1 / 11

Messaging Security

Lisa Farmer, Cedo Vicente, Eric Ahlm. Messaging Security. MULTI-LAYER DEFENSE. BEST-OF-BREED OPTIONS. 09/16/08. IronPort Gateway Security Products. Internet. Internet. IronPort SenderBase. BLOCK Incoming Threats. APPLICATION-SPECIFIC SECURITY GATEWAYS. EMAIL Security Appliance. WEB

binh
Download Presentation

Messaging Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lisa Farmer, Cedo Vicente, Eric Ahlm Messaging Security MULTI-LAYER DEFENSE. BEST-OF-BREED OPTIONS. 09/16/08

  2. IronPort Gateway Security Products Internet Internet IronPortSenderBase BLOCK Incoming Threats APPLICATION-SPECIFIC SECURITY GATEWAYS EMAIL Security Appliance WEB Security Appliance PROTECT Corporate Assets Data Loss Prevention Users Web Security | Email Security | Security Management | Encryption

  3. IronPort Consolidates theNetwork PerimeterFor Security, Reliability and Lower Maintenance Before IronPort After IronPort Internet Internet Firewall Firewall Encryption Platform DLP Scanner DLP Policy Manager MTA Anti-Spam Anti-Virus Policy Enforcement Mail Routing IronPort Email Security Appliance Groupware Groupware Users Users

  4. Worldwide Spam Trends Spam Trends Summary • In 2007 attackers tested new techniques • Spam outbreaks happening faster/ higher-velocity • Have spammers settled on URL spam?

  5. Data Loss PreventionMulti-Faceted Problem • Regulatory Compliance • HIPAA, GLBA, PCI, SOX Regulations • Scan for sensitive information and block infractions • Secure business partner communication • Acceptable Use • Block offensive content • Enforce messaging policy (attachment size, etc) • Add legal disclaimers to outgoing mails • Intellectual Property Protection • Block messages containing confidential data • Prevent email communications with competitor “Email has become the de facto filing system for nearly all corporate information, making it even more critical to protect the outbound flow of messages.” ─ Brian Burke, Security Products Research Manager, IDC

  6. IronPort PXE: Receiving a MessageSeamless End-User Experience 1. Open Attachment 2. Enter password 3. View message

  7. CISCO REGISTERED ENVELOPE SERVICE IronPort PXE: Sending a MessageInstant Deployment, Zero Management Costs • Automated user enrollment and account creation • User authentication and key delivery • Message Tracking • Secure Reply • NEVER stores email message → highest security

  8. Gartner Magic Quadrantfor Email Security Boundaries, 2008* Analysis of IronPort Email Security: • Cisco/IronPort is the market share leader with strong growth rates. • Spam detection rates for IronPort are excellent, with very low false-positive rates. • SenderBase has expanded to include Web URL reputation. The local connection management policy is very granular. • Email encryption (via the Cisco/PostX envelope functionality) is provided in the email security appliance. • Scalability and stability are prime differentiators. IronPort has a large percentage of very large enterprise customers. *Full report available on request.

  9. Before IronPort Internet Firewall Web Proxy & Caching Anti-Spyware Anti-Virus Anti-Phishing URL Filtering Policy Management Users Next Generation Secure Web Gateway After IronPort Internet Firewall IronPort S-Series Users

  10. Internet Integrated L4 Traffic MonitorWire Speed Network Layer Scanning for Malware • Scans all 65,535 ports at wire speed • Detects rogue phone home activity • Catches malware that attempts to bypass Port 80 TCP Headers & Packets Users 110111110011100100100101110011001010111011001000011010011001110010000 Network Layer Analysis L4 Traffic Monitor AsyncOS for Web

More Related