2 Why? Focused on Managed Messaging SaaS Security Systems Own Superior-Architected Infrastructure DATACENTERS: Carrier-class hosting facilities with power and back-up power supplies, Generator, temperature, humidity control and fire suppression systems 12 hours of battery life and 24 hours of generator fuel with contracts for 4 hour diesel fuel delivery Onsite technician SERVER FARM Server Clusters for Web services, funneling services and Backend SQL databases System is based on Cisco, Dell and EMC hardware Access to server Web and clusters is controlled by Load-Balancers to distribute IP connection across hardware and allow for easy addition of new hardware and autodetection/removal of down equipment without interruption. System is monitored and automatic alerts sent out when failures or heavy loads are detected. Stats stored for future growth projection Dual redundant/load-balanced fiber optic IP internet connections to Tier 1 internet back-bone providers. Our clusters of servers are directly connected to the internet via Gigabit Fiber and OC-12 internet feeds from two distinct tier-1 service providers SUPPORTED BY CERTIFIED ENGINEERS Linux, MCSE, CCNA, CCNP, CCDA certified engineers maintain our own infrastructure and provision our equipment and software as a service
3 Focused on Security Software since 1995 Own Well-Architected Software Technology Not open to hackers and spammers Promptly adapts to new threats or regulations Flexible to incorporate specific customer requirements Mature Technology Industry-acclaimed > 10 years, >100 countries and >1,300 clients Millions of protected mailboxes Multiple awards for performance and value Basic Funneling MX Verify & Redundancy service is a first pass processing strategy for organizations managing their own servers and utilizing their own internal software Spam and virus solutions. IT departments can take advantage of the Premium funneling service, in parts, by using our data centers to reduce your handling volumes, fully back up your local system, without employing Spam and virus management applications. Managing Spam is a full time process. Let AASP help your IT staff to focus on the spam we forward to your actual users, we ll focus on perimeter protections, attacks, and back up to your systems. Why? Basic Funneling offers companies multiple methods of user authentication to verify that only legitimate mail is passed from our world class data centers to your servers, even if it is not scanned for Spam. DNS attacks, directory harvesting, and bombs are defended at our data centers forwarding only user verified , which can reduce your own processing loads from 50% up to 90%. For pennies per account per month, AASP Basic Funneling can add carrier grade value with enterprise level uptime, while reducing the infrastructureand processing load required to manage the ever increasing problem of Spam.
4 Together Focused on Selective PERIMETER Security Strong Perimeter Defence Protects AASP mail servers against: Dictionary Harvesting attacks (DHA), DoS attacks, Open Relay attacks. Reputation Filters Other controls This represents approximately 70+% of Spam! As AASP servers are protected, our channel partners and their clients servers are never threatened! Perimeter Defense: 1. Protocol filter 2. Reputation Filters: - Reverse DNS lookup - SPF mechanism - Accreditation DB s 3. Block DHA attack 4. Connection limits 5. Block connections 6. Mail Relay Control 7. SMTP security - SMTP Authentication bit TLS Encryption
5 Why? Focused on our Managed Messaging Clients Since 2003 Over the years, we ve answered the requests of our end user focus groups and our channel partners by PROVIDING: No risk, guaranteed service, cancelable at will. No set up fees, maintenance fees or upgrade fees. No hardware or software purchases or licenses needed, no changes to legacy systems. No-long term contracts, just month to month actual billing. Private Labeling Create market confidence with your own brand name premium funneling services, instill assurances backing your service with the Vircom software name, offer seamless and quickly noticed upgrades whether converting from current filtering services or in-house solutions. The ability to create your own channel partners and re-label again to as many selling partners as the market will bear with street pricing limits. Virtual ownership of our World-class infrastructure, use our redundant data centers to guarantee uptime, speed, and ironclad reliability to process huge volumes of in milliseconds. Volume license sharing in the World-renowned, award winning VIRCOM filtering software through us, with out of the box performance. Real time monthly billing safeguarding against turnover, with accurate user verification and unlimited aliases, meaning fair and exact billing for only the accounts benefiting from the Funneling service. As the number of filtered boxes fluctuates, so do the amounts charged to our channel partners and their customers. Standard inbound, disaster recovery. Web based management center for Administrators. Free 30-day trial period, irrespective of mailbox deployment size
6 Focused on Security Technology since 1995 Why? MESSAGE FUNNELING TECHNOLOGY The core focus of funneling is to eliminate invalid user named that is attempting to find an inbox through your own or your customer s server. This would seem like a limited amount of for any receiving server to process, identify, and reject but this represents 50% or more of the load processed by receiving servers each day. Our user verification protocols are simple technologies built into most servers themselves. servers allow for these common user verifications between ESS and the server(s) we are protecting; 1). LDAP 2). SMTP Authentication 3). SMTP Verify ESS can also employ a manually managed static list of mail users to forward or reject invalid addresses with. Sharing an user list enables the funneling service without an external integration with the security network (ESS) to verify users. The drawback to a static list is it must be manually updated by both sides, ESS and the receiving server.
7 Why? Focused on Security Technology within our own Technology Since 2006 How does Basic Funneling Work? By redirecting your traffic through AASP data Funneling centers (MX Record Change), the world remains unaware that anything on your end has changed, even the speed is the same as is processed in milliseconds. How we make it work We disable our own engine scans and simply authenticate passing through our system as belonging to a known user, on your domain. We work with you to set up an authentication method. When our system and your system can match inbound with actual users, all un-named inbound is bounced without notification. All addresses have a send to formula that directs sent to the proper server, for delivering on to the receiver's inbox that formula is the MX Record. Since the MX Record is pointing to us, we now verify the has a valid user address and forward the (Spam included) to the intended server. Forwarded is then server scanned internally and then forwards on to the users inbox. Provisioning: 1. Create an Account by adding domain name(s), mail server IP, DNS name, aliases, and named administrator(s) 2. Secure Traffic -Block all receiving that is not from ESS 3. Select User Verify Option by best method that fits your system 2. Redirect Traffic by changing MX Record to point to our data centers, server clusters
8 Focused on Effortless Administration Set it and forget it Why? Automation Automated User/Account Management Automatic Population of User DB (SMTP, LDAP ) Authentication & User Verification 24/7 Automated Anti-Spam & anti-phishing Updates Up to every 5 minutes. Matchless self-learning mechanism Honeypots/Spamtraps User feedback: ISP partners, Corporate users Supported by Human Analysis Vircom s SpamBuster Team Minimal False Positives Every input benefits to All
9 Why? & Feature Summary Basic Funneling August, Protection Feature Status Description Spam Filtering NO 98.6% out of the box Virus Blocking NO Commercial Updates Connection Defense NO Block/Allow by IP etc Delivery Configuration Yes Load Balance, Fail Over Reports NO Web Based & ed Message Center NO Web User Interface Quarantine Summary NO & Web Based User Authentication Verify Yes Verify User or Bounce Directory Harvest Attack Configurable AASP Servers Attacked, Client Perimeter Defended Spam Bomb and Virus Attack protection Configurable AASP Servers Attacked, Client Perimeter Defended Spooling Redundancy Yes Up to 3 Days w/notification Attachment Control NO Size and File Type Inbound Content Manager NO Standard/Custom Scripting Transport-Layer Security (TLS) NO Encryption Industry Heuristics NO Standard/Custom Scripting User Directory Management (LDAP-SMTP) Yes Auto-User Authentication Outbound Services Attachment Manager Content Manager/Corporate Secrets Quarantine Virus Filtering/Downside Liability Compliance Footer NO Enterprise Rich control for (AUP) Acceptable Use Policy Instant Messaging NO Managed Addition Archiving NO Managed Addition Private Labeling Yes Client Identity on Services Aggregate Pricing for Core Services/Reselling Yes Channel Ready Cancellation/Performance Clause Yes % Uptime Guarantee Monthly Churn Protection Yes Auto-User Verify, Aliases waived, Actual Billing Migration Consulting NO Black/White List Import
Best Practices Series Microsoft Exchange Server 2010 in the Cloud White Paper A Step-by-Step Guide to Planning and Architecting Your Migration Introduction Microsoft Exchange Server 2010 offers a number
E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product
A GUIDE TO Security and privacy in a Hosted Exchange environment What s inside this white paper: A two-page checklist for comparing the security of hosted Exchange providers Definitions for each element
SonicWALL Email Security Appliance Administrator Guide Version 7.3 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: firstname.lastname@example.org Part Number:
CHARTER BUSINESS INTERNET PLUS Interactive welcome kit 800.314.7195 Charter-Business.com CB.016.intCD.0210 CHARTER BUSINESS INTERNET PLUS 2 ADDITIONAL INFO Thank you for choosing Charter Business INTERNET
Questions and Answers Questions About Platform, Requirements, and Capabilities What is the difference between a SonicWALL Appliance and Software SonicWALL Email Security? The hardware version is a Linux
Managed Server Hosting: Build It or Buy It? Executive Summary The question still reigns for most growing companies regarding the decision to build in-house infrastructure or utilize third party providers.
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
How AWS Pricing Works May 2015 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 15 Table of Contents Table of Contents... 2 Abstract... 3 Introduction...
Private Clouds & Hosted IT Solutions Your Infrastructure, our datacenters With the help of its World-class partners, PBC can safely host any of your Mission-critical application on powerful, secure, Dedicated
With hundreds of Help Desk software packages available, how do you choose the best one for your company? When conducting an Internet search, how do you wade through the overwhelming results? The answer
M1000, M2000, M3000 eprism User Guide Preface 5 CHAPTER 1 eprism Overview 7 What s New in eprism 5.0 8 eprism Overview 10 eprism Deployment 17 How Messages are Processed by eprism 19 CHAPTER 2 Administering
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
Manual POLICY PATROL EMAIL MAIL SECURITY MANUAL Policy Patrol Email Mail Security This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
Symantec Backup Exec 11d for Windows Small Business Server End-User Call Script for Sales This document is intended as a simple call structure to help get you started when selling Backup Exec 11d for Windows