SafeNet Content Security Product Overview Protecting the Network Edge
From idea to action, SafeNet smartly protects information as it moves through its lifecycle. With data encryption and control solutions, organizations can provide persistent protection of sensitive data throughout its lifecycle, wherever it resides from the data center to the endpoint to the network edge and into the cloud. esafe provides content security, data control, and data leak prevention (DLP) solutions for incoming and outgoing Internet traffic through the edge of the network, including web surfing (web security gateway) and messaging (mail security gateway).
Whether you are a small business facing a specific security threat or an enterprise enhancing your comprehensive security deployment, esafe s solutions and services for web and mail gateways ensure your network edge is safe from external and internal security threats and breaches. esafe provides the most comprehensive solution for real-time, intelligent inspection of all incoming and outgoing web and mail traffic in the content security market. Offering the performance and scalability needed for your organization to stay flexible and productive, esafe deeply inspects all content, including legitimate sites, encrypted traffic, and web-enabled applications and does it with the wire-speed performance required for total transparency. Central Management, Logging, Reporting Threats Evolution HTTP Security Compliance Control Productivity HTTPS WWW FTP Webmail Dual Anti-malware engine Data Leak Prevention Application Filtering Content Filtering & Anti-spam As the Internet has evolved into the dynamic and wide-open Web 2.0, the business of ecrime has evolved along with it. ecrime is now a highly profitable and targeted business model that capitalizes on the new weaknesses of an open Web. Cybercriminals are developing malware that has been purpose-built to find its way around traditional security solutions. This evolution requires a different way of thinking. Point in time reputation and categorization products simply don t address today s real-time threats. The secure gateway solution you choose needs to be as smart and dynamic as the threat itself. ecrime The advent of the Internet created endless opportunities for criminals to make money with almost zero risk. Unfortunately, ecrime has become a profession with a widespread reach that would have looked like science fiction just ten years ago. From finding the opportunities, researching security vulnerabilities, choosing the tools and methods of operation, operating and feeding the food chain (through money laundering), and making money by sending spam and phishing e-mail via infected computers, the race will always be between strong security solutions and ecrime professionals/amateurs, and who can stay one step ahead. Internet Evolution Threat Evolution Web 0.1 Web 1.0 Web 2.0 Amateur fame driven Professional Spammers, Fraudsters Organized ecrime Innovation and feature development are still being driven by smaller, dedicated SWG companies; the traditional incumbent URL-filtering, antivirus and proxy cache vendors are still playing catch-up. Protection Evolution URL Filter Web/Mail Anti-virus Application-aware Web Security Gateway Gartner 2010 Magic Quadrant for Secure Web Gateway
Web Security Gateway Web security gateways need protection from both external and internal threats. Facing the challenges of ecrime, data leakage, and decreased productivity, companies become more and more vulnerable, and require a variety of defenses in order to protect their data and intellectual property. esafe s Web Security Gateway works in real time to filter malicious content as it enters your network, analyzing http and ftp traffic for any trace of malicious, inappropriate, or otherwise restricted content and applications. In addition, it monitors all outgoing traffic with advanced data leak prevention (DLP) features to keep information from leaking out of the organization. esafe s new Web 2.0 Script Analysis Engine knows how to treat the latest up-to-date malware and web exploits automatically. Mail Security Gateway E-mail security gateways are constantly exposed to evolving threats. Whether these threats come in the form of spam, phishing attempts, spyware, malware, data leakage, or other content-related risks, companies must be alert and rapidly adapt in order to guarantee incoming and outgoing traffic through its mail gateways is secure. esafe s Mail Security Gateway uses a dual anti-spam engine with real-time reputation and distribution pattern technology to block sudden spam, malware, and virus outbreaks, as well as protect sensitive information by preventing data leakage. Providing both real-time reputation and deep content analysis in a single integrated solution, esafe s Mail Security Gateway protects your organization from the wide range of threats posed when using e-mail. esafe Modules Security - Anti-Malware, Anti-Spyware, and Antivirus esafe s security modules use multiple technologies to protect your network and e-mails from malicious code, spyware, and attempts to exploit web applications vulnerabilities that lead to malware infection. Unlike other solutions that focus mainly on inspecting downloadable files for viruses, esafe provides (with the Kaspersky engine) malweb detection (specific web malware). Malweb is hidden within standard web content and is designed to exploit various vulnerabilities on Internet-enabled applications, such as browsers, browser plug-ins, and any other application that interacts with the web. esafe is able to proactively detect attempts to exploit those vulnerabilities before they are actually penetrated, rather than detecting malware that is being downloaded as a result of the exploitation. Application and Web 2.0 Control esafe s Application and Web 2.0 Control modules provide granular control of web-enabled applications, regulate the usage of the Internet, and prevent unauthorized, unwanted, or dangerous operations that can lead to infection or information leakage. esafe s Web 2.0 Control module prevents Web 2.0-based applications from bypassing existing security measures and creating holes through which spyware, Trojan horses, viruses, and other malware can attack a network.
The AppliFilter provides complete real-time protection against malicious, dangerous, and unwanted applications, using more than 500 application protocols in more than 20 application categories. By monitoring, controlling, and blocking applications at the gateway, the network will be guarded in real time, enabling only the use of permitted applications, while remaining completely transparent to users. Unlike other solutions, esafe, in an effort to improve productivity, offers Web Quota Control, allowing administrators to monitor and enforce company policy for users and groups that routinely exceed their daily web quota. Data Leak Prevention (DLP) esafe s Data Leak Prevention (DLP) module enables control of all outbound traffic, assuring that only what is 100% identifiable as confidential information is blocked and remains within the network. The DLP module helps with regulatory compliance, minimizes false positives, and provides extensive forensics and discovery tools. The practical approach behind esafe s DLP enables inspection of all outbound traffic from the organization to the Internet (web, mail, and FTP). With more that 20 out-of-the-box dictionaries for over 150 file types, and full Unicode support, the DLP module can administer granular policies by user or group, and can generate actions to report, block, archive, or alert, as well as create reports to ease monitoring and administration. Additionally, administrators can customize the DLP dictionaries to fine-tune them to meet their organization s needs or create their own dictionaries. Unlike DLP products that require a complicated configuration and deployment, esafe s DLP module provides all the necessary features that enable companies to be more compliant and receive easy-to-manage basic DLP abilities. esafe s DLP module is a part of the product and provides the DLP features at no additional cost. Content Filtering esafe s Content Filtering module prevents access to unauthorized, inappropriate, and malicious websites, protecting your organization from legal liabilities while increasing security and productivity. Administrators are able to identify web surfing patterns and finetune web policies through granular control of user/group policies, and extensive web activity monitoring and reporting. With over 150 million categorized websites, in 70 categories, updated 12 times a day, esafe is based on unique artificial intelligence, web-classification technology that enables administrators to control streaming media per website category. esafe uniquely uses only local dynamic cache with common URLs, eliminating the need for a large local database or constant updates. SSL Inspection esafe s SSL Inspection protects the network from malicious code trying to enter over SSLencrypted traffic.esafe provides full inspection of HTTPS/SSL web traffic using transparent trusted Man-in-the-Middle (MitM) technology, enforces SSL usage policy, and certifies validity. The Importance of DLP Organizations want to protect their internal information against leakage to the outside world, and strong perimeter protection must also monitor outbound traffic to the Internet to ensure security policies are enforced. In their recent research, Putting the P in DLP, the Aberdeen Group wrote that the Crawl, Walk, Run approach is a pragmatic template for successful enterprise-wide rollouts of all IT security initiatives, and DLP is no exception. Inspecting all outbound traffic from the organization to the Internet (web, mail, and FTP). Recognizing the format of more than 150 different file types, including all MS Office formats, PDF, and archives Logging all events related to document distribution, including the time stamp, who sent it, where it was sent, and even the meta-data of the document More than 20 pre-defined dictionaries that are designed to find sensitive content, such as PII, credit card numbers, source code, profanity, and regulations such as SOX, PCI, and HIPAA Using MitM technology enables esafe to open all encrypted communication and re-encrypt it, as well as provides full control of content even when the content is encrypted,- for example, in Gmail. In addition to checking that the certificate is signed, esafe also checks that the certificate is valid and has not been revoked. Also, transparent SSL inspection is built in to protect bridge and router modes.
Anti-Spam and Anti-Phishing esafe s dual anti-spam engine for e-mail security provides complete protection, total control, and increased productivity. Combining reputation and content strategies, esafe s anti-spam module delivers both real-time reputation and deep content analysis technologies in a single, integrated solution. Using two engines enables detection of 99% of all spam and phishing attempts, and minimizes the false positives to almost zero, assuring that users receive only relevant and trusted e-mails. esafe provides global protection against e-mail and web phishing attempts, regardless of language or country of origin, and blocks phishing attacks when they are hidden on legitimate websites or when they are delivered through Web 2.0 applications. Real-time Detection Center www Engine 1 Engine 2 Real-time reputation analysis: Deep Content inspection: Management and Reporting esafe s Management and Reporting module provides administrators with advanced features that enable them to easily monitor the network and maintain the organization s security policy throughout the network. Administrators are in the know of anything that happens in the network through a real-time overview of the company s internal security and Internet usage, enabling them to quickly take action when the network is threatened or under attack, and provides detailed, user-friendly management-level Internet usage reports. esafe s Security Center is the management console that enables administrators to configure and enforce the content security policy throughout the network. esafe s Management and Reporting module provides security teams with an array of powerful tools for ongoing review and analysis of network traffic, employee productivity, and policy compliance. esafe enables administrators to easily communicate any security issues and rationally justify new requirements to executive management.
Delivery esafe offers robust and flexible delivery options with multiple deployment modes. With a built-in active cluster for high availability and load balancing that supports bridge and router deployment modes, esafe ensures redundancy and Internet service availability at no extra cost. Flexible Deployment Both esafe Web Security Gateway and Mail Security Gateway support multiple deployment modes. This flexibility ensures esafe s simple and painless implementation on the customer s network. esafe s flexible deployment modes are: Transparent inline bridge (web & mail) Router (web & mail) Proxy with cache (web) Forwarding Proxy (web) Proxy with WCCP support (web) As a PC Specialist at a major state college, I had to go from lab to lab three or four times a day removing virus infections. I received a demo disk for evaluation and my life changed. After evaluating the esafe product and cleaning the critical research labs, I presented the product to the College Dean and soon ordered a site license, which grew into an enterprise license solution. I love the esafe enterprise products! Eddie G. Holman IT Professional ICAP server (web) SMTP Relay (mail) High Availability / Load Balancing esafe s technology supports a wide range of high availability/load balancing solutions, including built-in inline bridge cluster, router cluster, and support for third-party L3-L4 switches. Choose your product u Choose the platform u Choose deployment mode Web Security Gateway (Anti-virus, Application Filter) Web Security Gateway PLUS (Anti-virus, DLP, Application Filter, URL Filter) Web SSL Security Gateway (SSL/HTTPS traffic inspection) Mail Security Gateway (Anti-virus, Anti-spam, Anti-phising, DLP) XG-110 Appliance XG-220 Appliance XG-300 Appliance Transparent inline bridge/router mode Proxy mode ICA mode SMTP mail relay Product Care and Support esafe provides a full range of product care and support services, including support programs and a wide range of online resources, to keep the security infrastructure updated and enable the esafe team to react to any request in a timely manner. The services also include software upgrades, critical security updates, and hardware replacement when necessary. Appliances Appliance Target Audience Capabilities XG110 SMBs and branch offices Up to 700 users XG210 Medium enterprises Up to 3,000 users XG300 Large enterprises and ISP data centers Up to 7,000 users XG1000 Telco, ISP security services, and government Up to 100,000 users
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com Follow Us: www.safenet-inc.com/connected 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. FB (EN)-08.10.10