Symantec Security.cloud - Skeptic Whitepaper
|
|
- Augustus Henderson
- 8 years ago
- Views:
Transcription
1 TECHNICAL BRIEF: SYMANTEC SECURITY.CLOUD Symantec Security.cloud - Skeptic Whitepaper Who should read this paper This white paper outlines the technical approach we use to deliver Symantec Security.cloud and protect your business from borne spam, phishing, malware, and targeted attacks without the need for on-premise software or hardware. A working knowledge of and information security principles is recommended.
2
3 Content Overview Global Infrastructure Cloud Security Platform Security Technology and Response Service Administration Industry Leading Service Summary Glossary
4 Overview The need for an effective defense is very real. Due to the prominence and use of in business operations, cyber criminals, spammers, and malware authors continue to focus considerable effort on developing -based forms of attack. In the last few years, these attacks have become more targeted and sophisticated, exhibiting convergence across multiple communication protocols. A common approach is to use to lure users to websites, which install malware that infiltrates corporate networks and steals information. Once data has been extracted, it can be utilized or sold through what has become a very well organized underground economy. Nearly one in 278 s today contains some form of malware threat. 1 Advanced toolsets used by cyber criminals are able to automatically mass-produce malware variants designed to overwhelm and evade traditional signature-based antivirus scanners. Some attackers also use highly targeted approaches that are designed to defeat signature-based systems by flying under the radar. Either way, the battle has reached a point where traditional antivirus signature scanning techniques alone are not enough. Without effective defenses, organizations risk costly business disruption, data leaks, and loss of customer confidence. However, mounting an effective defense can consume scarce resources and expertise. Symantec Security.cloud helps to protect your business from borne malware and does not require on-site hardware or software. Delivered from the cloud, the service is built on excellent customer service and a meaningful service level agreement 2 (SLA) that examines accuracy, effectiveness, and availability. The SLA is underpinned by significant service credits that demonstrate the confidence of Symantec's ability to deliver a robust security service. This white paper outlines the technical approach we use to deliver Symantec Security.cloud and meet our aggressive service level targets. 1- Symantec Intelligence Report, December Service Level Agreement 1
5 Global Infrastructure Symantec Security.cloud service uses infrastructure managed in the cloud designed to block -borne malware threats before they reach your network. The service is delivered through a global infrastructure of highly available data centers located around the world. These data centers are load balanced and housed in highly secure, well-established telecommunications centers located at major Internet exchange points. Redundancy within and across data centers enables us to offer a service level agreement target of 100 percent service uptime. In addition, we aim to run our servers at below capacity, providing ample headroom to handle unexpected spikes in traffic. As of December 2012, Symantec cloud infrastructure processes more than 7 billion s a month on behalf of our customers, ranging from Fortune 500 companies to small businesses. Handling such a large amount of traffic for such a broad range of global customers enables us to identify and block new emerging threats faster. Cloud Security Platform Security service uses a sophisticated multilayer architecture that combines multiple scanning engines. The following techniques are used at the perimeter of our platform to provide a first layer of defense: Traffic Shaping Symantec Traffic Shaper uses techniques that analyze traffic patterns at the TCP/IP protocol level to evaluate potentially malicious IP addresses. IPs that are considered a threat are identified, and the number of connections allowed to the Security infrastructure is reduced. This dramatically shrinks malicious volumes while enabling legitimate to reach its destination. Traffic management technology analyzes IP interaction over a period of time after connection limiting steps are taken. It is known that standard business mail servers have different patterns of connections than those of a Bot that is delivering either malicious code or spam. Taking a holistic approach that goes beyond evaluating current known reputations and includes studying connection patterns over time allows the system to more intelligently determine how many connections should be accepted by the infrastructure. 2
6 SMTP Heuristics Connection management works at the SMTP connection layer using techniques to verify legitimate SMTP conversations. Multiple component technologies are deployed in this layer of the platform to study the methodologies used by different servers connecting to our infrastructure. Using SMTP heuristics and signature components at the connection layer allows for Security to proactively shut down SMTP conversations identified as being illegitimate. Recipient Validation Recipient validation uses address checking to reduce the overall volume of s for registered domains and discards connections for which the recipient addresses are identified as invalid or non-existent. In addition to reducing the volume of illegitimate , this helps to block dictionary attacks against your mail infrastructure. Collectively, traffic shaping, SMTP heuristics, and recipient validation dramatically reduce the volume of mail that hits the scanning layers. This allows us to apply in-depth analysis techniques at the scanning layers without compromising mail delivery times. Spam Scanning The first scanning layer utilizes both dynamic and customer defined block lists to filter out traffic from known bad hosts and other unwanted . Symantec Brightmail Message Filter provides real-time automated spam filtering backed by the Symantec Global Intelligence Network. More than 2.5 million decoy accounts focused on collecting fraud, phishing and spam samples make up part of the Global Intelligence Network known as the probe network. The probe network has a global presence, including targeted deployments for foreign language content, and can gauge global spam and phishing activity. This network gathers more than 30 million probe messages per day. 3
7 Intelligent Data Feeds The Skeptic scanning layer provides further defense against spam, malware, and phishing attacks. Understanding a file's history and reputation goes a long way to determining whether a file should be deemed malicious or not. Symantec Insight is reputation-based security technology that puts files in context, using their age, frequency, location, and more. In-depth heuristic analysis of a file is expensive in terms of time and processing. The most expensive file to scan is one we already know is clean. By leveraging a feed of clean data from Insight, Security customers can take advantage of the intelligence captured from over 210 million systems in over 200 countries. The breadth of Symantec's security expertise and intelligence is highlighted further by the use of data from Norton Safe Web. Safe Web is a reputation service from Symantec that analyzes web sites and their content. Data from Norton Safe Web and other external sources is used to detect and block s containing links to known malicious websites for the purposes of phishing, malware distribution or other malicious activity. Symantec Protection Engine for Cloud Services Symantec Protection Engine for Cloud Services is a fast, scalable, and reliable content scanning engine. It uses patented technology to deliver industry leading malware protection. Security uses a multilayered antivirus architecture that combines Protection Engine for Cloud Services with Skeptic, providing defense in depth and limiting reliance on a single detection method. Skeptic Heuristic Technology Although signature based scanners are effective in some areas, they have limited ability to detect new, unknown virus threats. Security is designed to provide 100 percent protection from known and unknown viruses as defined in the SLA. 3 To help us to achieve our service level target we use predictive heuristic technologies built into a proprietary defense layer called Skeptic. Skeptic employs heuristic technologies to determine if an contains any components of malicious code. For example, Skeptic uses structure analysis to examine headers and attachments. Skeptic then runs complex deep analysis scans within s and attachments to find out more information. Skeptic also performs advanced code analysis, which operates on findings showing that malware writers reuse portions of their own code across new and different malware. Skeptic uses multiple patented technologies and thousands of rules to analyze and detect unknown threats. Unlike commercial antivirus scanning engines, Skeptic cannot be downloaded and tested by cyber criminals. A few of the techniques deployed by Skeptic to detect threats in communications include: Link following technology evaluates URL links in s to test if they point to malicious websites. Links potentially differ from conventional virus threats in that the URL itself does not contain malicious code but instead the http page that the URL directs users to contains malicious payload. Sandbox techniques in both full and partial forms are used to detect malware that exhibits easily detectable destructive behavior. Code analysis techniques are used to detect malware that is trying to evade sandboxing or which is trying to obscure itself. Reverse virus scanning allows new file-infecting viruses to be identified by detecting changes of formerly known good files. Symantec maintains a database of known good software, such as Windows executables and other popular software, which allows positive identification of good files and reduces virus false positives
8 File recognizers use Symantec s own large library of recognizers for known good variable software. Examples include self-extracting zip files, self-extracting PGP encrypted files, flash files, etc. These files vary each time because they carry data that can change. Our service examines and compares files to the known valid versions of these files in order to reduce false positives and aid in the identification of new fileinfecting viruses. Historical recognition uses Symantec s historical attachments data. Our data (which spans over 12 years), allows us to compute the probability of a file being clean based on the length of time it has been in circulation without ever being marked as malicious by antivirus software. Statistical analysis techniques detect malware trying to hide using new compression or encoding techniques. Data file fingerprinting is used to recognize when a data file looks suspicious. This is accomplished using a combination of several techniques. These types of files are often targeted trojan viruses which are designed for industrial or state-sponsored espionage. Malformed recognition is performed to detect deliberately malformed s. These s are used by malware creators to bypass scanners using an that the scanner will usually not recognize as having a valid attachment. Skeptic decodes these and scans resulting attachments. Skeptic uses scalable server arrays managed in the cloud to perform heuristic analysis techniques on over 7 billion s each month. The more traffic it scans, the smarter it gets. Policy Control Point Symantec Content Control.cloud and Symantec Image Control.cloud service add-ons can be enabled to automatically scan all incoming and outgoing and attachments to identify and control confidential, malicious, or inappropriate content and images. The Image Control service add-on incorporates sophisticated Image Composition Analysis (ICA) technology. Particularly well suited to the accurate detection of pornographic images, ICA applies a comprehensive range of image-filtering algorithmic techniques, including facial recognition, body positioning analysis, texture analysis, and flesh tone analysis. ICA results are fed through a sophisticated scoring system which allows the overall acceptability of an image to be determined. Security Technology and Response Security.cloud leverages protection technologies developed by the Symantec Security Technology and Response (STAR) team. STAR is a worldwide team of security engineers, threat analysts, and researchers that provide the underlying functionality, content, and support for all Symantec corporate and consumer security products. With eleven global response centers located throughout the world, STAR leverages the vast intelligence of the Global Intelligence Network (the technology backbone of Security Response) to develop and deliver the world's most comprehensive security protection. The team provides an additional layer of protection for all Security customers by examining proactive alerts generated by Skeptic. Looking at content and traffic patterns, Skeptic can proactively alert our security research and response teams about suspicious messages or unusual trends occurring in one or many of our customers. These types of messages would not ordinarily trigger a reaction from signature based scanning technology and could represent an entirely new threat or targeted attack that needs response. 5
9 The value of a human team behind any security service should not be underestimated. The STAR team has the added advantage of using data gathered from multiple products and services across the Symantec portfolio to investigate and feed security intelligence ensuring our customers get a high performing, robust security service. Service Administration Administration is performed on the Symantec.cloud management portal. A single administrative logon can be used to manage multiple Symantec cloud services, including Symantec Web Security.cloud and Symantec Instant Messaging Security.cloud. When Security intercepts a virus or malware in an , it places the infected into a holding pen, where it is stored for up to 30 days before being deleted. This quarantine period means that the malicious is isolated and cannot infect the intended recipient s computer. Each quarantined is given a unique identifier. This identifier is provided in the alerts that can be issued to administrators and users when an containing a suspect virus is received. Key Reporting Capabilities Dashboard, summary, detailed, and scheduled reporting options are included and configurable to provide visibility, accountability, and confidence in the service s effectiveness and your organizations activity. The key statistics dashboard provides a quick view of the current service performance levels and notable activities such as virus blocks or s that have triggered a policy. Report requests provide a way to get more in-depth reporting, allowing you to customize what metrics and time periods are included. Reports can be executed as a one-off or scheduled to run at regular intervals, with options to deliver via portal or straight to your inbox. My Services is designed to give you an at a glance overview of service activity across multiple Symantec cloud security services. Industry Leading Service Symantec understands that our customers want a high performing security service and excellent customer service backed by a meaningful and comprehensive service level agreement (SLA). Our confidence and our ability to deliver this is demonstrated by our market leader position 4 and our willingness to underpin our SLA with significant service credits. Security service level agreement provides an aggressive set of metrics by which the service is monitored and credit back or other remedies are provided according to the SLA if the following performance targets are not met: AntiVirus Effectiveness 100 percent protection against known and unknown viruses AntiVirus Accuracy - no more than percent false positives AntiSpam Effectiveness 99 percent spam capture (95 percent for with double-byte characters) AntiSpam Accuracy - no more than percent false positives Delivery 100 percent delivery Latency average scanning time within 60 seconds Availability 100 percent service uptime 4- Gartner Magic Quadrant for Secure Gateways Level 6
10 Technical Support - specific response times for critical, major, and minor calls Summary By deploying Symantec Security.cloud you can block virus, malware, spam, phishing, and targeted attacks before they reach your inbox. Security's content and image control services help control the flow of confidential and undesirable material through customer defined policies. Policy based encryption services can also be enabled to help protect confidential information from unauthorized viewers and ensure safe delivery of your most important messages. These services are available in a single integrated management console, simplifying administration while improving your control and visibility into service effectiveness. Begin a free trial of Symantec Security.cloud: 7
11 Glossary
12
13 About Symantec Symantec protects the world s information, and is a global leader in security, backup, and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our worldrenowned expertise in protecting data, identities, and interactions gives our customers confidence in a connected world. More information is available at or by connecting with Symantec at go.symantec.com/socialmedia. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 3/
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationSymantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
More informationSymantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
More informationImproving Business Outcomes: Plug in to Security As A Service Adrian Covich
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Principal Systems Engineer, Symantec.cloud 1 Who We Are 2 Security Challenges in Education 3 Security As A Service Email, Web,
More informationSymantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationSolution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
More informationSymantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
More informationSymantec Intelligence Report: February 2013
Symantec Intelligence Symantec Intelligence Report: February 2013 Welcome to the February edition of the Symantec Intelligence report, which provides the latest analysis of cyber security threats, trends,
More informationSymantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationSymantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
More informationFighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
More informationWEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
More informationProtect Your Enterprise With the Leader in Secure Email Boundary Services
Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise
More informationFinding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
More informationINFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationEmail AntiVirus. Administrator Guide
Email AntiVirus Administrator Guide Email AntiVirus Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
More informationStop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
More informationSymantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
More informationV1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
More informationWeb Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
More informationSymantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,
More informationTechnical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems
Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
More informationEmail Security for Small Businesses: What's the Right Solution For You?
Postini White Paper Email Security for Small Businesses: What's the Right Solution For You? The Small Business Dilemma: Fighting Growing Email Threats with Fewer Resources Many small businesses today face
More informationTechnology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationThe Symantec Approach to Defeating Advanced Threats
WHITE PAPER: THE SYMANTEC APPROACH TO DEFEATING ADVANCED........... THREATS............................. The Symantec Approach to Defeating Advanced Threats Who should read this paper For security practioners
More informationIntegrating MSS, SEP and NGFW to catch targeted APTs
#SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information
More informationUnified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationRecurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
More informationBest Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should
More informationEmail Image Control. Administrator Guide
Email Image Control Administrator Guide Image Control Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationSecuring Office 365 with Symantec
January, 2016 Solution Overview: Enterprise Security Adoption of Microsoft Office 365, Google Apps, and other cloud-based productivity solutions is growing. Microsoft in its Ignite 2015 session claimed
More informationisheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
More informationProtecting Point-of-Sale Environments Against Multi-Stage Attacks
SOLUTION BRIEF: PROTECTING POS DEVICES & BROADER ENVIRONMENT........................................ Protecting Point-of-Sale Environments Against Multi-Stage Attacks Who should read this paper Point-of-Sale
More informationCopyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
More informationWEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
More informationPublic, Private, Hybrid:
Public, Private, Hybrid: How to Use the Cloud for More Effective Security Symantec and Cloud Computing Ron Poserina, Director of Systems Engineering Agenda Our Perspective on Cloud Computing Why Cloud
More informationProtecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
More informationData Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
More informationWebsense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security
Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to
More informationTechnology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationIs online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution
PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who
More informationSPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
More informationYou ll learn about our roadmap across the Symantec email and gateway security offerings.
#SymVisionEmea In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection
More informationMailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
More informationQuarterly Report: Symantec Intelligence Quarterly
Symantec Intelligence Quarterly: Best Practices and Methodologies Quarterly Report: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Contents Symantec
More informationISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones
ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones Web Security Deployment Options 1 1 The threat landscape 2 Why Symantec web security 3 Generic
More informationThe Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationCisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
More informationCisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
More informationEiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
More informationChoose Your Own - Fighting the Battle Against Zero Day Virus Threats
Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle
More informationReviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
More informationSECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
More informationThe Challenge of a Comprehensive Network Protection. Introduction
Index Introduction...3 Corporate Network Security Management Challenge...5 Multi-layers and heterogeneous network...5 Roaming Clients...5 Control of unproductive and restricted applications...5 Securing
More informationStop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
More informationSymantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
More informationSPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
More informationSymantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
More informationPutting Web Threat Protection and Content Filtering in the Cloud
Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The
More information10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
More informationSR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0
SR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0 Angelos Kottas, Sr. Manager, Product Management Amanda Grady, Sr. Product Manager SR B10: Submissions 2.0 1
More informationESET Security Solutions for Your Business
ESET Security Solutions for Your Business It Is Our Business Protecting Yours For over 20 years, companies large and small have relied on ESET to safeguard their mission-critical infrastructure and keep
More informationENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
More informationwww.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach
100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...
More informationSymantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
More informationSecurity as a Service: Business Decision Factors
publication date 11 February 2011 Service: Business Industry Research Table of Contents Introduction 3 Security concerns are business issues 3 Business experience 3 Business priorities 3 Comparing on-premise
More informationPowerful and reliable virus and spam protection for your GMS installation
Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise
More informationREVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
More informationInsight. Security Response. Deployment Best Practices
Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users
More informationCommtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
More informationCisco IronPort C670 for Large Enterprises and ISPs
Data Sheet Cisco IronPort C670 for Large Enterprises and ISPs As the battle to protect the corporate email perimeter continues, two trends emerge: higher mail volumes and more resource-intensive scanning.
More informationEmail Security - A Holistic Approach to SMBs
Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new
More informationThe Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
More informationIpswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
More informationMXSweep Hosted Email Protection
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740
More informationCyber Security Services: Data Loss Prevention Monitoring Overview
WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in
More informationProactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.
Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control
More informationCisco Cloud Email Security Interoperability with Microsoft Office 365
White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources
More informationModern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
More informationCisco IronPort X1070 Email Security System
Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The
More informationIronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management.
Overview IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management. The IronPort C-Series email security appliances provide advanced
More informationEnd to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
More informationProtecting PoS Environments Against Multi-Stage Attacks
SOLUTION BRIEF: PROTECTING POS DEVICES & BROADER ENVIRONMENT........................................ Protecting PoS Environments Against Multi-Stage Attacks Who should read this paper Point-of-sale systems
More informationWhitepaper. Ten questions that every IT manager should ask. A Buyer s Guide to Hosted Security: www.exponential-e.com
Whitepaper A Buyer s Guide to Hosted Security: Ten questions that every IT manager should ask www.exponential-e.com Introduction to hosted security Information security remains the number one concern of
More informationDefending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
More informationBalancing Cloud-Based Email Benefits With Security. White Paper
Balancing Cloud-Based Email Benefits With Security White Paper Balancing Cloud-Based Email Benefits With Security Balancing Cloud-Based Email Benefits With Security CONTENTS Trouble Spots in Cloud Email
More informationEmerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
More informationClosing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
More informationEmail Quick Reference. Administrator Guide
Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationApplying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
More informationAdmin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam
Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...
More informationFirewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
More informationThe Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
More information