Similar documents







GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

Screentrade Car Insurance Policy Summary

tools for Web data extraction

VoIP for the Small Business

Summary: Vectors. This theorem is used to find any points (or position vectors) on a given line (direction vector). Two ways RT can be applied:

Small Business Networking

Small Business Networking

Small Business Networking

AntiSpyware Enterprise Module 8.5

How To Network A Smll Business

Small Business Networking

How To Set Up A Network For Your Business

(1) continuity equation: 0. momentum equation: u v g (2) u x. 1 a

JaERM Software-as-a-Solution Package

Application Bundles & Data Plans

Orbits and Kepler s Laws

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

VoIP for the Small Business

N V V L. R a L I. Transformer Equation Notes

How To Reduce Telecommunictions Costs

VoIP for the Small Business

VoIP for the Small Business

VoIP for the Small Business

Implementation and Evaluation of Transparent Fault-Tolerant Web Service with Kernel-Level Support

Vendor Rating for Service Desk Selection

VoIP for the Small Business

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

VoIP for the Small Business

Unleashing the Power of Cloud

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

Architecture and Data Flows Reference Guide

Version X3450. Version X3510. Features. Release Note Version X3510. Product: 24online Release Number: X3510

VoIP for the Small Business

E-Commerce Comparison

Adaptive Control of a Production and Maintenance System with Unknown Deterioration and Obsolescence Rates

GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0

FortiClient (Mac OS X) Release Notes VERSION

2.016 Hydrodynamics Prof. A.H. Techet

(Ch. 22.5) 2. What is the magnitude (in pc) of a point charge whose electric field 50 cm away has a magnitude of 2V/m?

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Random Variables and Distribution Functions

r (1+cos(θ)) sin(θ) C θ 2 r cos θ 2

Network Configuration Independence Mechanism

Health insurance marketplace What to expect in 2014

G.GMD.1 STUDENT NOTES WS #5 1 REGULAR POLYGONS

by K.-H. Rutsch*, P.J. Viljoen*, and H. Steyn* The need for systematic project portfolio selection

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

for Student Service Members and Veterans in Indiana

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Intro to Circle Geometry By Raymond Cheong

Quick Reference Guide: One-time Account Update

The 8 Essential Layers of Small-Business IT Security

Econ 4721 Money and Banking Problem Set 2 Answer Key

MATH 150 HOMEWORK 4 SOLUTIONS

Factoring Polynomials

Quick Reference Guide: Reset Password

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Recognition Scheme Forensic Science Content Within Educational Programmes

DATA SCIENTIST WHY IT S THE SEXIEST JOB OF THE 21 ST CENTURY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

Exam in physics, El-grunder (Electromagnetism), , kl

Health insurance exchanges What to expect in 2014

Small Business Cloud Services

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

EQUATIONS OF LINES AND PLANES

BUSINESS OWNERS PACKAGE INSURANCE APPLICATION

LAPLACE S EQUATION IN SPHERICAL COORDINATES. With Applications to Electrodynamics

In-stope bolting for a safer working environment

Curvature. (Com S 477/577 Notes) Yan-Bin Jia. Oct 8, 2015

Titanium: the innovators metal Historical case studies tracing titanium process and product innovation

Start Here. IMPORTANT: To ensure that the software is installed correctly, do not connect the USB cable until step 17. Remove tape and cardboard

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall Final Exam

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007

Converting knowledge Into Practice

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Efficient Implementation of Concurrent Programming Languages

Transcription:

GFI MilEssentils & GFI MilSecuity vs Tend Mico ScnMil Suite fo Micosoft Exchnge GFI Softwe www.gfi.com

GFI MilEssentils & GFI MilSecuity vs Tend Mico ScnMil Suite fo Micosoft Exchnge Exchnge Seve 2000/2003 Integtion Exchnge Seve 2007 Integtion Option to un s septe gtewy Supeio potection though multiple nti-vius engines Anti-vius engines used Detects mlwe, spywe nd geywe Self-lening Byesin nti-spm technology Potection ginst Diectoy Hvesting ttcks Sende Policy Fmewok (SPF) nti-spm technology Clenses HTML emils fom hmful scipts Potection ginst emil phishing ttcks Uses multiple Spm URI Rel-time Block List (SURBL) seves s n dditionl nti-spm technology Uses multiple Spm DNS Rel-time blcklist (DNSBL) seves s n dditionl nti-spm technology Technology to potect the mil seve ginst Denil of Sevice (DoS) ttcks Active Diectoy integted content policies Outbound emil uto whitelisting Detects ttchments by file type Use cn clssify emils s spm/good emils GFI MilEssentils & GFI MilSecuity Nomn, BitDefende, Kspesky*, AVG*, McAfee* Tend Mico ScnMil Suite fo Micosoft Exchnge Tend Mico * Who we e GFI is mket lede in secuity softwe, offeing high pefomnce solutions t unbetble pices to smll nd medium sized businesses. Poducts like GFI MilEssentils, the leding spm filte poduct on the mket, hs ove 80,000 customes; GFI MilSecuity ws the fist to pply multiple nti-vius engines to combt viuses; while GFI WebMonito is the no. 1 web filte fo Micosoft ISA Seve. GFI FAXmke emins the best fx seve solution ound. GFI leds the wy in the SMB sphee, combining pice, qulity nd innovtive technology in ll poducts. The GFI diffeence 80,000 stisfied customes Unbetble pice-pefomnce Ove 60 wds Moe thn 98% spm cptue te becuse of its Byesin filteing technology Lowest flse positives though vious technologies focused t eliminting flse positives Seve-bsed instll, no client softwe equied Suppot fo leding messge pltfoms including Micosoft Exchnge Seve 2007 * Avilble t n ext cost * Avilble t n ext cost in TendMico Contol Mnge ** Avilble t n ext cost in TendMico InteScn Messging Suite Byesin filteing technology Byesin filteing is widely cknowledged by leding expets nd publictions s the best wy to ctch spm. A Byesin filte uses mthemticl ppoch bsed on known spm nd hm (vlid emil). This gives it temendous dvntge ove othe spm solutions tht just check fo keywods o ely on downloding signtues of known spm. GFI s Byesin filte uses n dvnced mthemticl fomul nd dtset which is custom-ceted fo you instlltion: The spm dt is continuously updted by GFI nd is utomticlly downloded by GFI MilEssentils, whees the hm dt is utomticlly collected fom you own outbound mil. This mens tht the Byesin filte is constntly lening new spm ticks, nd spmmes cnnot cicumvent the dtset used. This esults in 98+% spm detection te, fte the equied two-week lening peiod. In shot, Byesin filteing hs the following dvntges: All ights eseved. GFI Softwe Ltd.

GFI MilEssentils & GFI MilSecuity vs Tend Mico ScnMil Suite fo Micosoft Exchnge Looks t the whole spm messge, not just keywods o known spm signtues Lens fom you outbound emil (hm) nd theefoe getly educes flse positives Adpts itself ove time by lening bout new spm nd new vlid emil Dtset is unique to you compny, mking it impossible to bypss Multilingul nd intentionl. Red moe bout Byesin filteing hee: http://www.gfi.com/whiteppes/why-byesin-filteing.pdf Multiple nti-vius scnning engines GFI MilSecuity uses multiple vius scnnes to scn inbound emil. Using multiple scnnes dsticlly educes the vege time to obtin vius signtues which combt the ltest thets, nd theefoe getly educes the chnces of n infection. The eson fo this is tht single nti-vius compny cn neve ALWAYS be the quickest to espond. Fo ech outbek, vius compnies hve vying esponse times to vius, depending on whee the vius ws discoveed nd so on. By using multiple vius engines, you hve much bette chnce of hving t lest one of you vius engines upto-dte nd ble to potect ginst the ltest vius. In ddition, since ech engine hs its own heuistics nd methods, one vius engine is likely to be bette t detecting pticul vius nd its vints, while nothe vius engine would be stonge t detecting diffeent vius. Ovell, moe vius engines mens bette potection. Red moe bout why one nti vius engine is not enough hee: http://www.gfi.com/whiteppes/why-one-vius-engine-is-not-enough.pdf Anti Flse Positives technology GFI MilEssentils includes vious technologies focused t eliminting flse positives. When GFI MilEssentils ws developed pticul ttention ws given to the flse positive issue s opposed to focusing only on spm detection. The utomtic white list mngement tool utomticlly dds outgoing mil ecipients to you white list. This getly educes flse positives, without ny need fo dditionl dministtion. White lists cn lso be built bsed on domin nmes, emil ddesses nd keywods. Eliminte hd to ctch imge, PDF, Excel nd ZIP spm With spmmes contolling tens of thousnds of zombie mchines, these lge botnet mies hve become one of the leding souces of spm. The Botnet/Zombie nti-spm check in GFI MilEssentils elimintes hd to ctch ttchment spm such s imge spm, PDF spm, Excel nd ZIP spm. The ttchment spm check filtes this ttchment spm quickly, efficiently nd with vey low te of flse-positives. All ights eseved. GFI Softwe Ltd.

GFI MilEssentils & GFI MilSecuity vs Tend Mico ScnMil Suite fo Micosoft Exchnge SURBL nd PURBL GFI MilEssentils checks emil content ginst Spm URI Rel-time Blocklist (SURBL) seves. Administtos cn configue multiple SURBL seves, dd thei own nd lso define the pioity of which seve should be checked fist. Moe infomtion on SURBL cn be found t http://www.subl.og. The Phishing URI Reltime Blocklist (PURBL) fetue of GFI MilEssentils detects phishing emils by comping URIs pesent in the emil to dtbse of URIs tht e known to be used in phishing ttcks, nd lso by looking fo typicl phishing keywods in the URIs. Poweful epoting The GFI MilSecuity RepotPck is full-fledged epoting compnion to GFI MilSecuity. Fom tend epots fo mngement (ROI) to dily dill-down epots fo technicl stff; the GFI MilSecuity RepotPck povides you with the esy-to-view infomtion you need to fully undestnd you emil secuity pttens. Full utomtion nd custom scheduling llow you tue instll-nd-foget functionlity! The GFI MilSecuity RepotPck offes sevel defult nd customizble epots tht cn be peped on n houly, dily, weekly o monthly bsis including: Viuses blocked Inbound emil tffic Outbound emil tffic Totl inbound nd outbound emil tffic Pocessed emils Blocked emils GFI MilSecuity mkes use of multiple nti-vius engines Is multiple nti-vius engine scnning bette thn single nti-vius engine scnning? GFI MilSecuity cn use up to five nti-vius engines nmely, Nomn, BitDefende, Kspesky, McAfee, nd AVG. Using multiple nti-vius engines ensues tht t lest one of the engines is updted nd cn detect the ltest viuses. Ech engine hs its own unique technology nd methods. Thus, multiple nti-vius engine scnning ensues bette potection. Symntec, on the othe hnd, uses just single nti-vius scnning engine which mens its vius potection fetue my not be s effective s GFI in esponding to ltest thets t ll times. GFI MilSecuity comes bundled with Nomn nd BitDefende nti-vius engines Do I need to buy the nti-vius engines septely? Nomn nd BitDefende nti-vius engines e included in the bse GFI MilSecuity poduct nd the use is not equied to buy these septely. Both these engines e ICSA cetified nd hve won the 100% Vius Bulletin wd. Also, GFI MilSecuity updtes Nomn nd BitDefende definition files utomticlly s nd when they become vilble. All ights eseved. GFI Softwe Ltd.

GFI MilEssentils & GFI MilSecuity vs Tend Mico ScnMil Suite fo Micosoft Exchnge GFI MilSecuity pevents Diectoy Hvesting ttcks How is Diectoy Hvesting ttcks pevention useful to me? Diectoy Hvesting is nothe technique used by spmmes. Spmmes often ty to guess ecipient ddesses by geneting multiple ndom emil ddesses t domin; they then send thei spm mil to ll those ddesses. GFI MilEssentils checks the vlidity of ALL the emil ddesses included in the mil sent, eithe vi quey to Active Diectoy o though suppot fo LDAP, nd if ddesses e not vlid, the emil is mked s spm. GFI MilSecuity povides RSS feeds fo quntined emils How simple it is to tck quntine emils? It is much esie to tck ll the quntine emils by using GFI MilSecuity. It llows the dministto to subscibe to RSS (Relly Simple Syndiction) feeds of quntined emils. Fo instnce, if n emil ddessed to the CEO is quntined, the dministto gets notified bout it by pop-up. Tend Mico notifies the dministto only though n emil o pge. GFI is focused on the SMB Segment A focused ppoch is bette thn one size fits ll GFI hs designed its poducts keeping in view the equiements of Smll nd Medium Businesses (SMB). GFI poducts (GFI MilEssentils nd GFI MilSecuity) e focused nd offe compehensive pckge fo the SMB mket. This focus hs helped SMBs by poviding specific fetues nd the best possible tools t the best possible pice in ode to bette mnge thei emiling infstuctue. On the othe hnd, Tend Mico ties to cte to ll the mket segments nd s esult it does not cte to ll the needs of ny pticul segment. Disclime The dt contined in this document is bsed on esech cied out by GFI. The picing dt fo the competitos poducts hs been compiled fom vious souces nd theefoe is coect to the best of ou knowledge. GFI does not epesent o wnt the ccucy o elibility of this infomtion, nd will not be lible if individuls/compnies use o misuse this infomtion. Redes should contct diectly the compnies mentioned in this document to obtin the ltest picing detils. All ights eseved. GFI Softwe Ltd.