Trend Micro Web and Security Solutions on Crossbeam X80 Platform
|
|
|
- Matilda Kennedy
- 10 years ago
- Views:
Transcription
1 Trend Micro Web and Security Solutions on Crossbeam X80 Platform Opus One April 2008 Opus One conducted performance tests on two Trend Micro products InterScan Messaging Security Suite and InterScan Web Security Suite running on Crossbeam X-Series platform. The goal of these tests was to determine the performance for the combined Trend Micro and Crossbeam solutions. Testing of InterScan Web Security Suite on a fully populated Crossbeam X80 platform with 10 Application Processing Modules (APMs) returned performance of over 2.4 Gbps scanning HTTP traffic for viruses and spyware. This high level of performance demonstrates that the combination of Trend Micro InterScan Web Security Suite and Crossbeam Systems X80 platform is capable of ensuring web security for data centers, carriers, and the world s largest enterprises. Testing of InterScan Messaging Security Suite on a fully populated Crossbeam X80 platform was capable of scanning 600 messages per second for viruses and spam, and 750 messages per second for viruses alone. With Trend Micro Reputation deflecting 76% of spam, the Crossbeam X80 could handle a load of up to 1645 messages per second, or an astonishingly high 140 million messages in a 24 hour period. Overview Crossbeam Systems builds network security platforms. The largest is the X80 platform, a 14-slot chassis running Crossbeam s own network operating system with high availability, load balancing, dynamic routing, and package management built into the platform. The X80 chassis can support up to 10 application processing modules (APM), each of which can be dedicated to a particular security application or grouped together to run one application. InterScan Web Security Suite from Trend Micro is a software-based web security product for malware blocking, content filtering, and URL filtering. Trend Micro s InterScan Messaging Security Suite is an security gateway solution with anti-spam, anti-virus, and other policy-based security features. Crossbeam Systems, in conjunction with their partner Trend Micro, offers a chassis-based solution for Internet security which integrates the InterScan Messaging and/or InterScan Web security applications with X-Series XOS software, load balancing, and application management tools. We tested the Crossbeam/Trend Micro solution using test equipment from Spirent. Although the test equipment was provided by Crossbeam, Opus One was responsible for all configuration and all test plans, as well as performing the tests and recording results. Crossbeam and Trend Micro staff were available during the test process and were responsible for installation of all Crossbeam and Trend Micro hardware and software. Opus One configured the InterScan Messaging Security Suite software and validated the configuration of the InterScan Web Security Suite software. Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 1
2 How We Tested InterScan Web Security Suite The goal of web security performance testing was to determine the maximum performance possible in a typical enterprise or service provider deployment. InterScan Web Security Suite (IWSS) is capable of multiple security functions. For this test, we focused on the anti-virus and anti-spyware functions. To measure performance, we loaded 10 different web objects (ranging in size from 1 KB to 1.5 MB) into the Spirent test equipment, including HTML (with embedded Javascript), GIF and JPEG images, PDF files, ZIP archives, and Windows executable files. No viruses or spyware were in the objects. The test equipment was configured to deliver this actual content from web servers to web clients in a mix of sizes and object types that approximates the Internet HTTP traffic of a typical enterprise. InterScan Web Security Suite was loaded onto the Crossbeam X80 APMs and was configured by Trend Micro in a typical high performance configuration as a web proxy. An external log server was installed, and logs from the application were sent over the network to the log server. By default, InterScan Web Security Suite will scan objects smaller than 512 KB in-line, and return an interstitial page to web clients for objects between 512 KB and 2 MB. This limit was raised so that no interstitial pages would be delivered to clients. Four web client simulators, each using a single 1 GigE interface, were aggregated into a 10 GigE interface connected to the Crossbeam X80 chassis using a dedicated switch. Four similarly connected Spirent web server simulators were aggregated into a different 10 GigE interface using a second switch. The Spirent test equipment was configured to offer a load of up to 10,000 URLs/second, or approximately 4 Gbps, completely saturating the 4 Gbps network fabric in one direction. To determine performance numbers, we ran a six minute test of web clients connecting through the IWSS proxy to web servers. Within the test, a constant three minute period was selected, and the actual throughput of the web clients was measured. Each test was repeated three times, and the average of the three results was reported. Rather than trying to convert measured bandwidth to some arbitrary number of users, the bandwidth numbers are presented here. Figure 1: Test Bed We did not test InterScan Web Security Suite URL filtering. URL filtering in most web security applications is an in the-cloud function, where the web security application performs a real-time lookup against a reputation service. Because the most significant performance limit with reputation services is the speed of the reputation service and the Internet connection latency and speed, along with the response time of the reputation service, we did not feel that it would be possible to provide a meaningful or repeatable benchmark of this feature. Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 2
3 Results of Testing IWSS Our testing of InterScan Web Security Suite showed that it was capable of processing loads from 346 Mbps with a single APM up to 2,419 Mbps with ten APMs. A chassis configured with N+1 redundancy would be able to process peak loads of approximately 2,312 Mbps. The performance numbers presented here should be considered as absolute maximum for peak levels of usage, and not as typical load limits. For example, with ten APMs and processing 2.4 Gbps of traffic, InterScan Web Security Suite introduced average latency of 168 milliseconds/url, which we believe is near the outside limit of what would be acceptable to web users. A conservative sizing of the Trend Micro web Security/X80 combination would call for continuous load levels of between 50% and 75% of the limits presented in this test. Figure 2: HTTP Goodput through IWSS How We Tested InterScan Messaging Security Suite The goal of the InterScan Messaging Security Suite (IMSS) test was to measure the steady-state capability of the application on the X80 chassis to handle while scanning for spam and viruses. We ran two separate tests: one scanning for viruses, and another scanning for spam and viruses. InterScan Messaging Security Suite was loaded onto the Crossbeam APMs by Trend Micro staff, but was configured by Opus One. A separate management server, external to the Crossbeam chassis, was used for system and configuration management and for logging. When testing spam and virus handling, the application was configured to tag and deliver messages. This is somewhat unusual, since most enterprises and ISPs delete viruses and spam from their mail stream. However, we chose to have InterScan Messaging Security Suite deliver the mail both to put the worst case load on the system and to ensure that we could fully measure the message handling performance of the APM. To measure performance, we used Spirent test equipment sending SMTP traffic into the InterScan Messaging Security Suite/Crossbeam system, and matching Spirent equipment at the other end to receive the messages from messaging security application. The Spirent Avalanche SMTP traffic generators were connected using 1 GigE interfaces, aggregated to a single GigE interface on the Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 3
4 Crossbeam X80 chassis. The SMTP traffic receivers were connected using a separate set of GigE interfaces, aggregated to a different GigE interface on the Crossbeam X80 chassis. The Spirent SMTP sender was preloaded with 30 different messages: 10 normal messages, 10 viruses, and 10 spam messages. The messages were selected at random from a live stream a few days before the test was conducted. We configured the Spirent SMTP sender to deliver these messages to the Trend Micro/Crossbeam system in a ratio of 10 non-spam/89 spam/1 virus. This ratio represents a typical enterprise load. These messages had sizes of between 4 KB and 108 KB. The Trend Micro solution combines an open source MTA Postfix with Trend Micro s own proprietary scanning technologies. Because Postfix can accept SMTP faster than the spam and virus filters can scan the mail, we measured the performance of the InterScan Messaging Security Suite system in receiving, scanning, and delivering while accepting a slightly higher level of messages. For example, we determined experimentally that a single APM has a performance capability for combined anti-spam and anti-virus scanning of between 60 and 65 messages per second. When a load of less than 60 messages per second is offered, the messaging security system will clear out messages as quickly as they come in and no queue will build up. When a load of 70 messages per second (for example), is offered, the queues begin to build up on the APM and the actual delivered mail rate is greater than 60 messages per second, but less than 70. Using this example, we measured the message delivery performance of the InterScan Messaging Security Suite APM while a higher load than the delivery rate was being offered. For scanning for both spam and viruses, we offered a load of 65 messages per second per APM. When scanning only for viruses, we offered a load of 80 messages per second per APM. Although the Spirent equipment was connected using Gigabit Ethernet networking, the relatively lower bandwidth requirement of did not stress the network infrastructure. Even at highest load (nearly 800 messages/second), the total network bandwidth required to send the was less than 300 Mbps. During our testing, we did not use any TLS/SSL encryption and we delivered exactly one message to a single recipient per TCP connection. To determine the performance of the Trend Micro/Crossbeam combination, we ran ten minute tests. The test had a ramp-up period of one minute, then steady transmission of for five minutes. The end of the test was extended to give the InterScan Messaging Security Suite/Crossbeam system a chance to drain any queued messages. The message delivery rate was measured over a fixed three minute interval, two minutes into the test. We also spot-checked delivery of messages to be sure that the InterScan Messaging Security Suite instance was still identifying viruses and spam in the offered load. No problems were found with messages slipping through under high loads. Because our testing showed that the performance of the Crossbeam X80 chassis running InterScan Messaging Security Suite scales nearly linearly with the addition of APMs, we tested with 1, 2, 3, 4, 5, and 10 APMs. We believe that the numbers can be fairly and reliably extrapolated for APM counts between 6 and 9. Results of Testing InterScan Messaging Security Suite With a fully populated X80 chassis (ten APMs), our testing showed that InterScan Messaging Security Suite is capable of scanning for spam and viruses at speeds of 596 messages/second, and scanning for viruses at 754 messages/second. When configured with N+1 redundancy, the chassis would be able to process 550 messages/second, scanning for both spam and viruses. Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 4
5 The performance numbers presented here should be considered as absolute maximum for unusual peak loads, and not as typical load limits. Because of the overhead involved in accepting and re-queueing messages when under high load, actual throughput is degraded when the offered load is much higher than capacity. For example, when a load of 150% (90 messages/second) is offered to an APM capable of handling 60 messages/second, the actual message delivery rate slows by 10%. As with InterScan Web Security Suite, a conservative sizing would call for continuous load levels of between 50% and 75% of the limits presented in this test. Figure 3: IMSS Performance Varying APMs Anti-Spam Performance and Reputation Services It is difficult to perform meaningful and repeatable benchmarks of reputation services. However, Opus One s real-world testing has shown that reputation-based services are remarkably effective at identifying spam and reducing the load on anti-spam gateways. Trend Micro offers an IP reputation service, Reputation Service (ERS). Their Reputation has two components, a reputation database that lists IP addresses that should always be refused , and a dynamic service of IP addresses that are known to send spam, but which may also send non-spam mail. The intended behavior of anti-spam gateways is to refuse mail from IP addresses on the reputation database, and to offer a temporary refusal (4xx response in SMTP) for IP addresses identified through the dynamic service. The reputation database is intended to have a very low false positive rate, while the dynamic service will have a somewhat higher rate. However, because the addresses identified by the dynamic service should be given temporary refusals, the impact of an occasional false positive is that legitimate mail will delayed, but eventually would be accepted. In a recent, separate, Opus One test, the ERS reputation database had zero false positives in 10,000 messages, while the ERS dynamic service had 27 false positives. Different anti-spam products use reputation services differently, but a common best practice is to refuse mail from systems that are listed on reputation service block lists such as those in the Trend Micro reputation database and dynamic service. This has the effect of dramatically increasing the potential performance of the anti-spam gateway, because between 50% and 80% of incoming spam can be blocked before it presents a load to the gateway. Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 5
6 ERS+IMSS Performance Varying APMs 10 APMs APMs APMs APMs Antivirus/AntiSpam Antivirus Only 2 APMs APM Messages Per Second Per Chassis, including effects of ERS Figure 4: Predicted ERS + IMSS Performance Varying APM In the most recent four months of testing, the average spam catch rate for the Trend Micro reputation database alone has been 47.7% and the spam catch rate of the Trend Micro dynamic service alone has been 28.4%, with a combined average catch rate of 76%. The average spam load, as a percentage of total messages, was 84%. Thus, if an InterScan Messaging Security Suite/Crossbeam chassis were to use the reputation database and dynamic service to refuse suspected spam, it would be able to support a load 276% higher than the levels reported here, or approximately 1645 messages/second in a fully populated Crossbeam X80 chassis with 10 APMs. 1 Some vendors have used a factor of 500% or 1000% in their marketing literature for this type of testing, but we do not believe that these are credible results. A 500% increase in performance would require a mail stream that is 90% spam and a reputation service that is 90% effective; a 1000% increase would require 95% spam and 95% efficiency. These levels are not supported by our real-world research and testing. Testing High Availability One of the features of the Crossbeam X80 chassis is redundancy and high-availability support built into the underlying Crossbeam operating system. We performed some simple tests to validate that the X80 chassis and the InterScan Messaging Security Suite application fully support common high availability failure scenarios. To test high availability, we configured a load of 550 messages/second across ten APMs running messaging security with anti-spam and anti-virus scanning enabled. This corresponds to an N+1 redundancy configuration: we offered a load appropriate for nine APMs, to a chassis with ten APMs installed and operating. Our testbed had a single connection from the Spirent load generator to a dedicated Ethernet switch that had two connections to the Crossbeam chassis, each connected to a 1 This is computed as 1/1-(spam load * reputation block rate). Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 6
7 separate Network Processing Module (NPM). A similar connection topology was used for the Spirent SMTP receiver: a single connection to a second dedicated switch, with dual connections from the switch to the Crossbeam X80 chassis. No special configuration of the switch was required to support these dual connections. During the validation run, with ten APMs installed, we saw a throughput of 550 messages/second, equal to the offered load. This was expected because ten APMs can handle a load of 600 messages/second. We also observed that the load was spread evenly (or approximately) among all of the operating APMs. We simulated one failure by unplugging one of the Ethernet cables attached to an active NPM port. This reproduced link loss, a failure that would occur if the connected switch or patch cable failed. Then, we simulated a second failure by abruptly removing one of the NPM cards installed in the Crossbeam chassis (leaving the second NPM with redundant connections in place). Although these failures did result in visible blips in the message flow, the final result was the same: 550 messages/second for the chassis. (The visible interruption was confirmed by an analysis of the second-by-second flows, showing a number of flows that were delayed during the HA event.) Our third test simulated an application module failure by abruptly removing one of the APMs running the InterScan Messaging Security Suite application. When an APM or application failure occurs, the NPM is responsible for detecting the failure and redistributing traffic flows across healthy APMs. In this case, there was no drop in the message acceptance or delivery rate, with a final result of 550 messages/second across the test. Conclusions Opus One testing demonstrated that the capacity of the Crossbeam X80 chassis when teamed with Trend Micro InterScan Messaging Security Suite and InterScan Web Security Suite scales to very high levels as Application Processing Modules are added to the X80 chassis. With a real-world HTTP scanning performance of 2.4 Gbps, and an virus and spam scanning rate of 1645 messages per second, the combination of Crossbeam s X80 chassis and Trend Micro s Internet and security applications provide the security services enterprises need at the speeds they need them. Our testing of high availability services also proves the ability of the Crossbeam X80 chassis to survive failure scenarios without significantly affecting performance or the end-user experience. About Opus One Opus One is an information technology consultancy based in Tucson, Arizona. With 25 years of experience in the design and deployment of enterprise-class secure networks and , Opus One provides unbiased and expert product evaluation services to enterprises on five continents. Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 7
8 Appendix I Equipment Tested IWSS v3.1 build 1027 with anti-virus and anti-spyware enabled was configured to scan all files submitted. Anti-virus engine version was loaded and no updates were allowed during the testing runs. Crossbeam hardware included the X80 chassis with two NPM-8200 modules, ten APM-8600 modules, and one CPM-8600 module. Crossbeam operating system was XOS v IMSS v7.0 build 3167 with anti-spam engine version and anti-virus engine version was configured to tag-and-deliver all messages, including spam and viruses. Crossbeam hardware included the X80 chassis with two NPM-8200 modules, ten APM-8600 modules, and one CPM-8600 module. Crossbeam operating system was XOS v7.3. (At the time of testing, IMSS was not certified to run on XOS v8.) Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 8
9 Appendix II X80 Chassis Configuration File for IWSS Test Do not remove after this line Last time the configuration was saved on Mon Apr 21 13:31: EDT Configuration generated by CLI on Mon Apr 21 13:33: CLI Version Do not remove above this line configure hostname IWSS_X80_A cp1 hostname IWSS_X80_B cp2 ip ftp system-identifier 1 system-internal-network /16 operating-mode dual-np series-6 access-list 1001 permit ip source-ip destination-ip access-list 1002 permit ip source-ip destination-ip username admin privilege 15 gui-level administrator alias wr 'copy running-config startup-config' vap-group IWSS xslinux_v3 vap-count 10 max-load-count 10 ap-list ap1 ap2 ap3 ap4 ap5 ap6 ap7 ap8 ap9 ap10 load-balance-vap-list ip-flow-rule iwss_lbrule action load-balance activate circuit mgmt circuit-id 1025 device-name mgmt vap-group IWSS ip / increment-per-vap circuit users circuit-id 1026 device-name IMSS vap-group IWSS ip / circuit internet circuit-id 1027 device-name internet Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 9
10 vap-group IWSS ip / interface gigabitethernet 1/1 logical mgmt circuit mgmt interface 10gigabitethernet 1/10 interface 10gigabitethernet 1/12 logical internet circuit internet interface 10gigabitethernet 2/12 interface 10gigabitethernet 2/10 logical users circuit users redundancy-interface master 10gigabitethernet 1/12 backup 10gigabitethernet 2/11 mac-usage master failovermode preemption-off redundancy-interface master 10gigabitethernet 2/12 backup 10gigabitethernet 1/11 mac-usage master failovermode preemption-off management gigabitethernet 14/1 ip-addr / enable access-list 1001 input access-list 1002 output management high-availability cp1 management high-availability cp2 management default-gateway cp-action cp1 disk-error offline cp-action cp2 disk-error offline end Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 10
11 Appendix III X80 Chassis Configuration File for IMSS Test Do not remove after this line Last time the configuration was saved on Mon Apr 21 13:31: EDT Configuration generated by CLI on Mon Apr 21 13:33: CLI Version Do not remove above this line configure hostname IMSS_X80_A cp1 hostname IMSS_X80_B cp2 ip ftp system-identifier 1 system-internal-network /16 operating-mode dual-np series-2 access-list 1001 permit ip source-ip destination-ip access-list 1002 permit ip source-ip destination-ip username admin privilege 15 gui-level administrator alias wr 'copy running-config startup-config' vap-group IMSS xslinux_v3 vap-count 10 max-load-count 10 ap-list ap1 ap2 ap3 ap4 ap5 ap6 ap7 ap8 ap9 ap10 load-balance-vap-list ip-flow-rule imss_lbrule action load-balance activate circuit mgmt circuit-id 1025 device-name mgmt vap-group IMSS ip / increment-per-vap circuit users circuit-id 1026 device-name IMSS vap-group IMSS ip / circuit internet circuit-id 1027 device-name internet Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 11
12 vap-group IMSS ip / interface gigabitethernet 1/1 logical mgmt circuit mgmt interface gigabitethernet 1/4 interface gigabitethernet 1/6 logical internet circuit internet interface gigabitethernet 2/4 interface gigabitethernet 2/6 logical users circuit users redundancy-interface master gigabitethernet 1/6 backup gigabitethernet 2/4 mac-usage master failovermode preemption-off redundancy-interface master gigabitethernet 2/6 backup gigabitethernet 1/4 mac-usage master failovermode preemption-off management gigabitethernet 14/1 ip-addr / enable access-list 1001 input access-list 1002 output management high-availability cp1 management high-availability cp2 management default-gateway cp-action cp1 disk-error offline cp-action cp2 disk-error offline end Trend Micro Web and Security Solutions on Crossbeams X80 Platform Page 12
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform September 2008 pg. 1 Executive Summary The objective of this report is to provide performance guidance for IBM s Proventia
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
Spam Testing Methodology Opus One, Inc. March, 2007
Spam Testing Methodology Opus One, Inc. March, 2007 This document describes Opus One s testing methodology for anti-spam products. This methodology has been used, largely unchanged, for four tests published
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
FortiMail Email Filtering. Course 221 - for FortiMail v4.0. Course Overview
FortiMail Email Filtering Course 221 - for FortiMail v4.0 Course Overview FortiMail Email Filtering is a 3-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Content Inspection Director
Content Inspection Director High Speed Content Inspection North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg St. Tel
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
Virtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
Trend Micro Email Encryption (TMEE) Delivering Secure Email. Veli-Pekka Kusmin Pre-Sales Engineer
Trend Micro Email Encryption (TMEE) Delivering Secure Email Veli-Pekka Kusmin Pre-Sales Engineer Trend Micro Baltics & Finland October 2009 Example #1 True or false: Email is inherently insecure. Answer:
FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Solution Brief FortiMail for Service Providers. Nathalie Rivat
Solution Brief FortiMail for Service Providers Nathalie Rivat Agenda FortiMail for Internet Service Providers Outbound antispam to prevent blacklisting MMS routing for Mobile Operators Inbound antispam
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Websense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
FortiMail Email Filtering. Course 221 (for FortiMail v4.2) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v4.2) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
F-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Fireware XTM Traffic Management
WatchGuard Certified Training Fireware XTM Traffic Management Fireware XTM and WatchGuard System Manager v11.4 Disclaimer Information in this guide is subject to change without notice. Companies, names,
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Visendo Email Suite a reliable solution for SMBs
Visendo Email Suite a reliable solution for SMBs Visendo offers a range of Email solutions to assist companies in meeting complex e-mail requirements Visendo Security for Email Servers Multi-engine spam
Using email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until
Lesson Plans Configuring Exchange Server 2007
Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:
Opus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY
Joel Snyder Opus One February, 2015 COMPARING RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION The following analysis summarizes the spam catch and false positive rates of the leading anti-spam vendors.
TREND MICRO. InterScan VirusWall 6. SMTP Configuration Guide. Integrated virus and spam protection for your Internet gateway.
TM TREND MICRO TM TM InterScan VirusWall 6 Integrated virus and spam protection for your Internet gateway for Linux TM SMTP Configuration Guide Trend Micro Incorporated reserves the right to make changes
Internet Services. Amcom. Support & Troubleshooting Guide
Amcom Internet Services This Support and Troubleshooting Guide provides information about your internet service; including setting specifications, testing instructions and common service issues. For further
How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
InterScan Web Security Virtual Appliance
InterScan Web Security Virtual Appliance Sizing Guide for version 6.0 July 2013 TREND MICRO INC. 10101 N. De Anza Blvd. Cupertino, CA 95014 www.trendmicro.com Toll free: +1 800.228.5651 Fax: +1 408.257.2003
Transparent Cache Switching Using Brocade ServerIron and Blue Coat ProxySG
Transparent Cache Switching Using Brocade ServerIron and Blue Coat ProxySG This document provides best-practice guidance for Brocade ServerIron ADC deployments using Transparent Cache Switching (TCS) with
Isilon IQ Network Configuration Guide
Isilon IQ Network Configuration Guide An Isilon Systems Best Practice Paper August 2008 ISILON SYSTEMS Table of Contents Cluster Networking Introduction...3 Assumptions...3 Cluster Networking Features...3
Serial Deployment Quick Start Guide
PaperClip em 4 11/19/2007 Serial Deployment Quick Start Guide This checklist should be completed before installing the em4 Relay. Your answers with the associated screens will enable you to install and
Funkwerk UTM Release Notes (english)
Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.
Customized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
Performance of Cisco IPS 4500 and 4300 Series Sensors
White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
The versatile solution of anti-spam, personal email backup and recovery, easy email security policy management and enforcement.
Anti-Spam Expert The versatile solution of anti-spam, personal email backup and recovery, easy email security policy management and enforcement. Effectively filter spam mails by cocktailed N-Tier filter
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Cisco IronPort X1070 Email Security System
Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The
Appliance Comparison Chart
202 Appliances 2200 4200 4400 4600 4800 Small-Office Enterprise Grade Production Performance (Security Benchmark) Security 4 4 223 374 623 Firewall (Gbps).4.4 2.2 3.4 5.8 Firewall and IPS (Mbps) 50 50
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
Lab Testing Summary Report
Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses 1. Why do I need a Web security or gateway anti-spyware solution? Malware attack vector is rapidly shifting from
Anti-spam Comparison Report
January 2009 Anti-spam Comparison Report www.westcoastlabs.com 1 Test Laboratory Details US Headquarters and Test Facility West Coast Labs, 16842 Von Karman Avenue, Suite 125 Irvine, CA 92606, U.S.A.,
Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
Router Throughput Tests
Lab Testing Summary Report June 2013 Report 130605 Key findings and conclusions: Cisco 4451-X ISR branch office router, with advanced features enabled, demonstrated 1 GB and 2 GB capacity as advertised
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
gateprotect Performance Test of xutm Appliances
Introduction The gateprotect xutm appliances were tested under loads that as closely as possible reflected market requirements. As the results showed, the xutm appliances sold by gateprotect offer extremely
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Astaro Deployment Guide High Availability Options Clustering and Hot Standby
Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
Enhanced Spam Defence
Enhanced Spam Defence An approach to making SMTP connect time blocking a reliable method for e-mail filtering By John Jensen, Topsec Technology Ltd. As the spam problem keeps growing and the associated
How To Configure Forefront Threat Management Gateway (Forefront) For An Email Server
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
Technical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Top 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
The Leading Email Security Suites
The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server
Introduction. Part I Introduction to Exchange Server 2010 1
Contents Introduction xxix Part I Introduction to Exchange Server 2010 1 Chapter 1 Introduction to Exchange Server 2010 3 Part II Brief History of Exchange Servers 4 New Features in Exchange Server 2010
Key Findings. Websense Triton Security Gateway Anywhere
Websense Triton Security Gateway Anywhere A Usability Study and Performance Evaluation Executive Summary In today s global economy the ways in which businesses use the Internet have changed dramatically
Trend Micro, Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro, Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
The Information Leak Detection & Prevention Guide
The Information Leak Detection & Prevention Guide Essential Requirements for a Comprehensive Data Leak Prevention System April 2007 GTB Technologies 4685 MacArthur Court Newport Beach, CA 92660 WWW.GTTB.COM
How to Build a Massively Scalable Next-Generation Firewall
How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies
Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2
Firewall Server 7.2 Release Notes BorderWare Technologies is pleased to announce the release of version 7.2 of the Firewall Server. This release includes the following new features and improvements. What's
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Network Configuration Example
Network Configuration Example Configuring Link Aggregation Between EX Series Switches and Ruckus Wireless Access Points Modified: 2015-10-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California
4 Delivers over 20,000 SSL connections per second (cps), which
April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation
Secure Messaging Service
Secure Messaging Service Powered by Trend Micro Email Security Platform for Service Providers Service Provider s Guide Trend Micro Incorporated reserves the right to make changes to this document and
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
Anti-SPAM Solutions as a Component of Digital Communications Management
Anti-SPAM Solutions as a Component of Digital Communications Management Ron Shuck CISSP, GCIA, CCSE Agenda What is Spam & what can you do? What is the cost of Spam E-mail E to organizations? How do we
VIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED
Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware
QUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Configuring the CSS and Cache Engine for Reverse Proxy Caching
Configuring the CSS and Cache Engine for Reverse Proxy Caching Document ID: 12586 Contents Introduction Prerequisites Requirements Components Used Conventions Caching Overview Content Caching Configure
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
