WHITE PAPER: ENTERPRISE SOLUTIONS. Multi-tier Security: The need for defense-in-depth
|
|
- Austin Kelly
- 8 years ago
- Views:
Transcription
1 WHITE PAPER: ENTERPRISE SOLUTIONS Multi-tier Security:
2
3 White Paper: Symantec Enterprise Solutions Multi-tier Security Contents Executive summary Introduction Role of in security Tier 1: Protecting the perimeter Tier 2: Mail server protection Multi-tier mail security solutions from Symantec Symantec s global security response Symantec s perimeter protection Symantec s mail server protection Introducing Symantec Mail Security Enterprise Edition Conclusion
4 Executive Summary Responding to today s challenges requires a multi-faceted approach: one that addresses protecting the perimeter while simultaneously protecting internal corporate mail systems. Defending one but not the other is akin to locking the car doors and leaving the windows open. A multi-tier approach to securing the infrastructure is needed not only to stop spam, viruses, and phishing attacks, but also to prevent unauthorized content from being transferred to the wrong hands, both inside and outside of the corporate walls. This white paper reviews the evolution of challenges facing today and demonstrates ways in which affects network security and business risk. The importance of implementing a multi-tier defense-in-depth approach to security is outlined in detail along with guidance in choosing the right perimeter and mail server defenses. Introduction Nearly a decade has gone by since the first mass-mailer worm attacked organizations worldwide. In 1997, Melissa changed the nature of -based threats from sending attachments containing an unintentional infection usually a Word document with a macro virus to using as a way of leveraging Internet near-borderless speeds to spread their malicious payload to millions of unsuspecting and vulnerable users. Since then, mass-mailers have continued to innovate and evolve, moving from exploiting vulnerabilities in the client itself, to running their own SMTP servers and bots to broadcast under the wire without causing suspicious traffic peaks on the infected network s mail server. We ve seen spam evolve from a minor nuisance that made up a small subset of all Internet to a scourge that now makes up the majority of legitimate sent around the world. Combining the social engineering of the virus writer with the distribution methods of the spammer, phishing has become the more threatening side of the spam problem, as phishers attempt to solicit and steal passwords, social security numbers, and identities of unsuspecting recipients. is now considered an essential and important communications tool. Its contents are often used to demonstrate compliance to industry regulations, as well as to serve as valuable evidence in legal proceedings. As a result, it becomes important to control the content of messages sent internally, between departments and employees, as well as externally. All of these factors highlight the importance of taking a more holistic approach to security to filtering for viruses, spam, and other unwanted or otherwise inappropriate content at multiple tiers of the network to ensure that all is scanned and controlled. 4
5 Compliance Phishing Spam Mass-mailing Worms Figure 1. Evolution of threats Role of in security The importance of security in the context of today s networking and business environments is that is one of two critical open doors (or ports) that we simply can t afford to close. Even the Web, the other open door (port 80), serves as a delivery mechanism for traffic, especially through popular Web-based mail services. The importance of as a ubiquitous and essential communications tool comes from the ease with which users can send and receive virtually any electronic data to any recipient in the world including spam, viruses, worms, and phishing attacks. When keeping secure, it is less about actually securing content from prying eyes, than preventing the wrong type of content from affecting business operations; for example: -borne threats such as mass-mailer worms can disrupt the network by infecting not just the recipient s desktop, but also other desktops and servers in the network. Mass-mailer worms themselves generate illegitimate and harmful traffic that typically targets addresses of other internal users, as well as partners, customers, and suppliers. Unfortunately, they often carry a company s name. Malicious payloads are typically multi-pronged, so they seek not only to spread infection, but also to compromise systems by affecting security settings, stealing information, and setting up Trojan horse applications and bots for future exploits. Proprietary and confidential company, customer, or user information can be accidentally or intentionally transferred to unauthorized persons inside or outside the organization. 5
6 content that violates corporate policy, such as inappropriate language or non-business attachments such as MP3 files, executable files, and others, can cause disruptions in the workplace. sent from disgruntled employees containing disruptive or inappropriate content to broad distribution lists, which should be cleaned from the message store to minimize employee exposure and company risk. Not all of the security risks we re defending the network against originate from the Internet. Viruses have many vectors of entry onto the network, including Web-based from free consumer services, as well as any form of removable media, such as a USB memory stick, CDs, DVDs, and others. In addition, early-stage threats will often slip by gateway defenses in the minutes and hours before they are discovered and virus definitions become available. As a result, security defenses need to be perimeter-based (usually the Internet [SMTP] gateway) and internal mail server based (usually Microsoft Exchange or Lotus Domino ). Tier 1: Protecting the perimeter Several measures can be taken to prevent unwanted Internet from reaching downstream servers, such as expensive message stores and data archives, as well as users. The two primary -borne threats and disruptions are viruses and spam. First, the most common virus content found in is the product of mass-mailer worms. These programs use addresses found on compromised systems and automatically generate s to replicate and distribute their payload to unsuspecting users and systems. Since mass-mailer worm s have no intrinsic business value, they can be deleted automatically without fear of legitimate data loss. Gateway-based antivirus scanners should be able to identify and distinguish mass-mailer worms and allow administrators to delete them. Often referred to as Mass-mailer Cleanup or Worm Purge, it is an important feature to look for in antivirus solutions. Second, mass-mailer worms usually rely on the same variety of data or file types to deliver the payload as an attachment. These are file types such as.scr,.pif, and.vbs, which are typically not found in regular business transactions, but may also include.exe files and will apply compression techniques, usually.zip. Based on these characteristics, further action can be taken to proactively protect the network environment from emerging, yet unidentified, mass-mailer threats. Attachment filtering can accomplish this through the creation of policy to delete messages when the presence of a suspect extension type, such as.scr and.pif, is found. 6
7 Also critical is the ability to identify these files within compressed containers, such as.zip files, and take the appropriate action. Third, spam content can be eliminated or removed from the internal mail streams to further reduce the burden on mail systems. Spam quarantines, generally housed on a server separate from the mail infrastructure, are ideal places to move unwanted spam content from active message stores (and consequently end-user mailboxes) to less expensive media, and they are far easier to scale and maintain. Quarantines are required because antispam systems cannot be 100% accurate. Since businesses cannot risk the loss of legitimate , users need a place to review spam-tagged messages. However, the reliability of the antispam system can play a significant role in reducing the amount of data that is held in quarantine and minimizing the amount of data requiring review by users. The standard metrics for antispam reliability are detection, i.e., spam catch rate, and accuracy rates against false positives (legitimate messages incorrectly identified as spam). One of the biggest challenges with many antispam systems is that detection and accuracy rates are often dependent variables, which can mean high detection rates at the expense of lower accuracy, and vice versa. It is important to look for an antispam solution that is not a collection of manual tools, but an integrated, frequently updated response mechanism with highly accurate spam definitions and techniques based on the latest spamming techniques. These best-of-breed antispam solutions ensure both detection and accuracy at the same time. The primary benefit the elimination of a large subset of spam messages that can be eliminated while in transit minimizes the burden on the spam quarantine and the end-user reviewer. Additional benefits include greater end-user confidence in antispam defenses. Finally, in order to maintain trust with customers and partners, it is also critical that an organization not be perceived as a source of inappropriate or malicious content. There are several ways to address this. All outbound should be scanned for viruses and inappropriate content. If company internal information is not to be shared with outside parties, it is important to identify this content and put the appropriate measures in place to filter the content at the mail server or gateway tier to keep it inside. Policy guidelines and employee education and awareness are also important. Since today s mass-mailer worms provide their own SMTP delivery services and no longer rely on popular programs and company mail architecture to distribute threats, it is important to put measures in place to stop unauthorized SMTP traffic (also referred to as Port 25 traffic). 7
8 These measures include network firewall rules that restrict Port 25 access to only authorized mail systems, as well as desktop firewall rules that prevent the use of Port 25 by end-user systems (end users send and receive Internet through the mail server, which is responsible for any actual SMTP transmissions). By implementing these measures, a large volume of data can be diverted or deleted from the mail stream, thus ensuring that downstream systems are not overtaxed by non-business content. This in turn leads to significant improvement in the overall operation of the infrastructure. Selecting perimeter form factors For SMTP perimeter protection, there are three ways to implement solutions. These are often referred to as form factors and can be described as follows: 1. Software-based solutions, which require installation of application software on the customerprovided hardware and operating system 2. Appliance-based solutions, where application software is pre-installed on a vendor-maintained operating system and hardware 3. Hosted service solutions, where the software and systems are located off-premises at a hosted provider and Internet mail streams are redirected through this environment to be scanned For all three solution scenarios above, the assumption is that the internal systems, for example, Lotus Domino and Microsoft Exchange environments, are located on the customer s premises, and are not managed off-site by a third-party service provider. For all three security form factors described, the administrator maintains full control over policy and flow of , whether it is in software, an appliance, or a hosted service. The availability of resources and expertise varies from company to company, even within larger organizations, so the choice of form factors becomes one of environmental situation and preference. There are advantages to each form factor, which can be categorized as follows: Software Appliance Hosted Complete control over entire environment, including choice of hardware and operating system Requires expertise and resources to maintain No operating system or compatible hardware to acquire and maintain No software to install Initial security hardening and subsequent patching provided by vendor No systems to maintain, so no internal expertise is required for day-to-day systems operation Burden of unwanted data, such as spam, is kept outside of the network 8
9 In addition to the key functional aspects required for perimeter protection described early in this section, there are form factor aspects to consider: Software: Deployment flexibility through support for multiple operating systems typically a range of operating system options, including various Windows, Solaris, and Linux environments. This allows companies to deploy and maintain flexibility and does not require specific operating system expertise in all geographic locations. Highly integrated: The fewer moving parts, the better. For emergency updates or upgrades, the fewer the number of components outside of the operating system and the mail security application, the easier it is to ensure compatibility and uptime. The vendor is responsible for both the technology and the security response components. This limits finger pointing between vendors and internal conflicts in the solution itself. Appliance: Hardening of the operating system for security non-essential operating system services are disabled, if not removed entirely, to limit exposure to system vulnerabilities Availability of a global support contract with four-hour hardware replacement Capacity for automated updates for application and operating system Hosted (proxy-based scanning vs. store-and-forward mail relay): The hosted provider should never take ownership of the message, with the exception of spam quarantining, which is accomplished by acting as a proxy between the sending server and the receiving server (on the customer s premises) holding the connection open long enough to complete inspection of the message, then closing out the transaction, as appropriate. Some hosted services function as store-and-forward relays, meaning they commit all messages to disk, as they are being processed. The exposure is twofold: (1) Catastrophic system failure can lead to loss of customer s, and (2) the confidentiality of s cannot be guaranteed, as they can be assessed through system or security compromise. Proxy-based hosting models prevent these risks to confidentiality and information loss. 9
10 Tier 2: Mail server protection Despite having solid perimeter protection in place, it is still necessary to inspect internal mail traffic. This is necessary for many reasons: Scanning for viruses that enter through other vectors, for example, personal Web-based , removable media such as USBs, remote laptop users whose virus definitions may not be current. No single tier of protection can offer 100% coverage, especially against new and emerging threats. Post-attack virus cleanup of message stores using the latest antivirus definitions is critical. Companies running the latest defenses at the SMTP gateway are often surprised when they are re-infected inside the network. Often the cause is lack of adequate virus cleanup at the mail server and even desktop tiers. Preventing authorized content from being sent to unauthorized users within and outside of the organization. Pains are often taken to secure internal Web sites for access by appropriate individuals or departments, but once downloaded to the desktop system, this information can easily be forwarded to virtually any individual within the company. Now, not only is there an exposure that unauthorized users gain access to confidential data, but they can also send that data outside of the company walls. Preventing leakage internally is just as critical as external or outbound data leakage. Preventing content from being accessed after it has been sent. Upon discovery of an inappropriate message, a rule can be created to block access to the message immediately and clean the message from the message store/database. Enforcing usage policies throughout the company, such as the use of inappropriate language in and the dissemination of unwanted or oversized attachment content such as MP3 files, executables, and others. Retroactive cleaning of message stores to remove older, unneeded content, for example, internal housekeeping memos. 10
11 As a result, mail server protection solutions should be able to inspect content in real time as is being committed to the message store, when it is being accessed from the store, and on a scheduled or on-demand basis to conduct sweeps of message store content based on updated virus definitions or specific content rules designed to identify suspicious or inappropriate content. In the case of most -borne threats, the initial outbreak stage leaves the company open to infection, as s enter the message store, where new infections are not yet detected by the current definitions. Once definitions have been updated, it is important to run periodic scans of the message store to eliminate any malicious content and prevent users from exposure. Multi-tier mail security solutions from Symantec Symantec is uniquely positioned in the security space as it offers customers the full range of solution form factors for perimeter SMTP protection, including broad platform support for its software-based solutions, as well as coverage of the two primary mail server platforms: Microsoft Exchange and Lotus Domino. To keep solutions up-to-date against the latest threats and disruptions including viruses, mass-mailer worms, spam, and phishing attacks, Symantec owns and maintains the largest global network of security, antivirus, and antispam research and response centers in the world. Symantec s global security response Symantec is one of only a few vendors that offers a truly global infrastructure for identifying and responding to the latest threats through security alerts and content updates. As the Internet knows no borders and time zones, neither should the response organization that provides ongoing updates for critical antivirus, antispam, and security scanning services on the network. 11
12 Dublin, Ireland Calgary, Canada San Francisco, CA Redwood City, CA Tokyo, Japan Santa Monica, CA Taipei, Taiwan Sydney, Australia Antivirus Labs Antispam Labs Virus Protection 6 Security Response Centers Digital Immune System Infrastructure Over 120M systems worldwide Over 45 Countries 24 x 365 Response Spam Protection 6 Operation Centers Over 2 Million Decoy Accounts Tens of Millions of Spam Processed Daily Over 20 Countries 24 x 365 Response Figure 2. Symantec Security Response global operations Global operations is critical, not just in terms of visibility into regional outbreaks, but also to provide customers with effective 24x7 response, wherever they have operations. With operations centers for spam and virus detection distributed across time zones, Symantec has security experts available 24-hours a day to view and process submissions and respond to the latest threats. Response to the latest threats can be updated via Symantec s robust, distributed network of LiveUpdate systems worldwide, reaching all customers, regardless of geographic location or time zone. 12
13 As part of that response network, Symantec receives suspect virus samples from over 120 million nodes located among its global customer base of consumer and corporate customers. Symantec also receives millions of new spam and phishing samples daily from its Probe Network, which is fed through its comprehensive ISP and enterprise customer base. All solutions in Symantec s multi-tier mail security portfolio are backed by Symantec Security Response, the world's leading antivirus and Internet security research and support organization. Symantec s perimeter protection Symantec s perimeter solutions span the key form factors (software, appliance, and hosted) as well as key operating systems (Windows, Solaris, and Linux), thereby offering flexibility in choosing the right fit for the unique needs of an organization. Software Installed on-premises using existing hardware, integrating with mail server. Internet Gateway Server Groupware Server Symantec Brightmail AntiSpam 6.0 Symantec Mail Security for SMTP Appliance Installed on-premises in a self contained appliance. Internet Symantec Mail Security 8200 Groupware Server Hosted Customer redirected to Symantecpowered data centers for filtering. Legitimate delivered to customer site. End users can optionally review off-premises spam quarantine. Internet Mail rerouted to Data Centers for filtering servers powered by Symantec Spam/Virus Filtering Quarantine for spam/ suspected spam Virus-free, spam-free Customer Site Groupware Server Symantec Hosted Mail Security Figure 3. Symantec Form Factors for SMTP Gateway Tier Protection 13
14 In addition, common to all solution offerings are: Symantec s industry-leading antispam technologies and response, which offer a greater than 97% effectiveness rate (Source: InfoWorld Product Review, 2004) and an accuracy rate of % (Source: Yankee Group Report, 2004), achieved through over 20 filtering technologies, Symantec s global Security Unit within Symantec Security Response infrastructure, and frequent 10-minute update intervals. In addition, Sender Reputation Lists leverage the Probe Network to identify known spam sources on the Internet to provide added certainty along with a stacked classification verdict system. Symantec s award-winning NAVEX antivirus technologies and response ensure consistent virus protection and updating across all supported platforms, using multiple detection technologies, including heuristics. Global Symantec Security Response operations centers provide support, with both schedulable and on-demand updating on a weekly, daily, and hourly basis. Mass-mailer cleanup capability to remove entire messages and prevent unnecessary virus notifications based on the presence of a mass-mailer worm. The ability to block by attachment name and extension and by message size, subject line, and message body content to assist in stopping early-hour attacks or to prevent the transmission of unwanted or inappropriate content. The flexibility to treat spam differently based on antispam engine verdict, i.e., deleting spam messages, but quarantining suspected spam messages for further review. Symantec s Web-based Spam Quarantine, which removes spam messages from the messaging environment, while making them available to administrators and end users for further processing and review. 14
15 The advantages offered through Symantec s different form factors are: Appliance Software Hosted Symantec Mail Security 8200 Series appliances Symantec Mail Security (with SPA), Symantec Brightmail AntiSpam Symantec Hosted Mail Security Pre-configured, hardened operating systems and mail relay Updating of operating system and application software provided by Symantec Acts as an firewall protecting against Directory Harvest Attacks, and based Denial of Service attacks Deployment flexibility across multiple operating systems Integration into existing mail gateway infrastructure (ex. Sendmail) or using integrated, proprietary mail relay technology. All SMTP traffic processed outside of your environment Spam Quarantine not housed in your network Symantec s mail server protection Where Symantec s perimeter protection plays a key role in minimizing the negative impacts of Internet traffic, Symantec Mail Security for Microsoft Exchange and Symantec Mail Security for Domino ensure that internal message traffic is also free of malicious or inappropriate content. Both solutions are tightly integrated into their respective mail environments, using vendorsupported APIs, ensuring maximum capability and minimum conflicts with the underlying messaging architecture. Similar to our perimeter protection solutions, Symantec Mail Security for Microsoft Exchange and Domino leverage the same core antivirus technology and response, as well as updating flexibility. For smaller organizations or even some larger organizations that have standardized from mail server to gateway using either a Domino or Exchange infrastructure, there is an added option of enabling the same Symantec Brightmail AntiSpam technologies and response as used in the perimeter protection solutions (to achieve 97%+ detection, % accuracy and updates every 10-minutes), further providing the flexibility in deployment required by diverse organizations. In addition to core scanning services, Symantec Mail Security for Microsoft Exchange and Domino also offer similar content inspection capabilities, such as subject line and message body filtering, attachment stripping, and restrictions on message size. These capabilities can be used to 15
16 enforce usage policies, as well as minimize exposure to regulatory penalties or even lawsuits resulting from inappropriate content being sent through internal . Symantec Mail Security for Exchange and Domino not only scan messages in transit but can also perform retroactive scans of the message store/database. This enables a mail administrator to use content rules to prevent access to a message that has already been sent. For example, if an employee sends a message with inappropriate or confidential information to a wide distribution list within the company, the administrator can create a rule to immediately prevent access to this message and remove it from the store. Similarly, when virus definitions are updated, the message store/database can be rescanned to ensure that internal mail is clean. Both products also provide the ability to create specific filtering rules depending on the transmission type (inbound, outbound, and internal messages). This provides a way to create targeted rules to: Prevent inappropriate content from being received within SMTP inbound messages Prevent confidential information from leaving the company via SMTP outbound messages Enforce internal policies via message store/database rules Introducing Symantec TM Mail Security Enterprise Edition Recognizing the importance of a defense-in-depth approach to security and the burden imposed on IT to identify and acquire the necessary technologies from multiple vendors, Symantec has developed the Symantec Mail Security Enterprise Edition, a licensing bundle that gives customers the flexibility to choose and use the form factor and platforms necessary to meet their evolving multi-tier security needs. Included in the offering are: Choice of perimeter protection using any of the three form factor solutions Symantec TM Hosted Mail Security Symantec Mail Security 8200 Series appliances Symantec Mail Security for SMTP (including Premium AntiSpam) Symantec Brightmail AntiSpam (including Symantec AntiVirus ) Choice of one or, for mixed or migrating environments, both mail server protection platforms Enablement and usage of both Symantec AntiVirus and Symantec Brightmail AntiSpam technology and response on any of the platforms, including the Exchange and Domino tiers Licensed per user (one license covers both security tiers) on an annual subscription basis 16
17 Gateway Tier Symantec Hosted Mail Security Symantec Mail Security 8200 Symantec Mail Security for SMTP Symantec Brightmail AntiSpam Mail Server Tier Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Domino Desktop Tier Symantec AntiVirus Corporate Edition Figure 4. Messaging tiers protected by Symantec Mail Security Enterprise Edition Conclusion Multi-tier security is a critical requirement in any Internet-enabled company, regardless of size, since has become such a mission-critical application in our business lives. Our increasing dependence on ensures that it will remain a primary target for virus writers, hackers, spammers, and phishers. It also means that controlling the flow of data within and outside the corporate walls becomes all the more important to prevent risk and exposure to the business itself caused by inappropriate or unauthorized content falling into the wrong hands. Symantec s ownership and dedication to the core solutions required for a defense-in-depth security strategy, as well as its global rapid response infrastructure to address and stay ahead of the ever-changing challenges plaguing , make it a key strategic partner to protect the enterprise, and to help contain IT costs. A single-vendor approach through Symantec s point solutions or Symantec Mail Security Enterprise Edition bundle offers customers the necessary flexibility and coverage, while at the same time simplifying the purchasing, licensing, installation, 17
18 About Symantec Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their information. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free Symantec Corporation World Headquarters Stevens Creek Boulevard Cupertino, CA USA Symantec, the Symantec logo, Symantec Brightmail AntiSpam, Symantec Mail Security, LiveUpdate, and Symantec Security Response are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.. Domino and Lotus are trademarks of International Business Machines Corporation in the United States, other countries, or both. Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Solaris is a trademark or a registered trademark of Sun Microsystems, Inc., in the U.S. or other countries. All other brand and product names are trademarks of their respective holder(s). Copyright 2005 Symantec Corporation. All rights reserved. Printed in the USA. 11/
Symantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
More informationMessaging Security, Availability, and Control for Small and Mid-sized Businesses
WHITE PAPER: SMALL AND MID-SIZED BUSINESS SECURITY Messaging Security, Availability, and Control for Small and Mid-sized Businesses White Paper: Small and Mid-sized Business Security Messaging Security,
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationINFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationSolution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
More informationSymantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationSymantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
More informationChoose Your Own - Fighting the Battle Against Zero Day Virus Threats
Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle
More informationOver the last 10 years, electronic mail has evolved
: Why You Need It, How to Achieve It Over the last 10 years, electronic mail has evolved from an occasional communications alternative to a mission-critical capability that few organizations can do without.
More informationProtect Your Enterprise With the Leader in Secure Email Boundary Services
Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise
More informationEmail Security - A Holistic Approach to SMBs
Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new
More informationSymantec Enterprise Vault for Lotus Domino
Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationwww.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach
100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...
More informationNorton Personal Firewall for Macintosh
Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for
More informationSymantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
More informationHow To Protect Your Computer From A Malicious Virus
Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,
More informationReviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
More informationSmall and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
More informationData Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today
More informationTHE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE
THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE EMAIL BORNE THREATS An Escalating Problem for Every Business More than three out of four emails contain spam, viruses or other malicious content and that
More informationEndpoint Security More secure. Less complex. Less costs... More control.
Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationSymantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses
A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed
More informationAVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationCopyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
More informationProtecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
More informationV1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
More informationINSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats
Symantec Enterprise Security WHITE PAPER Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats INSIDE Executive Summary Challenges to securing NAS An effective
More informationTechnology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationStop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationSymantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
More informationWHITE PAPER: ENTERPRISE SOLUTIONS. Email Security and Availability Implementing Email Security and Archiving Solutions from Symantec
WHITE PAPER: ENTERPRISE SOLUTIONS Email Security and Availability Implementing Email Security and Archiving Solutions from Symantec By Nick Wade Senior Product Manager, Enterprise Vault Now from Symantec
More informationSymantec Email Security.cloud - Skeptic Whitepaper
TECHNICAL BRIEF: SYMANTEC EMAIL SECURITY.CLOUD........................................ Symantec Email Security.cloud - Skeptic Whitepaper Who should read this paper This white paper outlines the technical
More informationQuarterly Report: Symantec Intelligence Quarterly
Symantec Intelligence Quarterly: Best Practices and Methodologies Quarterly Report: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Contents Symantec
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationAntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution
AntiVirus and AntiSpam email scanning The Axigen-Kaspersky solution The present document offers a comprehensive analysis of the ways to secure corporate email systems. It provides an expert opinion on
More informationWEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
More informationINTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
More informationWHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
More informationSystem Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
More informationHOW TO PREVENT SPAM AND MALWARE IN MAIL MOST EFFECTIVELY Index 1. Battling the increase in malware 2 2. Addressing the surplus of spam 3 3. The mail server A critical vulnerability 4 3.1 Denial of Service
More informationNorton AntiVirus 9.0 for Macintosh
Norton AntiVirus 9.0 for Macintosh Upgrade Overview Overview Norton AntiVirus 9.0 for Macintosh is the latest release of Symantec s awardwinning Norton AntiVirus product line. This document explains the
More informationThe benefits of using a perimeter-based managed service
W H I T E P A P E R Ensuring Email Security The benefits of using a perimeter-based managed service Ensuring Email Security page 1 Executive Overview With unsolicited email costing businesses millions
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationSTPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.
STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication
More informationEmail Security for Small Businesses: What's the Right Solution For You?
Postini White Paper Email Security for Small Businesses: What's the Right Solution For You? The Small Business Dilemma: Fighting Growing Email Threats with Fewer Resources Many small businesses today face
More informationSYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
More informationAdvantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
More informationThe Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER The Evolution of Email Security: Symantec Brightmail Integrated Email Security Appliance
More informationData Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationPowerful and reliable virus and spam protection for your GMS installation
Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise
More informationIronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management.
Overview IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management. The IronPort C-Series email security appliances provide advanced
More informationAVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
More informationData Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
More informationAnti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
More informationINSIDE. Symantec Brightmail AntiSpam 6.0: A Product Overview
Antispam TECHNOLOGY BRIEF Symantec Brightmail AntiSpam 6.0: A Product Overview INSIDE The growing volume of spam Architecture and deployment Powerful spam and email threat protection Administration made
More informationTop five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
More informationEndpoint Security Management
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
More informationVirus Protection Across The Enterprise
White Paper Virus Protection Across The Enterprise How Firewall, VPN and /Content Security Work Together Juan Pablo Pereira Sr. Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda Avenue
More informationEmail Security and Availability: A Holistic Solution to a Critical Problem
I D C V E N D O R S P O T L I G H T Email Security and Availability: A Holistic Solution to a Critical Problem August 2005 Adapted from Worldwide Secure Content Management 2004 2008 Forecast Update and
More informationData Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
More informationIronPort C300 for Medium-Sized Enterprises and Satellite Offices
I r o n P o r t A p p l i a n c e s H I G H - P E R F O R M A N C E E M A I L S E C U R I T Y. C A R R I E R - P R O V E N T E C H N O L O G Y. E N T E R P R I S E - C L A S S M A N A G E M E N T. IronPort
More informationCisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
More informationMXSweep Hosted Email Protection
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740
More informationIronPort Streamlines Email at One of the World s Largest Computer Vendors.
c u s t o m e r Case Study IronPort Streamlines Email at One of the World s Largest Computer Vendors. T h e S i t u a t i o n As one of the world s top suppliers of computer systems, Dell Inc. receives
More informationWebsense Web Security Solutions
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
More informationTop tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
More informationData Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement
Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through
More informationoverview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
More informationSpyware: Securing gateway and endpoint against data theft
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
More informationProven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
More informationWHITE PAPER. Understanding the Costs of Email Security
WHITE PAPER Understanding the Costs of Email Security Table of Contents Introduction.................................................................... 3 Calculating Savings.............................................................
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easy-to-use, all-in-one suite that secures your critical business assets and information against
More informationMANAGED SECURITY SERVICES
MANAGED SECURITY SERVICES True Managed Security Services give you the freedom and confidence to focus on your business, knowing your information assets are always fully protected and available. Finding
More informationES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS
ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS The Internet Threat Landscape Symantec TM Dean Turner Director Global Intelligence Network Symantec Security
More informationEndpoint Security: Moving Beyond AV
Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
More informationWorld-class security solutions for your business. Business Products. C a t a l o g u e
World-class security solutions for your business Business Products C a t a l o g u e About Kaspersky Lab Kaspersky Lab is the largest developer of secure content management systems in Europe and is among
More informationMESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
More informationS E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
More informationCloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
More informationContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
More informationSymantec Mail Security for Microsoft Exchange Getting Started Guide
Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationData Sheet: IT Compliance Payment Card Industry Data Security Standard
The (PCI, or PCI DSS) was developed by the PCI Security Standards Council to assure cardholders that their details were secure during payment card transactions. The Council, which now governs the Standard,
More informationWhat Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
More informationCyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the
More informationSymantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More information