Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements"

Transcription

1 Technology Blueprint Protect Your Get strong security despite increasing volumes, threats, and green requirements

2 LEVEL SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL Security Connected The Security Connected framework from McAfee enables integration of multiple products, services, and partnerships for SECURITY CONNECTED centralized, efficient, and REFERENCE ARCHITECTURE effective risk mitigation. Built on LEVEL more than two 1decades 2 3 of 4 5 proven security practices, the Security Connected approach helps organizations of all sizes and segments across all geographies improve security postures, optimize security for greater cost effectiveness, and align security strategically SECURITY with business CONNECTED initiatives. The REFERENCE Security Connected ARCHITECTURE Reference Architecture provides a concrete LEVEL path from 1 ideas 2 3 to 4 5 implementation. Use it to adapt the Security Connected concepts to your unique risks, infrastructure, and business objectives. McAfee is relentlessly focused on finding new ways to keep our customers safe. Get strong security despite increasing volumes, threats, and green requirements The Situation is one of the most widely used vectors of attack today. As the environment becomes more complex, with attachments, embedded pictures, links, and executable code, our approach to protecting against threats must also take on a more robust and layered model to be effective. There is also the inadvertent employee or the malicious insider that may send out confidential information that may be damaging to the organization or violate a compliance standard such as HIPAA or GLBA. Additionally, organizations are also considering green initiatives to reduce data center footprint and power consumption while maintaining high availability and performance. All of these challenges require security to be ever evolving to ensure the gates remain locked against one of the most tried and true avenues of attack. Driving Concerns Discerning which s are your run of the mill spam and which contain malware has become more difficult as the methods of sending spam and malware have become more sophisticated. Layer on top of that difficulty the very elaborate methods cybercriminals employ to solicit a user to click on a link or an image with embedded malicious code. For example, with social media and personal information available in the open, spearphishing has become more believable and reliable. Tests show almost 1 in 5 employees will click on links in phishing s and give out confidential information. 1 Protecting inbound traffic is also no longer enough. Every organization has some confidential information, such as pending mergers, financials, or design specifications, that needs to be prevented from leaving the organization via . Due to the global nature of mail now as well as complex collaboration with other business partners, there may be a need to treat mail with actions such as encryption or additional logging. As you move to address these threats, other business realities add complexity. Because it is a staple of conducting business, volumes are ever increasing, so scalability is critical. You must also provide continuity for and go green, reduce the on-premises footprint, in compliance with green initiatives. These conditions sum up to four specific challenges as you move to protect both inbound and outbound without negatively affecting your organization s ability to do business: Spam/Phishing/Virus detection. The bread and butter of any solution is to detect and block these unwanted s with a very low percentage of false positives Knowing who the good senders are. With today s volumes, separating the good and bad through content scanning, AV scanning, Bayesian Analysis, and other techniques is not enough. A solution must be able to determine reputation of the sender based on past behavior, domain, or IP association, and other characteristics that can be filtered prior to delivering to your servers. Without this first layer of filtering by reputation, any corporate infrastructure will work harder than it needs to and have to rely on constant updates. This leaves the environment less effective at catching clean sent with malicious intent. Data loss prevention (DLP). With mail being an easy way for intentional or accidental loss of confidential data, you must be able to detect and block outbound company confidential information contained in an or its attachments. Well-intentioned to the wrong recipient has caused both embarrassment and unintentional data loss. 2 Protecting

3 Standards compliance. Detect messages that are subject to a regulatory or governance policy and process them accordingly via encryption, archiving, logging, or other required processes Provide business continuity and reduced footprint. There is a trend to use cloud-based services to reduce on-premises equipment while providing business continuity in the event of an outage or disaster. A layered approach allows to be received and stored off site when connectivity to on-premises equipment is interrupted. Users need to be able to read and respond to during an extended outage. Solution Description An effective solution will layer cloud-based protection in front of on-premises equipment, enabling processing efficiencies as well as compliance with business and green requirements. Each of the following components of the solution must achieve its goal with a very high detection rate combined with a very low false positive percentage. Detection is only the first step, as the solution must also be able to take multiple actions on the items detected and send notifications where appropriate. Spam/Phishing/Virus detection. As attack techniques have changed, new methods of trying to get a user to click on a link have become more successful. Most attacks now rely on multiple vectors for full deployment. For successful detection of these new attack vectors, McAfee recommends near real-time reputation updates of each component of the message from a vast network of sensors. For example, it should detect and flag an from a previously unknown sender when that message contains a URL to a known phishing site. Knowing who the good senders are. As mentioned above, relying on standard risk assessment techniques leaves a major gap in coverage. Advanced technology that provides predictive security against new and emerging threats is required. Knowledge of past behavior from senders as well as associations with others is a strong predictor of future behavior. A solution must correlate and analyze the behavior of Internet objects or entities such as host IP addresses, Internet domains, specific URLs, images, and messages. Data loss prevention. In order to prevent unintentional or intentional data loss, a solution must provide a mechanism for various types of documents to be identified and registered as confidential without storing a copy of the original content. Outgoing s and their attachments must then be compared against the library of confidential documents for any full or partial matches and, depending on policy, allowed, denied, encrypted, or quarantined. This protects against the casual mistake that could be as devastating as a malicious insider trying to send confidential information out. Standards compliance. A solution must be able to detect standard content in compliance with multiple regulations around the globe, without requiring the administrator to be a compliance expert. It should have a robust compliance engine as well as a large library of compliance templates and regulations widely used around the world. Internal governance policies such as encryption of documents sent to and from business partners should be easy to enforce. Once controlled content is detected, the solution must be able to take appropriate actions, encrypting the message, quarantining and notifying the user and administrator, or blocking its transmission. Business continuity and reduced footprint. A cloud based security system should be layered in front of on-premises systems and configured to drop definitively bad messages that can represent 70-80% of the volume, and deliver the remaining messages to the on-premises devices for closer inspection. The reduction in mail volume delivered to your organization s on-premises system will allow for a substantially reduced processing footprint, both within the security systems and within the server and its storage. In the event of an outage, s must be held in the cloud until connectivity is restored. During these outages, users must have the ability to read, reply, forward and delete their via the cloud. After the outage, all message activity should be synchronized so that the on-premises system has the authoritative content. Decision Elements These factors could influence your architecture: Do you have incentives for adoption of cloud-based services? Do you need to scan and attachments for sensitive content? Does your need to be archived for compliance? Do you require distributed or centralized management? What are your requirements for encryption? Protecting 3

4 Technologies Used in the McAfee Solution The McAfee solution consists of a layered approach combining McAfee Software as a Service (SaaS) protection with McAfee Gateway (MEG), with its encryption and full McAfee Global Threat Intelligence (GTI) integration. This hybrid approach utilizes the SaaS business continuity features to ensure availability and configures protection to drop those messages that are certain to be malicious or spam. After initial screening in the cloud, the much smaller amount of remaining traffic is directed on site, where McAfee Gateway provides additional spam and malware screening based on signatures, heuristics, and file and messaging reputation lookups against the McAfee Global Threat Intelligence database. These advanced controls can be applied efficiently because the traffic volume has already been reduced so significantly in the initial cloud-based filter. The McAfee Gateway will also screen outbound traffic to prevent data loss and enforce compliance with standards. Based on content and policies, the McAfee Gateway will take relevant actions, such as quarantining or encryption. As an option, controlled can be archived automatically through the cloud, using the McAfee SaaS Archiving service. Inbound Blocks spam and threats in the cloud 99.9% good SaaS Protection McAfee Gateway DLP Encrypted Non-encrypted Outbound Protection, hybrid deployment McAfee SaaS Protection and Continuity In a hybrid configuration, McAfee SaaS Protection and Continuity is combined with McAfee Gateway deployed on your site. The hybrid configuration allows you to retain quarantined information within your network while eliminating confirmed spam before it reaches you. Removing the definitely bad typically accounts for a 70-80% reduction in on-premises volume. During an onpremises outage, due to either scheduled maintenance or emergency downtime, SaaS Continuity automatically activates, allowing users instant web access to for business as usual. Web activity is synchronized with your on-premises equipment when connectivity is restored. 4 Protecting

5 1 flows to server 2 server suffers outage McAfee SaaS Continuity Customer Network 3 SaaS Continuity automatically activates* Users have instant web access to for business as usual 4 s delivered back to server upon recovery * Manual activation also available Continuity for planned and unplanned server outages McAfee Gateway McAfee Gateway (MEG) protects your organization by scanning both inbound and outbound and applying local and global threat intelligence. MEG utilizes the well-known McAfee antivirus scanner to detect known malicious content, and McAfee Global Threat Intelligence (GTI) to detect emerging and suspicious but unknown content. By utilizing GTI, the McAfee Gateway is able to make decisions about an based on a file attachment or embedded URL s reputation in addition to the sending IP address and the message content. For example, it is common for phishing attacks to frequently change the IP address used to send the s. Reputation services that only track IP address reputations must learn about each new address while letting the initial messages ( patient zeros ) through to the recipients. However, with GTI, even though the sending IP address has changed, the URL contained within the phishing will still have a bad reputation in the GTI database. The message will be blocked, avoiding even the patient zero infection. Like other reputable vendors, McAfee participates in third party testing such as the Virus Bulletin VBspam comparative and has consistently scored very well. The latest results (May 2011) showed a spam catch rate of 99.92% with ZERO false positives. The gateway s attachment filtering can be configured easily to block potentially harmful attachments even if the filename is changed. For example, an executable that is renamed to a.txt will still be detected as an.exe. Kernel Mode Blocking stops distributed denial of service (DDOS) attacks cold while continuing to allow legitimate through. Protecting confidential information is easy with integrated data loss prevention. The gateway s on-box DLP allows confidential documents to be fingerprinted. The original documents are not stored on the gateway. Before a message is sent, the content is extracted, fingerprinted, and compared to the confidential document fingerprints. The gateway can take action depending on the percentage match and policies specified by the administrator. To reduce false negatives that might block permitted , corporate templates can be fingerprinted into an excluded content section so the boilerplate text will not be considered in the comparison. Protecting 5

6 MEG is shipped with hundreds of compliance templates covering regulatory standards from across the globe. The templates span from Australia s Tax File Numbers to American HIPAA and the United Kingdom s NHS numbers. The templates provide a proven baseline, so an administrator can achieve compliance with just a few simple steps. Many compliance standards mandate secure delivery of the data. The McAfee Gateway includes advanced encryption and secure web delivery features that can be triggered automatically when appropriate content is detected. The gateway s built-in clustering provides high availability, load balancing, centralized reporting, and centralized management across multiple appliances without the need for any additional hardware or software. Integration with McAfee epolicy Orchestrator (McAfee epo ) allows for central management and reporting of multiple gateways or clusters, as well as rollup of enterprise-wide reports for compliance and status updates. Impact of the Solution Implementing McAfee SaaS Protection and Continuity in a hybrid configuration with McAfee Gateway supports green initiatives through reduced on-premises volume and equipment usage. This model also provides business continuity in the event of an outage or disaster. Two layers of spam and malware protection help you keep up with the volumes of traffic and the ever-evolving tactics of spammers, phishers, and other online criminals. After SaaS Protection has removed the known bad traffic, McAfee Gateway provides excellent spam, phishing, and virus protection and leverages reputation in real time to catch breaking malicious threats. The same system adds data loss prevention and standards compliance for comprehensive inbound and outbound protection in a single solution. 6 Protecting

7 Q&A Is there an additional cost for on-box DLP with McAfee Gateway? No, the on-box DLP is included in the standard product license. Is there an additional cost for the gateway s on-box encryption features? No, the on-box encryption features are included in the standard McAfee Gateway product license. Is there an additional cost for McAfee Gateway epo management and reporting? No, epo management and reporting is included in the standard McAfee Gateway product license. Is McAfee Gateway only sold as a 1U or 2U appliance? No, McAfee Gateway is also available as a virtual appliance or in a blade server. Will McAfee Gateway work with my Syslog server? Yes, McAfee Gateway has the ability to format syslog information into very popular formats including ArcSight and Splunk and will send the information to your syslog server on a TCP port you specify. Does McAfee Gateway support SNMP? Yes, McAfee Gateway supports both SNMP Monitoring and alerting for SNMP versions 1, 2 & 3. Protecting 7

8 Additional Resources For more information about the Security Connected Reference Architecture, visit: About the Author Joel Caracciolo, an enterprise solution architect, provides technical assistance and design solutions to new and existing McAfee clients in North and South America. Joel has over 20 years of experience in the IT field and specializes in messaging, networking, and security. He also has a strong development background and holds a patent for developing a trusted source toolbar for CipherTrust/Secure Computing. An experienced trainer and presenter, Joel has been invited to speak at IBM s business partner executive council (BPEC) and Lotusphere. Joel attended Akron State University and began his career through their co-op program as an intern for Allen Bradley, where he developed their software management reporting system. 1 The information in this document is provided only for educational purposes and for the convenience of McAfee customers. The information contained herein is subject to change without notice, and is provided AS IS without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance Mission College Boulevard Santa Clara, CA McAfee, McAfee epolicy Orchestrator, McAfee epo, McAfee Gateway, McAfee SaaS Protection and Continuity, McAfee Global Threat Intelligence, and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications, and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2011 McAfee, Inc bp_protecting- -rep-L3_1111

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Technology Blueprint. Protecting Intellectual Property in Email. Guarding against information-stealing malware and outbound data loss

Technology Blueprint. Protecting Intellectual Property in Email. Guarding against information-stealing malware and outbound data loss Technology Blueprint Protecting Intellectual Property in Email Guarding against information-stealing malware and outbound data loss LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Protect Your Enterprise With the Leader in Secure Email Boundary Services

Protect Your Enterprise With the Leader in Secure Email Boundary Services Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Email Encryption Made Simple

Email Encryption Made Simple White Paper For organizations large or small Table of Contents Who Is Reading Your Email? 3 The Three Options Explained 3 Organization-to-organization encryption 3 Secure portal or organization-to-user

More information

Stop Spam. Save Time.

Stop Spam. Save Time. Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

Symantec Messaging Gateway powered by Brightmail

Symantec Messaging Gateway powered by Brightmail The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced

More information

Email Encryption Made Simple

Email Encryption Made Simple Email Encryption Made Simple For organizations large or small Table of Contents Who Is Reading Your Email?....3 The Three Options Explained....3 Organization-to-organization encryption....3 Secure portal

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property

More information

McAfee Acquires NitroSecurity

McAfee Acquires NitroSecurity McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Modular Network Security. Tyler Carter, McAfee Network Security

Modular Network Security. Tyler Carter, McAfee Network Security Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution

More information

Transitioning to McAfee SaaS Email Protection from Postini

Transitioning to McAfee SaaS Email Protection from Postini Technical FAQ Transitioning to McAfee SaaS Email Protection from Postini Frequently Asked Questions Google recently and abruptly announced that all Postini customers must either migrate to Google Apps,

More information

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption Technology Blueprint Protect Your VoIP/SIP Servers Insulating your voice network and its servers from attacks and disruption LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Solution Brief: Enterprise Security

Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................

More information

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business

More information

Technology Blueprint. Protect the Network Perimeter. Controlling what gets through into and out of your organization

Technology Blueprint. Protect the Network Perimeter. Controlling what gets through into and out of your organization Technology Blueprint Protect the Network Perimeter Controlling what gets through into and out of your organization LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected

More information

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

Hosted Security Integration with Microsoft Office 365

Hosted  Security Integration with Microsoft Office 365 A Trend Micro Integration Guide I July 2016 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365 customers

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Hosted Email Security Integration with Microsoft Office 365

Hosted Email Security Integration with Microsoft Office 365 A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365

More information

WildFire. Preparing for Modern Network Attacks

WildFire. Preparing for Modern Network Attacks WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends

More information

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86% Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

Top 10 Features: Clearswift SECURE Email Gateway

Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Solutions Brochure. Security that. Security Connected for Financial Services

Solutions Brochure. Security that. Security Connected for Financial Services Solutions Brochure Security that Builds Equity Security Connected for Financial Services Safeguard Your Assets Security should provide leverage for your business, fending off attacks while reducing risk

More information

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure. McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,

More information

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to

More information

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200

Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200 800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A

More information

T E C H N I C A L S A L E S S O L U T I O N

T E C H N I C A L S A L E S S O L U T I O N Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com

More information

Cisco Security Intelligence Operations

Cisco Security Intelligence Operations Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Email AntiVirus. Administrator Guide

Email AntiVirus. Administrator Guide Email AntiVirus Administrator Guide Email AntiVirus Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

Cisco Cloud Email Security Interoperability with Microsoft Office 365

Cisco Cloud Email Security Interoperability with Microsoft Office 365 White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources

More information

Mimecast Email Security

Mimecast Email Security DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing

More information

Database Security in Virtualization and Cloud Computing Environments

Database Security in Virtualization and Cloud Computing Environments White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and

More information

Technology Blueprint. Secure Cloud-based Communications. Manage risk while embracing cloud services

Technology Blueprint. Secure Cloud-based Communications. Manage risk while embracing cloud services Technology Blueprint Secure Cloud-based Communications Manage risk while embracing cloud services LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected The Security

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

Virtualizing Email Gateway Security

Virtualizing Email Gateway Security Virtualizing Email Gateway Security Flexible, Cost-Effective Protection at the Email Gateway August 2009 I. COST AND COMPLEXITY DRIVE VIRTUALIZATION EFFORTS Virtualization initiatives have gained momentum

More information

ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE

ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances

More information

IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features

IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features Security capabilities To support your business objectives IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features Give users complete

More information

Protecting the Infrastructure: Symantec Web Gateway

Protecting the Infrastructure: Symantec Web Gateway Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options

More information

Comprehensive Email Filtering. Whitepaper

Comprehensive Email Filtering. Whitepaper Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses

More information

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control

More information

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise

More information

Administration Guide Revision A. SaaS Email Protection

Administration Guide Revision A. SaaS Email Protection Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in

More information

Technology Blueprint. Protect Your Servers. Preserve uptime by blocking attacks and unauthorized changes

Technology Blueprint. Protect Your Servers. Preserve uptime by blocking attacks and unauthorized changes Technology Blueprint Protect Your Application Servers Preserve uptime by blocking attacks and unauthorized changes LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2 Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Not All Database Security Solutions Are Created Equal

Not All Database Security Solutions Are Created Equal Solution Brief Not All Database s Are Created Equal Compare solutions from different vendors Databases: The Top Regulatory Compliance Challenge In January 2012, Evalueserve surveyed 438 IT decision makers,

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

Firewall Testing Methodology W H I T E P A P E R

Firewall Testing Methodology W H I T E P A P E R Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness

More information

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud. W H I T E PA P E R Public Network External Application MTA Moving to the Cloud Important Things to Consider Before Migrating Your Messaging Infrastructure to the Cloud Fallback MTA External Corporate MTAs

More information

Comprehensive protection. Streamlined administration console

Comprehensive protection. Streamlined administration console Next generation of Forefront Online Protection for Exchange (FOPE) Comprehensive protection Enterprise class reliability Streamlined administration console On-premises Exchange Online Protection Office

More information

Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse

Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse Technology Blueprint Defend Against Denial of Service (DOS and DDOS) Attacks Protect each IT service layer against exploitation and abuse LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

Securing the Internet of Things

Securing the Internet of Things Business Brief Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy IoT Architectural Challenges Given the diversity and scale of the IoT, new security

More information

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research

More information

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Principal Systems Engineer, Symantec.cloud 1 Who We Are 2 Security Challenges in Education 3 Security As A Service Email, Web,

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Selecting Your Essential Cloud Services

Selecting Your Essential Cloud Services DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management

More information

Administration Guide Revision E. SaaS Email Protection

Administration Guide Revision E. SaaS Email Protection Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats

Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle

More information

Symantec Email Security.cloud - Skeptic Whitepaper

Symantec Email Security.cloud - Skeptic Whitepaper TECHNICAL BRIEF: SYMANTEC EMAIL SECURITY.CLOUD........................................ Symantec Email Security.cloud - Skeptic Whitepaper Who should read this paper This white paper outlines the technical

More information

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones Web Security Deployment Options 1 1 The threat landscape 2 Why Symantec web security 3 Generic

More information

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to

More information

Email Correlation and Phishing

Email Correlation and Phishing A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...

More information

Transitioning to McAfee SaaS Email Protection from Postini

Transitioning to McAfee SaaS Email Protection from Postini Technical FAQ Transitioning to McAfee SaaS Email Protection from Postini Frequently Asked Questions Google recently and abruptly announced that all Postini customers must either migrate to Google Apps,

More information

Defending Against Cyber Attacks with SessionLevel Network Security

Defending Against Cyber Attacks with SessionLevel Network Security Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive

More information