McAfee SaaS Protection
|
|
|
- Darcy Matthew Marsh
- 10 years ago
- Views:
Transcription
1 Solution Guide McAfee SaaS Protection Solution Guide
2 Table of Contents Overview 3 McAfee SaaS Protection The Best Defense 4 Multiple Layers of Filtering Technology 5 Additional Anti-Spam Tools 7 Virus and Worm Scanning 8 Fraud Protection 8 Content and Attachment Filtering 8 Attack Protection 9 Securing Your Critical Business Information 10 McAfee SaaS Encryption 10 Outbound Filtering 11 Secure Message Delivery 12 Convenient Administrative Tools 12 In-Depth Reporting Options 13 Sophisticated, Safe External Quarantine 13 McAfee SaaS Disaster Recovery Services 14 Technology Architecture 15 A Closer Look at McAfee Labs and McAfee Global Threat Intelligence 17 Intelligent Message Processing 18 McAfee SaaS Protection Service Packages 19 McAfee SaaS Service Suites 20 About McAfee, Inc. 21
3 Overview Simple. Efficient. Powerful. Invaluable. That s the way it should be. has transformed how we communicate with others at home, in the office, down the street, and around the globe and has become as integral to business communications as the phone and fax. Unfortunately, this revolutionary communications tool is under constant attack, with its delivery routes polluted each day by billions of unsolicited messages, ranging from the merely annoying to the truly dangerous. The cost to businesses worldwide in dealing with spam and malicious threats has reached billions of dollars annually. The McAfee SaaS Protection service brings its powerful defense solutions to market in response to the escalating risks that jeopardize business systems and networks. With its industry-leading network perimeter protection, the McAfee SaaS Protection service successfully blocks more than 99 percent of all threats 1 for its customers including service providers and their customers using a combination of proven spam filters powered by patented spam detection technology, fraud protection, leading anti-virus engines, content and attachment filtering, and sophisticated attack protection. The McAfee SaaS Protection service goes beyond traditional spam prevention with multilayered technology that is positioned between the Internet and the business network to identify, quarantine, block, and strip threats before they can infiltrate the organization. Overall, by using the McAfee SaaS Protection service to filter both inbound and outbound messages, businesses can enjoy the inherent benefits of communications and significantly reduce risk, save bandwidth, reduce storage costs, and minimize administrative costs. The service also enables business continuity and protects against information loss during server outages with our spooling service and McAfee SaaS Continuity. This overview reviews the technology and techniques that make the award-winning McAfee SaaS Protection service unique and effective: Ease of administration and use through its secure, web-based platform Infinitely scalable to grow along with your organization Inbound and outbound message filtering Patented, multilayered technology to block spam Three layers of virus and worm protection Sophisticated quarantine management to reduce time and risk Secure message delivery over transport layer security (TLS) (Optional) Policy-based, bidirectional encryption McAfee SaaS and Web Security services process billions of messages each month and proactively protect the critical messaging networks for organizations worldwide. In addition to our highly accurate threat protection technology, we combine human intelligence and experience with automated filtering technology, powered by McAfee Global Threat Intelligence, to ensure that our multiple filtering layers are updated instantly upon detecting new threats. 1 Miercom, Security Solutions, July 10, 2010, MX Logic (McAfee SaaS) spam detection rate of 99.90%. 3
4 McAfee SaaS Protection The Best Defense Is a Good Offense The McAfee SaaS Protection service is a comprehensive, perimeter-based solution that blocks more than 99 percent of threats, including spam, viruses, worms, and harmful content and attachments before they can enter and damage internal messaging networks. The multilayered, cost-effective solution offers rapid activation and is easy to configure and manage, helping to reduce IT-related costs and corporate liability while increasing employee productivity. Positioned between the Internet and the business network, the SaaS Protection service leverages the most effective technologies and techniques within more than 20 layers of filters to identify, quarantine, block, and strip threats. With nearly effortless configuration, your business can integrate the McAfee SaaS Protection service to begin reducing the risk, expenses, and wasted time associated with unwanted . Incorporate policy-setting and administration Using the control console, administrators can more easily fine-tune security policies. With this administration and reporting tool, businesses have the flexibility to establish protection policies, set domain-level rules, enable group policy filtering, and decide which type of should be allowed and which should be denied. Real-time, daily, weekly, and monthly reports also allow IT staff members to quickly analyze and track traffic and trends to improve overall performance and isolate issues before they become problems. Integrate protection outside of your network The McAfee SaaS Protection service is proven to be the most effective way to defend the entire enterprise system from unwanted and unsolicited using a precise combination of spam filtering, fraud protection, virus and worm blocking, content and attachment filtering, and attack protection. Reduce maintenance and additional hardware or software purchases Unlike appliances and software solutions that require integration, migration, and a significant amount of ongoing maintenance, our service is effortless and highly effective requiring no additional hardware or software or the constant diligence needed to apply and integrate updates, new patches and filters. Eliminate ongoing monitoring with McAfee Labs, protection As new threats are detected by McAfee Labs, new rules for blocking those threats are seamlessly integrated into our filtering layers to automatically protect our customers. Within our sophisticated streaming data environment, our technologists and our technology monitor the global state of for spam, viruses, worms and other threats 24 hours a day, seven days a week. Reduce IT-related costs Because the McAfee SaaS Protection service filters and blocks threats before they can enter the corporate network and then stores suspect messages in a safe, offsite queue, businesses can eliminate the risk and unnecessary costs associated with the additional storage and bandwidth required to deliver and store the unwanted along with the risks of server overload. Increase employee productivity and control With the McAfee SaaS Protection service blocking more than 99 percent of spam, employees no longer spend time sifting through junk to find legitimate messages. And, in the fight against false positives, our spam quarantine reports allow end users to take action on their own spam quarantine and determine how items captured by the filter should be handled in the future. Protect confidential business information The optional McAfee SaaS Encryption protects the organization from the loss of confidential data and helps to ensure compliance with privacy and security regulations. Furthermore, organizations can 4
5 limit the loss of critical, proprietary information with outbound filtering, which offers a range of data leak protection (DLP) capabilities. Safeguard your reputation Outbound filtering helps businesses safeguard and protect valuable proprietary or private information and be assured that potentially harmful viruses and worms or offensive messages will not be transmitted outside the organization via . Ensure delivery of revenue opportunities Both the McAfee SaaS Continuity service and our standard spooling service ensure that your business will never lose an by providing automatic backup protection in the event of an unplanned server or network outage or during planned maintenance. With the McAfee SaaS Continuity service, you ll be able to keep the lines of communication open during an outage via webbased access, management, and use. Multiple Layers of Filtering Technology For industry-leading filtering accuracy, our network perimeter-protection service is fortified using a multilayered strategy that combines more than 20 forms of spam, virus, content, attachment, and attack filtering technology. Spam Blocking No longer merely a nuisance, spam has become a major problem for businesses worldwide. Accounting for nearly 90 percent of all worldwide, spam is a costly drain on time and resources and, with its ability to stealthily transport worms and viruses, has become a significant threat to network security. Connection Filters IP reputation connection manager Threat analyzer McAfee SaaS Protection Service Filtering Layers McAfee Stacked Classification Framework McAfee Global Threat Intelligence message reputation Premium anti-spam multilanguage filter Statistical filtering Proprietary heuristics/mcafee Deep Content Analysis SM Reputation analysis Reputation-based real-time blackhole (RBL) filtering Additional anti-spam filters and techniques URL filtering Domain-level blacklists and whitelists Distributed blacklist User-level blacklist and whitelists Recipient deny lists (address) attack filtering Content and attachment filtering Sophisticated virus and worm scanning Denial-of-service (DoS) attack protection Directory harvest attack (DHA) protection Fraud protection Attachment filtering Archive and compressed file integrity filtering Spam beacon and web bug detection and blocking Multilevel HTML content protection Keyword filtering Proprietary McAfee WormTraq worm detection Industry-leading anti-virus engines 5
6 Advanced, layered technology to block spam As explained in the Technology Architecture section below, the McAfee SaaS Protection service is fortified using a multilayered strategy with the McAfee Stacked Classification Framework spam detection system at the foundation of our spam-blocking capabilities. Powered by patented technology, the McAfee Stacked Classification Framework combines the most effective spam-fighting filters and techniques in the industry. Within the McAfee Stacked Classification Framework, the different spam filters separately assess and vote on the probability that a specific is spam a technique that results in highly accurate threat protection with industry-leading low false positive rates (legitimate misidentified as spam). Then, as new spam detection techniques and filters are developed, these are quickly and seamlessly integrated into the flexible McAfee Stacked Classification Framework. Connection filters IP reputation connection manager This filter operates in front of the McAfee Stacked Classification Framework and rates the reputation of every incoming message, based on IP reputation data collected on an ongoing basis by McAfee Global Threat Intelligence technology. Connections are dropped for all messages that originate from IP addresses that are determined to carry a reputation for sending spam which can reduce inbound traffic by more than 50 percent. Threat analyzer As with the IP reputation connection manager, the threat analyzer sits in front of the McAfee Stacked Classification Framework, providing advanced protection against directory harvest attacks (DHAs). These attacks methodically bombard servers with messages by using common name pairs or address patterns or by using brute force to run through possible alphanumeric combinations to identify valid addresses. Our solution blocks DHAs at the network perimeter to prevent spammers from gaining information about the validity of random addresses used to target businesses for future attacks. McAfee Stacked Classification Framework spam detection system filters The McAfee Stacked Classification Framework uses a patented voting algorithm based on a sophisticated form of intelligent reasoning to achieve more than 99 percent accuracy. McAfee Global Threat Intelligence message reputation This global threat correlation and intelligence technology analyzes the behavior of all Internet objects and entities capable of participating in blended attacks. It tracks host IP addresses, Internet domains, specific URLs, images, and messages in real time to accurately calculate the current reputation or trustworthiness of interacting with these entities, so that it can effectively protect your systems from the latest online dangers. Within the McAfee Stacked Classification Framework, McAfee Global Threat Intelligence contributes as a voting filter by providing an IP and message reputation scores. Premium anti-spam multilanguage filter This filter provides the McAfee SaaS Protection service with a global view of spam traffic which enables McAfee to defend against real-time spam attacks and rapidly identify zero-hour spam, regardless of language. The filter is also effective at identifying imagebased spam and phishing s and is continually updated based on real-time feedback provided by a global network of users. Statistical filtering Our probabilistic filtering uses a statistical Bayesian algorithm to determine the probability that an message is spam based on how often elements in that message have appeared in other spam s. Proprietary heuristics/mcafee Deep Content Analysis McAfee Labs experts write and update thousands of proprietary rules to block spam using real-time data from McAfee Global Threat Intelligence technology. The deep content analysis filtering capabilities enable McAfee to protect customers from increasing the volume of messages that carry infected attachments. The filter blocks the highly prevalent attachment-based PDF spam and has also been developed with the infrastructure necessary to address any future attachment spam variations. Specifically, PDF spam is the latest generation of image spam using graphics instead of other masking techniques to conceal an unsolicited advertisement s call to action. With PDF spam, the images are embedded within attached PDF documents instead of within the body copy of the message. Deep content analysis enables 6
7 McAfee to analyze the content of the attachment to determine if it contains spam or malware before the message can reach the customer s network. Reputation analysis Reputation analysis votes on the probability that the message is spam based on comprehensive information about the source of the message, rating the reputation of the sender based on the percentage of spam messages sent from that IP address in the past. Reputation-based RBL filtering McAfee assigns a level of trust to key real-time blackhole lists (RBL) that rates the reputation of the RBL based on its accuracy at blocking spam. While most service providers use RBLs, only McAfee SaaS provides a customer-configurable process for limiting false positives to help ensure that our customers receive a high level of spam protection with minimum impact on their businesses. In addition, RBLs are uniquely deployed in two ways within the McAfee SaaS Protection service:»» By opting in to RBL protection, mail coming from listed addresses will be automatically blocked prior to filtering by the McAfee Stacked Classification Framework spam detection system.»» RBLs are also used within the McAfee Stacked Classification Framework as a voting filter. Should the RBL filter give a high likelihood score to a particular message while other voter filters score the message as low likelihood, the message will, in most cases, be allowed to pass through to the customer, reducing the instances of false positive messages being quarantined. All McAfee SaaS customers receive protection from this voting filter. Additional filters and techniques provide more protection The McAfee SaaS Protection service employs other filters and techniques to ensure that is virtually free of spam, including the following domain-level blacklists and whitelists and distributed blacklists: URL filtering URL filtering works by comparing embedded links found in messages with URLs associated with identified spam Domain-level blacklists and whitelists Specifically designed to protect against spam, inappropriate content, and attacks, domain-level blacklists and whitelists filter and block unsolicited messages Distributed black lists Providing exceptional protection against spam, distributed blacklists comprise a number of real-time subscription services and McAfee global deny lists, which include multiple lists of known spammers and their IP addresses Recipient deny lists (address) This type of filtering is designed specifically to filter for content and relieve network servers from attempting repeatedly to deliver mail to invalid addresses User-level blacklists and whitelists Through regularly delivered spam quarantine reports, end users have the flexibility to develop their own, personal allow and deny lists Additional Anti-Spam Tools Proactively control spam and protect your network By integrating the McAfee ClickProtect SM feature within the McAfee SaaS Protection service, businesses can learn how end-user behavior could be impacting their network protection. McAfee ClickProtect is an industry-first technology that allows companies to monitor whether employees are clicking on websites that violate network security sites that automatically add their addresses to spammer distribution lists or install spyware on their computers. In addition, McAfee ClickProtect increases user awareness by enabling customizable warning messages and gives administrators the ability to build and integrate lists of approved websites. One quick click, and spam is gone The threat experts at McAfee Labs continuously monitor the Internet for the latest spam attacks and then write spam-fighting rules to identify those threats in the future. We also analyze the unwanted that our customers consider to be spam and incorporate that information into additional spamfiltering rules so that similar messages are effectively filtered going forward. And, with McAfee Spam Control for Outlook, end users can easily add a delete as spam button to their Microsoft Outlook 7
8 navigation bar to immediately delete suspect s and simultaneously send the message directly to McAfee Labs for analysis and action. Virus and Worm Scanning To help businesses increase network security and protect corporate integrity, our comprehensive, network perimeter security solutions include highly effective, company-wide virus and worm scanning. Multilayered protection to combat morphing threats McAfee SaaS virus and worm scanning offers triple protection, including our proprietary McAfee WormTraq worm detection technology along with our leading anti-virus engines. This layered combination of protection provides the strongest defense for businesses of all sizes even those already deploying an on-premises virus software solution. Proprietary worm detection technology adds a critical layer of protection The proprietary McAfee WormTraq zero-hour worm detection technology protects customers from the dangers of mass-mailing worms hours before anti-virus services can distribute signature updates to their customers. Through sophisticated content behavior analysis, McAfee Labs is able to quickly identify the common characteristics found in sudden surges of suspicious messages, which are then intercepted before they can reach customers networks. Addition of three leading anti-virus engines results in triple filtering Using a proactive defense strategy, McAfee Labs diligently tracks and blocks the latest waves of worm and virus attacks using sophisticated content behavior analysis, proprietary scanning, and triple antivirus engines. The triple-layered technology virtually eliminates the risk of malicious viruses and worms entering the enterprise network because the threats are automatically stripped from incoming or are quarantined for review. In addition, by programming up-to-the-minute automated rules, McAfee scans for anti-virus updates from these leading anti-virus services every five minutes. Fraud Protection Using a combination of industry-leading spam-fighting methods, phishing s are identified and filtered before they reach the business network and dupe unsuspecting recipients into releasing personal or business-related information. Increasingly complex phishing attacks use common spam techniques to distribute large volumes of official-looking fraudulent s designed to deceive consumers into disclosing their credit card numbers, bank account information, Social Security numbers, passwords, and other sensitive information. With the McAfee SaaS Protection service and our layered anti-spam techniques, organizations can protect their networks and employees from the risks of phishing. Using the same methods to detect spam, phishing s, and fraudulent content can be identified and filtered out of inbound before they reach the network ensuring that they never reach employees. Content and Attachment Filtering Similar to the security threats posed by viruses and worms, businesses are now becoming more aware of the risk and liability associated with inappropriate content and attachments in liabilities that include licensing breaches, serious bandwidth overload, and sexual harassment lawsuits. protection customized to support unique corporate policies While controlling spam with precise filtering accuracy is paramount, many organizations require that specific corporate filtering policies be established for both incoming and outgoing messages. For those organizations, McAfee SaaS content and attachment filtering supports specific keyword filtering and attachment control. In addition to standard keyword buckets developed by McAfee, businesses have the flexibility to program their filtering policies to meet their unique needs, whether it involves blocking 8
9 the inbound and outbound transmission of private or proprietary corporate data, racially and sexually sensitive material, profanity, or any other content deemed inappropriate by the enterprise. Attachment filtering keeps out large, malicious files The McAfee SaaS Protection service protects the business network from the bandwidth-draining effects of overly large or malicious attachments. In combination with our spam-blocking detection technology, which provides the first layer of content control, content and attachment filtering can be programmed to monitor traffic and filter attachments according to business-specific configurations filtering by size, by MIME media type (.exe,.vbs,.mp3, and others), and by binary content. Using the same process, McAfee protects the network from archive files (for example,.zip) that are capable of disabling messaging servers. When it detects suspicious compression ratios or suspected nested archives in attachments, the feature strips the file to prevent possible network outages. Additionally, the service s archive integrity filtering can intercept encrypted.zip files or apply attachment policies to archive file contents. Content and attachment filtering techniques reduce liability The McAfee SaaS Protection service incorporates the following five filtering techniques designed to control unwanted content and attachments to protect your business integrity and reduce legal liability: Keyword filtering Keyword filtering technology evaluates the content of all messages based on the policies and associated actions configured by the enterprise Attachment filtering Attachment filtering blocks unwanted attachments by size, by MIME media type (.exe,.vbs,.mp3, and more), and by binary content before they enter or exit the corporate network. Our proprietary deep content analysis filter enables McAfee to protect customers from increasing volume of PDF spam or messages that carry infected.pdf attachments. Archive and compressed file integrity filtering Protecting businesses from the bandwidth-draining effect of large, malicious archive files (for example,.zip) that can lock up messaging servers, McAfee detects suspicious compression ratios or suspected nested archives in attachments and strips the file to prevent possible network outages Spam beacon and web bug detection and blocking This technique protects networks from these intrusive, almost imperceptible tags embedded in HTML that give spammers confirmation and information about targeted end users Multilevel HTML content protection Because malware can now take many forms, McAfee protects its business clients with multilevel HTML content protection. This feature filters suspect HTML, JavaScript, ActiveX, and applets based on defined policies Attack Protection has created tremendous opportunity but has also made businesses vulnerable to billions of dollars in lost revenue and lost productivity because of its universal openness and accessibility. To protect businesses against spammer intrusion, McAfee incorporates sophisticated attack protection into its filtering layers using a unique mail exchange (MX) record-masking technique. Shield the critical networking infrastructure Spammers today are writing code and developing complex tools capable of easily bypassing typical filtering mechanisms and capturing information about end users. The McAfee SaaS Protection service provides real-time monitoring and analysis of incoming messaging traffic, conceals critical messaging gateways and shields groupware servers from attack. By pointing your MX record to our SecureMX, businesses can conceal their Internet-facing mail servers and remove the threat of anonymous connections. With McAfee, malicious traffic is identified and quarantined at the network perimeter to ensure that the network is protected from directory harvest attacks, DoS attacks, mail bombs, and channel flooding attacks that can debilitate even the largest systems. 9
10 Prevent directory harvest attacks Our first defense threat analyzer filter blocks DHAs at the network perimeter to prevent spammers from gaining information about the validity of random addresses used to target businesses for future attacks. Block denial of service attacks In a DoS attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing , websites, online accounts (banking accounts, for example), or other services that rely on the affected computer. DoS attacks are particularly stealthy because, while they are designed to elude detection by masquerading as legitimate transactions, the intent is to launch them on a massive scale to overwhelm unprotected networks. When McAfee detects the excessive SMTP chatter associated with DoS attacks, it limits the connections it will allow from the attacking IP address(es), throttling back the traffic and effectively stopping the DoS. Securing Your Critical Business Information Protecting your organization against inbound online threats like spam and viruses is only half of the security battle. now ranks second only to portable storage devices as a data leakage channel, making it essential for all businesses to secure their systems against information loss and theft. McAfee SaaS Protection helps businesses to safeguard their critical information in two ways; by securing both the message and the pathway in instances when it is necessary to include confidential information within an , and by preventing the unauthorized delivery of confidential information via . (Optional) McAfee SaaS Encryption A bidirectional, policy-based solution that protects organizations from the loss of confidential data, and helps to ensure compliance with privacy and security regulations Outbound filtering A data loss prevention feature that helps businesses enforce corporate policies by filtering out specific content and attachments in messages leaving your corporate network Transport layer security (TLS) Secures inbound and outbound message pathways on either an enforced or opportunistic basis McAfee SaaS Encryption The optional McAfee SaaS Encryption service safeguards your confidential data and enables you to maintain compliance with regulations requiring encryption of sensitive data. A cloud-based solution, McAfee SaaS Encryption delivers unparalleled scalability, eliminates the burden of managing a solution, and empowers your mobile workforce to send and receive encrypted s ubiquitously from any client. Furthermore, this bidirectional encryption solution can secure both the original message and replies. Regardless of size, all businesses can immediately benefit from McAfee SaaS Encryption, which helps them to: Enforce encryption without disrupting the day-to-day workflow Protect the organization from liabilities associated with privacy regulations Ensure ease of use and keep the underlying encryption complexities hidden for the end user Monitor all messages via outbound content filtering to ensure compliance Extend encryption services internationally via a recipient pick-up portal that supports 14 languages including: English, German, Spanish, French, French (Canadian), Italian, Dutch, Japanese, Korean, Portuguese (Brazilian), Portuguese (Portugal), Russian, Chinese (Traditional), Chinese (Taiwanese) 10
11 McAfee SaaS Encryption offers flexible, easy-to-use options for service administrators and for both the sender and recipient. Administrators use the unified, web-based McAfee SaaS Control Console to set, review, and customize an organization s privacy policies so that confidential content is automatically encrypted. Multiple policies can be customized and enforced for respective user groups, branch offices, and lines of business. For the sender, the process is as simple as composing and sending an message. The message content is automatically scanned and will be encrypted if it matches a policy set by the administrator. In situations in which on-demand encryption is required (and has been enabled by an administrator), the sender can include [encrypt] in either the subject line or the message body to force encryption. Message recipients can choose from two options for retrieving the message. They can either access the message directly from the web-based message pick-up portal, or download a secure message reader, which enables viewing of the message directly through the recipients client. And, when they reply, that return message can also be encrypted. McAfee SaaS Encryption is built with trusted and proven standards-based encryption technologies. It removes the difficulty of installing and managing current solutions and is easy to use. McAfee SaaS Encryption supports the sending and receiving of encrypted messages via mobile devices (when the is delivered through the McAfee SaaS Protection system), and encrypts all parts of the message, including attachments. The powerful encryption solution also includes notifications for the sender to provide information on message disposition. The McAfee SaaS Encryption system will send a notification to the sender when the recipient retrieves the encrypted message. The sender will also receive three to five notifications during the 14-day period in which the message is active on the encryption portal if the recipient has not retrieved the message. McAfee SaaS Encryption is available as an optional service with all McAfee SaaS Protection packages and McAfee SaaS Service Suites. Outbound Filtering McAfee SaaS Protection outbound filtering enables businesses to proactively integrate policy enforcement for all messages leaving the corporate network en route to valued customers or business partners. With this added protection, organizations can reduce liability and corporate risk by preventing the distribution of company-sensitive information and by blocking the transmission of harmful viruses and worms to important business partners and clients. To further strengthen your security, you can also add a disclaimer or footer to all outgoing messages. Ensuring messages are safe, appropriate, and in compliance While the McAfee SaaS Protection service is shielding your network from malevolent incoming messages, outbound filtering enables businesses to protect intellectual property by preventing accidental or intentional distribution of sensitive or proprietary internal information. The service also helps safeguard corporate integrity by stripping viruses and worms from outgoing messages and ensuring that inappropriate content does not get distributed. Finally, integrating outbound filtering allows businesses to enforce policies that help comply with legislative, privacy and security regulations. 11
12 Outbound Filtering Features Content filtering Attachment filtering Virus and worm scanning Outbound Filtering Benefits Prevents inappropriate, malicious, or confidential content from leaving the corporate system, allowing organizations to monitor and enforce the appropriateness of outbound corporate messages. Automatically filters attachments by size, by media type, or by binary content. Employs triple filtering to stop viruses and worms from leaving the corporate system and infecting recipients. The level of outbound virus and worm scanning protection businesses receive is the same as the inbound filtering protection they select, combining our zero-hour proprietary worm scanning with signature-based engines. Secure Message Delivery Via Transport Layer Security The McAfee SaaS Protection service offers two options for the delivery of through TLS. The most robust option, enforced TLS, provides customers with the option to force inbound or outbound delivery of mail via TLS for specified domains. Once enabled, a message will be denied if TLS cannot be negotiated with the sending/receiving domain. With the basic, opportunistic TLS option, if TLS can be negotiated between the sender and the destination, the mail is delivered over TLS. If TLS cannot be negotiated, then mail is delivered via SMTP. Both TLS options are available to all McAfee SaaS Protection service customers at no charge. Convenient Administrative Tools The McAfee SaaS Protection service can be easily configured to fight spam, viruses and worms, and other threats based on the unique needs of each organization. Our control console is a centralized threat management policy platform that provides you with one interface for managing all corporate-wide threats, protection and security. This easy-to-use administration and reporting tool enables organizations to: Establish policies that direct how viruses, spam, unwanted attachments, unwanted content, and unwanted HTML in messages are handled Create customized group policies that meet the unique needs of specific user groups, including functional groups like accounts payable, sales or engineering, or even individual users Synchronize account information through directory integration, including primary and alias addresses and distribution lists, eliminating the need to manually make changes in either the corporate Microsoft Active Directory and the McAfee SaaS system Reduce spam-management burden on your IT staff by determining whether the quarantine process for threats will be managed by IT, your end users, or both A backscatter abatement feature helps customers eliminate the growing number of bounce messages or non-delivery reports (NDR) that result whenever a spammer forges or spoofs a legitimate sending address and that spam message is rejected by the recipient mail server Automatically quarantine suspect messages by safely isolating unwanted messages outside of your network where they can be reviewed and deleted or released according to the policies you set. All standalone McAfee SaaS Protection service packages include a seven-day quarantine with an available 14-day quarantine option that is included as part of all McAfee SaaS Service Suites. Create customized message rules lists, including allow and deny lists (for message senders), as well as an exempt users list (for users and recipients) Organizations with multiple locations can configure McAfee SaaS Intelligent Routing to seamlessly route coming into a main public-facing domain ([email protected]) to the appropriate local domain of the user ([email protected]). McAfee SaaS Intelligent Routing also accommodates delivery of s sent directly to the local domain if the local domain has a public mail exchange (MX) record. McAfee SaaS Intelligent Routing fulfills the role of an internal routing solution, eliminating the need to manage and maintain separate routing equipment. 12
13 In-Depth Reporting Options The control console also provides a wide range of real-time daily, weekly, monthly, and on-demand reports, which enable staff members to quickly analyze and track traffic and trends. This reporting can help you improve overall performance and isolate issues before they escalate. All control console reports are available for downloading in CSV or text file formats. The reports include: Traffic and bandwidth reports Spam and virus volume reports Content and attachment policy violations reports Quarantine reports User activity Event logs Audit trail disaster recovery overview and events McAfee SaaS performance reports provide customers with greater insight into the ongoing performance of their and web security services. These reports not only allow the easy manipulation and comparison of data but also the ability to send these reports automatically to a distribution list. Administrators can opt for weekly and/or monthly delivery of performance reports, which cover more than 20 vital areas within the McAfee SaaS Protection service and the McAfee SaaS Web Protection service. In addition, organizations that subscribe to ConnectWise can configure the delivery of customer-specific, domain-level traffic and threat data directly to their managed services platform dashboard through the MSP Connector. Sophisticated, Safe External Quarantine The sophisticated McAfee SaaS Protection service quarantine further reduces false positives (legitimate misidentified as spam) and IT administrator burden by allowing end users to customize their filtering policies and manage their own quarantine. For organizations that support employee quarantine management, McAfee s a spam quarantine report to their employees who can then simply and quickly delete, forward, whitelist, and blacklist quarantined via our intuitive, web-based control console. Spam quarantine reports can also be accessed on demand at any time. Quarantine saves time and helps eliminate false positives The McAfee SaaS Protection service consistently achieves industry-leading low false positive rates using intelligent, customizable spam filtering technology. Leveraging this unique technology is the most effective way to minimize false positives, especially given the growing complexity of spam and the subjectivity of what users define as legitimate . As an enterprise-class solution, simply blocking or always allowing according to McAfee rules is not a foolproof method for optimizing communications. With built-in features that allow customers to effortlessly condition the quarantine, McAfee SaaS security solutions offer the industry s most effective protection against spam and false positives. The McAfee SaaS quarantine process The McAfee SaaS Protection service blocks spam and filters content and other threats according to corporate guidelines that businesses establish and configure when they begin using the service. Once the is filtered, the suspect messages are held safely in an offsite quarantine on the customers behalf. This quarantine can be managed by the corporate IT department, employees, or both. 13
14 Setting rules around legitimate messages Most McAfee SaaS Protection service customers opt for IT and end-user management of the quarantine. Allowing control for both IT staff and end users helps reduce the amount of time IT managers spend dealing with spam and also further ensures that the messages end users view as legitimate are quarantined. Sophisticated end-user conditioning When businesses opt for end-user management, which offers employees the ability to set conditions for their own quarantine, McAfee sends a spam quarantine report to their employees inbox based on pre-established parameters. This allows employees to review the messages that McAfee has identified as spam based, in part, on corporate-defined parameters and further fine-tune the quarantine rules to meet their specific needs. Employees can simply and quickly delete, forward, always allow, or always deny the messages contained in the report. Keep spam sensitivity rates high and false positives low The ability to set highly specific rules for the quarantine enables businesses to keep spam sensitivity rates high while keeping false positives extremely low a tricky combination for businesses that rely on specific e-newsletters, online advertising, and ed promotions to do business. By having end users spend a few minutes during the first week of reviewing and setting conditions for their own quarantines, organizations can be confident that their corporate policies are enforced but that communication remains optimized on an end-user level. Extended quarantine period available to meet your organization s needs McAfee offers a seven-day spam quarantine as part of all McAfee SaaS Protection service packages. Businesses can also choose an optional 14-day quarantine period, which is a standard feature within all McAfee SaaS Service Suites. McAfee SaaS Disaster Recovery Services Unexpected events like natural disasters and malicious threats can bring down a business network within seconds, derailing communications, jeopardizing business opportunities, and resulting in lost revenue. To help businesses take the next step toward end-to-end security, McAfee provides valuable service backup protection with our robust disaster recovery services, McAfee SaaS Continuity, and our standard spooling service. Avoid business disruption with constant communication The McAfee SaaS Continuity service provides a wealth of features designed to keep communications flowing during outages, including web-based access, management, and use. The service provides full functionality including read, compose, reply, forward, and delete all while both inbound and outbound is protected from threats by the McAfee SaaS Protection service. Once connectivity is restored, the McAfee SaaS Continuity service delivers intelligent postoutage activity synchronization with your mail servers, including forensic information (time and date stamps, CC and BCC recipients, and read or unread status). Never lose another Both McAfee SaaS disaster recovery services ensure a company will never lose an by providing automatic service backup in the event your business is struck by an unforeseeable outage or malfunction, or during planned maintenance. These valuable features are part of the complete line of SaaS protection solutions from McAfee features not commonly available with many appliance and software solutions. Proactive monitoring, automatic detection, immediate back-up With the McAfee SaaS Continuity service or the spooling service, organizations no longer risk delays, interception, damage, or loss. The services are designed to instantaneously begin 14
15 spooling when a loss in connectivity is detected between McAfee and one or more of a business s message transfer agent (MTA) servers. Once the connection with the server(s) is restored, current and spooled is delivered to the business. Flexible platform enables manual operation The automatic, proactive features of the disaster recovery services can also be manually activated. While the services are designed to proactively discover disturbances or identify server malfunctions, administrators can manually program McAfee SaaS Continuity service or spooling for use during planned server maintenance. Ample storage and immediate notification Regardless of whether a business requires backup protection due to scheduled maintenance or in the event of an unplanned outage, the McAfee SaaS Continuity service and the spooling service automatically engage spooling when they detect a loss of connectivity to your server(s). To accommodate prolonged outages, the McAfee SaaS Continuity service provides 60 rolling days of unlimited storage, while standard spooling provides five rolling days of unlimited storage. Additionally, the services are programmed to automatically provide notifications sent to an alternate address located at another domain which alert the network administrator when either service has been automatically activated following repeated unsuccessful attempts to connect to the specific server. Several updates are provided throughout the service activation period, including alerts about storage capacity and a confirmation when the service has reestablished a connection to the server and is releasing spooled and current . Ease of administration through a web-based platform With the SaaS Control Console, a secure, intuitive, web-based administration and reporting tool, businesses are given maximum flexibility to customize protection policies, including the McAfee SaaS Continuity service and the spooling service specifications, notifications, and additional storage capacity. Using the administrative console, businesses can quickly monitor disaster recovery service activity and spooling levels and easily configure the following: Preferences regarding spooling priority Customized disaster recovery notifications A schedule for outages Ability to suspend incoming mail flow Technology Architecture Fighting spam and other threats is a constant battle. While companies struggle to stay ahead of the latest threats with new techniques and technologies, spammers and worm authors are developing more and more ways to bypass those defenses. That s why the technology behind the McAfee SaaS Protection service is the key to defending the entire business network from the whole range of threats. Network perimeter protection At the core of our advanced technology is our network perimeter defense, a defense proven to be the most effective way to protect the entire enterprise system. Because the Internet is a breeding ground for threats, our solution acts as the border patrol between the Internet and the business network to identify, quarantine, block, and strip threats before they can cause damage and disruption. Intelligent processing The intelligent processing within the McAfee SaaS Protection service leverages a proxy-based filtering approach that filters in real time which, unlike the store-and-forward method used by other providers, does not write and store messages to disk before forwarding them on to the recipient. This method virtually eliminates risk of loss associated with systems outages, message interception, or corruption from an infected base. The process acknowledges the inbound traffic, immediately opens a connection to the destination recipient 15
16 server, and filters the message as it flows through the network stream environment and into your messaging system. Multilayered protection framework The McAfee SaaS technology framework was designed with a plug-and-play foundation to rapidly and seamlessly integrate the latest filtering layers and techniques available. At the core of our multiple layers is the McAfee Stacked Classification Framework spam detection system. Aggregating the most effective spam filters and techniques in the industry, each of the filters in the framework dynamically calculates the spam probability of every message. Proprietary worm detection technology Our proprietary WormTraq worm detection technology protects against the dangers of mass-mailing worms hours before anti-virus services can distribute signature updates to their customers. Through sophisticated content behavior analysis, McAfee Labs is quickly able to identify the common characteristics found in sudden surges of suspicious messages, which are then intercepted before they can reach customers networks. Three leading anti-virus engines equals triple filtering In addition to its proprietary worm detection technology, McAfee incorporates virus protection from three leading engines. The triple protection virtually eliminates the risk of malicious viruses and worms entering the enterprise network because the threats are automatically stripped from incoming or are quarantined for review. And, by programming up-to-the-minute automated rules, McAfee scans for anti-virus updates every five minutes. McAfee Labs monitors global state of Powering our defense solutions is the threat intelligence behind McAfee Labs and McAfee Global Threat Intelligence. Our sophisticated streaming data environment monitors the global state of for spam, viruses, worms, and other threats 24 hours a day, seven days a week. McAfee Labs employs a dynamic defense by continuously incorporating information from its sensor network into its database and by writing and updating its filtering rules to protect against the latest threats. The centralized nature of the service allows our threat experts to update the McAfee SaaS system more rapidly than other types of solutions so it can react to new forms of threats and, in turn, provide immediate protection. Guaranteed around-the-clock availability Our data center production environment provides immediate disaster recovery and high availability, and the McAfee SaaS Network Operations Center (NOC) provides 24/7/365 operational support and automated monitoring of all service components. Our production facilities provide carrier-grade infrastructure, and our architecture design lends itself to a low-cost and highly distributed pod environment. Network and application monitoring provides remote operations with personnel visibility into suspect or trouble alerts and alarms. Scalable and robust Filtering billions of messages each month for organizations around the globe, the McAfee SaaS Protection service supports networks of any size, in any location. The service s distributed design provides for geographic system deployment and its decoupled components allow for independent scaling or grouping. Organizations can feel confident that our scalable systems architecture supports increased volume and growth; its fault-tolerant, multiple data centers handle excess capacity; and individual elements of the architecture can be scaled in response to traffic requirements. Effortless integration with all business networks is possible through the solutions native Internet standards support for SMTP, LDAP, MIME, XML-RPC web services API, LDAP/POP3 authentication, LDAP subscriber queries, and SQL interfaces. 16
17 A Closer Look at McAfee Labs and McAfee Global Threat Intelligence With a research footprint that covers the globe, McAfee Labs provides real-time, relevant, and actionable threat intelligence. Backed by a portfolio of more than 100 patented or patent-pending technologies, global data centers, and the largest network of global threat intelligence sensors, McAfee Labs researchers have a breadth of research expertise covering: Malware 50,000 pieces of malware identified each day Vulnerability analysis Protection from vulnerabilities averaged 80 days ahead of exploit in percent of Microsoft vulnerabilities in 2008 protected at the endpoint without a host IPS-signature update security 20 billion mail reputation queries each month More than 10 billion messages analyzed monthly Network security 100 million IP and port reputation queries each month 10 million intrusion prevention system alerts monitored and analyzed daily Web security 75 billion web reputation queries each month One new malicious web server identified every 60 seconds More than 32 million websites rated across 96 categories More than 5 million new zombies discovered monthly More than 200 million downloads analyzed daily Regulatory compliance and risk management Generates McAfee Security Advisories and countermeasure intelligence A history of firsts With more than 20 years of security research experience, McAfee Labs is at the forefront of real-time threat intelligence. McAfee Labs began as an industry-leading security research organization focused on identifying and tracking burgeoning malware threats. Through a series of strategic acquisitions and global expansion of the research team, McAfee Avert Labs broadened its threat research scope to cover network, web, and security, as well as the complete range of emerging vulnerabilities. This comprehensive security research foundation enables today s McAfee Labs to deliver real-time, relevant, and actionable global threat intelligence. In 2008, McAfee Labs detected 1.5 million unique pieces of malware and launched the revolutionary McAfee Global Threat Intelligence file reputation as the latest in a long history of cutting-edge, best-inclass security firsts. In 2004, McAfee researchers launched McAfee Global Threat Intelligence message reputation, the world s first reputation system, which has proven to be highly effective against the growing amount of spam coming from zombie senders. Over the years, McAfee Labs also pioneered the detection of password-stealing Trojans, discovered the first polymorphic field virus, developed buffer overflow prevention for host intrusion prevention, and uncovered one of the biggest self-executing worms ever Sasser. McAfee Global Threat Intelligence McAfee Global Threat Intelligence is a comprehensive solution that tracks the entire threat lifecycle, enabling predictive security to guard against the latest vulnerabilities, ensure regulatory and internal compliance, and lower the cost of remediation. 17
18 McAfee Global Threat Intelligence was created and refined by McAfee Labs to power the next generation of security. Spanning the entire Internet, McAfee Global Threat Intelligence effectively uses millions of sensors to gather real-time intelligence from host IP addresses, Internet domains, specific URLs, files, images, and messages. It seeks new and emerging threats, including malware outbreaks, zero-day exploits, and malicious zombie senders generating spam and web attacks. McAfee Labs team of more than 350 researchers in 30 countries is dedicated to providing the most relevant security information by tracking and analyzing the latest threats. Real-time McAfee Global Threat Intelligence powers our groundbreaking threat technologies, which distribute continually tuned threat protection through the McAfee suite of endpoint and network security products. Intelligent Message Processing in the McAfee SaaS Protection Service protection and security service companies traditionally leverage one of two methods for filtering the proxy-based method and the store-and-forward method. Unlike other service providers, the McAfee SaaS Protection service almost exclusively filters messages by proxy, as this method offers greater security and eliminates the risks inherent in store-and-forward filtering. The flow of makes the difference While both methods utilize the domain s mail exchange record for filtering, the proxy-based method is clearly superior in its delivery performance. It removes domain-level vulnerabilities and increases overall network security. In general, the difference in the methods comes down to how the flows through the filtering process: the proxy-based method does not disturb the normal flow of , while the flow is significantly altered with the store-and-forward method. vulnerability risks are virtually eliminated The store-and-forward method presents risks of message loss and interception. Unlike the proxybased method, store-and-forward filtering writes and stores all messages to disk outside the corporate firewall, filters them in succession, and then forwards them to their intended recipients. The vulnerability with the store-and-forward method exists within the message queue. Because messages are stored, filtered, and then forwarded, messages are subject to loss through system outages, message interception, or corruption from an infected base. Using intelligent message processing technology, McAfee SaaS proxy-based filtering virtually eliminates message delivery risks. Removing the risk of delivery failure The proxy-based filtering approach also removes the risk of delivery failure that results from network islanding. Network islanding occurs when the destination server identifies a message as undeliverable and the message becomes stranded between the originating server and its destination. Proxy-based filtering removes this risk by never accepting responsibility for the delivery of legitimate message traffic. If disaster strikes at the destination message server, the will bounce back to the sender normally as mandated by the simple mail transport protocol (SMTP). Both McAfee SaaS Continuity service and the spooling service ensure that your business never loses an by providing automatic backup protection in the event of an unplanned server or network outage, or during planned maintenance. Both of our disaster recovery services automatically engage spooling when we detect a loss of connectivity to your server(s). Once the connection with your server(s) is restored, current and spooled is delivered to your business. Real-time message filtering reduces latency The McAfee SaaS proxy-based method delivers sub-second message latency as it does not accept and store the messages in order to filter them. Generally, McAfee acts as a conduit between the sender and recipient, filtering the message in stream, in real time as it passes from the sender to the recipient. Because messages are never stored during the inline filtering process, s filtered by McAfee 18
19 experience sub-second delivery, thus avoiding the latency issues from high traffic and overburdened queues commonly experienced with the pure store-and-forward method employed by other providers. McAfee SaaS Protection Packages The McAfee SaaS Protection service is available in the following standalone packages and Service Suites. McAfee SaaS Protection & Continuity package Our most comprehensive package includes powerful security plus McAfee SaaS Continuity service, which provides storage, access, and use during planned or unplanned outages McAfee SaaS Protection package A robust package of threat services and the standard spooling service. McAfee SaaS Inbound Filtering package An ideal package for businesses that require advanced protection against inbound threats Feature McAfee SaaS Protection & Continuity McAfee SaaS Protection McAfee SaaS Inbound Filtering Perimeter IP Filtering Advanced Spam Blocking McAfee Global Threat Intelligence Premium Anti-Spam Multilanguage Filter Triple Virus and Worm Scanning Zero-Hour Worm Protection Content and Attachment Filtering Attack Protection Fraud Protection Advanced Administrative and Reporting Portal Sophisticated Quarantine Management 24/7 Monitoring 24/7 Customer Support Outbound Filtering P P Spooling 60 days 5 days McAfee SaaS Continuity McAfee SaaS Encryption Add-on Add-on Add-on Extended Spam Quarantine Add-on Add-on Add-on Intelligent Routing Add-on Add-on Add-on Perimeter IP Filtering Advanced Spam Blocking McAfee Global Threat Intelligence Premium Anti-Spam Multilanguage Filter Triple Virus and Worm Scanning Zero-Hour Worm Protection Content and Attachment Filtering P 19
20 Feature McAfee SaaS Protection & Continuity McAfee SaaS Protection McAfee SaaS Inbound Filtering Attack Protection Fraud Protection Advanced Administrative and Reporting Portal Sophisticated Quarantine Management 24/7 Monitoring 24/7 Customer Support Outbound Filtering P P Spooling 60 days 5 days McAfee SaaS Continuity McAfee SaaS Encryption Add-on Add-on Add-on Extended Spam Quarantine Add-on Add-on Add-on Intelligent Routing Add-on Add-on Add-on P McAfee SaaS Service Suites McAfee SaaS Service Suites combine the power and protection of our industry-leading security, web security, and archiving managed services all backed by live, 24/7 support, innovative technology, and our experienced team of threat experts. You can choose from the following service suites to meet the unique needs of your organization: McAfee SaaS Web & Security with Archiving A comprehensive suite that protects your business from spam, viruses and worms, attacks, fraud, and spyware, while enabling you to efficiently store and retrieve all inbound, outbound, and internal s. In addition to the McAfee SaaS Protection service, this service suite includes the McAfee SaaS Archiving service (with retention from one to seven years) and the McAfee SaaS Web Protection service. McAfee SaaS Security & Archiving Suite This suite combines award-winning McAfee SaaS Protection threat and disaster recovery services with McAfee SaaS Archiving service (with retention from one to seven years) for organizations looking to protect their vital communications McAfee SaaS Web & Protection Suite The services included in this bundle effectively keep a wide range of and web threats from ever entering or leaving your corporate network by combining our award-winning McAfee SaaS Protection service with McAfee SaaS Web Protection service McAfee SaaS and Web security is also available as part of McAfee SaaS Total Protection Service, the only integrated security Software-as-a-Service (SaaS) solution to offer always on-guard protection for desktops, servers, network, web and . Delivered in a SaaS model where McAfee manages the security infrastructure offsite, SaaS Total Protection Service automates updates and upgrades, and simplifies security for businesses by reducing operational costs, ongoing maintenance, and support. 20
21 About McAfee, Inc. McAfee, Inc., headquartered in Santa Clara, California, is the world s largest dedicated security technology company. McAfee is relentlessly committed to tackling the world s toughest security challenges. The company delivers proactive and proven solutions and services that help secure systems and networks around the world, allowing users to safely connect to the Internet, browse, and shop the web more securely. Backed by an award-winning research team, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee SaaS and Web Security Sales Team 9781 South Meridian Blvd., Suite 400 Englewood, CO USA T F E [email protected] McAfee, Inc Freedom Circle Santa Clara, CA McAfee, the McAfee logo, McAfee Deep Content Analysis, McAfee WormTraq, McAfee ClickProtect, McAfee Spam Control for Outlook, McAfee Labs, McAfee Global Threat Intelligence, McAfee Stacked Classification Framework, and McAfee SaaS Total Protection are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2010 McAfee, Inc gde_saas_ -protection-guide
We take care of your email protection, continuity and archiving so you can take care of your business. INTRODUCING: HOSTED McAFEE SERVICES
We take care of your email protection, continuity and archiving so you can take care of your business. INTRODUCING: HOSTED McAFEE SERVICES Hosted McAfee Saas Services frees Tanya Venter of the South African
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
The benefits of using a perimeter-based managed service
W H I T E P A P E R Ensuring Email Security The benefits of using a perimeter-based managed service Ensuring Email Security page 1 Executive Overview With unsolicited email costing businesses millions
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
Filtering Service. Secure E-Mail Gateway (SEG) Service Administrative Guides. Revised February 2013
Secure E-Mail Gateway (SEG) Service Administrative Guides Filtering Service Revised February 2013 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Top 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
Mimecast Email Security
DATA SHEET Mimecast Email Security A fully integrated email security, continuity and archiving cloud based solution that delivers total end-to-end control of your email, mitigating email risks and reducing
How To Manage Your Spam On Graymail On Pc Or Macodeo.Com
User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
Features and benefits guide for partners and their customers
and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus
Administration Guide Revision E. SaaS Email Protection
Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS
Administration Guide Revision A. SaaS Email Protection
Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Securing enterprise collaboration through email and file sharing on a unified platform
Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
anomaly, thus reported to our central servers.
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features
Security capabilities To support your business objectives IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features Give users complete
Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
Email Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.
Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control
Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
Securing enterprise collaboration through email and file sharing on a unified platform
Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.
Websense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
Controlling Unwanted Content
Controlling Unwanted Content Executive Overview At least 50 percent of employees receive racist, sexist, pornographic, or other inappropriate email while at work. USA Today Email has become an extremely
European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT
A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT TECHNICAL DOCUMENT SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT 2 OVERVIEW When it comes to deploying Microsoft
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Transitioning to McAfee SaaS Email Protection from Postini
Technical FAQ Transitioning to McAfee SaaS Email Protection from Postini Frequently Asked Questions Google recently and abruptly announced that all Postini customers must either migrate to Google Apps,
THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE
THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE EMAIL BORNE THREATS An Escalating Problem for Every Business More than three out of four emails contain spam, viruses or other malicious content and that
FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Mimecast Unified Email Management
DATA SHEET Mimecast Unified Email Management An always-on, cloud-based email security solution that reduces the complexity of protecting your organization from malware, spam and data leakage. Mimecast
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
Cisco IronPort X1070 Email Security System
Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
INLINE INGUARD E-MAIL GUARDIAN
INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine [email protected] 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail
WATCHGUARD BARRACUDA KEY SALES PITCH TRUTH BEHIND THE PITCH
KEY SALES PITCH Long time provider of email security with large customer base XCS 170, 370 and 570 appliances integrate bi directional email threat protection and data loss prevention on a single platform.
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
Symantec Hosted Mail Security Administration Guide
Symantec Hosted Mail Security Administration Guide Symantec Hosted Mail Security Administration Guide Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software
SurfControl EmailFilter for SMTP
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SurfControl EmailFilter for SMTP JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS SurfControl EmailFilter for SMTP SurfControl,
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Mail-SeCure for virtualized environment
OUR INNOVATION YOUR SECURITY Mail-SeCure for virtualized environment OVERVIEW More and more companies are moving towards a virtualized IT-environment, where several network services (email, web surfing
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Barracuda Email Security Service
Barracuda Networks Technical Documentation Barracuda Email Security Service Administrator s Guide Version 1.0 RECLAIM YOUR NETWORK Copyright Notice Copyright (c) 2004-2011, Barracuda Networks, Inc., 3175
Cisco IronPort C670 for Large Enterprises and ISPs
Data Sheet Cisco IronPort C670 for Large Enterprises and ISPs As the battle to protect the corporate email perimeter continues, two trends emerge: higher mail volumes and more resource-intensive scanning.
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
FortiMail Email Filtering. Course 221 (for FortiMail v4.2) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v4.2) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management.
Overview IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management. The IronPort C-Series email security appliances provide advanced
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Thexyz Premium Webmail
Webmail Access all the benefits of a desktop program without being tied to the desktop. Log into Thexyz Email from your desktop, laptop, or mobile phone, and get instant access to email, calendars, contacts,
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
An Advanced Reputation Management Approach to Stopping Emerging Email Threats
An Advanced Reputation Management Approach to Stopping Emerging Email Threats CONTENTS The Evolution of Reputation Management 2 Emerging Security Threats 2 Advanced Reputation Management (ARM) 3 How ARM
Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
WHITE PAPER. Safeguarding your Email Infrastructure INSIDE MODUS TECHNOLOGY
WHITE PAPER Safeguarding your Email Infrastructure INSIDE MODUS TECHNOLOGY Table of Contents Executive Summary............................................................. 3 Vircom s modus Technology....................................................
The versatile solution of anti-spam, personal email backup and recovery, easy email security policy management and enforcement.
Anti-Spam Expert The versatile solution of anti-spam, personal email backup and recovery, easy email security policy management and enforcement. Effectively filter spam mails by cocktailed N-Tier filter
ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE
The Leader in Cloud Security DATA SHEET ZSCALER EMAIL SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE OVERVIEW Email volume is growing every day. Administrators struggle with a growing number of appliances
Anti-SPAM Solutions as a Component of Digital Communications Management
Anti-SPAM Solutions as a Component of Digital Communications Management Ron Shuck CISSP, GCIA, CCSE Agenda What is Spam & what can you do? What is the cost of Spam E-mail E to organizations? How do we
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
Do you need to... Do you need to...
TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
