Be up against the UTM Dedicated Content Security solutions from Cisco

Size: px
Start display at page:

Download "Be up against the UTM Dedicated Content Security solutions from Cisco"

Transcription

1

2 Be up against the UTM Dedicated Content from Cisco Istvan Segyik Systems Engineer CCIE Security #47531 Cisco Global Virtual Engineering (GVE)

3 Topics threats A few things to do for safer with no $$ investment Cisco Security Appliance (ESA) Web threats Cisco Web Security Appliance (WSA)

4 security

5 Threats SPAM - unsolicited , usually advertising: Causes employee productivity issues; May cause Denial of Service issues in the infrastructure; Can be used to spread malware. SCAM unsolicited with forged sender address: Usually used for advertising; Many times spreads malware; Many times used for Phishing attack = Phishing SCAM; The victim is not the recipient only but the legal owner of the sender address (domain). Malware in (doesn t have to be SPAM or SCAM). Confidential data leakage. Targeted attack (DoS, Privilege escalation, data theft).

6 Phishing SCAM Starts with a forged Sender identity has been forged; Internal content resembles to a company s brand (typically banks or governmental organizations). Forging senders: Simply changing sender addresses and using open SMTP relay servers that don t check source addresses; Compromising the servers of the real owner of the sending domain. The goal of the attack is to ask the addressee to visit a portal (e.g. forged banking portal) and hand over login credentials or credit card data. The legal owner of the sender usually suffers serious loss of reputation so becomes secondary victim.

7 SCAM example: the

8 SCAM example: the alleged sender Memfus Wong Surveyors Limited: mwsl.com.hk Property agency in Hong Kong

9 SCAM Example: the apparent issue

10 SCAM Example: the real bad thing

11 SCAM example: who are the victims? In this example: The person who lost its credit card details. The property agency in Hong Kong whose system was compromised. The clothing company whose web site was compromised. Worldwide: Manufacturing: 8% Other industry: 8% Design and development agencies: 8% Utility (e.g. energy): 19% Financial industry: 27%

12 What can we do? Educate users. Apply industry s best practices to secure our infrastructure: SPF, DKIM, DMARC; Upgrading, patching systems; IPS/IDS systems. Use advanced security solutions such as Cisco Security Appliance (ESA).

13 SPF, DKIM, DMARC

14 DKIM, SPF, DMARC in general With these techniques configured on both sender and receiver sides, sender forging can be prevented. The recipient server can verify the sender server s identity and authority. Verified SIGNED Your Company DNS Server SIGNED Trusted_Partner.com Recipient server Imposter Drop/Quarantine Trusted_Partner.com

15 Sender Policy Framework - SPF RFC7208 The sender makes the recipient able to verify if a certain SMTP server is authorized to send s from a domain or not. The recipient server can verify the HELO and MAIL FROM addresses. The sender can instruct the recipient how to interpret and what to react in case of a violation. Example (cisco.com): "v=spf1 ip4: /27 ip4: /26 ip4: /27 ip4: /24 ip4: /14 ip4: /27 ip4: /24 ip4: /16 ip4: /20 ip4: /24 ip4: /24 ip4: /27 ip4: /26 ip4: /27 ip4: /26 ip4: /24 mx:res.cisco.com mx:sco.cisco.com ~all"

16 Question: what does it mean? sub-domain.domain.com. IN TXT "v=spf1 -all"

17 SPF shortcomings Doesn t protect against intra-domain forgery. Doesn t inspect inner header. Doesn t check the integrity of the .

18 Domain Key Identified - DKIM RFC5585, RFC6376, RFC5863, RFC5617 (ADSP) The sender SMTP host creates an SHA-1 or SHA-256 hash of the message and signs the hash with a private key. The public key is stored in a DNS record. DNS record example: c3po._domainkey.altn.com text = "v=dkim1; k=rsa; p=migfma0gcsqgsib3dqebaquaa4gnadcbiqkbgqcjvrk3kpx17dwax uya/66/qgzu/r/7325hxqhg8poaqmn3jzpagh9gdaocdzxbtnbqkknojmkkczr41xb4h3u5reinbbq8g rfynp3n6s2kz2lwwwpssavdgtotcuxqt+pwesda7c0z5v2axgg76ygyh8b504gv+yhaxurqxnbzqwida QAB"

19 DKIM shortcomings Requires significant processing power. Can be optimized but that reduces security: Header and content simplification; Use of SHA-1 instead of SHA-256. If an was not signed, its verification would be ignored. Author Domain Signing Practices (ADSP) could mitigate the problem above, but rarely implemented, because: Can handle DKIM only; Doesn t ensure feedback channel to the sending party. _adsp._domainkey.example.com IN TXT "dkim=unknown all discardable"

20 Domain-based Message Authentication, Reporting & Conformance The DMARC protocol: Unifies the instructions for SPF and DKIM verifications at the recipient side; The sender can sign to the recipient what to do with SPF and DKIM errors; The following actions can be requested by the sender: none reject quarantine; Provides feedback channels: for every single error message OR for aggregate error reports. Not surprisingly uses a DNS record. More complicated than ADSP but there are on-line tools that help you, e.g.: A DNS record example: v=dmarc1; p=quarantine; pct=100; rua=mailto:dmarc-reports@bounces.amazon.com; ruf=mailto:dmarc-reports@bounces.amazon.com

21 DMARC visualized DNS Server DMARC p=reject SIGNED Verified SIGNED Trusted_Partner.com Cisco ESA Report Imposter Drop/Quarantine Trusted_Partner.com

22 Cisco Security Appliance - ESA

23 Cisco Ironport Security Appliance ESA Virtual (on Cisco UCS hardware + VMware) and hardware appliance. Main features: traffic normalization; SPF, DKIM, DMARC verification, DKIM signing; Sender reputation filtering; Anti-SPAM; Anti-malware engines (Sophos, McAfee, FireAMP); Integrated RSA DLP engine; Outbreak Filter (automatically enforced Cisco Talos rules); Real-time URL analysis; Local or off-box (Management Appliance) quarantine; encryption (Cisco Secure Envelope Services or S/MIME). Can be managed over its embedded GUI or through a Content Security Management Appliance.

24 Simplified incoming mail verification flow Normalization, SFP/DKIM/ DMARC, recipient identity checks Drop/Quarantine SenderBase Reputation Filtering Drop Anti-Spam Drop/Quarantine Cisco Talos Anti-Virus Drop/Quarantine Advanced Malware Protection AMP Drop/Quarantine Outbreak Filters Quarantine/Re-write Real-time URL Analysis cws Deliver Quarantine Re-write URLs Drop

25 Cisco Senderbase reputation filtering Big-big data: More than 1.6 million sensors; Covers approximately 35% of the World s traffic; Inspects over 13 billion Web requests per day; More than 200 web and parameters are analysed for hosts and domains. The result is a reputation score between -10 and +10 for SMTP servers and web sites which is used as a condition in rules. It is inspected for incoming mails only. The reputation score in Senderbase cannot be modified manually. The owner of the domain or host must comply! Public website for Senderbase:

26 Anti-SPAM ESA has two Anti-SPAM engines. You may run both using Intelligent Multi-Scan. It can be applied on both outgoing and incoming s. ESA may put suspected SPAM messages into quarantine, drop or just mark them. There is an approximate 99% catch rate. The categories into which an may fall into: Not SPAM; Unwanted marketing from a legitimate source; Suspected SPAM; Positively identified SPAM. The system gives integrated feedback channel to Cisco in case of false positive or false negative classification events.

27 Anti-virus on ESA There are two traditional A/V engines on ESA: Sophos and McAfee. One or both can be run in the same time on the same message. Both engines can do traditional pattern matching and heuristic analysis. Infected messages can be disinfected or quarantined. Messages with attachments that cannot be inspected can be quarantined or tagged. Can be used on both incoming and outgoing s.

28 FireAMP on ESA Called File Reputation and File Analysis engine in ESA. Can be used to inspect incoming messages only. Requires continuous access to Sourcefire cloud. At the moment it uses cloud Sandboxing (Threat Grid in AMP cloud). Integrated Sandboxing is on roadmap. Comprehensive reporting and audit functionality. File tracking with alerting and reporting on false negatives (initially missed malware).

29 Mail Flow Pipeline File Reputation update FireAMP on ESA To Content Filters AMP Cloud AMP Client Local Cache File Reputation Query Sha256 checksum +SPERO fingerprint for WinPE files Verdict Unknown File Upload for Sandboxing VRT Sandboxing From Anti-Virus

30 Outbreak Filter Automated intervention point for Cisco Talos. Can be used on both incoming and outgoing s. Virus, Malware and Phishing SCAM protection. Ways of intervention: May quarantine or drop harmful messages; Suspected messages can be hold back until an anti-virus system declares it clean; Modification of the message, e.g.: Tagging the URL, delete or rewrite the URL, redirect to Cisco Cloud Web Security (CWS) proxy. End users cannot write custom rules for the Outbreak Filter engine. The default poll time is 5 minutes.

31 Real-time URL analysis in ESA The embedded URLs in an can be analysed automatically. This may be used for both incoming and outgoing s. The category and the web reputation score of the URL (host) can be verified. Above message drop and quarantine, the following actions can be done: Tag the URL (so they are not parsed as valid URL); Replace the URL (can even redirect to Cisco Cloud Web Security (CWS) proxy); Overwrite the URL with any text. Note: many such phishing URLs point to new web sites with currently neutral (0) reputation. See our previous example! So this function doesn t prevent you having sufficient web security measures.

32 Real-time URL analysis in ESA Contains URL Rewrite Send to Cloud Tag BLOCKEDwww.playboy.comBLOCKED BLOCKEDwww.proxy.orgBLOCKED Cisco Talos Replace This URL is blocked by policy URL Categorization

33 Inspection of outgoing s The previously mentioned bi-directional inspection functions are: Normalization; Anti-SPAM; Legacy anti-virus; Outbreak filter; URL analysis. One not yet mentioned bi-directional function: decryption with S/MIME. Above the above-mentioned: RSA DLP engine; encryption using either Cisco Registered Envelope Service (CRES) or S/MIME; DKIM signature.

34 Cisco Registered Envelope Service (CRES) Cisco Security Appliance Message Key Sender Controls Recipient Automated key management on a local server or in cloud. The content is never processed in the cloud, encrypted on ESA. Policy driven encryption, can be transparent at the sender side. Alternative solution #1: TLS encrypted SMTP between servers. Supported on ESA. Alternative solution #2: S/MIME. End-to-end or encryption done on ESA. FAQ:

35 S/MIME on ESA NEW in version 9.0 Secure/Multipurpose Internet Mail Extensions (S/MIME) is a standard based method for integrity checking (signing) and encryption. RFCs: 3369, 3370, 3850, 3851, 5750 and The ESA can (on gateway level with common key materials): Sign, encrypt, or sign and encrypt messages using S/MIME; Verify, decrypt, or decrypt and verify messages using S/MIME. May work together with CRES. ESA can generate self-signed or use imported certificates for signing and decryption.

36 S/MIME on ESA NEW in version 9.0 Encryption requires ESA having the public key of the recipient: It can be added manually; ESA can try to harvest them. Public key harvesting: ESA can automatically collect the public keys from incoming s; The maximum storage size for that purpose is 512 Mbytes per appliance; Oldest keys are deleted when the storage space fills up; The HAT (Host Access Table) can be fine tuned to allow/disallow harvesting for certain categories. Outgoing S/MIME signing and encryption can be controlled in policy. S/MIME challenges: Requires PKI; Some webmail systems have difficulties to handle it.

37 Some deployment considerations ESA should be connected into the DMZ. Logically ESA must be in front of the Groupware/ server. Redundancy and load-balancing can be achieved via: Multiple MX records in the DNS zone; Load-balancer. Please ask Cisco or a certified Cisco partner to size the ESA deployment!

38 Dedicated security vs. UTM/NGFW Dedicated security solutions offer: More controls; Defense in depth (e.g. Multiple anti-virus/malware engines); More processing power for features like DKIM, S/MIME, etc.. Better reporting on related data; Think about ACI, it is easy to separate applications traffic.

39 Web security

40 Common Web Threats #1 Malware Visiting phishing sites. Productivity issues: employees spending time with visiting non-productive web sites. Bandwidth issues: employees downloading large files (bad files or good files but big size and bad timing).

41 Malware Web Malware related attack vectors: Browser exploit; Browser plugin exploit; Downloaded file hides malware; Harmful web applications; Etc. The attack vector is increasingly sophisticated: The web site that hosts the harmful code is many times accessed via multiple redirections and hidden links; The initially run code downloads and/or creates other files it can be the fourth, fifth, etc. level that implements the real harmful activity; SSL/TLS encrypted channels can be used. Web surfing is the hardest to protect attack surface today.

42 Cisco Ironport Web Security Appliance WSA Virtual (Cisco UCS + VMware or KVM) or hardware appliance formats. Features: HTTP(S), FTP(S) proxy, caching and TCP optimization; TLS decryption and re-encryption (MITM); Dynamic URL category and reputation filtering; Content filtering (file type); Simple in-box DLP engine, ICAP interface for external engines; Web Application Visibility and Control (AVC) engine; Anti-malware engines (Sophos, McAfee, Webroot and FireAMP); Botnet Activity Filtering (L4TM) inspection over the whole TCP/UDP port range; User Authentication, quota control, user-based reporting. Can be managed over its embedded GUI and CLI or over the centrally through a Content Security Management Appliance.

43 WSA TLS Proxy The SSL/TLS encryption blinds the content analysis engines. URL Filtering can still work. How? WSA supports Man In The Middle (MITM) style SSL/TLS decryption and reencryption. It can be transparent to the end user: The proxy (e.g. WSA) receives the request; The proxy opens a new encrypted session towards the web server; The proxy generates and signs a new certificate which is very similar to the original certificate of the server; If the proxy s certificate comes from a Trusted CA, the client browser won t raise any alert. For effective use of this function a signing certificate must be installed on the WSA that comes from a Trusted Root CA server.

44 WSA TLS Proxy - certificates An example for a decrypted session. The banking site in the example is 100% safe and used by the author daily.

45 Latest additions to WSA FireAMP anti-malware (File reputation and analysis): May block file download; Has extensive file tracking and reporting; Retrospective analysis and alerting; Approximately 6-16% extra load. Cisco Identity Services Engine (ISE) pxgrid API integration: An additional transparent user authentication method (in addition to the CDA method for AD); Maps the username and the Security Group Tag to the source IP address; The SGT is used in the Web Access Policy as a condition; Can identify non-ad users and non-user endpoints; At the moment unidirectional but automated remediation initiated by the WSA over ISE is on roadmap. Time and volume quotas.

46 Some WSA deployment considerations WSA fully inspects HTTP(s) and FTP(s) only. The rest of the traffic can be inspected by the Botnet Traffic Filter function over different in-line or promiscuous ports only. The (selective) traffic redirection can be done in the following ways: Explicit Proxy settings in the OS or in the browser (manual or PAC file); Transparent (to end user) redirection: WCCP; Policy Based Routing (PBR); Destination NAT (breaks SSL/TLS proxy). Normally WSA uses its proxy IP address as the source IP for sending traffic out to the Internet. It can be changed to preserve the source IP address.

47 Some WSA deployment considerations The L4TM (Botnet Traffic Filter) is working on separate interfaces (in-line or promiscuous). The Load-balancing and redundancy options are: WCCP; Multiple proxies configured in the PAC file; Load-balancer. Web Cache Communication Protocol (WCCP) Content routing protocol developed by Cisco; Redirects traffic AND provides: fail-open, redundancy, load-balancing and signalling; There are Layer 2 and Layer 3 (GRE) redirection methods; Redirection is supported on Cisco switches, IOS routers, ASA firewalls and 3rd party devices; Read more:

48 Dedicated Web proxy vs. UTM/NGFW Pros: Do caching as well, ideal for low-bandwidth connections; The deployment requires no- or minimal change in the existing firewall system; Has enough processing power for defense in depth kind of processing (e.g. multiple anti-virus/malware engines). Cons: There are no IPS functions; Fully inspects HTTP(s) and FTP(s) only; Separate device to manage.

49 Dedicated Web proxy customer scenario The customer: Multinational pathological microscope and x-ray developer; Low bandwidth Internet uplink (20 Mbps for 300 employees); Existing corporate standard 3rd party Firewall with IPS license; The existing firewall s web security features didn t satisfy the needs but has PBR functionality. Requirements: #1 Malware filtering even in SSL/TLS encrypted traffic; Authenticated user access primarily for reporting; URL filtering to increase productivity and decrease the load on the Internet uplink; Caching would be a nice to have feature. They have bought WSA on Cisco appliance after evaluating it on VMware.

50 THANK YOU!

51

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2

SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2 Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and

More information

Cisco EXAM - 300-207. Implementing Cisco Threat Control Solutions (SITCS) Buy Full Product. http://www.examskey.com/300-207.html

Cisco EXAM - 300-207. Implementing Cisco Threat Control Solutions (SITCS) Buy Full Product. http://www.examskey.com/300-207.html Cisco EXAM - 300-207 Implementing Cisco Threat Control Solutions (SITCS) Buy Full Product http://www.examskey.com/300-207.html Examskey Cisco 300-207 exam demo product is here for you to test the quality

More information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Anti-Phishing Best Practices for ISPs and Mailbox Providers Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Top 10 Features: Clearswift SECURE Email Gateway

Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Cisco IronPort X1070 Email Security System

Cisco IronPort X1070 Email Security System Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The

More information

Comprehensive Email Filtering. Whitepaper

Comprehensive Email Filtering. Whitepaper Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses

More information

Cisco Web Security: Protection, Control, and Value

Cisco Web Security: Protection, Control, and Value Cisco Web Security: Protection, Control, and Value Benefits Strong protection: Protects every device through a sophisticated global threat-intelligence infrastructure, which includes Cisco Talos Security

More information

Simple security is better security Or: How complexity became the biggest security threat

Simple security is better security Or: How complexity became the biggest security threat Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

Cisco Cloud Email Security Interoperability with Microsoft Office 365

Cisco Cloud Email Security Interoperability with Microsoft Office 365 White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources

More information

Email Security - DMARC ed Encryption

Email Security - DMARC ed Encryption Email Security - DMARC ed Encryption non perdere tempo, non perdere dati e soprattutto evitare le trappole Cristiano Cafferata Claudia Parodi Mauro Cicognini

More information

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail. Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Exchange Online Protection In-Depth

Exchange Online Protection In-Depth Exchange Online Protection In-Depth Mike Crowley Baseline Technologies Session Agenda Introduction to EOP Administration DMARC, SPF & DKIM Advanced Threat Protection EOP Deployment Tips Introduction to

More information

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line

More information

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86% Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity

More information

A D M I N I S T R A T O R V 1. 0

A D M I N I S T R A T O R V 1. 0 A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall

How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks

More information

Securing enterprise collaboration through email and file sharing on a unified platform

Securing enterprise collaboration through email and file sharing on a unified platform Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

Email Security Deployment Guide

Email Security Deployment Guide Email Security Deployment Guide Revision: H1CY11 Who Should Read This Guide This guide is intended for the reader with any or all of the following: Up to 2500 connected employees Up to 75 branches with

More information

Cisco Email Security: Layered Protection from Blended Threats

Cisco Email Security: Layered Protection from Blended Threats Cisco Email Security: Layered Protection from Blended Threats Benefits Faster, more comprehensive email protection, often hours or days ahead of the competition The largest network of threat intelligence

More information

SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1

SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1 SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1 Objetivo Securing Web with Cisco Web Security Appliance (SWSA) é um curso com carga horário de dois dias, que proporciona aos alunos os conhecimentos

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

Cisco Cloud Web Security

Cisco Cloud Web Security Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that

More information

FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview

FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate communications.

More information

Cisco Email Security Appliances

Cisco Email Security Appliances Data Sheet Cisco Email Security Appliances Product Overview Over the past 20 years, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate

More information

Targeted Phishing. Trends and Solutions. The Growth and Payoff of Targeted Phishing

Targeted Phishing. Trends and Solutions. The Growth and Payoff of Targeted Phishing White Paper Targeted Phishing Email is the medium most organizations have come to rely on for communication. Unfortunately, most incoming email is unwanted or even malicious. Today s modern spam-blocking

More information

anomaly, thus reported to our central servers.

anomaly, thus reported to our central servers. Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201 FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201 Course Overview Through this 2-day instructor-led classroom or online virtual training, participants

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services

More information

Cisco Web Security Appliance

Cisco Web Security Appliance Data Sheet Cisco Web Security Appliance In our highly connected and increasingly mobile world, more complex and sophisticated threats require the right mix of security solutions. Cisco delivers security

More information

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection

More information

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

WATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH

WATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH KEY SALES PITCH First and only true unified security provider for protection bidirectional threats and data loss prevention across email and web in a single solution. XCS leverages ReputationAuthority

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4

What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4 Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

Cisco IronPort C670 for Large Enterprises and ISPs

Cisco IronPort C670 for Large Enterprises and ISPs Data Sheet Cisco IronPort C670 for Large Enterprises and ISPs As the battle to protect the corporate email perimeter continues, two trends emerge: higher mail volumes and more resource-intensive scanning.

More information

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.] Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless

More information

Securing enterprise collaboration through email and file sharing on a unified platform

Securing enterprise collaboration through email and file sharing on a unified platform Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.

More information

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

Cisco PIX vs. Checkpoint Firewall

Cisco PIX vs. Checkpoint Firewall Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.

More information

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Threat Containment for Facebook

Threat Containment for Facebook Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

On and off premises technologies Which is best for you?

On and off premises technologies Which is best for you? On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email

More information

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec

More information

HTTPS Inspection with Cisco CWS

HTTPS Inspection with Cisco CWS White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a

More information

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000 Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

How To Configure Forefront Threat Management Gateway (Forefront) For An Email Server

How To Configure Forefront Threat Management Gateway (Forefront) For An Email Server Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management

More information

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007 COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different

More information

Avira Managed Email Security AMES FAQ. www.avira.com

Avira Managed Email Security AMES FAQ. www.avira.com Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change

More information

C I S C O E M A I L S E C U R I T Y A P P L I A N C E

C I S C O E M A I L S E C U R I T Y A P P L I A N C E C I S C O E M A I L S E C U R I T Y A P P L I A N C E U R L F I L T E R I N G September 2015 Version 1.3 Tobias Mayer Consulting Systems Engineer The most current version of this document can be found

More information

Mimecast Email Security

Mimecast Email Security DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing

More information

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property

More information

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network. Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part

More information

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

The Leading Email Security Suites

The Leading Email Security Suites The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server

More information

SafeNet Content Security Product Overview. Protecting the Network Edge

SafeNet Content Security Product Overview. Protecting the Network Edge SafeNet Content Security Product Overview Protecting the Network Edge From idea to action, SafeNet smartly protects information as it moves through its lifecycle. With data encryption and control solutions,

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

MDaemon Vs. Microsoft Exchange Server 2013 Standard

MDaemon Vs. Microsoft Exchange Server 2013 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance 1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation

More information

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check http://kuix.

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check http://kuix. Spam Salt aka Message Salt An invention against email abuse (Spam), introducing an email sender authentication mechanism. Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Protect Your Enterprise With the Leader in Secure Email Boundary Services

Protect Your Enterprise With the Leader in Secure Email Boundary Services Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise

More information

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

IronPort C300 for Medium-Sized Enterprises and Satellite Offices

IronPort C300 for Medium-Sized Enterprises and Satellite Offices I r o n P o r t A p p l i a n c e s H I G H - P E R F O R M A N C E E M A I L S E C U R I T Y. C A R R I E R - P R O V E N T E C H N O L O G Y. E N T E R P R I S E - C L A S S M A N A G E M E N T. IronPort

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

Cisco RSA Announcement Update

Cisco RSA Announcement Update Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information