APPLIANCES FOR THE SMALL/MEDIUM-SIZED BUSINESS MARKET
|
|
|
- Ophelia McCormick
- 10 years ago
- Views:
Transcription
1 APPLIANCES FOR THE SMALL/MEDIUM-SIZED BUSINESS MARKET DECEMBER 16, 2007
2 IT departments spend almost 10% of their time managing filtering solutions. (InformationWeek Research Survey, Nov. 2006) An IT Manager's time and budget are limited, and the ideal solution is one that best matches both the company's needs for security and its needs for IT efficiency and productivity. In this review: CLEARSWIFT MIMESWEEPER 2.6 IRONPORT C150 SOPHOS ES1000 today is the cornerstone of corporate communication. In our world of always-on connectivity, it is expected to be available and reliable around the clock. Users also expect it to be free from spam, phishing and malware, as these threats severely impact its ongoing effectiveness as a business tool. In many small and medium companies, maintaining a safe and reliable environment is a top IT priority. A November 2006 InformationWeek Research Survey found that IT departments spend almost 10% of their time managing filtering solutions. With all the other demands on their time, there is great pressure to ensure that the security solution in place meets or exceeds expectations on protection, administration and support. After all, while might be a strategic necessity, managing security probably is not. This review evaluates appliance-based options from the perspective of performance and day-to-day administrative effort for small- and medium-sized businesses. Our testing scenario assumes that for this market, an IT Manager's time and budget are limited, and the ideal solution is one that best matches both the company's needs for security and its needs for IT efficiency and productivity. THE EVOLVING NATURE OF SECURITY According to the Gartner Group's report, Magic Quadrant for Security Boundary, 2006, efficient and accurate spam and virus filtering remain essential to buyers; however, it is generally the secondary features that win deals. The report cites features that lower administration overhead, policy-based outbound content inspection, encryption and appliance MTA (Mail Transfer Agent) capabilities as increasingly important, driven by a desire to consolidate infrastructure. Emerging concerns about compliance and data leak prevention are also stimulating demand for enhanced outbound inspection and encryption. The report goes on to say that a complete solution would require a spam catch rate of at leat 95%, and that keeping the infrastructure up and running is priority #1 for IT managers. WHO WE TESTED In this review we looked at three popular appliances that are currently marketed to small and medium businesses, which we define as having between 100 to 1000 users. We tested a Sophos ES1000, Clearswift MIMEsweeper 2.6, and Ironport C150. We looked carefully at ease of installation but then focused in on everyday ease of use, management, policy creation, reporting features and how reliably the appliance carried out its mission, since those are the things that an IT manager will end up living with daily. Since all three appliances were able to handle the same volume of mail with similar throughput speeds, we chose to ignore this as a test criterion. [1] Report created by evision IT Labs
3 O verall, the Sophos ES1000 provided the best combination of security, functionality, ease of use and price for SMBs. THE RESULTS Our test reveals that all three products deliver reliability and protection, often exceeding the criteria defined in the Gartner Group report. That said, the products clearly have different strengths, and an IT Director will want to choose wisely depending on the organization's specific requirements. In putting each of the appliances through their paces we found one the Sophos ES1000 to be changing the landscape of appliances, as well as to be offering IT Directors a persuasively innovative way to simplify their operations. It was this forward-thinking and somewhat future-proofing approach that set the Sophos ES1000 ahead of its peers as a more valuable solution for SMBs. The ES1000's integrated support complete with real-time security updates and its highly intuitive management console make this product a standout in the group. Spam catch rates were the highest we tested at 99.4%, and the GUI reliably delivered minimal click-through management and day-to-day ease of use. Automatic self-maintenance and remote monitoring (standard) are especially beneficial to SMB administrators, as was the ability to remotely tunnel into the device (also standard) for extended troubleshooting support. Compliance is enabled through solid protective controls, and reporting is informative. Overall, the Sophos ES1000 provided the best combination of security, functionality, ease of use and price for SMBs. Clearswift IronPort Sophos Installation / Deployment Managability / Usability Reporting / Compliance Price Totals Weighted Scores Summary Robust feature set; Wide range of reporting; Complex management Decent reporting; Acceptable installation; Low spam protection Ease of management; Good vendor support; Basic reporting The IronPort C150 from Cisco is a robust solution, but installation and configuration is more complicated, requiring more effort than is typically expected by the SMB market. The appliance is administered via a combination of Web-based interface and command-line access, which we found to be cumbersome and time-consuming. The product delivers all the standard must-haves for an all round gateway but other than logging into the device, there is no effective monitoring capability. Reporting [2] Report created by evision IT Labs
4 APPLIANCE SPECIFICATIONS Clearswift MIMEsweeper: Dual Intel Xeon processors, 2GB RAM, two 250GB SATA drives in Raid 1, Linux OS IronPort C150: Single Intel processor, 2GB RAM, two 80GB SATA drives in RAID 1, AsyncOS Sophos E1000: Single Intel Celeron D processor,, 1GB RAM, one 160 GB SATA drive, FreeBSD OS capabilities are limited although we liked the scheduling and mailing feature that was available. Protective controls for compliance are adequate. The C150 detected 96.9% of spam during our test, which unfortunately ranked it last of the three appliances. The device can be fine-tuned by the administrator to increase its effectiveness, but this adds administrative burden and reduces its overall attractiveness to our target market. The company states that the C150 is positioned to be affordable, however, it was significantly more expensive than both the Sophos and the Clearswift appliances. The MIMEsweeper 2.6 from Clearswift finished third in our ranking. After getting over initial difficulties adapting to a less-than-intuitive interface and complicated configuration rules, it did provide reliable security. Its broad functionality includes features such as lexical pattern matching and a wide range of customizable reporting. It offers extensive support for compliance with policy violation alerts and protective controls. Unfortunately, all this means that the MIMEsweeper 2.6 has all the attendant complexity of such a large feature set, coupled with little built-in support. Documentation was poorly organized and not clearly written. While the MIMEsweeper came in as the least expensive solution - only marginally more than Sophos - its complexity and lower spam catch rate caused it to lose ground in our test. Price Breakout: (for 1,000 users, 1 year license, hardware included, all figures in US dollars) Clearswift MIMEsweeper: $17,699 IronPort C150: $29,500 Sophos ES1000: $20,795 All these appliances require subscription renewals. [3] Report created by evision IT Labs
5 We evaluated each appliance against one another in the following categories: Installation and deployment Usability and management Reporting and compliance Price THE EVISION IT LABS TEST BENCH We used a test environment that emulates a business of 1,000 users divided into groups to represent the Sales, Human Resources, and Accounting departments, as well as an executive level. Users were simulated using custom-built scripts representing various patterns including both live spam feeds and canned spam, and attachments of various lengths with viruses attached. Keeping security in mind when the devices were tested in a "live" environment, we used the Internet standard EICAR to emulate virus testing while the DUT (Device Under Test) was under heavy load. The goal of each test is to get approximately 10,000 messages sent through the device under test (DUT). We used a scaled approach; starting with 100 messages and increasing to 1,000 inbound per minute weighted across each department. Attachments were set to two different parameters 64Kb and 1Mb. We used a ratio of 50% spam, 20% spam with a known virus attachment, 20% varied virus, and 10% content specific (for testing content filtering). We evaluated each appliance against one another in the following categories: Installation and deployment Usability and management Reporting and compliance Price Each appliance was scored on a scale of 1 to 10, 1 being poor and 10 being excellent. Keeping the needs of the SMB in mind compared to the large enterprise which might have different priorities each category was then assigned a weighted ranking based on relative importance. The weighted rankings are as follows: Category Weighting Installation / Deployment 30% Managability / Usability 45% Reporting / Compliance 15% Price 10% INSTALLATION AND DEPLOYMENT Here we evaluated the ease of initial setup and configuration for our 1,000-user test bench for each appliance. This included elements such as the sales ordering process, accuracy of delivered product, and the initial physical installation. We considered the clarity and simplicity of Quick Install or Setup Guides. We also measured the ease of use of any tools and/or wizards that were built in to assist us in the setup and configuration. Deployment was defined as the setup for the test bench similar to an organization configuring the device for their unique environment. [4] Report created by evision IT Labss
6 Data leakage prevention (DLP) is a growing concern for companies of all sizes and industries. IT administrators usually assume a degree of responsibility in safeguarding confidential data. USABILITY AND MANAGEMENT For this part of the test, we evaluated the experience during common administrative activities such as managing users and groups and changing policies. We considered the number of steps it took to create a policy (e.g. filtering outbound messages for keywords), update the software and make other configuration changes. The ability to search for quarantined messages and retrieve information from message logs was also tested as a day to day operation. REPORTING AND COMPLIANCE For reporting and compliance testing, we analyzed and evaluated the standard reports (both quantity and detail), as well as the ability to meet output requirements and generate custom reports. These features are increasingly important to both security and general business policy; visibility of traffic is vital to enforcing acceptable use of and to planning infrastructural changes. Knowing what to do next is often dependent on the data that can be extracted. We looked at ease of access to reports, intuitiveness, and availability of options and templates. The ability to export data was also noted, as were alerts and other forms of notification on system performance. We also looked at how reporting enabled business managers to evaluate the implementation and effectiveness of IT policies. Data leakage prevention (DLP) is a growing concern for companies of all sizes and industries. Customer records, financial documents, trade secrets and similar information are not only vital business records, but they also represent potentially serious legal, financial and public-relations landmines should they fall into the wrong hands. The news is filled with stories of organizations like United States Veteran Affairs, Salesforce.com, TJX and the UK government's customs department losing confidential data and suffering both financially and reputationally. Since as much as 80% of business records are contained in , and is owned by the IT department, IT administrators usually assume a degree of responsibility in safeguarding confidential data. Since security solutions play a key support role, we investigated what each appliance offered in terms of data leakage prevention capabilities. PRICE While price is a key factor, we see Total Cost of Ownership (TCO) as a more important measurement. Total Cost of Ownership includes the cost of the hardware, software, and all the costs associated with implementation, including administrator time, outside consulting, ongoing support, and maintenance. It also includes the cost of running the device for two years after implementation. This is when the administrator really begins to learn the true cost of owning a system, as they begin to run through their day-to-day operations. [5] Report created by evision IT Labs
7 S OPHOS ES1000 Sophos support centers span the globe, proactively monitoring every Sophos appliance 24/7. Automatic selfmaintenance and remote monitoring (standard) are especially beneficial to SMB administrators, as was the ability to remotely tunnel into the device (also standard) for extended troubleshooting support. ABOUT EACH PRODUCT Sophos ES1000 Sophos takes a visionary approach with its ES1000 appliance. At the source is a unique global network of spam and malware analysis centers, sorting through millions of messages, web sites and malware samples every day in search of new threats. Sophos is consistently ranked as a top-5 vendor in threat response, as per organizations such as avtest.org and secunia.com. Sophos support centers span the globe, proactively monitoring every Sophos appliance 24/7. An example of this is rather than go the SNMP route, which is an insecure system prone to error and interruption, Sophos will monitor the appliance directly, through a system of built-in sensors that watch everything from unit temperature to disk space to update status, etc. topping at upwards of 50 different alerts. The appliance will trigger alerts to the admin and/or to Sophos in the event of an abnormal condition being met. This refreshingly unique approach actually caused us to be notified by and telephone when, as a part of the test, we took the device off-line. Sophos offers a full range of security solutions built for business. Alongside the ES1000, there is a second appliance the ES4000 designed for larger enterprises, a web appliance built for SMBs, a Network Access Control solution and an endpoint security suite that combines anti-virus, anti-spyware and application control. Sophos claims to protect more than 100 million customers in nearly 150 countries. INSTALLATION AND DEPLOYMENT From the very start, it was evident that one of the ES1000's strong suits was ease of use. Simple and easy to read instructions, clearly defined steps, and an activation key that was ed to us before we received the unit made for faster than expected initial setup of DNS settings, domains, internal mail hosts, and even basic policy. The setup wizards were intuitive and efficient to use. Upon completing the wizard, the device runs diagnostics to ensure connectivity, a simple yet effective method of confirming proper configuration. Documentation included a Setup Guide in print as well as on online PDF version. Default settings allow instant anti-spam and anti-virus protection in one of three deployment modes, with full mode allowing filters to be set across the entire user base. Once we completed the installation process the summary page allowed us to review our configuration, make edits, and print our settings USABILITY AND MANAGEMENT Again, Sophos scored well in this regard. Consistently easy to use and very intuitive to our testers, the ES1000 simplified many of the tasks that would be required to keep secure. Sophos relies on HTTPS web based administration, however SSH connections can be used as well. Had we needed technical assistance, we could have established an SSH tunnel to Sophos, granting a Sophos support technician access to the device to help resolve the issue. The secure tunnel would have automatically expired in 4 hours a feature designed to preserve device integrity and security. The ES1000 provides administrators with plenty of flexibility when it comes to directory service integration. It is fully integrated with LDAP and can synchronize automatically with Microsoft Active Directory. [6] Report created by evision IT Labs
8 S OPHOS ES1000 We were able to capture 99.4% of spam s, change policies, add trusted mail relays and more, easily and efficiently. By default the device is configured with security in mind. s are scanned both inbound and outbound, and the interface provided us with the flexibility to changes policies based on groups and users and custom groups. Policy configuration was the easiest of the appliances we tested; we found it took us about three steps to generate an outbound content inspection policy. Policies can be added or deleted, enabled or disabled as well as re-ordered with a simple drag and drop process in the Web-based UI. Additionally, message action features make easy work of the notification and disclaimer/banner process, a critical part of demonstrating compliant practices. Overall, the device performed well above expectations. The ES1000 is able to disinfect many common file types such as ZIP, ARJ, CAB, RAR and LHA formats. We were able to capture 99.4% of spam s, change policies, add trusted mail relays and more, easily and efficiently. Sophos ES1000 dashboard REPORTING AND COMPLIANCE The ES1000's reporting capabilities are sufficient for the majority of organizations in this target market, although not as broad as Clearswift's or as flexible as IronPort's. The ES1000 has an informative and easy to read main reporting page that provides an excellent summary of recent activity. A good range of policy, usage and traffic reports can be printed, exported and saved if required. Detailed reports can be modified for period and type (line or bar, with or without data tables). Like its counterparts in this test, the ES1000 provides good tools for companies to avoid leakage of confidential information via . It can scan outbound s for keywords regular expressions and strings attachment types and message size, and it can add customer banners/disclaimers as well. These actions can be applied globally or for defined groups and users, and can trigger customized policies in the event of a rule hit. [7] Report created by evision IT Labs
9 S OPHOS ES1000 ES1000 system status page The ES1000 doesn't come pre-populated with specific lexicons, but industry- or company-specific keyword lists can be uploaded and edited quite easily through the management console. Also on the compliance side, the ES1000 logs all admin actions and stores a file locally. Should the need arise to review administrator work flow, e.g. to see when a policy was changed, a setting altered or a search performed, the administrator can open an SSH connection to Sophos Support, and a Sophos technician can retrieve the admin log (important note: as is the case with SSH troubleshooting, Sophos cannot access the appliance or see the logs until asked). For security purposes, the admin cannot retrieve the logs without assistance from Sophos. To maintain transparency, all actions taken by the Sophos support technician are logged as well. [8] Report created by Envision Labs
10 I RONPORT C150 IronPort appliances are designed for Internet Service Providers and large corporate users. We found day-to-day management to be overly complicated. IronPort C150 IronPort is recognized by IDC as a leader in security, with an estimated market share of 14.3% (IDC Expands Worldwide Security Appliance Tracker to Include Secure Content Management Appliances, July 18, 2007). A popular choice among Internet Service Providers and large corporate users, the company was purchased in June 2007 by networking giant, Cisco. In the C150, IronPort has delivered a powerful, feature-rich device based on its larger appliances. While the C150 is not as elegant or as easy to use as the Sophos ES1000, it did offer some breadth in its feature set that some administrators might like. However, keeping the needs of an SMB in mind, we found that most of these options overly complicated both the configuration and the day-to-day management of the device. INSTALLATION AND DEPLOYMENT Initial setup for the C150 was straightforward, but configuring the appliance for our test bench was a bit more cumbersome and less intuitive than the Sophos to setup. Administrators must use both the Web-based interface and the command line interface to configure the C150. The setup wizard only covers the basics, and we quickly had to refer to the Advanced Users Guide for assistance. Here is where the device lost some points for ease of use. While the manuals were detailed, hunting for specific information was difficult and time consuming. Once back to the interface, we noted that system warnings communicate well with administrators as they make changes, and confirmations are logical and clearly communicated when offered. The hierarchical organization of the options and menus in the Web-based interface is consistent and intuitive. One feature we liked was the summary information upon login that included general health of the system as well as some summary statistics. Overall, however, the deployment process was not as smooth or simple as it was with the Sophos ES1000. IronPort C150 Message Security [9] Report created by evision IT Labs
11 I RONPORT C150 USABILITY AND MANAGEMENT We believe that the C150's lower catch rate is due in large part to its limited range of antispam techniques, and to the fact that today's botnet-driven spam campaigns are increasingly difficult to block based solely on the reputation of the sender IP. While the IronPort C150 exceeds the minimum spam catch rate requirements we referenced in the Gartner Group report, it fared the poorest of the three devices tested, blocking just 96.9% of spam compared to 99% for the MIMEsweeper and 99.4% for the ES1000. The C150 relies heavily on reputation filters to block spam. Reputation filters look at suspect volume, for example a large number of messages from one IP or a range of IPs, as a possible sign of a spam campaign or virus outbreak. It then cuts back bandwidth or completely blocks the , depending on how the appliance is configured. We believe that the C150's lower catch rate is due in large part to its limited range of anti-spam techniques, and to the fact that today's botnet-driven spam campaigns are increasingly difficult to block based solely on the reputation of the sender IP. IronPort C150 anti-spam policy page Like the other appliances tested, the C150 offers full LDAP integration. It can be managed in a variety of ways including HTTP or HTTPS for the Web interface and SSH or Telnet for the CLI. Communications are encrypted for compliance. Policy creation isn't as straightforward as we had expected. The appliance does have a default policy and additional customized policies can be built, but we found this required considerable effort, particularly when opting for an action other than following the defaults. We would like to see the initial creation screen contain all available settings to simplify this process. Other improvements would be to enable customized reports and the addition of an administrative log. For day-to-day management the IronPort did not score as well as the Sophos, but was a close second. IronPort does not have its own anti-virus scanning technology. Customers can add the Sophos anti-virus engine to the C150, with one significant protection difference: whereas Sophos customers receive threat updates directly from Sophos every five minutes, IronPort customers cannot. IronPort must first receive the updates from Sophos and then repackage them for distribution to their customers. [10] Report created by evision IT Labs
12 I RONPORT C150 REPORTING AND COMPLIANCE The IronPort C150 scored slightly better in reporting and compliance than the ES1000, due to greater flexibility in policy customization and report scheduling. For example, if an administrator so chooses they can elect to send pre-built reports to multiple recipients at different scheduled times. However they can't customize those reports. While not as robust as the MIMEsweeper for reporting, the IronPort did provide a nice suite of information for administrators to begin tracking outbound communications for compliance. [11] Report created by evision IT Labs
13 C LEARSWIFT The MIMEsweeper scored well in security, reporting and compliance, but did not fair as well as its competitors in the other areas, and therefore finished third in our scoring. Clearswift MIMEsweeper Clearswift is an established security vendor based in the UK, with good market presence there and in Europe despite being not too well known in North America. Originally a software vendor, Clearswift introduced an appliance-based version of its MIMEsweeper solution in late According to the company, the hardened Linux core in the appliance supports up to 2,500 users. It scored well in security, reporting and compliance, but did not fair as well as its competitors in the other areas, and therefore finished third in our scoring. INSTALLATION AND DEPLOYMENT Initial setup was achieved via a wizard that operated as advertised, allowing us to gain access to the Web-based management console within minutes. However, the wizard is for very basic parameters only, and does not include any ability to configure policies. Complete configuration and deployment followed a more manual and time-consuming process. Clearswift MIMEsweeper anti-spam policy page [12] Report created by evision IT Labs
14 C LEARSWIFT The MIMEsweeper has an abundance of configuration options, more than either of the other two appliances tested. Clearswift MIMEsweeper message policy page USABILITY AND MANAGEMENT The MIMEsweeper is clearly designed to focus more on content filtering than on security. The company says their default settings are pre-configured and set to block viruses. However, the unit we received for some reason was not doing so out of the box. It was not until we got into the testing phase that we realized the setting was not on and the device was not blocking our test viruses. Once we corrected this issue, blocking was initiated. The MIMEsweeper has an abundance of configuration options, more than either of the other two appliances tested. However, along with these choices comes the requisite configuration complication. Not as intuitive as the Sophos and more convoluted than the IronPort, the MIMEsweeper actually proved to be cumbersome to manage on a day-to-day basis. Setting up policies proved to be far more complex than the process on the other appliances. We consistently found ourselves running through multiple screens and configurations to Edit, Change, Edit and Apply before finally being able to commit changes to the policy. The process of confirming settings and reviewing policies was more complicated than it needs to be, resulting in a lack of confidence that the appliance was set up properly. We would like to see a Summary screen to review and confirm every policy that would drill down to a required detailed review from within the policy if we wanted to review and verify. In keeping with its strengths in filtering, Clearswift recently added a feature called "lexical search" which enables extensive searching through s and attachments for specific words, phrases and expressions. Boolean operators, regular expressions, and contextual awareness operators (before, after, with, etc.) can all be combined into tightly tailored scanning algorithms. After almost forty-five minutes of experimenting, we began to get the general feel of how to operate the device, although we'd like to see a more intuitive process. [13] Report created by evision IT Labs
15 C LEARSWIFT Clearswift's SpamLogic technology, coupled with its TRUSTmanager reputation service that helps avoid delays to legitimate , scored very closely to the Sophos ES1000, with only a slight variance in catch rate over the other devices tested. The latest version of TRUSTmanager now returns finer reputation information and policy flexibility: whereas the appliance previously had the function to either Accept or Reject , version 2.6 provides additional levels of trust, which streamline messages through the system. The four reputation bands are now Good, Neutral, Suspicious and Bad. Like IronPort, Clearswift does not have its own anti-virus technology, relying instead on third parties to provide protection. Customers must purchase a separate license from Kaspersky Lab, effectively requiring them to deal with two vendors for the same appliance. REPORTING AND COMPLIANCE Reporting and compliance are MIMEsweeper's strong suit, and one of its primary differentiators in this test. It comes with 13 pre-built reports with multiple customized sub-categories. Alerting functionality ranked highest in our review, given its ability to schedule, customize, and review every level of the device. The MIMEsweeper appliance had the most enterprise-level tools, including advanced logging, SNMP, and alerting. The benefit to larger organizations is obvious, but for small- and mid-sized organizations, these features may not be as useful, as they typically require an investment in additional infrastructure in order to be fully utilized. evision IT Labs The "Blue Collar" test lab. Specializing in competitive product evaluations, technical documentation, and security and compliance testing. Contact: [email protected] This comparative review, conducted independently by evisionit Labs, was sponsored by Sophos. evisionit Labs aims to provide objective, impartial analysis of each product based on hands-on testing in its security lab, and gives each company whose products are included the opportunity to participate by providing input on evisionit Labs test plan and feedback on findings. [14] Report created by evision IT Labs
Clearswift SECURE File Gateway
Security solutions for a changing world You wouldn t leave your front door unlocked if you were going out for the day, so why do the same with your business? In today s rapidly evolving business environment,
Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
Top 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
Cisco IronPort X1070 Email Security System
Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The
IronPort C300 for Medium-Sized Enterprises and Satellite Offices
I r o n P o r t A p p l i a n c e s H I G H - P E R F O R M A N C E E M A I L S E C U R I T Y. C A R R I E R - P R O V E N T E C H N O L O G Y. E N T E R P R I S E - C L A S S M A N A G E M E N T. IronPort
IronPort C10 for Small and Medium Businesses
I r o n P o r t A p p l i a n c e s S I M P L E I N S TA L L AT I O N, E A S Y M A N A G E M E N T, A N D P O W E R F U L P R O T E C T I O N F O R Y O U R E M A I L I N F R A S T R U C T U R E. IronPort
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
Four reasons to upgrade from MIMEsweeper for SMTP to the Clearswift SECURE Email Gateway
Four reasons to upgrade from MIMEsweeper for SMTP to the Clearswift SECURE Email Gateway Exclusive trade-in deals, available only to you. As an existing Clearswift MIMEsweeper for SMTP customer special
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
IronPort X1000 Email Security System
I r o n P o r t A p p l i a n c e s T H E U LT I M AT E E M A I L S E C U R I T Y S Y S T E M F O R T H E W O R L D S M O S T D E M A N D I N G N E T W O R K S. IronPort X1000 Email Security System O v
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
QUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
A Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Symantec Messaging Gateway powered by Brightmail
The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced
Cisco IronPort C670 for Large Enterprises and ISPs
Data Sheet Cisco IronPort C670 for Large Enterprises and ISPs As the battle to protect the corporate email perimeter continues, two trends emerge: higher mail volumes and more resource-intensive scanning.
Sophos Email Appliance Configuration Guide
Sophos Email Appliance Configuration Guide Sophos TOC 3 Contents Copyrights and Trademarks...4 Introduction...4 Product Overview...4 Installing a Virtual Appliance...7 Initial Configuration...8 Activating
Email Security Solutions
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
IronPort C350 for Medium-Sized Enterprises and Satellite Offices
I r o n P o r t E M A I L S E C U R I T Y A P P L I A N C E S H I G H - P E R F O R M A N C E E M A I L S E C U R I T Y. C A R R I E R - P R O V E N T E C H N O L O G Y. E N T E R P R I S E - C L A S S
Sophos Email Appliance Configuration Guide
Sophos Email Appliance Configuration Guide Sophos TOC 3 Contents Copyrights and Trademarks...4 Setup and Configuration Guide...4 Product Overview...4 Installing a Virtual Appliance...7 Initial Configuration...9
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Web. Anti- Spam. Disk. Mail DNS. Server. Backup
Email Server Appliance N ew generation of Server Appliance, AirLive, is designed for the SMB or enterprise that needs to install an easy maintained and fully functional mail server. It not only preserves
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Next Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2
Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)
E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product
FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
WATCHGUARD IRONPORT KEY SALES PITCH TRUTH BEHIND THE PITCH
KEY SALES PITCH First and only true unified security provider for protection bidirectional threats and data loss prevention across email and web in a single solution. XCS leverages ReputationAuthority
provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.
WatchGuard XCS v10.0 Update 1 Release Notes WatchGuard XCS Build 140312 Revision Date 11 November, 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard XCS v10.0 Update 1. This
The Advantages of Security as a Service versus On-Premise Security
The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
PureMessage for Microsoft Exchange Help. Product version: 4.0
PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9
2. Installation and System requirements
RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
FortiMail Email Filtering. Course 221 - for FortiMail v4.0. Course Overview
FortiMail Email Filtering Course 221 - for FortiMail v4.0 Course Overview FortiMail Email Filtering is a 3-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.
Page 1 of 9 Overview Email + web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all. Security risks for email, web, and data are no secret. Most people
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.
SafeNet Content Security esafe SmartSuite - Security that Thinks Real-time, Smart and Simple Web and Mail Security Solutions Product Overview Malware CONTENT SECURITY Antivirus Malware A secure Web gateway
No per user or mail box pricing restrictions. Bundled pricing integrated with Antispam, Antivirus, Antispyware and Antimalware
Fortinet Lowers TCO No per user or mail box pricing restrictions Bundled pricing integrated with Antispam, Antivirus, Antispyware and Antimalware Cost on average is approximately 50% less than traditional
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
WATCHGUARD BARRACUDA KEY SALES PITCH TRUTH BEHIND THE PITCH
KEY SALES PITCH Long time provider of email security with large customer base XCS 170, 370 and 570 appliances integrate bi directional email threat protection and data loss prevention on a single platform.
Policy Based Encryption Gateway. Administration Guide
Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
Solution Brief FortiMail for Service Providers. Nathalie Rivat
Solution Brief FortiMail for Service Providers Nathalie Rivat Agenda FortiMail for Internet Service Providers Outbound antispam to prevent blacklisting MMS routing for Mobile Operators Inbound antispam
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
PureMessage for Microsoft Exchange 2013 startup guide. Product version: 4.0
PureMessage for Microsoft Exchange 2013 startup guide Product version: 4.0 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
BitDefender Client Security Workstation Security and Management
BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
FortiMail Email Filtering. Course 221 (for FortiMail v4.2) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v4.2) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
Symantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business is an easyto-use, all-in-one suite that secures your critical business assets and information against today s complex
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide APPLICATION VERSION: 9.0 MAINTENANCE RELEASE 1 Dear User! Thank you for choosing our product. We hope that this document will
email management solutions
Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations
IronPort C650 Email Security Appliance for Large Enterprises and ISPs
I r o n P o r t E M A I L S E C U R I T Y A P P L I A N C E S a d va n c e d t h r e at p r e v e n t i o n, s pa m a n d v i r u s b l o c k i n g, a n d c o r p o r at e e m a i l p o l i c y e n f o
Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
IronPort X1060 Email Security System
IronPort EMAIL SECURITY APPLIANCES THE ULTIMATE EMAIL S E C U R I T Y S Y S T E M F O R T H E W O R L D S M O S T DEMANDING NETWORKS. IronPort X1060 Email Security System Overview As the battle to protect
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Server & Application Monitor
Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich
Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.
Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control
The Next Step in Outbound Email Protection. By Robert Mannal, CIPP, CISSP
The Next Step in Outbound Email Protection By Robert Mannal, CIPP, CISSP Background and Issues Some observers are crediting email with building the Internet; reflecting that it may be the killer app that
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
McAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes
Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide
Kaspersky Security 9.0 for Microsoft Exchange Servers Administrator's Guide A P P L I C A T I O N V E R S I O N : 9. 0 Dear User! Thank you for choosing our product. We hope that this document will help
Websense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE
The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Superior protection from Internet threats and control over unsafe web usage
datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber
Trend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
F-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
Web Security Gateway Solutions
Web Security Gateway Solutions Websense Web Security Gateway Solutions 90 percent of the top 100 Web sites are classified as social networking or search and more than 47 percent of these sites support
F-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
Setting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
