Network Box. s e c u r i t y i s a s e r v i c e

Similar documents
Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

McAfee Endpoint Protection Products

Cisco Security Intelligence Operations

ESET SMART SECURITY 6

Cyberoam Perspective BFSI Security Guidelines. Overview

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Cisco Advanced Malware Protection for Endpoints

Cisco Cloud Security Interoperability with Microsoft Office 365

ESET Endpoint Protection Advanced

Quick Heal Exchange Protection 4.0

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Zscaler Cloud Web Gateway Test

Check Point Security Administrator R70

Network Security Solution. Arktos Lam

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

User Documentation Web Traffic Security. University of Stavanger

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

When Reputation is Not Enough. Barracuda Security Gateway s Predictive Sender Profiling. White Paper

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

NetDefend Firewall UTM Services

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Anti-Bot and Anti-Virus

Networking for Caribbean Development

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Man, Machine and DDoS Mitigation

Security Administration R77

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite

Sonicwall Reporting Server

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

IT Sicherheit im Web 2.0 Zeitalter

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

NetDefend Firewall UTM Services

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Next Generation IPS and Reputation Services

Reduce Your Virus Exposure with Active Virus Protection

One Minute in Cyber Security

The SIEM Evaluator s Guide

Cisco Services for Intrusion Prevention Systems Customer Q&A

Guideline on Auditing and Log Management

FORTIGUARD SERVICES: REAL TIME RESPONSE TO SECURITY THREAT OUTBREAKS

NESCOT Cyberoam Training Academy

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Achieving SOX Compliance with Masergy Security Professional Services

ESET SMART SECURITY 9

Veranderende bedreigingen Security in het virtuele datacenter

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Symantec Advanced Threat Protection: Network

VESZPROG ANTI-MALWARE TEST BATTERY

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

A progressive and integrated approach to protecting corporate networks

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

ESET NOD32 ANTIVIRUS 9

Endpoint Business Products Testing Report. Performed by AV-Test GmbH

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

ESET NOD32 ANTIVIRUS 8

Remote Maintenance with Security Appliances FL MGuard RS2000 and RS4000. Economic and Reliable Service

avast! Business products 2012

Anti-Virus Comparative - Proactive/retrospective test May 2009

Advantages of Managed Security Services

WHY HONEYPOT TECHNOLOGY IS NO LONGER EFFECTIVE

Cisco RSA Announcement Update

Cisco Advanced Malware Protection for Endpoints

Unified Threat Management, Managed Security, and the Cloud Services Model

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Fortinet Advanced Threat Protection- Part 3

Need for Archival Solution

Lesson 5: Network perimeter security

Streamlining Web and Security

Cisco Security Appliances

Lumension AntiVirus Technical Notification December 19, 2012

A Case for Managed Security

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

Network Box. Network Security Trends In Asia June 2008

Cisco Advanced Malware Protection

Edge-based Virus Scanning

Symantec Endpoint Protection

Managed Security Services

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business.

Managed Services. Who are NCI Technologies? Full support for your IT systems and users, without the hassle or expense of an in-house IT department

SESA Securing with Cisco Security Appliance Parts 1 and 2

The User is Evolving. July 12, 2011

Deploying Steelhead Appliances with Symantec Endpoint Protection 11.0

Automated Protection on UCS with Trend Micro Deep Security

BitDefender Client Security Workstation Security and Management

Features Business Perspective.

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Chapter 9 Firewalls and Intrusion Prevention Systems

Small Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely

Building a Web Security Ecosystem to Combat Emerging Internet Threats

End-user Security Analytics Strengthens Protection with ArcSight

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Samsung SDS. Enterprise Mobility Management

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Sophos Cloud and Partner Dashboard Jonathan Shaw

Transcription:

Network Box s e c u r i t y i s a s e r v i c e

The Internet never sleeps, attacks are absolutely relentless, twenty-four hours a day, all year round.

Network Box UTM+ Comprehensive Internet Threat Protection Firewall (State-of-the-art Hybrid Design) VPN (Virtual Private Networking) IDP (Intrusion Detection and Prevention) Multi-Layered Anti-Virus Gateway ( + M-Scan) Multi-Layered Anti-SPAM Gateway Multi-Layered Anti-Spyware Gateway Multi-Layered Content Filtering Gateway Company Policy Enforcement Gateway Traffic Shaping, Policing and Quality of Service Control Real-Time, PUSH Update Technology (updates in under 45 seconds) Real Time, Weekly, and Monthly, Automated Report Generation Real Time, in-the-cloud, Management and Monitoring

The number of security updates required each day is growing rapidly, and these updates are critical. Real-Time Updates: Intrusion Detection and Prevention Security Patches; Malware Signatures; SPAM Signatures; Content Filtering Database 1200 1000 800 600 817 1044 400 388 512 200 0 8 12 20 53 104 162 223 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 Statistics Network Box Security Operations Centre Mean Average Updates, Per Day

Traditional Anti-Virus Engines Typical anti-virus industry practice, is to release malware signatures to clients only several hours after a virus first appears. The virus sample has to be obtained. Then the virus sample has to be analyzed. Anti-virus signatures then have to be produced. Prior to release, these signatures have to be validated. Often that validation needs to be done across multiple platforms. Only if additional iterations are not required, are the signatures released. Of course, in most cases, released is not the same as in production. Client systems will still need to download the updates. It is not unusual for this type of process to take between three to twelve hours. Which is just not fast enough.

The anti-virus engine is completely different. The signature cycle is brought down from several hours, to just a few seconds. Virus samples are obtained in real-time, from over 150,000 traps which are in-the-cloud, waiting for virus attacks to occur around the clock. Multiple samples, from different sources, of the same suspicious object, are correlated in real-time, to ascertain a confidence level. Once the confidence level reaches a pre-set limit, suspicious samples are automatically escalated to security teams for in-depth analysis of the outbreak and formal signature release. The confidence levels are published in a global real-time database and queried by a module on each Network Box in real-time. Real world performance monitoring, shows that can achieve signature release times of under 3 seconds.

Malware Writer s

Zero Day Virus Malware Writer s

Zero Day Virus Malware Writer s Command and Control System Malware Writer s

Zero Day Virus Malware Writer s Command and Control System Malware Writer Bot-Net s

Zero Day Virus Malware Writer s Command and Control System Malware Writer Bot-Net s

Network Box Security Response Outbreak System M-Scan Lab s

Outbreak System Network Box Security Response Outbreak System M-Scan Lab s

Outbreak System USA Region European Region Signature Servers Asian Region

Network Box Client Gateway Outbreak System USA Region European Region Signature Servers Asian Region

Network Box Client Gateway Outbreak System USA Region European Region Signature Servers Asian Region

Z-SCAN Anti-Virus Comparison M-Scan Typical AV Engines Total 1 16 1 Current Signature Total 100+ 5 Million+ 3,500 2 Million Malware Gathering Real Time Real Time Batch Processing Update Technology Used In-The-Cloud PUSH PULL Typical Signature Creation 1 30 Seconds 10-120 Minutes 3 12 Hours Typical Signature Release 2-3 Seconds 30 45 Seconds Hourly / Daily Expected Best Response Time 3 Seconds 10.5 Minutes 3.5 Hours

Z-SCAN Anti-Virus World Class Technology servers are active right across the globe, and work seamlessly with Network Box s existing award winning M-Scan Anti-Virus systems Over 150,000 virus traps are already deployed Ultra high speed zero-day virus response Best response times ofjust 3 seconds Performance 4,200 times faster than typical gateway anti-virus systems; which are protecting the majority oforganizational networks today