Clearswift SECURE File Gateway



Similar documents
Top 10 Features: Clearswift SECURE Gateway

Securing Microsoft Office 365

SECURE Web Gateway Sizing Guide

Clearswift SECURE Gateways

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version /12/13. Product Information. Version & Platform SGOS 6.

Essential Steps to Web Security. A Clearswift Best Practice Guide

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Symantec AntiVirus Enterprise Edition

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

(Self-Study) Identify How to Protect Your Network Against Viruses

IronPort C300 for Medium-Sized Enterprises and Satellite Offices

Very Large Enterprise Network Deployment, 25,000+ Users

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Clearswift SECURE Gateways

Websense Data Security Solutions

Quick Reference Guide

Symantec Endpoint Protection

V1.4. Spambrella Continuity SaaS. August 2

Building A Secure Microsoft Exchange Continuity Appliance

Security Solutions

IronPort C10 for Small and Medium Businesses

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

Securing enterprise collaboration through and file sharing on a unified platform

External Supplier Control Requirements

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

BitDefender Client Security Workstation Security and Management

Did you know your security solution can help with PCI compliance too?

SharePoint 2013 Infrastructure Planning

Cisco IronPort X1070 Security System

Avira AntiVir MailGate 3.2 Release Notes

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

Total Defense Endpoint Premium r12

IronPort C650 Security Appliance for Large Enterprises and ISPs

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Ignify ecommerce. Item Requirements Notes

Top Four Considerations for Securing Microsoft SharePoint

Trend Micro. Advanced Security Built for the Cloud

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Microsoft Dynamics CRM 2011 Guide to features and requirements

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

Malicious Mitigation Strategy Guide

Securing enterprise collaboration through and file sharing on a unified platform

Superior protection from Internet threats and control over unsafe web usage

Uncover security risks on your enterprise network

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

IronPort C350 for Medium-Sized Enterprises and Satellite Offices

Ovation Security Center Data Sheet

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

How To Get The Most Out Of Your From Your Mail Server (For A Small Business)

Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Security. Titus White Paper

Compliance in 5 Steps

Sharpen your document and data security HP Security solutions for imaging and printing

Ovation Security Center Data Sheet

Very Large Enterprise Network, Deployment, Users

Document ID. Cyber security for substation automation products and systems

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

Managing internet security

Why Encryption is Essential to the Safety of Your Business

Defending Against Cyber Attacks with SessionLevel Network Security

IronPort X1000 Security System

Implementing Deep-Secure guards in NATO Information Exchange Gateways

Mailwall Remote Features Tour Datasheet

McAfee Web Reporter Turning volumes of data into actionable intelligence

Managing BitLocker With SafeGuard Enterprise

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Installing Websense Data Security

System Requirements for Microsoft Dynamics GP 2013

Clearswift SECURE Gateways

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.

Enterprise Network Deployment, 10,000 25,000 Users

Information Security Policy. Policy and Procedures

Symantec Protection Suite Small Business Edition

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Information Technology Solutions

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Evaluation Guide. eprism Messaging Security Suite V8.200

FortiMail Filtering Course 221-v2.2 Course Overview

Clearswift SECURE Web Gateway Evaluation Guide

Outline. Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models

White paper. Why Encrypt? Securing without compromising communications

HP Intelligent Management Center Standard Software Platform

How To Secure Your Business

VMware vsphere Data Protection 6.0

Endpoint protection for physical and virtual desktops

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

Transcription:

Security solutions for a changing world You wouldn t leave your front door unlocked if you were going out for the day, so why do the same with your business? In today s rapidly evolving business environment, you need to be able to engage with emerging collaborative technologies to stay relevant and competitive. Keeping your data secure yet mobile is more important and more complex than ever. To avoid the potentially serious implications of data leaks and regulatory breaches, you must inspect the information you create and share. Your content needs to be reviewed constantly, in real time to ensure compliance with your information governance policies. Which is where deep content inspection technology comes in. The SECURE File Gateway enables organisations to add powerful file content inspection features to existing applications and services, meaning that you can ensure the integrity of your data as it moves around, and before it leaves your organisation. Only by understanding your content can you protect your information assets and make better decisions with your data. Clearswift s solutions are renowned for providing mission-critical content filtering for thousands of customers and millions of users worldwide. The award-winning Clearswift content inspection engine sits at the heart of the File Gateway and has a proven track record of secure, robust, high-performance deep content inspection. Use-cases include: Enforce data usage policy Prevent data leakage Ensure regulatory compliance Prevent reputational damage Avoid malware cross-contamination Automate existing processes improving efficiency and consistency SECURE File Gateway details 2 Recommended hardware Processor: Intel quad-core processor Memory: 8GB RAM System disk: (7,200rpm) Configuration: No RAID required The following operating systems are supported: Windows Server 2008 R2 Standard, with SP1 Windows Server 2008 R2 Enterprise, with SP1 Red Hat Enterprise Linux for Servers (64-bit) version 6.1

Automated inspection If automated applications and services are moving files containing any information social security numbers, or credit card numbers for example then there s a risk that sensitive information may be leaked. The SECURE File Gateway can help significantly reduce this risk by automating the inspection process, identifying content based on policy, and preventing unexpected disclosure of sensitive or personal information. Easy integration and policy configuration The SECURE File Gateway integrates with your existing applications and services and works with them to perform its inspection. An intuitive, web-based user interface (UI) makes it easy for administrators to manage, audit and report on the file s progress and policy outcomes. We ve designed the integration process to be as easy and simple as possible to aid rapid deployment. Put simply, integration involves moving the relevant files to the File Gateway s input directory and then subsequently collecting them from the output directory once the inspection is complete. If a policy violation is encountered, the suspect files are moved into a separate quarantine directory from where the violation can be managed. HOST APPLICATION Data + Rules Result SECURE File Gateway Large files The SECURE File Gateway can handle very large files. The standard version can handle files up to 4GB, while there is an option to handle files up to 16GB in size. If anti-virus is installed, the File Gateway will segment the file appropriately so that effective scanning for viruses can also take place. 3

Avoid sensitive data leaks The File Gateway is commonly used to inspect a file s content as it moves from one location to another. By inspecting the file before it moves, the risk of sensitive data leaks is considerably reduced especially in scenarios where both locations are networks with different levels of security. For example, one network may be a high security domain and the other low security; alternatively a private Intranet network and a public facing website. In both of these examples there s a real risk that the information contained within the file could be valuable in one location but represent a data leak in the other. Recognise, understand and process The File Gateway s content inspection engine recognises over 150 different file or format types. It uses strong signature and data parsing techniques that ignore unreliable external indicators, like file extensions. The engine performs recursive decomposition, and systematically opens and searches within archive files like ZIP and TAR to locate all embedded objects for example images, or active content within Office documents. Inspection continues until there is nothing left to process. By recognising particular file types, it is possible to set a policy to decide which file types are acceptable, and which should be blocked. The inspection also extends to textual content: the words and phrases contained within the files. aa Textual search The SECURE File Gateway provides powerful text analysis capabilities to search for words, phrases and expressions of any format and in any language. Expressions can be keywords, phrases or regular expressions Predefined patterns such as credit card numbers, social security numbers (US), NI numbers (UK) and IBAN numbers Each expression can have its own weighting to allow occurrence counts to be defined Logical operators: AND, OR, XOR, ANDNOT Proximity operators: NEAR, BEFORE, AFTER, FOLLOWEDBY Search within body, headers, footers, meta-data or whole document By recognising the presence of terms such as Top secret in the footer of Word documents, or credit card numbers in Excel worksheets, it is possible to build policies that strictly control which data is processed through the system, and more importantly, which isn t. 4

Malware, active code and damaged data In addition to checking for content violations, the File Gateway is compatible with Sophos anti-virus. This means the data you process can be checked to ensure it doesn t contain suspicious content or malware that could potentially cause cross-infection to other networks or organisations. The SECURE File Gateway also has its own capabilities when it comes to blocking potential malware: It has rules to detect active code, such as macros in Microsoft Office, or scripts in Adobe PDF It can block suspicious data that doesn t match any recognised format, appears to be corrupt, or has been tampered in some way. Unusual data could indicate that malware is trying to exploit a weakness and cause a buffer overflow in an application It quarantines encrypted data that cannot be inspected GUARDS GUARDS LOW SECURITY NETWORK HIGH SECURITY NETWORK Sample uses cross domain transfer While many cross-domain solutions have the bandwidth to transfer large volumes of data, adding content checking can introduce bottlenecks, particularly with large files. The Clearswift SECURE File Gateway permits the transfer of very large files up to 16GB in size which are verified against a defined content security policy. 5

FTP S/FTP MFT APP Authentication File Validation Encryption SCP Input data Output data SECURE File Gateway Sample uses managed file transfer For the fast and secure transfer of large files, managed file transfer (MFT) products have traditionally been the quickest and the most economical. These solutions typically focus on the transport methods of the delivery, rather than on the content being sent. However, organisations wanting to ensure all of their points of egress are covered for data security should add the SECURE File Gateway to the process. This will ensure that sensitive data cannot be mistakenly transferred to the wrong location. Sample uses collaboration Collaboration tools are big business; SharePoint for example has over 100 million users, and there are many other similar products. The business benefits of tools like this are widely recognised, but with sharing comes risk. People make mistakes and accidents happen, so safeguards ensuring that only appropriate content is shared can be vital. If you are using SharePoint to allow your partners to access your data, how do you prevent internal documents accidentally being posted for partners to see? By integrating the Clearswift SECURE File Gateway into the publishing process, accidental disclosure can be prevented. Data protection made simple Clearswift s trusted deep content inspection capabilities ensure peace of mind for thousands of customers worldwide. The SECURE File Gateway, the latest addition to the Clearswift suite of security solutions, analyses your data on the move, preventing sensitive data leaks and malware infection. Protecting the integrity of your data is what we do best, so let us help you to get the most out of your information. Seamlessly integrating with your existing applications and services, the SECURE File Gateway provides sophisticated file-based deep content inspection, lexical analysis and comes with pre-built templates. The intuitive GUI makes it simple for administrators to manage and respond to policy outcomes; quite simply, we provide the reassurance you need to safely collaborate and share your information in a riskfree environment. 6

About us Clearswift s content-aware, policy based solutions (Clearswift Secure Web Gateway, Clearswift Secure Email Gateway, MIMEsweeper for SMTP) enable over 17,000 organisations in 50 countries to manage and maintain no-compromise data, email and web security across all gateways and in all directions. Clearswift developed many features the security industry now considers standard, such as image scanning, policy-based encryption and user-level message tracking. Clearswift s content-aware solutions enable safe and effective communication without compromising on security. If you d like to find out more, contact your local Clearswift team: UK info@clearswift.com +44 (0)118 903 8903 Australia info@clearswift.com.au +61 2 9424 1200 Germany info@clearswift.de +49 (0)89 904 05 206 Japan info.jp@clearswift.com +81 (3)5326 3470 Rest of Europe info.es@clearswift.com +34 91 572 6764 United States info@us.clearswift.com +1 856 359 2360 7

www.clearswift.com