1 MESSAGING SECURITY GATEWAY Detect attacks before they enter your network
2 OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how it works. Key features MSG offers two main features for communication: protection and privacy. Virus protection and spam detection help protect your company s computers and data against external threats. encryption allows you to make sure that private information stays private. Company Data Benefits MSG offers complete defense against threats with 99%+ anti-spam accuracy and 100% anti-virus protection. Reduces the load on mail servers and the company network, minimizing the need for hardware investments. encryption prevents accidental leaks of confidential data. MSG offers total control and flexibility for security.
3 THE CASE FOR PROTECTION AND PRIVACY is still the most common means of communications within and between companies. Its everyday use makes it an essential part of any company s basic functions. Phishing messages are often designed to steal sensitive and confidential data. Unlike traditional spam, they attempt to hijack company data by imitating legitimate messages to appear trustworthy. Today, phishing messages are sent with low volumes and are often not detected by traditional spam scanning. Phishing messages may often only contain a URL for further information, meaning that they can easily slip through spam filters and reach the end-user s inbox. It is important to understand the new forms of malicious s, because ordinary spam definition updates are too slow and usually do not protect you from new types of exploits. This makes real- time URL reputation checking a necessity. Privacy in communication Another critical issue is the privacy of confidential information. You must ask yourself (and all your employees) three critical questions: 1. Have you ever sent an to the wrong address? 2. Do you know that sending a message without encryption is similar to dropping a postcard? 3. Do you know what information must be encrypted? It is very easy to avoid human errors and mistakes with the right tool that automatically encrypts mails containing any information that can be considered private or confidential.
4 WHAT IS F-SECURE MESSAGING SECURITY GATEWAY? Messaging Security Gateway is an all-in-one solution for your anti-spam, anti-malware and encryption needs. It helps you detect and stop attacks even before they enter your network. It is an easy-to-use tool just install it and forget all about it. It offers you automatic control of confidential information. The solution is easy to implement and rebrand for your company needs. It comes with enterprise- class availability and scalability and is simple to administer with no loss of control. Firewall Module Reject - no more processing Deliver now - no more processing Proofpoint Protection Server Message processing hub F-Secure Virus Protection Module Spam Detection Module Digital Assets How does it work? The solution protects inbound and outbound traffic against any type of threat. Judgement Judgement Judgement Regulatory Compliance Module URL Defense Quarantine Reject Deliver Discard Retry Re-route
5 COMPLETE PROTECTION IN ONE PRODUCT Encryption Policy-based Encryption Trusted Partners TLS Encryption Company Data Virus Protection Signature-based Zero-hour Threat Detection Paraller Message Analysis Data Loss Prevention Dynamic Updates Spam Detection Categorization URL Protection Self Learning Global Reputation Check
6 FEATURES INCLUDED IN THE SOLUTION Global Features Host Firewall Policy Route Management Quarantine Management Branding Templates Alert Monitoring User / Group Management Firewall End User Management Data Loss Prevention SMTP Rate Control Recipient Verification Sender Policy Framework Bounce Management DomainKeys Identified Mail LDAP Integration Smart Send End User Digests End User Portal Reporting Digital Assest Regulatory Compliance Smart Identifiers Dictionaries Business Partners
7 DEPLOYMENT AND INSTALLATION The F-Secure Messaging Security Gateway is designed as a gateway product to protect the environment inside your network. The solution supports hardware, virtual or hybrid deployment. The solution is easy and quick to implement in your current network environment. Internet Internal Network F-Secure Messaging Security Gateway Server Local Hosts
8 ENCRYPTION Unbeatable encryption and data loss prevention Simplified encryption key management Automatically applies encryption based on your organization s policies One-step encrypted delivery for mobile, laptop, and desktop users Native, integrated, and strong encryption technology (AES 256-bit message encryption: and ECDSA 256-bit digital signature) Covers privacy and data security regulations including HIPAA, GLBA, PCI, SEC rules, and many more. AES-256/DSA Hosted Key Service SMTP Server (e.g. Exchange) F-Secure Messaging Security Gateway Sender Recipient
9 VIRUS PROTECTION Zero-hour threat detection Multi-layered threat protection Bidirectional filtering Best-in-class inbound and outbound security SPAM PROTECTION Ultimate protection against the latest s threats. Real-time reputation check for spam and URLs guarantees highly accurate spam detection Advanced machine learning technology for unrivalled anti-spam effectiveness AUTOMATIC REPORTING With the automatic reporting tool, you get an overview of the attempted and blocked attacks and can verify what s are being filtered. You can also get an overview of the overall status of traffic in the company. You can select what type of information you need to get. More than 60 ready-made reporting templates and scheduled reports Multiple ways to publish reports Customized reporting for each customer Branded reports according to your company s visual guidelines
10 MANAGEMENT The protection functions of MSG are easy to manage through a web-based administration portal. Powerful end-user controls allow the administrator to easily manage the entire environment. Administrators can setup Sub-organizations ( Sub-Orgs ) with the Delegated Administration feature. Sub-Orgs are logical groups of users based on business units, geographical regions, roles, functions, organizational hierarchy, or a combination of these criteria. Additionally, the administrator can delegate administration of select controls and settings under each Sub-Org. Delegated Administrators can only view and manage the Sub-Org to which he or she has been given access by the root administrator. Thanks to the new Sub-Orgs structure, user administration can be based on geographical regions, administrator roles, or administrator functions. Administrators can create a hierarchy of users that best represents the organizational structure by adding or deleting Groups that belong to a Sub- Org. Sub-Orgs belong to the Organization, and will inherit filtering attributes from the Organization unless overridden by unique attributes for the Sub-Org. Spam policies, safe and block lists, digest attributes, and encryption attributes can be changed at the Sub-Org level to gain the right level of mail filtering. The encryption included in Messaging Security Gateway works without downloading or installing additional client software. The solution stores only the encryption keys and not the actual encrypted message. It offers advanced detection of private and confidential information in both structured and unstructured data. The encryption works with any client.
11 THIS IS F-SECURE F-Secure is an online security and privacy company from Finland. We offer millions of people around the globe the power to surf invisibly and store and share stuff, safe from online threats. We are here to fight for digital freedom. Join the movement and switch on freedom. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd. SWITCH ON FREEDOM
Manual POLICY PATROL EMAIL MAIL SECURITY MANUAL Policy Patrol Email Mail Security This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
10 Things Your Next Firewall Must Do Introduction Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices.
A COALFIRE WHITE PAPER Using s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance Implementing s Deep Security Platform in a Payment Card Environment April 2015 Page 1 Executive Summary...
Reducing the Cyber Risk in 10 Critical Areas Information Risk Management Regime Establish a governance framework Enable and support risk management across the organisation. Determine your risk appetite
Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE FORTINET Controlling Web 2.0 Applications in the Enterprise PAGE 2 Summary New technologies used in Web 2.0 applications have increased
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam
A Websense White Paper ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS: THREAT ANALYSIS AND DEFENSE STRATEGIES FOR SMB, MID-SIZE, AND ENTERPRISE ORGANIZATIONS REV 2 ADVANCED PERSISTENT THREATS AND
A Modern Framework for Network Security in Government 3 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Government: Securing Your Data, However and Wherever Accessed Governments around
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
e-security booklet 20/12/02 2:11 am Page 1 Contact Us US Office Vicomsoft Inc. 265 E. Merrick Road Suite 209 Valley Stream NY 11580 USA Phone: 888-842-2608 Fax: 530-685-8896 Sales : firstname.lastname@example.org
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
Siebel Security Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
Table of contents 1: Improved application security 4: Tighter integration with operating system architectures 5: Easier deployment and administration for reduced total cost of ownership 6: Content security
ROGERS WHITE PAPER 1 Rev. May 2011 page 2 2 TABLE OF CONTENTS Introduction 3 Small Business Telephony Options 4 Basic Phone Service 4 Traditional PBX and Key Systems 4 Digital Services Business Cable and
Enterprise Anti-Virus Protection APRIL - JUNE 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
IT Administrators Guide Skype for Windows version 4.2 Version 2.0 Copyright Skype Limited 2010 Overview Skype lets your business work the way you want to, whatever the message, wherever people are. This
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying
Trend Micro Deep Security Server Security Protecting the Dynamic Datacenter A Trend Micro White Paper August 2009 I. SECURITY IN THE DYNAMIC DATACENTER The purpose of IT security is to enable your business,
EASYBLOGBUILDER 2.0 START COMMUNICATING WITH CUSTOMERS ONLINE EasyBlogBuilder 2.0 is a Web-based blogging journal, powered by a self-publishing tool, that enables the author to regularly and easily update
vshield Manager 5.0.1 vshield App 5.0.1 vshield Edge 5.0.1 vshield Endpoint 5.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
Wireless Local Area Network (LAN) Security Guideline Noor Aida Idris Mohamad Nizam Kassim Securing Our Cyberspace 2 To say a system is secure because no one is attacking it is very dangerous (Microsoft
Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases