security threats for small to medium sized businesses. It achieves this by blocking threats at the Internet gateway to prevent them from entering the network and subsequently causing potential damage. The appliance includes numerous features for monitoring and protecting a network from services such as SMTP, HTTP, FTP and POP3. All testing for this Technology Report was carried out over the SMTP protocol. IGSA utilises the multi-layered antispam protection components incorporated into the device to significantly reduce the amount of Spam received. Specifically, they include the main Trend Micro Anti-Spam engine, Spam pattern file, Approved and Blocked senders lists and Network Reputation Services (RBL+ and QIL), which works in conjunction with IGSA to scan for and filter Spam. The initial protection provided by the Network Reputation Services (RBL+ and QIL), prevents many threats before the engine is invoked to filter Spam and s at the gateway. 10 Test Report
11 Installation and Configuration The in-line, rackmountable, hardware device has an LCD console on the front for initial navigation and configuration. At the rear, there is a power switch and connections available for Power, USB ports, a Serial Connection and gigabit Ethernet ports. There is also a further Ethernet 10/100 port interface available for configuration and management. Initial configuration consists of deciding whether to use a static or dynamic IP Address, and then setting up (if appropriate) the subnet mask, Gateway and primary and secondary DNS Server details. No alterations need to be made to the existing mail server, which means that there is no need to shut it down. This is a great benefit to any Administrator needing to avoid any potential downtime. Test Report 11
12 Interface Once the configuration values are entered, the product s SSL encrypted web-based console can be further used to configure the solution without any difficulty. The Administrator is initially presented with a screen that requires valid authentication details before a successful logon can occur. Upon a successful validation of credentials, there is complete access to the options that relate to the appliance s supported protocols and services, together with the appliance s logging, reporting and other administration features. Licensing is carried out via the webbased console and is a simple process merely consisting of entering the appropriate key. After the licence key validates, individual components and pattern files may be updated to ensure the latest and most current protection for the device. IGSA can protect and update without intervention. From the Update menu an Administrator may choose to configure and customise the different update settings provided with the update service. An Administrator may also choose to download updates manually if required. The navigation menu provides access to the various different categories and services supported such as summary statistics, logging, configuration settings for the various protocols supported, and device configuration. Each menu item expands to sub-categories that relate to the option selected. 12 Test Report
13 The web-based console is simple to navigate and descriptions are concise but helpful. This approach ensures that there is a short learning curve, which means that the Administrator is getting the most from the options, features and services provided by IGSA in a short period of time. Management options are sub-divided into self-explanatory menus with lots of on screen help available to aid less confident Administrators. Test Report 13
14 Configuration and Customisation The Content Scanning and Network Reputation Services menu items found under the Anti-Spam menu are key elements in the protection offered by IGSA - these enable an Administrator to control how IGSA should examine any potential Spam, and to determine the action that the solution should subsequentially take if Spam is detected. From these pages, scanning methods and actions for Spam may be configured to filter Spam against DNS blacklists, signature databases, and linguistic heuristics. Specifically, these include the main Trend Micro Anti-Spam engine, several Keyword Exceptions lists, an IP Profiler filter, an Approved and Blocked senders list that can be built by the company themselves, and Network Reputation Services (including the RBL+ and QIL databases). Configuring the Content Scanning on IGSA to scan SMTP traffic for unsolicited is a two-part process. A Spam detection rate level (Low, Medium, or High) needs to be selected and an appropriate action upon a trigger at this rate needs to be set. There are also optional settings that may be configured by the Administrator including the Approved Senders, Blocked Senders and Keyword Exception lists. 14 Test Report
15 The Low Spam detection level is the most unrestricted and default level of Spam detection that means IGSA will filter only the most obvious and common Spam messages but it is highly unlikely that it will filter false positives. The Medium Spam detection level is utilised by IGSA to monitor at a high level of Spam detection with a moderate chance of filtering false positives. The High Spam detection level is the most rigorous level of Spam detection and IGSA monitors all messages for suspicious files or text but this brings greater chance of false positives. Network Reputation Services also has low and high settings that utilise the Trend Micro Network Anti-Spam Services (RBL+ and QIL), to block Spam at the source. It accomplishes this by validating the IP address of the SMTP server sending the inbound mail to a list of known IP addresses. Both the Real-Time Black List and the QIL service are databases that contain the IP addresses of SMTP servers that originate Spam or are considered to be Spam open relay hosts. The QIL service also provides highly dynamic, real-time detection and blocking of currently active sources that may not yet have a history of sending Spam. For the duration of the training period and test concerned, each detection rate level for Low, Medium and High were individually selected to measure results for each of the settings over differing time periods. For IGSA to achieve optimum performance and best results, both the composite Spam scanning engine and the High setting in the Network Reputation Services screen need to be enabled. To aid statistical analysis, West Coast Labs engineers customised how the appliance handled mail regarded as Spam by setting the device to Pass all messages and prepend the subject line with an Test Report 15
16 Administrator defined string, for example (***SPAM***). This option enabled the engineers to quickly group together and analyse large amounts of and also to check for any messages incorrectly labelled as Spam. Other options available for each of the messages include Quarantine (that allows the device to deliver Spam to the user s Spam Mail folder), and Delete ( the appliance will entirely delete the message and any attachments). 16 Test Report
17 Reporting The Logs menu contains three links for Query, Settings and Maintenance that allow an Administrator to query logs based on certain criteria such as log type, protocol, time period and the number of entries displayed per page. These logs can be filtered for each of the various services supported by the device. Administrators can use many of these incorporated reporting utilities to generate useful status reports that summarise the overall performance of the device. A company may configure IGSA to notify users about Spam messages via , and the solution is also able to perform maintenance on logs, backup logs, or export logs to various alternative formats such as.csv. The Summary screen provides statistical information collected by the device for mail traffic that has been processed. This information may be filtered to make it simple to monitor the status of the device and the network over different periods of time including Today, Previous, Seven Days or Previous Thirty Days. Other useful data displayed on the Summary screen includes statistics for virus and malware detection, spyware/greyware detections, malicious code and various other reports about the common types of traffic (SMTP/POP3/HTTP/FTP). Test Report 17
18 If Spam logging is enabled, IGSA records Spam detections to the Anti- Spam: Content Scanning log or to the Anti-Spam: Network Reputation Services log. An Administrator also can export the contents of the Anti- Spam logs to alternative formats such as.csv for inclusion in external reports, or for further analysis in a spreadsheet application. 18 Test Report
19 Results Type of Mail Detected as Genuine Detected as Spam GENUINE 100% 0% SPAM 2% 98% Trend Micro s IGSA performed well, by delivering 100% of the genuine mail accurately and by rightly classifying 98% of the Spam mail. It is also worth noting that the service delivers a sizeable proportion of grey and list mail as genuine, which offers an organisation the flexibility and opportunity to define policies without missing mail that could potentially be business critical. West Coast Labs is pleased to announce that the Trend Micro s IGSA has reached the required standard for the Premium Anti-Spam Checkmark. Test Report 19
20 Conclusion The appliance is very straightforward to install, and can be quickly customised and configured with ease in a short period of time. The capability of IGSA of transparent functionality will be appreciated by company administrators, and both the administrators and the users alike will welcome the multi-layered protection against Spam that brings less interruptions to the busy working day. Configuration and management of the solution is easily achieved using the SSL encrypted web-based console. The interface for IGSA aids this greatly as it is sub-divided into self-explanatory menus with concise help dialogs. This ensures that administrators of the device do not have to have any specialist knowledge in order to get the device to function at the highest level of capability. The monitoring options available ensure that IGSA can be kept running at optimum performance at all times. The integration of the comprehensive protection and reporting utilities ensures that IGSA will certainly be a valuable asset to any small to medium sized business wanting to increase workplace productivity and to protect against unsolicited 20 Test Report
21 Security Features Buyers Guide IGSA deploys quickly to deliver the most complete, all-in-one defense from viruses, spyware, spam and other threats, before they can damage your network.igsa is designed for medium-sized businesses with between users, with an installed firewall/vpn solution, an IT staff with limited security expertise, and values simplicity and is cost conscious. Benefits to IT staff as stated by Trend Micro Fast, easy installation of appliance with a hardened operating system, pre-installed Secure Content Management software running on performance-optimized hardware One vendor to call saves you save time and money if you have a question Simplifies cleanup of spyware and malware from client desktops Add additional layer of security without impacting existing firewall/vpn Maximizes network uptime ensuring business continuity Updates automatically reducing your management time Reduces storage requirements by blocking more spam Increases network bandwidth by controlling employee Internet activity Enable end-user self-help for sorting spam from work and cleanup of spyware Test Report 21
22 Benefits to the Business Owner as stated by Trend Micro Saves you money - Quickens return on investment Protects information assets - Helps achieve regulatory compliance Helps ensure business continuity - Appliance will fail open if a problem occurs Limits legal liability - Helps with URL Filtering, limit access to objectionable sites Increases employee productivity - Improves employee satisfaction and therefore retention 22 Test Report
23 Security Features Buyers Guide IGSA Top Noteworthy Features All-in-one Internet Gateway Solution protecting both mail and Web with hardware, software, and support packaged together Award-winning Anti-virus and Spyware protection with automated desktop cleanup (Damage Cleanup Services) Multi-layered Spam Blocking with Reputation (AKA Network Reputation Service) removing the majority (up to 80%)of your spam burden, and an optimized spam scanning engine to handle the remainder Remote, Hosted Scanning Services for Spam and URL Filtering - Stop threats at the source, for better security and scanning detection - Offload processor-intensive features, for better appliance performance (blocking spam before it reaches your network gateway) Prevents Data leakage (personal information and confidential company data) through Inbound and Outbound Scanning Intuitive Web UI makes seriously powerful security-simple to live with and requires much less administration Ideal Branch Office Gateway Security solution with centralized management from TMCM (Trend Micro Control Manager) Hardware Flexibility and Scalability, license key upgrades mean no hardware-upgrade needed in the future Support of TrendLabs with 24/7 phone and online service, 2-hour virus support, and all backed by a global team of security experts working tirelessly on your behalf Test Report 23
24 US SALES T EUROPE SALES T GLOBAL HEADQUARTERS West Coast Labs William Knox House Britannic Way Llandarcy Swansea SA10 6EL, UK
MXSweep Hosted Email Protection
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740
More informationTest Report October 2007. InterScan Messaging Security Suite. Anti-Spam Technology Report
Test Report October 2007 InterScan Messaging Security Suite Anti-Spam Technology Report Vendor Details Name: Trend Micro Inc. Address: 10101 N. De Anza Blvd., Cupertino, CA - 95014, USA Telephone: + 1
More informationTest Report September 2007. Netcore's Emergic CleanMail Service. Anti-Spam Technology Report
Test Report September 2007 Netcore's Emergic CleanMail Service Anti-Spam Technology Report Vendor Details Name: NetCore Solutions Pvt Ltd. Address: 402, Peninsula Chambers, Peninsula Corporate Park, Ganpat
More informationSurfControl EmailFilter for SMTP
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SurfControl EmailFilter for SMTP JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS SurfControl EmailFilter for SMTP SurfControl,
More informationANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. SurfControl Email Filter. www.westcoastlabs.org
ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 SurfControl Email Filter 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents SurfControl Email Filter Test objectives and scenario...3 Test network...4
More informationANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006. Email Systems Managed Service. www.westcoastlabs.org
ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY 2006 Email Systems Managed Service 2 ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT Contents Email Systems Managed Service Test objectives and scenario...3 Test network...4
More informationGFI Mail Essentials for Exchange/SMTP
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT GFI Mail Essentials for Exchange/SMTP NOVEMBER 2006 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Mail Essentials for Exchange/SMTP GfI Software,
More informationEmail Systems Managed Service
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT Email Systems Managed Service JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS Email Systems Email Systems Limited,Cart Lodge,Goodley
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
More informationTechnology Report July 2007. Trend Micro InterScan Gateway Security Appliance. Content Filtering Technology Report
Technology Report July 2007 Trend Micro InterScan Gateway Security Appliance Content Filtering Technology Report Vendor Details Name: Trend Micro Address: Trend Micro Inc., 10101 N. De Anza Blvd, Cupertino,
More informationCisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
More informationK7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationCopyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
More informationeprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationSymantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
More informationStop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
More informationPowerful and reliable virus and spam protection for your GMS installation
Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise
More informationMDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
More informationWEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
More informationIronPort C300 for Medium-Sized Enterprises and Satellite Offices
I r o n P o r t A p p l i a n c e s H I G H - P E R F O R M A N C E E M A I L S E C U R I T Y. C A R R I E R - P R O V E N T E C H N O L O G Y. E N T E R P R I S E - C L A S S M A N A G E M E N T. IronPort
More informationProtect Your Enterprise With the Leader in Secure Email Boundary Services
Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise
More informationSystem Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
More informationEvaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
More informationT E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
More informationCloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
More informationReviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
More informationAnti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
More informationMicrosoft Exchange 2003
Microsoft Exchange 2003 Configuration Guide Microsoft Exchange 2003 Configuration Guide Page 1 Table of Contents Introduction... 2 Document and naming conventions... 2 Outbound email protection... 3 SMTP
More informationIntercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
More informationEmail Security for Small Businesses: What's the Right Solution For You?
Postini White Paper Email Security for Small Businesses: What's the Right Solution For You? The Small Business Dilemma: Fighting Growing Email Threats with Fewer Resources Many small businesses today face
More informationAVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
More informationSTPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.
STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication
More informationEiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
More informationAdvantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
More informationisheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationWebsense Web Security Solutions
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people
More informationSimplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%
Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity
More informationSoftware Engineering 4C03 SPAM
Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as
More informationMailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
More informationE-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product
More informationwww.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach
100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...
More informationThe Advantages of Security as a Service versus On-Premise Security
The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationSymantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
More informationAnti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
More informationComprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
More informationeprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
More informationSafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.
SafeNet Content Security esafe SmartSuite - Security that Thinks Real-time, Smart and Simple Web and Mail Security Solutions Product Overview Malware CONTENT SECURITY Antivirus Malware A secure Web gateway
More informationQUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
More informationSymantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
More informationSymantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
More informationTREND MICRO. InterScan VirusWall 6. SMTP Configuration Guide. Integrated virus and spam protection for your Internet gateway.
TM TREND MICRO TM TM InterScan VirusWall 6 Integrated virus and spam protection for your Internet gateway for Linux TM SMTP Configuration Guide Trend Micro Incorporated reserves the right to make changes
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationWhen Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
More informationPanda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
More informationSPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
More informationitg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
More informationCommtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
More informationA Guide to Understanding Hosted and Managed Messaging
A Guide to Understanding Hosted and Managed Messaging An Osterman Research White Paper sponsored by Published August 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond,
More informationCisco ASA 5500 Series Business Edition
Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive
More informationThe Leading Email Security Suites
The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server
More informationFortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
More informationThe Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc.
The Latest Internet Threats to Affect Your Organisation Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc. Agenda Spam Trends Staying Ahead Blended Threats Spam Trends What Do Dick Cheney & Bill
More informationAloaha Mail and Archive
Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally
More informationWEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
More informationIronPort C10 for Small and Medium Businesses
I r o n P o r t A p p l i a n c e s S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A S T R U C T U R E. IronPort
More informationReliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow
Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces
More informationCisco ASA 5500 Series Content Security Edition for the Enterprise
Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources, disrupting business operations and impacting business transactions. The
More informationIronPort X1000 Email Security System
I r o n P o r t A p p l i a n c e s T H E U LT I M AT E E M A I L S E C U R I T Y S Y S T E M F O R T H E W O R L D S M O S T D E M A N D I N G N E T W O R K S. IronPort X1000 Email Security System O v
More informationCore Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
More informationFirewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
More informationTrend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
More informationA D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
More informationWebsense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
More informationV1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
More informationGFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange
GFI Product Comparison GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI MailEssentials Trend Micro ScanMail Suite Microsoft Exchange Server 2003/2007/2010/2013 Integration Option
More informationData Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
More informationanomaly, thus reported to our central servers.
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
More informationGFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
More informationProtecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
More information1 You will need the following items to get started:
QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide
More informationTumbleweed MailGate Secure Messenger
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed
More informationCisco IronPort X1070 Email Security System
Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The
More informationImplementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
More informationProactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.
Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control
More informationTrend Micro Email Encryption (TMEE) Delivering Secure Email. Veli-Pekka Kusmin Pre-Sales Engineer
Trend Micro Email Encryption (TMEE) Delivering Secure Email Veli-Pekka Kusmin Pre-Sales Engineer Trend Micro Baltics & Finland October 2009 Example #1 True or false: Email is inherently insecure. Answer:
More informationSecured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
More informationFortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
More informationWildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
More informationPART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
More informationQuick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
More informationThe Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
More informationNetwork Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
More informationCYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com
CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current
More information