Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

Size: px
Start display at page:

Download "Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1"

Transcription

1 Reviewer s Guide PureMessage for Windows/Exchange Product tour 1

2 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one of the Sophos Security and Data Protection solutions. The guide provides IT administrators with an overview of the product s key features, takes a closer look at the way it enforces corporate policy and explains its comprehensive reporting functions. Like all our solutions, PureMessage for Lotus Domino is the product of more than 20 years experience protecting business, education, and government organizations. It delivers integrated protection for your gateway and Domino servers against all -borne spam and malware threats. It allows you to control the information your organization sends and receives, provides protection against the loss of confidential data and guards against the inappropriate use of your system. Sophos solutions are built around simplicity and manageability, and are acclaimed for delivering proactive protection from increasingly complex and fast-spreading security threats. All our licenses include comprehensive 24-hour support from our worldwide network of support experts every day of the year, at no additional cost. PureMessage for Lotus Domino is also backed up by SophosLabs our global network of threat analysis centers which provides a rapid response to emerging and evolving threats. For information on pricing and how to buy PureMessage for Lotus Domino, please contact your local Sophos representative. To find out who to contact in your area, please visit: If you would like to request an evaluation, please go to: 2

3 CONTENTS CONTENTS 1 A BRIEF OVERVIEW 4 Award-winning technology 4 Deployment and management 5 2 CORPORATE POLICY ENFORCEMENT 6 Simplified policy setting and enforcement 6 Powerful anti-malware scanning 8 Industry-leading spam protection 8 Content filtering 9 Disclaimers 10 Quarantine management 10 3 COMPREHENSIVE LOGS AND STATISTICS 12 Graphs 13 APPENDICES I Sophos products for the enterprise 14 II Other Sophos products and services 15 III System requirements 17 3

4 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO 1: A BRIEF OVERVIEW PureMessage for Lotus Domino stops spam and malware from entering your infrastructure and Domino 8 servers. It delivers cost-effective and proactive protection against known and unknown threats, while its advanced attachment and content filtering technology prevents data leakage and helps you enforce acceptable use policies. Default anti-virus and anti-spam policies get you up and running as quickly as possible, and you can easily write customized policies to suit your exact needs. All policies can be assigned to individual users or groups, giving you complete control over usage. Simple security Default and customized policies and full scanning of s and their attachments protect your Domino servers from spam, malware and data loss. Sophos Firewall Lotus Domino server protected by PureMessage Internet Infected Notification sent Figure 1: Inbound, outbound and internal mail is scanned for multiple threats Award-winning technology PureMessage scans and attachments as they enter and leave your network and within your Domino server (Figure 1). It detects viruses, Trojans, worms, spyware, spam and sensitive information, protecting the integrity of your infrastructure and your information. Sophos Genotype Technology recognizes entire spam and virus families and protects you against threats before they happen, blocking malware and over 99.9 percent of spam. Further protection is delivered through obfuscation detection, URL tracking, heuristics, and content fingerprinting, while SXL (Sophos extensible Lists) provides real-time spam intelligence to catch all evolving threats. PureMessage for Lotus Domino is also updated by SophosLabs throughout the day with the very latest pre-packaged anti-spam and anti-virus intelligence. 4

5 A BRIEF OVERVIEW PureMessage for Lotus Domino benefits Unrivaled detection of spam and malware Proactive protection High accuracy Data loss prevention Regulatory compliance Global protection Automatic updating End-user controls Comprehensive support Detects over 99.9 percent of spam and protects against scams, including phishing attacks. Detects, disinfects, deletes or quarantines viruses, Trojans, worms, and malicious spyware in incoming and outgoing . Employs Genotype, Behavioral Genotype, and Sender Genotype technology to catch evolving threats and dangerous applications. Automatically balances a range of spam detection techniques to deliver consistent accuracy, minimizing false positives. Provides powerful message and attachment content scanning controls to protect against confidential information leakage. Incorporates a rich policy environment to support complex security or regulatory compliance requirements. Protects global organizations from spam and viruses in multiple language message streams, including those that use double-byte characters. Updates automatically with the latest protection from SophosLabs a global network of threat analysis centers. Provides end-user quarantine review, allow lists, and block lists. Includes unlimited 24-hour telephone, , and online support, 365 days a year. Full visibility A Domino-based console allows you to manage the quarantine, trace messages and see all traffic and threat activity. Deployment and management A Domino-based console gives you centralized administration across multiple servers, providing automated quarantine management, message tracing, and reporting on traffic and threat activity. You can install PureMessage on standalone and replicated servers and can integrate users and groups with the Notes Address Book (NAB). Two versions PureMessage for Lotus Domino is available in two versions with separate pricing structures: Anti-virus only Integrated anti-virus, anti-spam and content filtering. 5

6 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO 2: CORPORATE POLICY ENFORCEMENT Simplified policy setting and enforcement PureMessage for Lotus Domino allows you to centrally configure and consistently enforce your corporate policies. This helps you to control your organization s flow of information and prevent the accidental or malicious loss of data, or the distribution of inappropriate material. Flexible policies You can customize policies so that incoming, outbound and internal mail are treated differently. An policy that is correctly configured will play a major role in defending against attacks against your network, which is why PureMessage for Lotus Domino comes equipped with a number of pre-installed default policies that are based on our in-depth knowledge of anti-virus and anti-spam enforcement. s and their attachments are scanned for viruses, spam, inappropriate content, keywords and other sensitive information (Figure 2). If an is identified as being suspicious it is either blocked or quarantined. It can also be cleared and then delivered. You can re-write the default policies or create your own to suit your individual requirements and set exemptions for individuals or groups. traffic PureMessage anti-virus scan Clean viruses? Approved sender? Quarantine PureMessage anti-spam scan Is spam? PureMessage content scan Block content? Mail delivered Recipient mailbox PureMessage store scan Figure 2: s are scanned a number of times before they are passed as clean PureMessage for Lotus Domino also allows you to configure your policies to cover direction, making it possible to set one policy for inbound , another for internal and a third for outbound . 6

7 CORPORATE POLICY ENFORCEMENT Policies can be written to detect certain words or phrases within the main content of an or its subject line and can cover attachments, including all common programs. Policies for and store scanning (Figure 3) are independent of each other, giving you a flexibility as to how you manage them. Each policy is defined by a set of jobs, and unlimited numbers of jobs can be configured and prioritized. Default sample jobs facilitate quick organization-wide deployment. Intelligent scanning Policies can detect certain words or phrases within messages and attachments including all common programs. Figure 3: Policies that scan and stores are defined by a set number of jobs which can be customized to suit your needs Each individual job also has a number of aspects that can be configured to suit your requirements, including rules for what types of message the job should apply to, and the kind of information to be scanned for (Figure 4). Figure 4: Each job can be configured in a number of ways 7

8 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO Depending on the job, other attributes can also be configured. For example, you can configure specific parts of a message to scan, which thresholds to use, whether messages should be blocked and/or quarantined, or any notifications that should be generated. Powerful anti-malware scanning PureMessage for Lotus Domino incorporates our malware detection engine which scans all s entering and leaving a Domino server, and those within the Domino message stores. It provides protection against blended threats such as those that combine virus, spam and DoS (denial of service) attacks. PureMessage also supports background scanning which can be set to run continuously or at regular intervals. Industry-leading spam protection Full threat protection PureMessage for Lotus Domino protects against blended threats such as those that combine virus, spam and denial of service attacks. Spam accounts for 97 percent of all business . To combat this, PureMessage for Lotus Domino filters suspicious in hundreds of different ways, one example being a test that looks for the billions of different spellings of the word Viagra. Figure 5: A score system determines if an is treated as spam From the initial scan the solution determines a message s risk level through a scoring system. In the example shown (Figure 5), any with a rating of 80 is categorized as having a high spam rating, while messages scored at 50 are considered a medium risk. You can determine whether the message should be quarantined, discarded or delivered. 8

9 CORPORATE POLICY ENFORCEMENT Malicious hyperlinks Spammers can snare unwary users by placing a malicious hyperlink in an and encouraging them to click on it. PureMessage for Lotus Domino deals with this through spammer asset tracking, and does so by: Evaluating URLs contained in an and blocking those messages that contain links to a known spammer s web assets Filtering URLs and blocking any messages that link to hijacked, freeweb and other suspect websites Checking against the Sophos IP Block List for known spam servers, open proxies and hijacked systems. Content filtering Reputation scanning PureMessage for Lotus Domino runs a reputation check on the server IP address of every it scans. Through its advanced content filtering, which scans attachment and message content, PureMessage for Lotus Domino helps you control the data leaving your organization. The solution s content filters protect your data in a number of ways: Attachment type PureMessage for Lotus Domino can be configured to block certain applications, such as executables, that are considered a security risk or a threat to staff productivity, such as MP3s. The body of an attachment, subject lines and message text can all be scanned. Phrase/regular expression This policy looks for full and partial phrases and regular expressions that you deem unacceptable or a security risk. PureMessage for Lotus Domino comes with a number of out-of-the box dictionaries (Figure 6), which include common confidential terms and offensive language. Dictionaries can also be customized. Figure 6: This dictionary lists the keywords and other confidential information that should be blocked 9

10 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO PureMessage for Lotus Domino can analyze content within common document types, such as Word and Excel, to see if they contains certain words or phrases, for example Financial Report. You can define phrase lists and can include wildcards that match partial phrases. Regular expressions can be added to the policy and provide a powerful way to match specific number or code formats, such as credit cards or other personally identifiable information. Once the content policy has been defined, an action and any exceptions, can be applied when an is captured. Common actions are: Delete Log only Replace with text Quarantine Quarantine and deliver Adding unique text You can add copy to all outbound messages and tailor it to suit specific audiences and senders. The last option allows you to quarantine a blind copy of an , which is particularly useful for monitoring sensitive data contained within outbound s. True file type detection True file type detection ensures that executable files in attachments are not disguised as innocent files, such as jpegs or word processing documents. Disclaimers The disclaimers option allows you to add unique text to all outbound messages and can be configured for specific groups or individual users. Uses could include promotional text being added to s sent from the sales team or helpdesk information from those coming from the IT department. You can also set exceptions so that, for instance, messages coming from a sales or IT director contain information more applicable for their audiences. Quarantine management You can configure policy so that any message identified as infected with malware, spam or as containing inappropriate content is placed into the central quarantine (Figure 7). This gives you a secure area to review the message and perform a number of actions, such as: Forwarding a copy to your inbox Releasing the to its intended recipient(s) Deleting the from the quarantine Disinfecting the Deleting any viral attachment Adding the sender to the global allow or block lists. 10

11 CORPORATE POLICY ENFORCEMENT Saving you time You can allow users to manage their own spam, which keeps IT resources focused on core responsibilities. Figure 7: The quarantine gives you an area where you can safely deal with any messages that are considered a threat. You can also dig down into individual messages to view their specific details, including the job that caused it to be quarantined (Figure 8). In this example the job was catching spam by keyword. Figure 8: Details of individual messages can be accessed to see why they have been flagged as suspicious and placed into the quarantine You can grant end users access to quarantined spam through a web interface and ask them to respond to any immediate concerns about a specific . They can request that a quarantined message be released, or that the sender be added to the allow/block list. Allowing staff to manage their own spam not only ensures that all incoming is correctly identified, but it will help you keep your IT resources focused on core responsibilities. However, please remember that great care should be taken when looking at any message that might contain malware. 11

12 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO 3: COMPREHENSIVE LOGS AND STATISTICS PureMessage for Lotus Domino provides you with extensive reporting, graphs and logging options that are designed to help you analyze your message traffic, quarantines and filter options. You can create customized reports that detail all aspects of your network, such as showing trends in throughput, policy rule hit rates, and any issues that require remedial action. This data can then be exported for further analysis or be included in other office programs such as word processing documents and spreadsheets for management reports. In-depth analysis All threat data captured by PureMessage for Lotus Domino can be exported for later analysis and presentation. Reports can be defined and customized using advanced filters that include: General report formats Output format Report period Server direction. Figure 9: Customized reports can be generated and can be exported to common word processing and spreadsheet packages. 12

13 COMPREHENSIVE LOGS AND STATISTICS Graphs PureMessage for Lotus Domino also provides a number of standard report graphs that include: Quarantines by category Number of messages quarantined Traffic reports Message by trends. Standard reporting Extensive reporting options can analyze and present data quickly and efficiently. 13

14 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO APPENDIX I: SOPHOS PRODUCTS FOR THE ENTERPRISE Sophos Security and Data Protection Sophos Security and Data Protection provides integrated threat management across the entire organization. In addition to Security and Data Protection it includes: Sophos Endpoint Security and Data Protection protects networks from malware and controls unauthorized applications, with centralized management through Sophos Enterprise Console. A single client detects viruses, spyware, adware, suspicious files, suspicious behavior and controlled applications such as VoIP and games and, in combination with a client firewall, stops zero-day threats and prevents intrusion by hackers. Our endpoint protection also comes with integrated network access control. Sophos Web Security and Control is based on a fully-integrated web appliance that protects against the full range of web threats. It provides a complete infrastructure for secure browsing and eliminates the complexity of administering effective web security. Sophos NAC Advanced controls access to the network for guest, unmanaged and unauthorized computers, identifying and isolating non-compliant computers based on a centrally defined, policy-driven assessment. Safeguard Enterprise Encryption from Utimaco is now available from Sophos since the encryption specialist became part of the Sophos group. The solution complements Sophos endpoint, gateway, and network access control solutions and prevents data access, loss or theft with centrally managed full disk encryption for laptops, desktops and removable storage devices. It can also detect and block use of removable storage devices, optical media drives and wireless networking protocols. 14

15 APPENDIX II: OTHER SOPHOS PRODUCTS AND SERVICES APPENDIX II SAV Interface SAV Interface enables software vendors, OEMs, ISPs, and ASPs to integrate Sophos malware detection into their own firewalls, gateways, and solutions, and is included in Security and Data Protection and Web Security and Control licenses. Sophos Small Business Solutions Sophos small business solutions provide award-winning virus, spyware, and spam protection to enterprises with little or no IT expertise. Sophos Professional Services Sophos Professional Services provide businesses with the skills to implement and maintain complete endpoint and gateway security. We have worked with some of the most recognized organizations in the world, meeting their specific requirements and assuring rapid, optimal deployment of Sophos products. Our expertise is delivered through standard or customized packages, provided onsite or remotely, to ensure the maximum return on your investment. Sophos Alert Services Sophos ZombieAlert Service provides you with immediate warning if spammers have hijacked any of your organization s computers to send spam or launch denial-of-service attacks. Sophos PhishAlert Service provides fast, near real-time alerts of phishing campaigns, so that you can take steps to shut down the imitation website and protect your organization s customers. Sophos WebAlert Service provides your organization with an automatic warning if any of your webpages are infected by malware. For more information on Sophos Alert Services, visit:

16 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO Industry-leading, 24/7 support Our round-the-clock technical customer support operation is included in your license, giving you unlimited access to our highly-acclaimed customer support team. You can contact our engineers for one-to-one support by or telephone, or use our web-based support knowledgebase. Working from support centers around the world, our experts draw on a wealth of experience and technology to replicate, analyze, and resolve your problems fast. Our technical support operates from centers in Australia, Canada, France, Germany, Japan, Italy, Singapore, UK and USA. Whichever center handles your problem, you can be assured of the highest level of expertise, professionalism and customer service. For more details, visit 16

17 APPENDIX III: PUREMESSAGE FOR LOTUS DOMINO SYSTEM REQUIREMENTS APPENDIX III server* Lotus Domino server R7, R8.0x, and R8.5 (32-bit/64-bit) Operating system Windows 2000 Server Windows Server 2003 (32-bit/64-bit) Windows Server 2008 (32-bit/64-bit) *Lotus Domino server R6 is supported by PureMessage for Notes/Domino v3 17

18 Boston, USA Oxford, UK Copyright Sophos Plc. All rights reserved. All trademarks are the property of their respective owners. rg/090813

How To Use Puremessage For Microsoft Exchange

How To Use Puremessage For Microsoft Exchange Reviewer s Guide PureMessage for Windows/Exchange Product tour REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR MICROSOFT EXCHANGE WELCOME WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Microsoft

More information

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions. PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Top five strategies for combating modern threats Is anti-virus dead?

Top five strategies for combating modern threats Is anti-virus dead? Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.

More information

Spyware: Securing gateway and endpoint against data theft

Spyware: Securing gateway and endpoint against data theft Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation

More information

Stopping zombies, botnets and other email- and web-borne threats

Stopping zombies, botnets and other email- and web-borne threats Stopping zombies, botnets and other email- and web-borne threats Hijacked computers, or zombies, hide inside networks where they send spam, steal company secrets, and enable other serious crimes. This

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

PureMessage for UNIX Reviewer's guide. PureMessage for Windows/Exchange Product tour

PureMessage for UNIX Reviewer's guide. PureMessage for Windows/Exchange Product tour PureMessage for UNIX Reviewer's guide PureMessage for Windows/Exchange Product tour SOPHOS PUREMESSAGE Sophos is the world leader in integrated threat management solutions purpose-built for business, education

More information

Top Four Considerations for Securing Microsoft SharePoint

Top Four Considerations for Securing Microsoft SharePoint Top Four Considerations for Securing by Chris McCormack, Product Marketing Manager, Sophos is now the standard for internal and external collaboration and content management in much the same way Microsoft

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Reviewer s Guide. Models: ES1000, ES5000 and ES8000. PureMessage for Windows/Exchange Product tour

Reviewer s Guide. Models: ES1000, ES5000 and ES8000. PureMessage for Windows/Exchange Product tour Reviewer s Guide Models: ES1000, ES5000 and ES8000 PureMessage for Windows/Exchange Product tour welcome WELCOME Welcome to the reviewer s guide for Sophos Email Appliances. The guide is structured to

More information

brilliantly simple security and control

brilliantly simple security and control brilliantly simple security and control Trusted by 100 million users and endorsed by industry analysts as a real alternative to Symantec and McAfee, we provide the best defense against today s blended

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features

IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features Security capabilities To support your business objectives IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features Give users complete

More information

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control Endpoint web control overview guide Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control Document date: December 2011 Contents 1 Endpoint web control...3 2 Enterprise Console

More information

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the

More information

A progressive and integrated approach to protecting corporate networks

A progressive and integrated approach to protecting corporate networks A progressive and integrated approach to protecting corporate networks Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile

More information

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

Assessing endpoint security solutions: why detection rates aren t enough

Assessing endpoint security solutions: why detection rates aren t enough Assessing endpoint security solutions: why detection rates aren t enough Evaluating the performance of competing endpoint security products is a time-consuming and daunting task. Enterprise decision-makers

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus

More information

Security and control: The smarter approach to malware and compliance

Security and control: The smarter approach to malware and compliance Security and control: The smarter approach to malware and compliance The continuing evolution of malware threats combined with the demand for increasingly flexible working practices is a significant challenge

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

World-class security solutions for your business. Business Products. C a t a l o g u e

World-class security solutions for your business. Business Products. C a t a l o g u e World-class security solutions for your business Business Products C a t a l o g u e About Kaspersky Lab Kaspersky Lab is the largest developer of secure content management systems in Europe and is among

More information

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control

More information

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education

Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets

More information

Protect Your Enterprise With the Leader in Secure Email Boundary Services

Protect Your Enterprise With the Leader in Secure Email Boundary Services Postini Perimeter Manager Enterprise Edition Protect Your Enterprise With the Leader in Email Boundary Services The Most Comprehensive, Flexible And Trusted Email Security Solution Perimeter Manager Enterprise

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Small business solutions. All-in-one security that s easy to set up and use ANTI-VIRUS ANTI-SPYWARE ANTI-ADWARE ANTI-SPAM CLIENT FIREWALL

Small business solutions. All-in-one security that s easy to set up and use ANTI-VIRUS ANTI-SPYWARE ANTI-ADWARE ANTI-SPAM CLIENT FIREWALL Small business solutions All-in-one security that s easy to set up and use ANTI-VIRUS ANTI-SPYWARE ANTI-ADWARE ANTI-SPAM CLIENT FIREWALL Take the pain out of securing your business» Ensure rapid protection

More information

Next Gen Firewall and UTM Buyers Guide

Next Gen Firewall and UTM Buyers Guide Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains

More information

PureMessage for Microsoft Exchange Help. Product version: 3.1

PureMessage for Microsoft Exchange Help. Product version: 3.1 PureMessage for Microsoft Exchange Help Product version: 3.1 Document date: June 2015 Contents 1 About PureMessage for Microsoft Exchange...4 2 Key concepts...5 2.1 Key concepts overview...5 2.2 Inbound,

More information

The Increasing Risks from Email

The Increasing Risks from Email The Increasing Risks from Email ABSTRACT With organisations now facing a growing number of security threats and an increasingly regulated and compliance driven business environment, ensuring security and

More information

Sophos Endpoint Security and Control Help. Product version: 11

Sophos Endpoint Security and Control Help. Product version: 11 Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About

More information

PureMessage for Microsoft Exchange startup guide. Product version: 3.1

PureMessage for Microsoft Exchange startup guide. Product version: 3.1 PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage to Exchange

More information

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even

More information

Windows Vista: Is it secure enough for business?

Windows Vista: Is it secure enough for business? Windows Vista: Is it secure enough for business? Five years after the release of Windows XP, Microsoft s primary stated goal with Windows Vista has been to reduce security vulnerabilities and overall susceptibility

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Cyber Security Solutions:

Cyber Security Solutions: ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Symantec Messaging Gateway powered by Brightmail

Symantec Messaging Gateway powered by Brightmail The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced

More information

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity

More information

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and

More information

PureMessage for Microsoft Exchange 2013 startup guide. Product version: 4.0

PureMessage for Microsoft Exchange 2013 startup guide. Product version: 4.0 PureMessage for Microsoft Exchange 2013 startup guide Product version: 4.0 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage

More information

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Laws, regulations and compliance: Top tips for keeping your data under your control

Laws, regulations and compliance: Top tips for keeping your data under your control Laws, regulations and compliance: Top tips for keeping your data under your control The challenge of complying with a growing number of frequently changing government, industry and internal regulations

More information

SurfControl EmailFilter for SMTP

SurfControl EmailFilter for SMTP ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SurfControl EmailFilter for SMTP JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS SurfControl EmailFilter for SMTP SurfControl,

More information

PureMessage for Microsoft Exchange startup guide

PureMessage for Microsoft Exchange startup guide PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: May 2010 Contents 1 About this guide...3 2 Planning your PureMessage deployment...4 3 Installing PureMessage...6 4 Starting

More information

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg. STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication

More information

BitDefender Client Security Workstation Security and Management

BitDefender Client Security Workstation Security and Management BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from

More information

Sophos Endpoint Security and Control Help

Sophos Endpoint Security and Control Help Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos

More information

BitDefender for Microsoft ISA Servers Standard Edition

BitDefender for Microsoft ISA Servers Standard Edition BitDefender for Microsoft ISA Servers Standard Edition Copyright 2006 SOFTWIN Edition 1. How Does It Work? As content entering or leaving your company must meet security policies, it is crucial to choose

More information

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in

More information

HOW TO PREVENT SPAM AND MALWARE IN MAIL MOST EFFECTIVELY Index 1. Battling the increase in malware 2 2. Addressing the surplus of spam 3 3. The mail server A critical vulnerability 4 3.1 Denial of Service

More information

Seven for 7: Best practices for implementing Windows 7

Seven for 7: Best practices for implementing Windows 7 Seven for 7: Best practices for implementing Windows 7 The early reports are in, and it s clear that Microsoft s Windows 7 is off to a fast start thanks in part to Microsoft s liberal Windows 7 beta program

More information

Powerful and reliable virus and spam protection for your GMS installation

Powerful and reliable virus and spam protection for your GMS installation Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise

More information

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Sophos Enterprise Console policy setup guide. Product version: 5.2

Sophos Enterprise Console policy setup guide. Product version: 5.2 Sophos Enterprise Console policy setup guide Product version: 5.2 Document date: September 2014 Contents 1 About this guide...4 2 General policy recommendations...5 3 Setting up an updating policy...6

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Learn More: Call us at 877.634.2728 www.megapath.com Executive Summary Protecting Your Network and

More information

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how

More information

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers

More information

Stop Spam. Save Time.

Stop Spam. Save Time. Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution

More information

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents

More information

Global Support Services

Global Support Services Global Support Services Supporting your investment in Sophos Technical Support has the highest priority within Sophos. Our comprehensive support service delivers the full range of benefits you would expect

More information

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information

Secure Computing s TrustedSource

Secure Computing s TrustedSource The industry s most acclaimed reputation system Proactive security based on global intelligence. Secure Computing s TrustedSource One of the most important characteristics of enterprise security is proactive

More information

Dealing with spam mail

Dealing with spam mail Vodafone Hosted Services Dealing with spam mail User guide Welcome. This guide will help you to set up anti-spam measures on your email accounts and domains. The main principle behind dealing with spam

More information

Websense Data Security Solutions

Websense Data Security Solutions Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

Endpoint Security More secure. Less complex. Less costs... More control.

Endpoint Security More secure. Less complex. Less costs... More control. Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap

More information

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper

When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level

More information

Symantec AntiVirus Enterprise Edition

Symantec AntiVirus Enterprise Edition Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management.

IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management. Overview IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management. The IronPort C-Series email security appliances provide advanced

More information

Advantages of Managed Security Services. Cloud services via MPLS networks for high security at low cost

Advantages of Managed Security Services. Cloud services via MPLS networks for high security at low cost Cloud services via MPLS networks for high security at low cost 2 Cloud services via MPLS networks for high security at low cost Executive Summary Protecting your Network and Information Assets Today s

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information