Basic Email Funneling MX Verify and Redundancy. Why E-Mail Sorting Solutions? Why Vircom?



Similar documents
Premium Filtering MX Verify, Redundancy, Virus & Spam. Why Sorting Solutions? Why Vircom?

Total Message Care. Why Sorting Solutions?

Web Content Filtering. Why Sorting Solutions? Why ST BERNARD?

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

eprism Security Appliance 6.0 Release Notes What's New in 6.0

SESA Securing with Cisco Security Appliance Parts 1 and 2

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Top 10 Features: Clearswift SECURE Gateway

WHITE PAPER. Safeguarding your Infrastructure INSIDE MODUS TECHNOLOGY

Deployment Guide. For the latest version of this document please go to:

IronPort X1000 Security System

Reliable & Secure . Professional, Dependable, Complete Easy to Learn, Use and Grow

V1.4. Spambrella Continuity SaaS. August 2

Security Policy JUNE 1, SalesNOW. Security Policy v v

Eiteasy s Enterprise Filter

MDaemon Vs. Microsoft Exchange Server 2013 Standard

Mod 08: Exchange Online FOPE

Barracuda Security Service

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Filtering Course 221-v2.2 Course Overview

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5

Service Launch Guide (US Customer) SEG Filtering

Cisco IronPort X1070 Security System

BUILT FOR YOU. Contents. Cloudmore Exchange

Access Webmail, Collaboration Tools, and Sync Mobile Devices from Anywhere

Intercept Anti-Spam Quick Start Guide

Guardian Digital Secure Mail Suite Quick Start Guide

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Barracuda Spam Firewall Administrator s Guide

Websense Security Transition Guide

Preface Introduction to Proofpoint Essentials... 5

Integrating cloud services with Polaris. Presented by: Wes Osborn

Frequently Asked Questions

Installing GFI MailEssentials

Outlook. Sharepoint. Lync. BlackBerry. McAfee. Microsoft Hosted Exchange

Installing GFI MailEssentials

Exim4U. Server Solution For Unix And Linux Systems

GFI Product Manual. Getting Started Guide

Migration Project Plan for Cisco Cloud Security

MAILGUARD LIVE. Continuity. Trust the innovator to simplify cloud security

Securing enterprise collaboration through and file sharing on a unified platform

Setting up Microsoft Office 365

Configuration Guide for Exchange 2003, 2007 and 2010

Securing enterprise collaboration through and file sharing on a unified platform

Feature Comparison Guide

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

Core Filtering Admin Guide

INLINE INGUARD GUARDIAN

Cloud Services. Anti-Spam. Admin Guide

Implementing MDaemon as an Security Gateway to Exchange Server

Trend Micro Hosted Security. Best Practice Guide

The benefits of using a perimeter-based managed service

The Leading Security Suites

Microsoft Exchange 2003

Migration Quick Reference Guide for Administrators

Norman Protection

The versatile solution of anti-spam, personal backup and recovery, easy security policy management and enforcement.

Solutions IT Ltd Virus and Antispam filtering solutions

FortiMail Filtering. Course 221 (for FortiMail v4.2) Course Overview

1 Introduction About this manual Terms and conventions used in this manual 12

How To Get The Most Out Of Your From Your Mail Server (For A Small Business)

Visendo Suite a reliable solution for SMBs

Cisco IronPort C670 for Large Enterprises and ISPs

IronPort C350 for Medium-Sized Enterprises and Satellite Offices

Mailwall Remote Features Tour Datasheet

Cisco Security Appliances

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

Evaluation Guide. eprism Messaging Security Suite V8.200

Symantec Messaging Gateway 10.5

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

If your response to any of the questions above was Yes, then SmarterMail Enterprise Edition may be right for you.

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

How To Set Up A Barcuda Server On A Pc Or Mac Or Mac (For Free) With A Webmail Server (For A Limited Time) With An Ipad Or Ipad (For An Ipa) With The Ip

Setting up Microsoft Office 365

Features and benefits guide for partners and their customers

Installing GFI MailSecurity

Cisco Cloud Security Interoperability with Microsoft Office 365

Core Protection Suite

Symantec Hosted Mail Security Getting Started Guide

TEAL: Transparent Archiving Library

Quick Start Policy Patrol Mail Security 10

Comprehensive Filtering. Whitepaper

Transcription:

Basic Email Funneling MX Verify and Redundancy Why E-Mail Sorting Solutions? Why Vircom?

Why? Focused on Managed Messaging SaaS Security Systems Own Superior-Architected Infrastructure DATACENTERS: Carrier-class hosting facilities with power and back-up power supplies, Generator, temperature, humidity control and fire suppression systems 12 hours of battery life and 24 hours of generator fuel with contracts for 4 hour diesel fuel delivery Onsite technician SERVER FARM Server Clusters for Web services, E-mail funneling services and Backend SQL databases System is based on Cisco, Dell and EMC hardware Access to server Web and E-mail clusters is controlled by Load-Balancers to distribute IP connection across hardware and allow for easy addition of new hardware and autodetection/removal of down equipment without interruption. System is monitored and automatic alerts sent out when failures or heavy loads are detected. Stats stored for future growth projection Dual redundant/load-balanced fiber optic IP internet connections to Tier 1 internet back-bone providers. Our clusters of servers are directly connected to the internet via Gigabit Fiber and OC-12 internet feeds from two distinct tier-1 service providers SUPPORTED BY CERTIFIED ENGINEERS Linux, MCSE, CCNA, CCNP, CCDA certified engineers maintain our own infrastructure and provision our equipment and software as a service. 1-866-660-4292

Focused on Email Security Software since 1995 Own Well-Architected Software Technology Not open to hackers and spammers Promptly adapts to new threats or regulations Flexible to incorporate specific customer requirements Mature Technology Industry-acclaimed > 10 years, >100 countries and >1,300 clients Millions of protected mailboxes Multiple awards for performance and value Basic Email Funneling MX Verify & Redundancy service is a first pass email processing strategy for organizations managing their own email servers and utilizing their own internal software Spam and virus solutions. IT departments can take advantage of the Premium Email funneling service, in parts, by using our data centers to reduce your email handling volumes, fully back up your local email system, without employing Spam and virus management applications. Managing Spam is a full time process. Let AASP help your IT staff to focus on the spam email we forward to your actual users, we ll focus on perimeter protections, attacks, and back up to your email systems. Why? Basic Email Funneling offers companies multiple methods of user authentication to verify that only legitimate mail is passed from our world class email data centers to your email servers, even if it is not scanned for Spam. DNS attacks, directory harvesting, and email bombs are defended at our data centers forwarding only user verified email, which can reduce your own email processing loads from 50% up to 90%. For pennies per email account per month, AASP Basic Email Funneling can add carrier grade value with enterprise level uptime, while reducing the infrastructureand processing load required to manage the ever increasing problem of Spam.

Together Focused on Selective PERIMETER Email Security Strong Perimeter Defence Protects AASP mail servers against: Dictionary Harvesting attacks (DHA), DoS attacks, Open Relay attacks. Reputation Filters Other controls This represents approximately 70+% of Spam! As AASP servers are protected, our channel partners and their clients email servers are never threatened! Perimeter Defense: 1. Protocol filter 2. Reputation Filters: - Reverse DNS lookup - SPF mechanism - Accreditation DB s 3. Block DHA attack 4. Connection limits 5. Block connections 6. Mail Relay Control 7. SMTP security - SMTP Authentication - 128-bit TLS Encryption

Why? Focused on our Managed Messaging Clients Since 2003 Over the years, we ve answered the requests of our end user focus groups and our channel partners by PROVIDING: No risk, guaranteed service, cancelable at will. No set up fees, maintenance fees or upgrade fees. No hardware or software purchases or licenses needed, no changes to legacy systems. No-long term contracts, just month to month actual billing. Private Labeling Create market confidence with your own brand name premium email funneling services, instill assurances backing your service with the Vircom software name, offer seamless and quickly noticed upgrades whether converting from current filtering services or in-house solutions. The ability to create your own channel partners and re-label again to as many selling partners as the market will bear with street pricing limits. Virtual ownership of our World-class infrastructure, use our redundant data centers to guarantee uptime, speed, and ironclad reliability to process huge volumes of email in milliseconds. Volume license sharing in the World-renowned, award winning VIRCOM email filtering software through us, with out of the box performance. Real time monthly billing safeguarding against turnover, with accurate user verification and unlimited email aliases, meaning fair and exact billing for only the email accounts benefiting from the Funneling service. As the number of filtered email boxes fluctuates, so do the amounts charged to our channel partners and their customers. Standard inbound, disaster recovery. Web based management center for Administrators. Free 30-day trial period, irrespective of mailbox deployment size. 1-866-660-4292

Focused on Email Security Technology since 1995 Why? MESSAGE FUNNELING TECHNOLOGY The core focus of email funneling is to eliminate invalid user named email that is attempting to find an inbox through your own or your customer s email server. This would seem like a limited amount of email for any receiving email server to process, identify, and reject but this represents 50% or more of the email load processed by receiving email servers each day. Our user verification protocols are simple technologies built into most email servers themselves. Email servers allow for these common user verifications between ESS and the email server(s) we are protecting; 1). LDAP 2). SMTP Authentication 3). SMTP Verify ESS can also employ a manually managed static list of email mail users to forward or reject invalid email addresses with. Sharing an email user list enables the funneling service without an external integration with the security network (ESS) to verify users. The drawback to a static list is it must be manually updated by both sides, ESS and the receiving email server.

Why? Focused on Email Security Technology within our own Technology Since 2006 How does Basic Email Funneling Work? By redirecting your email traffic through AASP data Funneling centers (MX Record Change), the world remains unaware that anything on your end has changed, even the speed is the same as email is processed in milliseconds. How we make it work We disable our own engine scans and simply authenticate email passing through our system as belonging to a known user, on your domain. We work with you to set up an authentication method. When our system and your system can match inbound email with actual email users, all un-named inbound email is bounced without notification. All email addresses have a send to formula that directs sent email to the proper email server, for delivering on to the receiver's inbox that formula is the MX Record. Since the MX Record is pointing to us, we now verify the email has a valid user address and forward the email (Spam included) to the intended email server. Forwarded email is then server scanned internally and then forwards on to the users inbox. Provisioning: 1. Create an Account by adding domain name(s), mail server IP, DNS name, aliases, and named administrator(s) 2. Secure Email Traffic -Block all receiving email that is not from ESS 3. Select User Verify Option by best method that fits your system 2. Redirect Email Traffic by changing MX Record to point to our data centers, server clusters

Focused on Effortless Administration Set it and forget it Why? Automation Automated User/Account Management Automatic Population of User DB (SMTP, LDAP ) Authentication & User Verification 24/7 Automated Anti-Spam & anti-phishing Updates Up to every 5 minutes. Matchless self-learning mechanism Honeypots/Spamtraps User feedback: ISP partners, Corporate users Supported by Human Analysis Vircom s SpamBuster Team Minimal False Positives Every input benefits to All

Why? & Feature Summary Basic Email Funneling August, 2007 Email Protection Feature Status Description Spam Filtering NO 98.6% out of the box Virus Blocking NO Commercial Updates Connection Defense NO Block/Allow by IP etc Delivery Configuration Yes Load Balance, Fail Over Reports NO Web Based & Emailed Message Center NO Web User Interface Quarantine Summary NO Email & Web Based User Authentication Verify Yes Verify User or Bounce Directory Harvest Attack Configurable AASP Servers Attacked, Client Perimeter Defended Spam Email Bomb and Virus Attack protection Configurable AASP Servers Attacked, Client Perimeter Defended Spooling Redundancy Yes Up to 3 Days w/notification Attachment Control NO Size and File Type Inbound Content Manager NO Standard/Custom Scripting Transport-Layer Security (TLS) NO Encryption Industry Heuristics NO Standard/Custom Scripting User Directory Management (LDAP-SMTP) Yes Auto-User Authentication Outbound Services Attachment Manager Content Manager/Corporate Secrets Quarantine Virus Filtering/Downside Liability Compliance Footer NO Enterprise Rich control for (AUP) Acceptable Use Policy Instant Messaging NO Managed Addition Archiving NO Managed Addition Private Labeling Yes Client Identity on Services Aggregate Pricing for Core Services/Reselling Yes Channel Ready Cancellation/Performance Clause Yes 99.999% Uptime Guarantee Monthly Churn Protection Yes Auto-User Verify, Aliases waived, Actual Billing Migration Consulting NO Black/White List Import