1 / 36

Proofpoint: Email Security and Data Loss Prevention Solutions

Proofpoint: Email Security and Data Loss Prevention Solutions. Proofpoint Overview. Customers. Unified email security and data loss prevention solutions 24x7 support Fastest-growing young technology company in North America #1 on Deloitte’s Fast 500 “Rising Star” List 2006. Partners.

Download Presentation

Proofpoint: Email Security and Data Loss Prevention Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Proofpoint:Email Security and Data Loss Prevention Solutions

  2. Proofpoint Overview Customers • Unified email security and data loss prevention solutions • 24x7 support • Fastest-growing young technology company in North America#1 on Deloitte’s Fast 500 “Rising Star” List 2006 Partners Focus On… • Research and Innovation • Messaging Security • Customers Validation

  3. Anticipate spammers’ new techniques. Are you protected? Zero-hour viruses are impacting my organization Communicate with management on security status Does my solution protect against spear-phishing? Is there a way to stop image-based spam? What is the best practice for encryption in my industry? Anticipate new content security breaches Keep up with message volume Fewer resources! Data privacy Upgrade email infrastructure Learn new regulations How do I stop botnets? Keep end users happy! Email SecurityThreats Data Loss PreventionThreats Across Email andother Protocols Feeling Overwhelmed? Starting to Hate Email? Spam Corporate governance Viruses 101010101010101 101010101010101 0101010101010101 0101010101010101 Phishing 101010101010101 101010101010101 0101010101010101010101 01010101010101010 Denial of service 101010101010101 101010101010101 Security, privacy and compliance 101010101010101 101010101010101 01010101010101010 01010101010101 1010101010101010 1010101010101010 01010101010101010 01010101010101010 1010101010101010 1010101010101010 Botnets Intellectual property Directory harvest The Messaging Team Has Many Responsibilities Enterprise SMTP, HTTP and FTP services

  4. How Our Email Security Solution is Different Problem Proofpoint False PositivesFalse Negatives Accuracy Scale Limitations Architecture Point Solutions All-In-One Platform Access for End UsersAdministration Costs Low Costly

  5. Proofpoint allows you to: Defend against inbound threats Prevent leaks of information Encrypt sensitive information Analyze messaging infrastructures Manage email delivery All-In-One Platform For Messaging SecurityLess Infrastructure. Less Training. One Vendor. Proofpoint Attack Response Center (PARC) Digital AssetSecurity Network Content Sentry Regulatory Compliance Secure Messaging Dynamic Reputation Spam Detection Virus Protection Zero-Hour Anti-Virus Power MTA Smart Search

  6. Architecture: Master / AgentOptimal Combination of Scalability, Redundancy and Performance Manage cluster as single system Reliable architecture Security architecture Dynamic scalability Single Server • Filtering & routing • Management • Consolidated quarantine • Full reporting

  7. Architecture: Master / AgentOptimal Combination of Scalability, Redundancy and Performance DMZ Manage cluster as single system Reliable architecture Security architecture Dynamic scalability Agent(s) • Filtering & routing Private Network Master • Management • Consolidated quarantine • Full reporting

  8. Architecture: Master / AgentOptimal Combination of Scalability, Redundancy and Performance • Manage cluster as single system • Reliable architecture • Security architecture • Dynamic scalability DMZ Data Center 1Houston Data Center 2 New Jersey Agent(s) Private Network Master Primary Master Backup Master

  9. Deploy standalone or in combination Architecture: All Deployment Models AvailableDeployment Flexibility to Suit any Business Strategy Models Sample Scenarios Single Mode Software Appliance Hybrid Disaster Recovery DynamicCapacity Virtual Appliance On Demand (Hosted)

  10. 100% 99% 97% 95% 94% Anti-Spam Effectiveness in 2007 Average > 99.8% 93% 92% 91% 90% “> 99% Accuracy” Accuracy Consistently >99%Less Spam = More Satisfied Users & Reduced Load on Mail Servers

  11. 3rd Generation Anti-Spam TechnologyProofpoint MLX = Peace of Mind • Advanced machine learning analysis • Multiple techniques • Detects image, PDF, adult, phish spams • Over 500,000 attributes analyzed • Future proof your environment • Automatic updates NOT manual upgrades needed • MLX adapts to new spam types – MP3 audio, Zip, Excel, etc. • Ongoing R&D “We reduced spam with a 99.998% effectiveness rate overnight. There was not a single false positive” Proofpoint MLX is dynamic and well suited to the dynamic nature of spam

  12. Deliver 19% of all email Quarantine and add to digest 1% of all email 2% of spam Discard 80% of all email 98% of spam Confident Scoring The Bottom Line – High Confidence

  13. Sender: Botnet • Hundreds of sending IP addresses • Evades 1st Gen Reputation Filters • Content: Spammy Image • Obfuscated/ Randomized Image • Animated GIF • Evades Signature, Bayesian Filters • Content: Text • “Hash Busting” • Intended to read valid • Evades Bayesian, Signature Filters • Proofpoint correctly identifies as spam—holistic view: • Botnet found via Dynamic Reputation • Spammy image detection • Text is classified as spammy, not valid Case Study: “Pump and Dump” Spam CampaignUses Image + Text Combination Tricks

  14. Unique 3rd Generation Technology Architected for rapid responses High quality input data using MLX Sophisticated reputation algorithms using netMLX Proofpoint Dynamic Reputation • Enhanced utilization from appliances • Up to 80% of connections dropped • Enhanced effectiveness • Up to 0.5% effectiveness gain against dynamic botnets • Advanced connection management • 2 components: local and global (netMLX) • Complements MLX Anti-Spam technology

  15. Multi-layer Virus Protection Stop viruses at the gateway • Signature-based Virus Protection • F-Secure: 3 anti-virus engines in one • McAfee: AVERT – 100+ worldwide researchers • Scan inbound and outbound “zombie” traffic • Zero-hour Anti-Virus Protection • Non-signature-based approach • Stop virus outbreaks • As much as 12 hours ahead of signature updates

  16. Anti-Virus Engine Detection Rate Comparison Based on a test by AV-Test.org with a collection of 468 953 malware samples in November 2006 Source: AV-Test.org

  17. Proofpoint Zero-Hour Anti-VirusCase Study: Zero-Hour AV Customer (Government) ROI • 3,000 Mailboxes • $60K+ Monthly Savings Realized Immediately • Total Monthly Zero-Hour Incidents: 121 • Average Cost per Virus Attack: $500 per Attack (source: F-Secure) • 1 Major Attack • 10.5% of viruses (66 viruses) were not stopped by Signature-Based Solution • Daily Smaller Attacks • Average Number of Viruses is 1-2%

  18. Proofpoint Power MTA • Industry Grade MTA • Secure, High Performance • Relaying, Routing, Address Rewriting • Easy to Use • Point and Click • Queue Management • Sender Authentication, Recipient Verification • Built-In Firewall • Easily translate your policy • Dozens of filtering attributes • Detect full or partial content matches • Manage 400+ files types

  19. Message Tracing: Investigation, Forensics: Compliance and eDiscovery: Trend Analysis: “What happened to the CEO’s message?” “Did Joe email the competition last week?” “How many HIPAA violations occurred?” “How many MP3 files came in?” Real-time message history search Easy to use through point and click GUI Consolidated across cluster Multiple views on data—summary, detailed, raw logs Saves time and money for routine, repetitive tasks Fully integrated with all Proofpoint modules (Future: other mail systems) Empowers IT Help Desk and non-technical business users! Proofpoint Smart SearchAdvanced Log Analysis and Search Tool

  20. Email-Based End User Digest Web-Based Self-Service Access for End Users • Reduce helpdesk calls with simple end user interfaces • Greater power to end users • Lower cost to administrators

  21. Web-Based End User Quarantine Access for End Users • Reduce helpdesk calls with simple end user interfaces • Greater power to end users • Lower cost to administrators

  22. Proofpoint Spam ManagerOutlook Plug-in Access for End Users • Reduce helpdesk calls with simple end user interfaces • Greater power to end users • Lower cost to administrators

  23. Unified Policy Interface Administration Costs Are Low • Consolidated interface for entire cluster • Personalized workspace for multiple admins • Common interface across all modules • Do a lot easily

  24. Top Throttled IPs Message Rate Top Virus Types Reporting and Forensics Administration Costs Are Low • 50+ real-time reports • Save customized reports • Publishable on a scheduled basis to management • No separate server required

  25. Proofpoint Summary Problem Solved False PositivesFalse Negatives Accuracy Scale Limitations Architecture Point Solutions All-In-One Platform Access for End UsersAdministration Costs Low Costly

  26. Product Demonstration

  27. APPENDIX

  28. CUSTOMER SLIDES BY VERTICAL • SERVICE PROVIDER • FINANCIAL SERVICES • HEALTHCARE & PHARMA

  29. Proofpoint Overview Customers Commercial • Unified email security and data loss prevention solutions • 24x7 support • Fastest-growing young technology company in North America#1 on Deloitte’s Fast 500 “Rising Star” List 2006 Service Provider Partners Focus On… • Research and Innovation • Messaging Security • Customers Validation

  30. Proofpoint Overview Customers Commercial • Unified email security and data loss prevention solutions • 24x7 support • Fastest-growing young technology company in North America#1 on Deloitte’s Fast 500 “Rising Star” List 2006 Financial Partners Focus On… • Research and Innovation • Messaging Security • Customers Validation

  31. Proofpoint Overview Customers Commercial • Unified email security and data loss prevention solutions • 24x7 support • Fastest-growing young technology company in North America#1 on Deloitte’s Fast 500 “Rising Star” List 2006 Healthcare & Pharma Partners Focus On… • Research and Innovation • Messaging Security • Customers Validation

  32. DEPLOYMENT MODELS • APPLIANCE • PROOFPOINT ON DEMAND • VIRTUALIZATION

  33. Proofpoint Messaging Security Gateways P845 P845M P320 P640 P840 1 Rack Unit (1U) Rack configuration 1 Rack Unit (1U) 1 Rack Unit (1U) 2 Rack Unit (2U) 1 Rack Unit (1U) 2x Quad-Core Intel Xeon Processor(s) 1x Dual-Core Intel Xeon 1x Quad-Core Intel Xeon 2x Quad-Core Intel Xeon 2x Quad-Core Intel Xeon Memory 2GB 4GB 4GB 8GB 8GB Disks 2x 160GB RAID1 2x 146GB RAID1 2x 146GB RAID1 2x 146GB RAID1 6x 300GB RAID10 2x Gigabit BaseT 2x Gigabit BaseT 2x Gigabit BaseT 2x Gigabit BaseT Network 2x Gigabit BaseT 40,000 msg/hr 200,000 msgs/hr 65,000 msgs/hr 200,000 msgs/hr 150,000 msgs/hr Throughput* (peak) 29,000 msg/hr 155,000 msgs/hr 48,000 msgs/hr 155,000 msgs/hr 110,000 msgs/hr Throughput* (average) 4 hour Dell field support Next business day Dell field support 4 hour Dell field support 4 hour Dell field support 4 hour Dell field support Hardware support • Throughput numbers based on conservative estimates. Certain features such as Reputation, Recipient Verification, SMTP Rate Control can dramatically increase performance.

  34. Service includes: Advanced anti-spam, anti-virus protection Advanced DLP and content filtering Robust reporting and end-user capabilities Dedicated environment – not shared Geographically dispersed, load-balanced, redundant environment Dedicated on demand architecture Complete policy flexibility Dedicated quarantine, reporting & user information – no data leaks Built for instant delivery – no shared risk Proofpoint manages: Implementation 24x7 monitoring Troubleshooting Updates, upgrades Client manages: Policies/email filtering Users/groups Performance 99% spam effectiveness 99.999% availability 100% virus protection Instant email delivery (no delays) Lowest false positives Innovative, flexible architecture meets any deploymentor business strategy Proofpoint on DemandHosted Email Security Service c1.com c2.com c3.com c4.com c5.com c6.com c7.com Flexible Managed Service Platform

  35. Case Study: Cincinnati Bell’s Email Volume Growth and Dynamic Capacity Planning via Virtualization Connections Per Day Time # Appliances Needed: 2 # Physical Appliances Used: 2 # Appliances Needed: 5 # Physical Appliances Used: 1 # Virtual Appliances Used: 4 During spam storm, needed new appliances to handle load. Added virtual appliances, but in the end retired physical appliances.

  36. Single Server Single Server 1 Physical Agent 4 Virtual Agent(s) • Filtering & routing • Management • Consolidated quarantine • Full reporting • Filtering & routing • Management • Consolidated quarantine • Full reporting • Filtering & routing • Filtering & routing 1 Combined Physical Master, Agent 1 Physical Master • Management • Consolidated quarantine • Full reporting • Management • Consolidated quarantine • Full reporting Proofpoint’s Virtual Edition and Modular Architecture Allows Cincinnati Bell to Reap Benefits of Virtual Appliances TODAY BEFORE Can provision as many virtual agents as needed

More Related