Cisco IronPort & Web Security
|
|
- Jason James
- 8 years ago
- Views:
Transcription
1 Cisco IronPort & Web Security Greg Griessel Consulting Systems Engineer - Security greggr@cisco.com 2010 Cisco and/or its affiliates. All rights reserved. Ciscc 1
2 Application-Specific Security Gateways BLOCK Incoming Threats: Spam, Phishing/Fraud Viruses, Trojans, Worms Spyware, Adware Unauthorized Access Internet SensorBase (The Common Security Database) APPLICATION-SPECIFIC SECURITY GATEWAYS Security Gateway WEB Security Gateway SECURITY MANAGEMENT Appliance 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
3 Security, 2010 The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Cisco Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
4 Secure Web Gateway, 2011 The Magic Quadrant is copyrighted 2011 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Cisco Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
5 Cisco IronPort Security 2010 Cisco and/or its affiliates. All rights reserved. Ciscc 5
6 Junk Mail Privacy & Control Viruses Regulations 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
7 More and more targeted attacks Daily Spam Volume (Billion) Targeted Attacks Spam Source: Cisco Threat Operations Center 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
8 Statistics on more than 30% of the world s traffic New threats & alerts detection More than 200 parameters to build reputation scores Data Volume Message Structure Complaints Blacklists, whitelists Off-line data Reputation Filters Reputation Score URL blacklists & whitelists HTML Content Domain Info Known bad URLs Website history Web Reputation Filters Reputation Score 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
9 Cisco IronPort Security Appliance INBOUND SECURITY Spam Defense Virus Defense MAIL TRANSFER AGENT OUTBOUND CONTROL CISCO IRONPORT ASYNCOS PLATFORM Data Loss Prevention Secure Messaging Management 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
10 For Security, Reliability and Lower Maintenance Before Cisco IronPort After Cisco IronPort Internet Internet Firewall Firewall Encryption Platform Anti-Spam MTA DLP Scanner Anti-Virus Policy Enforcement DLP Policy Manager Cisco IronPort Security Appliance Mail Routing Groupware Groupware Users Users 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
11 Cisco IronPort Security Appliance INBOUND SECURITY Spam Defense Virus Defense MAIL TRANSFER AGENT OUTBOUND CONTROL CISCO IRONPORT ASYNCOS PLATFORM Data Loss Prevention Secure Messaging Management 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
12 Revolutionary Delivery Platform Traditional Gateways and Other Appliances Cisco IronPort Security Appliances 200 Connections Low Performance/ Peak Delivery Issue 1K 10K Connections High Performance/ Sure Delivery Disk I/O Bottlenecks Unable To Leverage Full Capability Components CPU Limited Solely By CPU Capacity 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
13 Cisco IronPort Security Appliance INBOUND SECURITY Spam Defense Virus Defense MAIL TRANSFER AGENT OUTBOUND CONTROL CISCO IRONPORT ASYNCOS PLATFORM Data Loss Prevention Secure Messaging Management 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
14 SensorBase Reputation Filtering IronPort Anti-Spam Who? How? Verdict Where? What? Spam Blocked Before Entering Network > 99% Catch Rate < 1 in 1 million False Positives 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
15 Real Time Threat Prevention Known good is delivered Reputation Filtering IronPort Anti-Spam Suspicious is rate limited & spam filtered Incoming Mail Good, Bad, and Unknown Known bad is blocked Cisco s Internal Experience: Message Category % Messages Stopped by Reputation Filtering 93.1% 700,876,217 Stopped as Invalid recipients 0.3% 2,280,104 Spam Detected 2.5% 18,617,700 Virus Detected 0.3% 2,144,793 Stopped by Content Filter 0.6% 4,878,312 Total Threat Messages: 96.8% 728,797,126 Clean Messages 3.2% 24,102,874 Total Attempted Messages: 752,900, Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
16 Cisco IronPort Security Appliance INBOUND SECURITY Spam Defense Virus Defense MAIL TRANSFER AGENT OUTBOUND CONTROL CISCO IRONPORT ASYNCOS PLATFORM Data Loss Prevention Secure Messaging Management 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
17 The First Line of Defense Early Protection with IronPort Virus Outbreak Filters 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
18 Outbreak Filtering in Action Cisco SIO Verdict: Suspect IP / URL Action: Send to Cloud Verdict: Malicious Content Action: STOP 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
19 Zero Hour Malware Prevention and AV Scanning Virus Outbreak Filters Anti-Virus T = 0 -zip (exe) files T = 5 mins -zip (exe) files -Size 50 to 55 KB T = 15 mins -zip (exe) files -Size 50 to 55KB - Price in the filename An analysis over one year: Average lead time over 13 hours Outbreaks blocked 291 outbreaks Total incremental protection. over 157 days 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
20 Cisco IronPort Security Appliance INBOUND SECURITY Spam Defense Virus Defense MAIL TRANSFER AGENT OUTBOUND CONTROL CISCO IRONPORT ASYNCOS PLATFORM Data Loss Prevention Secure Messaging Management 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
21 Top Risk: Employees Biggest Impact: Customer Data 10% 12% 5% 4% 7% Information marked Confidential Top Data Loss Types 4% 8% 4% Personal client information 44% Personnel Information 21% Intellectual Property 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
22 Comprehensive, Accurate, Easy Comprehensive 100+ Pre-defined templates Regulatory compliance Easy One-click activation Policy enable/disable Accurate Multiple parameters Key words, proximity, etc Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
23 Comprehensive, Accurate, Easy Comprehensive 100+ Pre-defined templates Regulatory compliance Easy One-click activation Policy enable/disable Accurate Multiple parameters Key words, proximity, etc Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
24 Ranked as Leader in Gartner Magic Quadrant Focus on accuracy: large research team staffed specifically to write and refine content polices RSA has strong described content capabilities enabled by a formal knowledge-engineering process - Gartner 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
25 Reports by severity and policy Real time and scheduled reports available 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
26 Instant Deployment, Zero Management Cost Message pushed to recipient User opens secured message in browser Gateway encrypts message Key is stored User authenticates and receives message key Cisco Registered Envelope Service Decrypted message is displayed Automated key management No desktop software requirements No new hardware required 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Cisco
27 Confidential Contents No Forwarding Allowed without Permission Guaranteed Recall Guaranteed Read Receipts Message Expiry 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Cisco
28 Anti-Spam SensorBase Reputation Filtering IronPort Anti-Spam RSA DLP 100+ predefined DLP policies Accurate Easy to Implement Inbound Security Cisco IronPort Security Solution Outbound Control Anti-Virus Virus Outbreak Filters (VOF) McAfee Anti-Virus Sophos Anti-Virus Encryption Secure Message Delivery Transport Layer Security Protect Employees From Identity Stealing Malware and Phishing Protect Company From Identity Data Leaks 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
29 Cisco IronPort Security Appliance INBOUND SECURITY Spam Defense Virus Defense MAIL TRANSFER AGENT OUTBOUND CONTROL CISCO IRONPORT ASYNCOS PLATFORM Data Loss Prevention Secure Messaging Management 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
30 Single view of policies for the entire organization Allow all media files Quarantine executables Mark and Deliver Spam Delete Executables Archive all mail Virus Outbreak Filters disabled for.doc files IT SALES LEGAL with Delegated Administration Global Administrator Operator Read-Only Helpdesk.. PCI Auditor PCI Supervisor 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Cisco
31 Unified Business Reporting Consolidated Reports Single view across the organization Real Time insight into traffic and security threats Actionable drill down reports Multiple data points Volumes Spam Counters Policy Violations Virus Reports Outgoing Data Reputation Service System Health View 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
32 Appliances Hosted Hybrid Hosted Managed Award-Winning Technology Dedicated SaaS Infrastructure Best of Both Worlds Fully Managed on Premises Backed by Service Level Agreements 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
33 Cisco IronPort Web Security 2010 Cisco and/or its affiliates. All rights reserved. Ciscc 33
34 Acceptable Use Control Malware Protection Data Loss Prevention SaaS Access Control Policy 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
35 Industry Leading Secure Web Gateway Security Malware Protection Secure Mobility Internet Control Data Security Acceptable Use Controls SaaS Access Controls Centralized Management and Reporting 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
36 80% of the web is uncategorized, highly dynamic or unreachable by web crawlers Botnets Dynamic content Password protected sites User generated content Short life sites Danger Malware Protection Data Security Danger Acceptable Use Controls The Known Web 20% covered by URL lists SaaS Access Controls 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
37 URL Lookup in Database URL Database Uncategorized URL Keyword Analysis Gambling Industry-leading URL database efficacy 65 categories Updated every 5 minutes Real-time Dynamic Content Analysis Uncategorized Gambling Dynamic Content Analysis Engine Dynamic categorization identifies more than 90% of Dark Web content in commonly blocked categories Analyze Site Content Gambling 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
38 Industry Leading Secure Web Gateway Security Malware Protection Secure Mobility Internet Control Data Security Acceptable Use Controls SaaS Access Controls Centralized Management and Reporting 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
39 237% volume increase in 09 Over 70% of compromised web sites are legitimate Vulnerabilities in Adobe PDF emerged as the main target, followed by Flash 54% of malware encounters due to iframes and exploits Cross-Site Scripting and SQL Injection are top attack methods 83% of websites have at least 1 serious vulnerability 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
40 BoingBoing.net: A Popular Blog URLs in browser: 1 HTTP Gets: 162 Images: 66 from 18 domains including 5 separate 1x1 pixel invisible tracking images Scripts: 87 from 7 domains Cookies: 118 from 15 domains 8 Flash objects from 4 domains 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
41 BoingBoing.net: A Popular Blog 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
42 Predictive, Zero-day Protection Cisco Network and Content Security Deployments Threat Telemetry Threat Telemetry Cisco Security Intelligence Operations Outbreak Intelligence Cisco SensorBase Threat Operations Center Advanced Algorithms External Feeds Identifying Malware Lurking in the Dark Web Web Reputation Scores -10 to Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Cisco
43 New York Times: Victim of an Advertiser Attack! Seemingly legitimate ad turned malicious causing 3 redirects Ultimate destination: protection-check07.com Cisco Web Rep Score: -9.3 Default Action: BLOCK NYT site allowed but malicious redirect blocked Drive By Scareware Full-screen pop-up simulates real AV software, asks user to buy full version to clean machine Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
44 Dynamic Vectoring and Streaming Signature and Heuristic Analysis Heuristics Detection Identify unusual behaviors DVS Engine Signature Inspection Identify known behaviors Parallel Scans, Stream Scanning Wide coverage with multiple signature scanning engines Identify encrypted malicious traffic by decrypting and scanning SSL traffic Seamless user experience with parallel scanning Latest coverage with automated updates 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
45 Layer 4 Traffic Monitor Users Packet and Header Inspection Network Layer Analysis Internet Cisco IronPort S-Series Preventing Phone-Home Traffic Scans all traffic, all ports, all protocols Detects malware bypassing Port 80 Prevents Botnet traffic Powerful Anti-Malware Data Automatically updated rules Real-time rule generation using, Dynamic Discovery Also available on the ASA as Botnet Traffic Filter 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
46 Industry Leading Secure Web Gateway Security Malware Defense Secure Mobility Internet Control Data Security Acceptable Use Controls SaaS Access Controls Centralized Management and Reporting 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
47 On-Box Common Sense Security Partner site Documents Log Allow Block Internet Webmail Allow, block, log based on file metadata, URL category, user and web reputation Multi-protocol: HTTP(s), FTP, HTTP tunneled Off-Box Advanced Data Security Documents DLP Vendor Box Log Allow Block Internet Deep content inspection: Structured and unstructured data matching Performance optimized: Works in tandem with accelerated on-box policies 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
48 Industry Leading Secure Web Gateway Security Malware Defense Secure Mobility Internet Control Data Security Acceptable Use Controls SaaS Access Controls Centralized Management and Reporting 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
49 Identity Application Job Sites Human Resource Instant Message No File Transfer Time Facebook Lunch hour Location Streaming Media 100 kbps/user P2P All Object Priority 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
50 Access Control Policy Instant Messaging Facebook: Limited Apps Video: 512 kbps max Employee in Finance Access Control Violation File Transfer over IM Facebook Chat, P2P Granular control over HTTP, HTTP(s), FTP applications Dynamic signature updates maintained by Cisco SIO Granular Control over Application Usage 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
51 Allow/Block thousands of Facebook Apps Allow/Block features like Chat, Messaging, Video & audio bandwidth Block Malware like Farm Town app ad that redirects users to fake antivirus software 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 Cisco
52 Industry Leading Secure Web Gateway Security Malware Defense Secure Mobility Internet Control Data Security Acceptable Use Controls SaaS Access Controls Centralized Management and Reporting 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
53 Regaining Visibility and Control Through Identity Corporate Office Login SaaS Single Sign On Branch Office Home Office SaaS Single Sign On AnyConnect Secure Mobility Client User Directory No Direct Access X Visibility Centralized Enforcement Single Source Revocation 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
54 Industry Leading Secure Web Gateway Security Malware Defense Secure Mobility Internet Control Data Security Acceptable Use Controls SaaS Access Controls Centralized Management and Reporting 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
55 Security Management Appliance Centralized Management On-Box Centralized Reporting and Tracking Centralized Policy Management Delegated Administration In-Depth Threat Visibility Extensive Forensic Capabilities Insight Across Threats, Data and Applications Control Consistent Policy Across Offices and for Remote Users Visibility Visibility Across Different Devices, Services, and Network Layers 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
56 Multi-Core Optimization Integrated Identity and Authentication NTLM/ Active Directory LDAP Secure LDAP Addresses latency issues associated with anti-virus scanning Enables multi-scan features for improved security efficacy Optimized for rich web content Identity Based Policies Transparent, single sign-on (SSO) authentication against Active Directory Guest Policies, Re-Auth 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
57 Customers Pioneer in SaaS Web Security Over 34% market share in SaaS Web Security (IDC) Multi-award winning product portfolio Millions of users Billions of Web requests scanned every day 100% Availability Awards Partners 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
58 With AnyConnect 3.0 Internet Traffic VPN Internal Traffic (optional) AnyConnect Secure Mobility 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
59 Branch/Retail or Home Office RADIUS/ LDAP Corporate Office Internet ISR G2 with ScanSafe Connector SW Approved Content Blocked Blocked URLs Files Blocked Content 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Cisco
60 Thank you.
Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
More information聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置
More informationA Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
More informationOn and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
More informationEmail Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
More informationSimple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
More informationCyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
More informationThreat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
More informationCisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security
White Paper Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security Introduction Organizations that want to harness the power of the web must deal with
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationCisco IronPort X1070 Email Security System
Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationIntroducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
More informationCisco IronPort C670 for Large Enterprises and ISPs
Data Sheet Cisco IronPort C670 for Large Enterprises and ISPs As the battle to protect the corporate email perimeter continues, two trends emerge: higher mail volumes and more resource-intensive scanning.
More informationCisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
More informationIT Sicherheit im Web 2.0 Zeitalter
IT Sicherheit im Web 2.0 Zeitalter Dirk Beste Consulting System Engineer 1 IT Sicherheit im Web 2.0 Zeitalter Cisco SIO und Global Threat Correlation Nach dem Webinar sollte der Zuhörer in der Lage sein:
More informationProtecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
More informationStop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
More informationCisco Cloud Web Security
Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that
More informationHow To Protect Your Network From A Web Based Attack
I r o n P o r t A p p l i a n c e s P O W E R F U L M A LWA R E P R O T E C T I O N E N A B L E S T H E I N D U S T RY S M O S T C O M P R E H E N S I V E P E R I M E T E R D E F E N S E IronPort S-Series
More informationISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones
ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones Web Security Deployment Options 1 1 The threat landscape 2 Why Symantec web security 3 Generic
More informationThe Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationK7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
More informationHuawei Eudemon200E-N Next-Generation Firewall
Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT
More informationWEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
More informationContent-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
More informationWeb Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited
The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers
More informationENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
More informationCopyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
More informationSystem Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
More informationCisco Cloud Email Security Interoperability with Microsoft Office 365
White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources
More informationSESA Securing Email with Cisco Email Security Appliance Parts 1 and 2
Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)
More informationIBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
More informationNetwork protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
More informationCisco ISR Web Security with Cisco ScanSafe
Data Sheet Cisco ISR Web Security with Cisco ScanSafe Cisco Enterprise Branch Web Security The Cisco Integrated Services Router G2 (ISR G2) Family delivers numerous security services, including firewall,
More informationMailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
More informationZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE
The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances
More informationREVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
More informationV1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
More informationHow To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware
DATA SHEET ZSCALER WEB SECURITY CLOUD FOR SMALL BUSINESS OVERVIEW In today s competitive world, Small and Medium Businesses (SMB) are focusing their discretionary resources on growing revenue and increasing
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More information11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER
11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for
More informationWeb Security Gateway Anywhere
Web Security Gateway Anywhere The Web Security Challenge Web Technology Trends Dynamic, interactive Web 2.0 technologies have transformed the Web into a core business application platform Customer relationship
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationCisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
More informationWEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
More informationSymantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
More informationUSG6600 Next-Generation Firewall
USG6600 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
More informationITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
More informationUSG6300 Next-Generation Firewall
USG6300 Next-Generation Firewall With the proliferation of smart devices, such as smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of enterprise operation. The
More information74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
More informationHow To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationHow Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail
How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.
More informationContent-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
More informationCisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
More informationWEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer info@fvc.com www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
More informationUsing Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education
White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets
More informationWebsense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
More informationLooking Ahead The Path to Moving Security into the Cloud
Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application
More informationThe Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationWeb Security Gateway Solutions
Web Security Gateway Solutions Websense Web Security Gateway Solutions 90 percent of the top 100 Web sites are classified as social networking or search and more than 47 percent of these sites support
More informationComprehensive real-time protection against Advanced Threats and data theft
TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient
More informationCybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com About Palo Alto Networks We are the network security company World-class
More informationSafeNet Content Security Product Overview. Protecting the Network Edge
SafeNet Content Security Product Overview Protecting the Network Edge From idea to action, SafeNet smartly protects information as it moves through its lifecycle. With data encryption and control solutions,
More informationThe Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc.
The Latest Internet Threats to Affect Your Organisation Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc. Agenda Spam Trends Staying Ahead Blended Threats Spam Trends What Do Dick Cheney & Bill
More informationCybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
More informationGateway Security at Stateful Inspection/Application Proxy
Gateway Security at Stateful Inspection/Application Proxy Michael Lai Sales Engineer - Secure Computing Corporation MBA, MSc, BEng(Hons), CISSP, CISA, BS7799 Lead Auditor (BSI) Agenda Who is Secure Computing
More informationBuyers Guide to Web Protection
Buyers Guide to Web Protection The web is the number one source for malware distribution today. While many organizations have replaced first-generation URL filters with secure web gateways, even these
More informationSymantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
More informationStallioni Sügisseminar
Stallioni Sügisseminar Juha Poutanen, Territory Manager Websense How to open Internet to your employees safely - managing risks of modern Internet web security data security web security email security
More informationReviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
More informationHow To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)
Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.
More informationeprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
More informationSymantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationINCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
More informationSafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.
SafeNet Content Security esafe SmartSuite - Security that Thinks Real-time, Smart and Simple Web and Mail Security Solutions Product Overview Malware CONTENT SECURITY Antivirus Malware A secure Web gateway
More informationTechnology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationImproving Business Outcomes: Plug in to Security As A Service Adrian Covich
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich Principal Systems Engineer, Symantec.cloud 1 Who We Are 2 Security Challenges in Education 3 Security As A Service Email, Web,
More informationContent Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
More informationNetwork Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
More informationZscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
More informationWHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
More informationApplications erode the secure network How can malware be stopped?
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
More informationProtect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect
Protect your internal users on the Internet with Secure Web Gateway Richard Bible EMEA Security Solution Architect Identity and Access Management (IAM) Solution Authentication, Authorization, and SSO to
More informationTrend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
More informationMove over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
More informationAdvantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
More informationAVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
More information全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate
More informationIronPort C300 for Medium-Sized Enterprises and Satellite Offices
I r o n P o r t A p p l i a n c e s H I G H - P E R F O R M A N C E E M A I L S E C U R I T Y. C A R R I E R - P R O V E N T E C H N O L O G Y. E N T E R P R I S E - C L A S S M A N A G E M E N T. IronPort
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationSymantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
More informationSymantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
More information:: Protecting your infrastructure ::
:: Protecting your infrastructure :: Who we are? AGEN DA Unified Threat Management Malware detection platform Q & A? About Us InfoSys Gateway Sdn. Bhd. (797304-H) Incorporated in 2007 Bumiputra owned Company
More informationIBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
More information