Similar documents
1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct



Campus Sustainability Assessment and Related Literature

3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.

ACE-1/onearm #show service-policy client-vips







Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management


SCO TT G LEA SO N D EM O Z G EB R E-






PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB


proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->


<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="



I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y

Put the human back in Human Resources.


Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage

Online Department Stores. What are we searching for?




EM EA. D is trib u te d D e n ia l O f S e rv ic e






1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování


How To Be A Successful Thai


Overview of Spellings on

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1

R e t r o f i t o f t C i r u n i s g e C o n t r o l

BLADE 12th Generation. Rafał Olszewski. Łukasz Matras




GENERAL INFORMAT ION:

How To Know If You Are A Good Or Bad Person

III Bienal de Autismo Página 1 / 43


BMC ITSM Suite - nabité skúsenosťami. Juraj Izák,


M P L S /V P N S e c u rity , C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.



He Will Hold Me Fast (When I Fear My Faith Will Fail)


B I N G O B I N G O. Hf Cd Na Nb Lr. I Fl Fr Mo Si. Ho Bi Ce Eu Ac. Md Co P Pa Tc. Uut Rh K N. Sb At Md H. Bh Cm H Bi Es. Mo Uus Lu P F.


With Rejoicing Hearts/ Con Amor Jovial. A Fm7 B sus 4 B Cm Cm7/B

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years

Bewährte Six Sigma Tools in der Praxis

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o


CUSTOMER INFORMATION SECURITY AWARENESS TRAINING

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, ±3 7 8

U.S. Department of Housing and Urban Development: Weekly Progress Report on Recovery Act Spending


U S B Pay m e n t P r o c e s s i n g TM



B A R M A G - F R I C T I O N U N I T

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m

Practice Writing the Letter A

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

STUDENT HEALTH INSURANCE

Opis przedmiotu zamówienia - zakres czynności Usługi sprzątania obiektów Gdyńskiego Centrum Sportu

How To Rate Plan On A Credit Card With A Credit Union

HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES

LYXOR ASSET MANAGEMENT THE POWER TO PERFORM IN ANY MARKET

Thuraya XT-LITE Simple. Reliable. Affordable.

SEPTEMBER Unit 1 Page Learning Goals 1 Short a 2 b 3-5 blends 6-7 c as in cat 8-11 t p

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL P. A. V a le s, Ph.D.

W h a t is m e tro e th e rn e t


MS IN EARLY CHILDHOOD STUDIES



Lehman Brothers UK Holdings Limited In Administration

Chem 115 POGIL Worksheet - Week 4 Moles & Stoichiometry Answers

Transcription:

IronPort Gateway Security Products The Leader in Communication Security Reiner Baumann IronPort Systems

The Principles of Industry Leadership A n a l y s t L e a d e r s h i p R e c o g n i z e d a s t h e l e a d e r b y G a r t n e r, M e t a, R a d i c a t i, I D C, F o r r e s t e r, B l o o r C u s t o m e r L e a d e r s h i p 4 0 o f t h e W o r l d s L a r g e s t 1 0 0 C o m p a n i e s 1 2 o f t h e 1 5 l a r g e s t I S P s 7 o f t h e 1 0 l a r g e s t b a n k s G l o b a l L e a d e r s h i p O p e r a t i o n s i n 3 0 c o u n t r i e s a n d 4 6 c i t i e s g l o b a l l y 6 0 0 + p a r t n e r s I r o n P o r t i n f r a s t r u c t u r e c u r r e n t l y o p e r a t i n g i n 7 5 + c o u n t r i e s

IronPort Anti-S p a m C u s tom e r L e a d e rs h ip Trusted Throughout Austria

T h e C om m on T h read V I R U SE S SPAM Jeremy Haynes C o nv i c t ed M al w are W ri t er PH I SH I N G SPY W AR E

It work s!

W IronPort G atew ay S ecurity Products Ir o n P o r t S e n d e r B a s e I nt ernet EMAIL Security A p p l ia n ce EB Security A p p l ia n ce Security M A N A G E M E N T A p p l ia n ce

IronPort S enderb ase N etw ork G l ob al R eac h Y iel ds B en c hm ark Ac c urac y The Dominant Force in Global E mail and W eb Traf f ic M onitoring R es u lts in A ccu racy and A d v anced P rotection Spam Caught by Reputation I ro np o rt C i p h e r T r u s t B o r d e r W a r e 4 0% 50% 8 0 % N etw or k Reac h ( Contr ibuting N etw or k s ) I ro np o rt C i p h e r T r u s t B o r d e r W a r e 4, 000 8, 000 1 2 0, 0 0 0 5 q u d a i l 1 5 0 + E i l a W p a 2 5 % W d E i l T f f i c B+ eri es y ma nd eb ra meters of th e orl s ma ra V ir us P r otec tion L ead I ro np o rt M c A f e e, T r e n d, S y m a n t e c, S o p h o s, C A, F -S e c u r e 1 3 h o u rs* * 6/2005 6/2006. 1 7 5 o u t b r e a k s i d e n t i f i e d. C a l c u l a t e d a s p u b l i c l y p u b l i s h e d s i g n a t u r e s f r o m t h e l i s t e d v e n d o r s. Source: w w w. ci p h ert rus t. com a n d w w w. b ord erw a re. com, A ug us t 6, 2 0 0 6

IronPort A rchitecture for M ulti-layered E m ail S ecurity MANAGEMENT TOOLS SPAM D E F E N SE V I R U S D E F E N SE PO L I C Y E N F O R C E ME N T E MAI L AU T H E N T I C AT I O N THE IRONPORT AS Y NC OS EM AIL PL ATF ORM

IronPort R eputation F ilters S top 8 0 % of H ostile M ail at the D oor. K n o w n g o o d i s d e l i v e r e d R ep u t at i o n F i l t eri ng A nt i -S p am E ng i ne Su s p i c i o u s i s r a t e l i m i t e d & s p a m f i l t e r e d I n c o m i n g Ma i l G o o d, B ad, and G rey o r U nk no w n E mai l K n o w n b a d i s d e l e t e d / t a g g e d I r o n P o r t u s e s i d e n t i t y & r e p u t a t i o n t o a p p l y p o l i c y S o p h i s t i c a t e d r e s p o n s e t o s o p h i s t i c a t e d t h r e a t s

w s IronPort R eputation F ilters D el l C ase S tudy A c c u r a c y o f s p a m f i l t e r i n g i n c r e a s e d 1 0 x S e r v e r s c o n s o l i d a t e d b y 7 0 % O p e r a t i n g c o s t s r e d u c e d b y 7 5 % I ronp ort has increas ed the q u ality and reliability of ou r netw ork op erations, hile red u cing ou r cos ts. -- T i m Hel mset et t er Manager, Global C ollaborat i v e S y s t em E ngi neeri ng and S erv i c e Managem ent, D ELL C O R P O R AT IO N

IronPort A nti-s pam B ac k ed B y The I n dustry s M ost Adv an c ed I n f rastruc ture I r o n Po r t T h r e a t O p e r a t i o n s C e n t e r Se n d e r B a s e S EC U R IT Y MO D ELIN G Machine Generated Rules T hreat E v idence C lustering C o n t e x t Ad a p t i v e Sc a n n i n g E n g i n e

O w IronPort V irus O F irst L in e of D ef en se utb reak F ilters Early Protection ith I ronport V iru s u tb reak F ilters

M T IronPort V irus O utb reak F ilters A dv antag e V i ru s N ame D at e V i ru s D esc ri p t i o n L ead T i me (h h : mm) K u k u d r o -A 6 / 27/ 0 6 V i r u s t h a t s p r e a d s v i a z i p p e d w o r d d o c u m e n t. 3 :3 8 F eeb s. AG 6 / 21/ 0 6 A r r i v e s a s a n e m a i l a t t a c h m e n t c l a i m i n g t o b e s e n t v i a " P r o t e c t e d E a i l s e r v i c e -M. 17:4 6 T r o j / S t i n x-w 6 / 15 / 0 6 I R C b a c k d o o r T r o j a n. 11:12 Y a b e. G 5 / 16 / 0 6 T r o j a n t h a t a t t e m p t s t o d o w n l o a d f u r t h e r m a l i c i o u s c o d e. 13 :0 9 B a g l e-g 4 / 21/ 0 6 I n s t a l l s b a c k d o o r a n d c o m m u n i c a t e s v i a H T T P, t h u s b y p a s s i n g f i r e w a l l f i l t e r s. 18 :28 yt o b -H J 4 / 19 / 0 6 T u r n s o f f a n t i -v i r u s a p p l i c a t i o n s o f i n f e c t e d P C t o a v o i d d e t e c t i o n. 3 2:5 7 Nyxem-D ( K a ma S u t r a ) 1/ 16 / 0 6 D e l e t e s m o s t d o c u m e n t s o n t h i r d d a y o f e v e r y m o n t h. 1:27 L o o k s k y. G 1/ 6 / 0 6 I n s t a l l s k e y s t r o k e l o g g e r s o n t o i n f e c t e d P C s. 3 5 :4 0 A v er age l ead time* ov er 1 3 hour s O utbr eak s bl oc k ed * 1 7 5 outbr eak s T otal inc r emental pr otec tion*. ov er 9 4 d ays *June 2005 Jul y 2006. C a l c ul a t ed a s p ub l i c l y p ub l i s h ed s i g na t ur es f r o m t h e f o l l o w i ng v end o r s : S o p h o s, T r end M i c r o, C o m * p ut J une er A s s2 o 0 c 0i a 5 t es J, F uly -S ec 2 ur 0 0e, 6 S. y m a nt ec a nd M c A f ee. I f s i g na t ur e t i m e i s no t a v a i l a b l e, f i r s t p ub l i c l y p ub l i s h ed a l er t t i m e i s us ed.

E m ail C om pliance S olutions N ex t G en eration C om p l ian c e F il ters P r e -P a c k a g e d P o l i c i e s a n d L e x i c o n s f o r C o m m o n R e g u l a t i o n s M u l t i -C a t e g o r y P a t t e r n M a t c h i n g S i g n i f i c a n t l y Reduces False P o si t i v es P o st X e n c r y p t i o n E a s y -t o -u s e, e a s y -t o -d e p l o y S e n d t o a n y e m a i l i n b o x, n o u s e r s o f t w a r e r e q u i r e d H i g h P f o r m T L S E n c r y p t i o n C o n f i g u r e d K e e p s B u s i n e s s C o m m u n i c a t i o n s P r i v a t e er an ce PR E -PAC K AG E D L E X I C O N S

IronPort E m ail S ecurity M anag er S in gl e v iew of p ol ic ies f or the en tire organ iz ation C at eg o ri es: b y D o mai n, U sername, o r L D A P A l l o w a l l m e d i a f i l e s Q u a r a n t i n e e x e c u t a b l e s I T M a r k a n d D e l i v e r S p a m D e l e t e E x e c u t a b l e s SAL E S A r c h i v e a l l m a i l E mail Sec ur ity M anager s er v es as a s ingl e, v er s atil e d as hboar d to manage al l the s er v ic es on the appl ianc e. -- P C M a g a z i n e 2 / 2 2 / 0 5 V i r u s O u t b r e a k F i l t e r s d i s a b l e d f o r. d o c f i l e s L E G AL

Web Security Overview I RO N P O RT S -S E RI E S W E B S E C U RI T Y A P P L I A N C E

IronPort S -S eries N ex t G en eration W eb S ec urity P l atf orm L 4 t r a f f i c m o n i t o r i n s p e c t s a l l t r a f f i c W e b r e p u t a t i o n f o r p r e v e n t i v e f i l t e r i n g I n t e g r a t e d c o m p l e t e c o n t e n t i n s p e c t i o n A c c e p t a b l e U s e U R L f i l t e r i n g f o r c o r p o r a t e p o l i c y I r o n Po r t S6 5 0 / S3 5 0 T h e W o r l d s B e s t W e b Se c u r i t y Sy s t e m L 4 T ra f f i c M oni tor M A N A G E M E N T T O O L S IronPort U R L F i l ters IronPort Web R ep u ta ti on F i l ters A nti -M a l w a re S y s tem I ro np o rt A sync O S W eb S ec u ri t y P l at f o rm

IronPort U R L F ilters C om p rehen siv e C ap ab il ities B i g g e s t, b r o a d e s t a n d b e s t d a t a b a s e 5 2 c a t e g o r i e s, 2 1 M + s i t e s, ~ 3. 5 B w e b p a g e s 1 / 3 r d o f t h e d a t a b a s e i s i n t e r n a t i o n a l F l e x i b l e p o l i c y m a n a g e m e n t P e r u s e r, p e r g r o u p p o l i c i e s M u l t i p l e a c t i o n s, i n c l u d i n g monitor onl y V i s i b i l i t y E a s y t o u n d e r s t a n d r e p o r t s C o m p r e h e n s i v e l o g g i n g & a l e r t i n g

W W eb R eputation F ilters D ata M ak es the D if f eren c e P ar am et er s U R L B l ac k l i st s U R L W h i t el i st s U R L C at eg o ri z at i o n D at a HT M L C o nt ent D at a U R L B eh av i o r G l o b al V o l u me D at a D o mai n R eg i st rar I nf o rmat i o n D ynami c I P A d d resses C o mp ro mi sed Ho st L i st s W eb C raw l er D at a N et w o rk O w ners K no w n T h reat s U R L s O f f l i ne d at a (F 5 0 0, G 2 0 0 0 ) W eb S i t e Hi st o ry Se n d e r B a s e D a t a T H R E AT PR E V E N T I O D a t a An a l y s i s / Se c u r i t y Mo d e l i n g N I N R E AL T I ME e b R e p u t a t i o n Sc o r e s ( W B R S) -1 0 t o + 1 0

IronPort D ynam ic V ectoring and S tream ing ( D V S ) E ng ine H i g h p e r f o r m a n c e s c a n n i n g M u l t i p l e v e r d i c t e n g i n e s u p p o r t W e b r o o t L a r g e, a c c u r a t e s i g n a t u r e d a t a b a s e A u t o m a t e d t h r e a t r e s e a r c h s y s t e m ( P h i l e a s ) B a c k e d b y i n -h o u s e T h r e a t R e s e a r c h T e a m I IR R O O N N P P O O R R T T D D V V S S E E N N G G I IN N E E R R E E PU T T AT I IO O V E R D I C T E N G I N E 1 V E R D I C T E N G I N E 2 V E R D I C T E N G I N E N N N -B -B ASE D D V V E E R R D D I IC C T T C C AC H H I IN N G G

W eb S ecurity M onitor S y s t e m O v e r v i e w W e b T r a f f i c T r e n d s S i t e A c t i v i t y S i t e D e t a i l C l i e n t A c t i v i t y C l i e n t D e t a i l C a t e g o r y D e t a i l M a l w a r e D e t a i l s M a l w a r e T r e n d s L 4 T r a f f i c M o n i t o r W e b R e p u t a t i o n

m m IronPort S-Se ri e s Aurora Health Care Case Study A u rora H e a l th C a re s c h a l l e ng e : 1 3 H o s p i t a l s, 1 0 0 c l i n i c s, 3 0, 0 0 0 u s e r s S i g n i f i c a n t m a l w a r e & s p y w a r e i n f e c t i o n s R e q u i r e m e n t f o r H I P P A c o m p l i a n c e ~ 8 s e r v e r s r u n n i n g W e b s e n s e I ronp ort S ol u tion B l o c k e d ~ 2 M a d d i t i o n a l s u s p e c t t r a n s a c t i o n s / w e e k ( d o w n l o a d s. h o t b a r. c o m, a. t r i b a l f u s i o n. c o m ) R e p l a c e d 8 s e r v e r s w i t h 2 I r o n P o r t S -S e r i e s S p y w a r e f i l t e r i n g a c c u r a c y i n c r e a s e d b y 3 x P h o n e h o m e m o n i t o r i n g e n a b l e d H I P P A c o m p l i a n c e S e r v e r s c o n s o l i d a t e d b y 7 0 % w e h a v e b e e n v e r y c o n c e r n e d a b o u t l e v e l o f a l w a r e i n f e c t i o n s i n o u r n e t w o r k. T h e f a c t t h a t t h e S - S e r i e s a l l o w s u s t o s t o p a l w a r e a t t h e n e t w o r k e d g e w h i l e a l s o a l l o w i n g u s t o d e p l o y U R L f i l t e r i n g p o l i c i e s i s a b i g a d v a n t a g e f o r u s. " T im S omme rs A u rora H e a l th C a re

IronPort Perimeter SS ec uu rity AA pp pp ll ia nc es Thank you