Symantec Brightmail Anti Phishing

Similar documents
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Symantec Messaging Gateway powered by Brightmail

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.6

2012 Endpoint Security Best Practices Survey

Balancing Cloud-Based Benefits With Security. White Paper

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

INFORMATION PROTECTED

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Solution Brief: Enterprise Security

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Quarterly Report: Symantec Intelligence Quarterly

How To Protect Your Online Banking From Fraud

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Advanced Threat Protection: Network

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Trust the Innovator to Simplify Cloud Security

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Endpoint Protection Small Business Edition 2013?

How To Get A Cloud Service For A Small Business

Securing Your Software for the Mobile Application Market

SYMANTEC INTELLIGENCE REPORT MAY 2015

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Symantec Protection Suite Add-On for Hosted and Web Security

Symantec Endpoint Protection

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

Corporate Account Takeover & Information Security Awareness

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Payment Card Industry Data Security Standard

Conducting an Phishing Campaign

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Protecting the Infrastructure: Symantec Web Gateway

SYMANTEC INTELLIGENCE REPORT JUNE 2015

Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support

MANAGED SECURITY SERVICES

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

How to Identify Phishing s

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

March 2010 Report #39

Symantec Intelligence Report: February 2013

OIG Fraud Alert Phishing

Security and Trust: The Backbone of Doing Business Over the Internet

Symantec Security.cloud - Skeptic Whitepaper

Advanced Threat Protection with Dell SecureWorks Security Services

Protect Your Business and Customers from Online Fraud

white paper Malware Security and the Bottom Line

Security from the Cloud

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Securing the Mobile App Market

How To Monitor Your Entire It Environment

Protecting Against Online Fraud with F5

Countering Insider Threats Jeremy Ho

Integrating MSS, SEP and NGFW to catch targeted APTs

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise

Symantec RuleSpace Data Sheet

Web Protection for Your Business, Customers and Data

Best Practices Guide to Electronic Banking

Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks

Endpoint Security More secure. Less complex. Less costs... More control.

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise

Data Sheet: IT Compliance Payment Card Industry Data Security Standard

Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s

SR B17. The Threat Landscape Continues to Change: How are You Keeping Pace? Dean Turner

2012 Bit9 Cyber Security Research Report

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

IBM Security X-Force Threat Intelligence

Finding Security in the Cloud

Frequently Asked Questions. Frequently Asked Questions: Prioritizing Trust: Certificate Authority Security Best Practices

Online Cash Manager Security Guide

Symantec Endpoint Protection

May 2011 Report #53. The following trends are highlighted in the May 2011 report:

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Symantec Protection Suite Small Business Edition

The Symantec Approach to Defeating Advanced Threats

Evaluating the Perceptions of People towards Online Security

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Cyber Security Services: Data Loss Prevention Monitoring Overview

8 Key Requirements of an IT Governance, Risk and Compliance Solution

Marble & MobileIron Mobile App Risk Mitigation

SYMANTEC INTELLIGENCE REPORT JANUARY 2015

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Symantec Control Compliance Suite. Overview

Spear Phishing Attacks Why They are Successful and How to Stop Them

McAfee Total Protection Reduce the Complexity of Managing Security

Better Together: Microsoft Office 365 & Symantec Office 365

Symantec Mobile Security

Small and Midsize Business Protection Guide

Symantec Endpoint Protection

Transcription:

Symantec Brightmail Anti Phishing

White Paper: Messaging Security Symantec Brightmail Anti Phishing Contents Introduction............................................................................................ 1 Intelligence gathering.................................................................................... 2 Conclusion.............................................................................................. 3

Symantec Brightmail Anti Phishing Introduction In today s information driven world, cyber criminals are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. One method that is frequently employed is phishing, which the criminally fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by appearing as a trustworthy entity in an electronic communication. Examples of phishing include communications to unsuspecting end users purporting to be from financial Institutions, popular social websites, auction sites, online payment processors or IT administrators. Typical channels for phishing are e-mail or instant messaging, and often direct users to enter details at a fake website which made to look and feel like a legitimate one. Despite the use technology to combat phishing attempts, it normally requires tremendous skill to detect that a website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current Web security technologies. While legislation has been enacted to battle this problem, it shows no signs of slowing down. The Symantec monthly State of Phishing report 1 details phishing activity on a monthly basis, keeping both organizations and home computer users informed and helping them avoid becoming victims of phishing attempts. In addition to implementing technology to help protect against malicious activity on the Web and email, organizations must educate their end-users on phishing to avoid the negative impact of being victimized. Phishing attacks present serious consequences for organizations including loss of data, financial losses as well as loss of brand due to the negative publicity associated with these cases. In today s economic climate, companies can ill afford the loss of brand which ultimately can mean a shrinking customer base. Symantec, with its collection of people, processes and solutions, is uniquely positioned to win the fight against phishing and other cyber-related criminal activity. 1-Symantec monthly State of Phishing report; www.symantec.com/spam 1

Symantec Brightmail Anti Phishing Intelligence gathering Recently, there have been cases where a large organizations were the target of phishing attempts. In one such case, users at an organization received emails that came via SMTP, directing them to click on a URL within the email. The ultimate goal of this phishing attempt was to gain access to information, ultimately leading to financial loss for the company. In another case, end users were sent an email via a Webmail application asking them to provide their username and password. The email, shown below, looks the same as any other message associated with accounts that typical computer users have online asking them to update their information, and thus can easily trick end users into providing credentials to a criminal entity. In both cases, implementing the right technology and educating end users would help in allowing organizations to avoid the negative impact of a successful phishing attempt. Figure 1. Example of a Phishing email Symantec leverages multiple sources to gather intelligence and data on phishing, spam, viruses and other types of malware. This data is analyzed and leveraged by Symantec's portfolio of solutions to help customers protect their organizations from threats to their messaging systems, IT infrastructure, and loss of valuable data. At the core of Symantec's backend technologies is the Symantec Global Intelligence Network, which encompasses some of the most extensive sources of Internet threat data in the world to offer comprehensive and up-to-date. Elements of the Global Intelligence Network focused on phishing include the Symantec Probe Network: more than two and a half million decoy email accounts focused on collecting fraud, phishing and spam samples. In addition to focused techniques, the Global Intelligence Network has monitored security devices which log up to 2 billion daily events, helping Symantec understand what threats are impacting our customers. In addition to that, 120 million virus submission systems provide insight into the latest threats, along 40 thousand sensors in over 200 countries which determine where threats originate and whether or not they are targeted or global. 2

Symantec Brightmail Anti Phishing At the heart of this intelligence gathering network is the Symantec Security Response team, which has been combating threats for over 15 years and consists of more than 200 security specialists working around the clock, 365 days a year. Security research centers around the world provide unparalleled analysis of and protection from malware, security risks, and vulnerabilities. In addition to the more than 200 Security Response specialists, Symantec has a global team of intrusion experts, security engineers, virus hunters, threat analysts, and technical support professionals who provide fast and accurate analysis of security data 24 x 7 to help customers guard against complex Internet threats and other security risks. Conclusion While there are many technologies on the market that help organizations protect and defend against phishing attacks, none are as deep and extensive as that of Symantec's Brightmail line of products. Other solutions are largely dependent on their own administrators and end-users submitting missed phishing emails in a timely manner to corresponding backend operations teams, a very manual process. This can also lead to increased administrative overhead and burden on systems. Symantec's Global Intelligence and Probe networks are uniquely positioned to help organizations protect against phishing attacks though automated systems and processes which have deep visibility into all global threats, thus taking the burden off of the end user and ensuring complete protection at all times. 3

About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Copyright 2009 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 12/2009 20717027