240 likes | 553 Views
Telnet Media Agenda Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Who is Tel.net Media Ex Sun Microsystems engineers Australian Software Company Established 1998 Enterprise Class Secure Content Management Over 500,000 users Surfing the Web
E N D
Agenda • Telnet Media Ltd • Surfing the Web • Secure Content Management • Products • Reasons to implement
Who is Tel.net Media • Ex Sun Microsystems engineers • Australian Software Company • Established 1998 • Enterprise Class Secure Content Management • Over 500,000 users
Surfing the Web • You’re just browsing pages? • You’re not downloading anything are you? • You’re not sending anything out? • You’re not putting company confidential information at risk? It’s safe isn’t it?
Secure Content Management • Web Content Filtering • Internet Sheriff • Email Filtering • Email Sheriff • Anti-Spam • Anti-Spam Sheriff • Anti-Virus • Sophos Anti-Virus
Compelling Reasons to Buy • Internet traffic is the second largest consumer of the overall corporate network • Up to 40% of Internet surfing during business hours is not business related • Employees spend on average 3.6 hours a week, using the Internet for personal reasons
Compelling Reasons to Buy • 16 times more Spam than 2 years ago (Source) Gartner group • 60 Billion email messages by 2006, Approx. 40% Spam(Source) IDC • 80% of viruses enter via email gateway(Source) IDC
Compelling Reasons to Buy • Increase employee PRODUCTIVITY • Manage bandwidth • Reduce legal LIABILITY • Manage corporate Internet Access Policy • Prevent breaches in network SECURITY • Meet budgets
VIRUS SPAM IP Theft VIRUS SPAM IP Theft Virus SPAM IP Theft VIRUS IP Theft Why is SCM important? VIRUS SPAM • Business Integrity Issues • Damage to reputation • Reduced productivity • Loss of confidential data • Pornographic material • Theft of data • Legal liability • Network Integrity Issues • Data corruption • Virus infection • Malicious code • ActiveX • Executables • Degradation in service • Mp3’s, movies, etc. SPAM IP Theft VIRUS IP Theft VIRUS SPAM VIRUS VIRUS SPAM IP Theft VIRUS SPAM IP Theft
Employee Internet Management • Real-time Dynamic Modelling • Monitors & reports • Customer relevant database • Fast & efficient • Manages network bandwidth • Reduce costs • Increases employee productivity • Limits non-productive Internet use
Email Scanning • Email content filtering (Real-time) • Monitors & reports • Manages network bandwidth • Stop large attachments • Scans and intercepts • All emails from & to employees • Web-based administration
Anti-Spam Techniques to detect Spam : • Context sensitive phrase recognition(multi-lingual) • Information hiding • URL Classification • Formatting & heuristics • Real-time black-hole lists (but not in the traditional way)
Anti-Spam Flexible interception options: • Block Spam efficiently – 90% • Absolute minimum false positives – less than 0.5% • Flexible ‘rule set’ for response to spam • (Quarantine, Tag & Allow, Discard, Bounce) • Acts in real time • 75-80 messages analyzed per second
Anti-Spam & E-mail • Anti-spoofing capabilities • Stops Spammers pretending to be an authorised user • Custom allow and deny lists • Denied by Domain, email address, or IP • Anti-relaying capability • Prevents Spammers using your server to distribute their messages
Anti-Virus - Sophos • Complete anti-virus solution for corporates, education, government. • Easily updated, flexible solution. • Small local area networks to large multi-server, multi-platform WANs. • 24 hour Virus identify updates
Implementation Stages • Understanding • Planning • Implementation
Understanding Groups Categories/Solution Offensive/Inappropriate Sinful Six Non Work Related Sport, Travel, Jobs Internet Bandwidth Intensive Entertainment,Games Objectionable content Guns,Drugs Malicious Code Virus Scanning Email Anti-Spam Spam Attachments File type blocking
Planning Usage by Category File type Content (MIME) type Department Internet Usage by file type File size Department User Email Using this information allows us to help create an accurate Internet Access Policy (IAP) clearly defining what is acceptable & allowing us to address inefficient & inappropriate usage
Implementation Manage by Category File type Content (MIME) type Department Internet Manage by file type File size Department User Email This is a continually evolving process, to fine tune the processes that have been implemented to provide both the staff & the organisation with the best possible outcome
Competitive Advantages • Dynamic content recognition system providing real-time updates – on the fly • Customer relevant database - lightweight • Installed into existing networks • Allows clients to develop own filtering policies and accessibility timeframes • All in one solution • ABA approved • Scalable
Platforms • Sun Solaris 7 or higher (Sparc) • Sun Solaris 8 or higher on x86 • Linux - Redhat, Mandrake • BSD - FreeBSD, OpenBSD • Mac OS X
Close • Question period
Telnet Media Thank You adam.barnard@telnetmedia.com