Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements
|
|
- Gwenda Dawson
- 8 years ago
- Views:
Transcription
1 Technology Blueprint Protect Your Get strong security despite increasing volumes, threats, and green requirements
2 LEVEL SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL Security Connected The Security Connected framework from McAfee enables integration of multiple products, services, and partnerships for SECURITY CONNECTED centralized, efficient, and REFERENCE ARCHITECTURE effective risk mitigation. Built on LEVEL more than two 1decades 2 3 of 4 5 proven security practices, the Security Connected approach helps organizations of all sizes and segments across all geographies improve security postures, optimize security for greater cost effectiveness, and align security strategically SECURITY with business CONNECTED initiatives. The REFERENCE Security Connected ARCHITECTURE Reference Architecture provides a concrete LEVEL path from 1 ideas 2 3 to 4 5 implementation. Use it to adapt the Security Connected concepts to your unique risks, infrastructure, and business objectives. McAfee is relentlessly focused on finding new ways to keep our customers safe. Get strong security despite increasing volumes, threats, and green requirements The Situation is one of the most widely used vectors of attack today. As the environment becomes more complex, with attachments, embedded pictures, links, and executable code, our approach to protecting against threats must also take on a more robust and layered model to be effective. There is also the inadvertent employee or the malicious insider that may send out confidential information that may be damaging to the organization or violate a compliance standard such as HIPAA or GLBA. Additionally, organizations are also considering green initiatives to reduce data center footprint and power consumption while maintaining high availability and performance. All of these challenges require security to be ever evolving to ensure the gates remain locked against one of the most tried and true avenues of attack. Driving Concerns Discerning which s are your run of the mill spam and which contain malware has become more difficult as the methods of sending spam and malware have become more sophisticated. Layer on top of that difficulty the very elaborate methods cybercriminals employ to solicit a user to click on a link or an image with embedded malicious code. For example, with social media and personal information available in the open, spearphishing has become more believable and reliable. Tests show almost 1 in 5 employees will click on links in phishing s and give out confidential information. 1 Protecting inbound traffic is also no longer enough. Every organization has some confidential information, such as pending mergers, financials, or design specifications, that needs to be prevented from leaving the organization via . Due to the global nature of mail now as well as complex collaboration with other business partners, there may be a need to treat mail with actions such as encryption or additional logging. As you move to address these threats, other business realities add complexity. Because it is a staple of conducting business, volumes are ever increasing, so scalability is critical. You must also provide continuity for and go green, reduce the on-premises footprint, in compliance with green initiatives. These conditions sum up to four specific challenges as you move to protect both inbound and outbound without negatively affecting your organization s ability to do business: Spam/Phishing/Virus detection. The bread and butter of any solution is to detect and block these unwanted s with a very low percentage of false positives Knowing who the good senders are. With today s volumes, separating the good and bad through content scanning, AV scanning, Bayesian Analysis, and other techniques is not enough. A solution must be able to determine reputation of the sender based on past behavior, domain, or IP association, and other characteristics that can be filtered prior to delivering to your servers. Without this first layer of filtering by reputation, any corporate infrastructure will work harder than it needs to and have to rely on constant updates. This leaves the environment less effective at catching clean sent with malicious intent. Data loss prevention (DLP). With mail being an easy way for intentional or accidental loss of confidential data, you must be able to detect and block outbound company confidential information contained in an or its attachments. Well-intentioned to the wrong recipient has caused both embarrassment and unintentional data loss. 2 Protecting
3 Standards compliance. Detect messages that are subject to a regulatory or governance policy and process them accordingly via encryption, archiving, logging, or other required processes Provide business continuity and reduced footprint. There is a trend to use cloud-based services to reduce on-premises equipment while providing business continuity in the event of an outage or disaster. A layered approach allows to be received and stored off site when connectivity to on-premises equipment is interrupted. Users need to be able to read and respond to during an extended outage. Solution Description An effective solution will layer cloud-based protection in front of on-premises equipment, enabling processing efficiencies as well as compliance with business and green requirements. Each of the following components of the solution must achieve its goal with a very high detection rate combined with a very low false positive percentage. Detection is only the first step, as the solution must also be able to take multiple actions on the items detected and send notifications where appropriate. Spam/Phishing/Virus detection. As attack techniques have changed, new methods of trying to get a user to click on a link have become more successful. Most attacks now rely on multiple vectors for full deployment. For successful detection of these new attack vectors, McAfee recommends near real-time reputation updates of each component of the message from a vast network of sensors. For example, it should detect and flag an from a previously unknown sender when that message contains a URL to a known phishing site. Knowing who the good senders are. As mentioned above, relying on standard risk assessment techniques leaves a major gap in coverage. Advanced technology that provides predictive security against new and emerging threats is required. Knowledge of past behavior from senders as well as associations with others is a strong predictor of future behavior. A solution must correlate and analyze the behavior of Internet objects or entities such as host IP addresses, Internet domains, specific URLs, images, and messages. Data loss prevention. In order to prevent unintentional or intentional data loss, a solution must provide a mechanism for various types of documents to be identified and registered as confidential without storing a copy of the original content. Outgoing s and their attachments must then be compared against the library of confidential documents for any full or partial matches and, depending on policy, allowed, denied, encrypted, or quarantined. This protects against the casual mistake that could be as devastating as a malicious insider trying to send confidential information out. Standards compliance. A solution must be able to detect standard content in compliance with multiple regulations around the globe, without requiring the administrator to be a compliance expert. It should have a robust compliance engine as well as a large library of compliance templates and regulations widely used around the world. Internal governance policies such as encryption of documents sent to and from business partners should be easy to enforce. Once controlled content is detected, the solution must be able to take appropriate actions, encrypting the message, quarantining and notifying the user and administrator, or blocking its transmission. Business continuity and reduced footprint. A cloud based security system should be layered in front of on-premises systems and configured to drop definitively bad messages that can represent 70-80% of the volume, and deliver the remaining messages to the on-premises devices for closer inspection. The reduction in mail volume delivered to your organization s on-premises system will allow for a substantially reduced processing footprint, both within the security systems and within the server and its storage. In the event of an outage, s must be held in the cloud until connectivity is restored. During these outages, users must have the ability to read, reply, forward and delete their via the cloud. After the outage, all message activity should be synchronized so that the on-premises system has the authoritative content. Decision Elements These factors could influence your architecture: Do you have incentives for adoption of cloud-based services? Do you need to scan and attachments for sensitive content? Does your need to be archived for compliance? Do you require distributed or centralized management? What are your requirements for encryption? Protecting 3
4 Technologies Used in the McAfee Solution The McAfee solution consists of a layered approach combining McAfee Software as a Service (SaaS) protection with McAfee Gateway (MEG), with its encryption and full McAfee Global Threat Intelligence (GTI) integration. This hybrid approach utilizes the SaaS business continuity features to ensure availability and configures protection to drop those messages that are certain to be malicious or spam. After initial screening in the cloud, the much smaller amount of remaining traffic is directed on site, where McAfee Gateway provides additional spam and malware screening based on signatures, heuristics, and file and messaging reputation lookups against the McAfee Global Threat Intelligence database. These advanced controls can be applied efficiently because the traffic volume has already been reduced so significantly in the initial cloud-based filter. The McAfee Gateway will also screen outbound traffic to prevent data loss and enforce compliance with standards. Based on content and policies, the McAfee Gateway will take relevant actions, such as quarantining or encryption. As an option, controlled can be archived automatically through the cloud, using the McAfee SaaS Archiving service. Inbound Blocks spam and threats in the cloud 99.9% good SaaS Protection McAfee Gateway DLP Encrypted Non-encrypted Outbound Protection, hybrid deployment McAfee SaaS Protection and Continuity In a hybrid configuration, McAfee SaaS Protection and Continuity is combined with McAfee Gateway deployed on your site. The hybrid configuration allows you to retain quarantined information within your network while eliminating confirmed spam before it reaches you. Removing the definitely bad typically accounts for a 70-80% reduction in on-premises volume. During an onpremises outage, due to either scheduled maintenance or emergency downtime, SaaS Continuity automatically activates, allowing users instant web access to for business as usual. Web activity is synchronized with your on-premises equipment when connectivity is restored. 4 Protecting
5 1 flows to server 2 server suffers outage McAfee SaaS Continuity Customer Network 3 SaaS Continuity automatically activates* Users have instant web access to for business as usual 4 s delivered back to server upon recovery * Manual activation also available Continuity for planned and unplanned server outages McAfee Gateway McAfee Gateway (MEG) protects your organization by scanning both inbound and outbound and applying local and global threat intelligence. MEG utilizes the well-known McAfee antivirus scanner to detect known malicious content, and McAfee Global Threat Intelligence (GTI) to detect emerging and suspicious but unknown content. By utilizing GTI, the McAfee Gateway is able to make decisions about an based on a file attachment or embedded URL s reputation in addition to the sending IP address and the message content. For example, it is common for phishing attacks to frequently change the IP address used to send the s. Reputation services that only track IP address reputations must learn about each new address while letting the initial messages ( patient zeros ) through to the recipients. However, with GTI, even though the sending IP address has changed, the URL contained within the phishing will still have a bad reputation in the GTI database. The message will be blocked, avoiding even the patient zero infection. Like other reputable vendors, McAfee participates in third party testing such as the Virus Bulletin VBspam comparative and has consistently scored very well. The latest results (May 2011) showed a spam catch rate of 99.92% with ZERO false positives. The gateway s attachment filtering can be configured easily to block potentially harmful attachments even if the filename is changed. For example, an executable that is renamed to a.txt will still be detected as an.exe. Kernel Mode Blocking stops distributed denial of service (DDOS) attacks cold while continuing to allow legitimate through. Protecting confidential information is easy with integrated data loss prevention. The gateway s on-box DLP allows confidential documents to be fingerprinted. The original documents are not stored on the gateway. Before a message is sent, the content is extracted, fingerprinted, and compared to the confidential document fingerprints. The gateway can take action depending on the percentage match and policies specified by the administrator. To reduce false negatives that might block permitted , corporate templates can be fingerprinted into an excluded content section so the boilerplate text will not be considered in the comparison. Protecting 5
6 MEG is shipped with hundreds of compliance templates covering regulatory standards from across the globe. The templates span from Australia s Tax File Numbers to American HIPAA and the United Kingdom s NHS numbers. The templates provide a proven baseline, so an administrator can achieve compliance with just a few simple steps. Many compliance standards mandate secure delivery of the data. The McAfee Gateway includes advanced encryption and secure web delivery features that can be triggered automatically when appropriate content is detected. The gateway s built-in clustering provides high availability, load balancing, centralized reporting, and centralized management across multiple appliances without the need for any additional hardware or software. Integration with McAfee epolicy Orchestrator (McAfee epo ) allows for central management and reporting of multiple gateways or clusters, as well as rollup of enterprise-wide reports for compliance and status updates. Impact of the Solution Implementing McAfee SaaS Protection and Continuity in a hybrid configuration with McAfee Gateway supports green initiatives through reduced on-premises volume and equipment usage. This model also provides business continuity in the event of an outage or disaster. Two layers of spam and malware protection help you keep up with the volumes of traffic and the ever-evolving tactics of spammers, phishers, and other online criminals. After SaaS Protection has removed the known bad traffic, McAfee Gateway provides excellent spam, phishing, and virus protection and leverages reputation in real time to catch breaking malicious threats. The same system adds data loss prevention and standards compliance for comprehensive inbound and outbound protection in a single solution. 6 Protecting
7 Q&A Is there an additional cost for on-box DLP with McAfee Gateway? No, the on-box DLP is included in the standard product license. Is there an additional cost for the gateway s on-box encryption features? No, the on-box encryption features are included in the standard McAfee Gateway product license. Is there an additional cost for McAfee Gateway epo management and reporting? No, epo management and reporting is included in the standard McAfee Gateway product license. Is McAfee Gateway only sold as a 1U or 2U appliance? No, McAfee Gateway is also available as a virtual appliance or in a blade server. Will McAfee Gateway work with my Syslog server? Yes, McAfee Gateway has the ability to format syslog information into very popular formats including ArcSight and Splunk and will send the information to your syslog server on a TCP port you specify. Does McAfee Gateway support SNMP? Yes, McAfee Gateway supports both SNMP Monitoring and alerting for SNMP versions 1, 2 & 3. Protecting 7
8 Additional Resources For more information about the Security Connected Reference Architecture, visit: About the Author Joel Caracciolo, an enterprise solution architect, provides technical assistance and design solutions to new and existing McAfee clients in North and South America. Joel has over 20 years of experience in the IT field and specializes in messaging, networking, and security. He also has a strong development background and holds a patent for developing a trusted source toolbar for CipherTrust/Secure Computing. An experienced trainer and presenter, Joel has been invited to speak at IBM s business partner executive council (BPEC) and Lotusphere. Joel attended Akron State University and began his career through their co-op program as an intern for Allen Bradley, where he developed their software management reporting system. 1 The information in this document is provided only for educational purposes and for the convenience of McAfee customers. The information contained herein is subject to change without notice, and is provided AS IS without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance Mission College Boulevard Santa Clara, CA McAfee, McAfee epolicy Orchestrator, McAfee epo, McAfee Gateway, McAfee SaaS Protection and Continuity, McAfee Global Threat Intelligence, and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications, and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2011 McAfee, Inc bp_protecting- -rep-L3_1111
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationTechnology Blueprint. Protecting Intellectual Property in Email. Guarding against information-stealing malware and outbound data loss
Technology Blueprint Protecting Intellectual Property in Email Guarding against information-stealing malware and outbound data loss LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4
More informationTechnology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
More informationV1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
More informationMcAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
More informationanomaly, thus reported to our central servers.
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
More informationProtect Your Enterprise With the Leader in Secure Email Boundary Services
Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise
More informationWEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
More informationEuropean developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
More informationStop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
More informationEmail Encryption Made Simple
White Paper For organizations large or small Table of Contents Who Is Reading Your Email? 3 The Three Options Explained 3 Organization-to-organization encryption 3 Secure portal or organization-to-user
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationSymantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationEmail Encryption Made Simple
Email Encryption Made Simple For organizations large or small Table of Contents Who Is Reading Your Email?....3 The Three Options Explained....3 Organization-to-organization encryption....3 Secure portal
More informationTransitioning to McAfee SaaS Email Protection from Postini
Technical FAQ Transitioning to McAfee SaaS Email Protection from Postini Frequently Asked Questions Google recently and abruptly announced that all Postini customers must either migrate to Google Apps,
More informationWHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
More informationSetting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationModular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
More informationTotal Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
More informationTechnology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption
Technology Blueprint Protect Your VoIP/SIP Servers Insulating your voice network and its servers from attacks and disruption LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationSeven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS
Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationSetting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
More informationCopyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationMcAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
More informationData Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
More informationSolution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
More informationTechnology Blueprint. Protect the Network Perimeter. Controlling what gets through into and out of your organization
Technology Blueprint Protect the Network Perimeter Controlling what gets through into and out of your organization LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected
More informationGFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
More informationHow To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationHow McAfee Endpoint Security Intelligently Collaborates to Protect and Perform
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to
More informationWhen Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
More informationEiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
More informationMcAfee Endpoint Protection for SMB. You grow your business. We keep it secure.
McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,
More informationOn-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
More informationEvaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE
The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances
More informationEmail AntiVirus. Administrator Guide
Email AntiVirus Administrator Guide Email AntiVirus Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationSolutions Brochure. Security that. Security Connected for Financial Services
Solutions Brochure Security that Builds Equity Security Connected for Financial Services Safeguard Your Assets Security should provide leverage for your business, fending off attacks while reducing risk
More informationWhen Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
More informationSimplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%
Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity
More informationTop 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
More informationSymantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
More informationTechnology Blueprint. Secure Cloud-based Communications. Manage risk while embracing cloud services
Technology Blueprint Secure Cloud-based Communications Manage risk while embracing cloud services LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected The Security
More informationMimecast Email Security
DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing
More informationAdministration Guide Revision A. SaaS Email Protection
Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationWildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
More informationCisco Cloud Email Security Interoperability with Microsoft Office 365
White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources
More informationIntercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
More informationTechnology Blueprint. Protect Your Servers. Preserve uptime by blocking attacks and unauthorized changes
Technology Blueprint Protect Your Application Servers Preserve uptime by blocking attacks and unauthorized changes LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected
More informationCisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
More informationT E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
More informationAdministration Guide Revision E. SaaS Email Protection
Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationSECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
More informationDatabase Security in Virtualization and Cloud Computing Environments
White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and
More informationFighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
More informationComprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
More informationSecuring the Internet of Things
Business Brief Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy IoT Architectural Challenges Given the diversity and scale of the IoT, new security
More informationINSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
More informationFortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
More informationIBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features
Security capabilities To support your business objectives IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features Give users complete
More informationWhen Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
More informationProtecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
More informationNot All Database Security Solutions Are Created Equal
Solution Brief Not All Database s Are Created Equal Compare solutions from different vendors Databases: The Top Regulatory Compliance Challenge In January 2012, Evalueserve surveyed 438 IT decision makers,
More informationCommtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
More informationProactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.
Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control
More informationConfiguration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
More informationReviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
More informationSymantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
More informationVirtualizing Email Gateway Security
Virtualizing Email Gateway Security Flexible, Cost-Effective Protection at the Email Gateway August 2009 I. COST AND COMPLEXITY DRIVE VIRTUALIZATION EFFORTS Virtualization initiatives have gained momentum
More informationSecuring the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy. The number of Internet-connected smart devices is growing at a rapid pace. According to Gartner, the
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationChoose Your Own - Fighting the Battle Against Zero Day Virus Threats
Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle
More informationSelecting Your Essential Cloud Services
DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationEmail Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
More informationImproving Business Outcomes: Plug in to Security As A Service Adrian Covich
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Principal Systems Engineer, Symantec.cloud 1 Who We Are 2 Security Challenges in Education 3 Security As A Service Email, Web,
More informationTransitioning to McAfee SaaS Email Protection from Postini
Technical FAQ Transitioning to McAfee SaaS Email Protection from Postini Frequently Asked Questions Google recently and abruptly announced that all Postini customers must either migrate to Google Apps,
More informationSESA Securing Email with Cisco Email Security Appliance Parts 1 and 2
Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)
More informationWebsense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security
Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to
More informationTechnology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse
Technology Blueprint Defend Against Denial of Service (DOS and DDOS) Attacks Protect each IT service layer against exploitation and abuse LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
More informationPROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES
PROTECTING YOUR MAILBOXES Features SECURITY OF INFORMATION TECHNOLOGIES In 2013, 50% of businesses would have experienced a virus infection by e-mail. Electronic mail remains one of the preferred vectors
More informationEmail Correlation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
More informationMESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
More informationFortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
More informationare some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.
W H I T E PA P E R Public Network External Application MTA Moving to the Cloud Important Things to Consider Before Migrating Your Messaging Infrastructure to the Cloud Fallback MTA External Corporate MTAs
More informationCisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
More informationMcAfee Certified Product Specialist McAfee epolicy Orchestrator
McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives
More information