310 likes | 503 Views
Oscar Maqueda oscarmh@microsoft.com TSP Microsoft Online WE. Microsoft Exchange Hosted Services is a comprehensive set of fully-managed, “in the cloud” services for e-mail security and management. Microsoft Exchange Hosted Services Filter, encrypt, archive, recover.
E N D
Oscar Maqueda oscarmh@microsoft.com TSP Microsoft Online WE
Microsoft Exchange Hosted Services is a comprehensiveset of fully-managed, “in the cloud” services fore-mail security and management Microsoft Exchange Hosted ServicesFilter, encrypt, archive, recover Multi-layer spam and virus protection Policy-based e-mail encryption E-mail retention for compliance Continuous e-mail during outages
Gartner Email Security Magic Quadrant “Given its installed base of Exchange e-mail infrastructure users and the acquisitions of Sybari (soon to be called Forefront for Exchange) and Frontbridge (now called Exchange Hosted Services) — in addition to original investments in native anti-spam filtering — Microsoft is poised to become the de facto leader in the e-mail security market.”
Hosted Filtering Hosted Archiving Hosted Encryption Hosted Continuity Exchange ServicesChoice of platform and complementary services Choice of Messaging Platform • On-premise Server OR • Hosted by Service Providers Complementary Services
Microsoft E-mail Security Solutions E-mail Gateway Security E-mail Server Security On-Premise Software DMZ Internet Firewall • Mailbox • Client Access • Hub Transport • Unified Messaging SMTP Services + OR - Edge Transport Choice for E-mail Gateway Security • Internet-based services or on-premise software protect against spamand viruses before they reach the corpnet Defense-in-depth Security • Gateway and E-mail server security in a competitively priced package Security and Secure Remote Access • Secure remote e-mail access via ISA Server
Our DifferenceEnterprise-class reliability and performance High-Availability, High-Security and High-Performance for Billions of E-mail 99.999% service level uptime guarantees andperformance SLAs for spam filtering effectiveness SAS 70 Type II and ISO 17799 compliant data centers More than 60 billion messages processed per month Dedicated Expertise Available for Thousands of Customers, 24/7 Real-time security updates and networkperformance monitoring 24/7 customer support and dedicated accountmanagers for qualifying accounts Investment from Microsoft; Integration with Software and Services Investment and resources to ensure superior QoS Tight integration with Microsoft Exchange and otherMicrosoft products and services Roadmap to be the message management servicefor unified communications
Microsoft Hosted FilteringMultilayer spam and virus protection/content and policy enforcement Only requires asimple MX record Real-time Attack Prevention (RTAP)and Directory Services protect againstlarge attacks Comprehensive virus filter deliversday-zero protection using multiple,anti-virus engines Flexible policy filterto enforce anye-mail-use rules Strong spamfiltering effectiveness E-mail queuing helps ensure mail is never lost Queued e-mail is delivered in a flow-controlled fashion when server is available SpamPrevention Internet Corporate Network DirectoryServices Real time attack prevention (TRAP) IP-based authentication Reputation database SPAM Connections from all senders are analyzed, connections from illigitimate senders are blocked No Yes If server is unavailable,e-mail is queued up for five days E-mail enters the global data center network Is e-mail server available? Look up e-mail filtering settings for domain Virus Scanning Policy Enforcement Spam Protection Clean e-mail is handed off to corporatee-mail servers Anti-virus Engine 1 Anti-virus Engine 2 Anti-virus Engine 3 Custom Policy Rules Attachment and message attribute management Custom Spam Filter management (CSFM) Fingerprint Engine Rules Based Scoring Content and Policy Quarantine Spam Quarantine
The Need For E-mail FilteringE-mail security is a main concern of IT professionals What is e-mail filtering? • The filtering of inbound and outbound e-mail for spam, malware, and policy violations to increase corporate security and enhance the messaging experience for all Why e-mail filtering? • Businesses continue to be over burdened by a multitude ofmalware such as spam, virusesand phishing threats • E-mail security is time-consuming and is often not an IT core competency • Increasingly complex e-mail threats jeopardize the stability of a corporation’s messaging infrastructure • “Viruses and other forms of malware can create catastrophic problems for an organization. These include bringing an e-mail infrastructure down for hours or days at a time, destruction of data, loss of productivity, and loss of reputation.” • - Osterman Research, “Critical Decision Factors for Messaging Management, 2005”
Administrator ConsoleFlexibility to meet any company’s needs Spam and policy settingsconfigurable per domain Enforcement of strong passwordsand other security policies Flexible policy filter thatsupports wild cards Custom reporting for org or domain Define e-mail delivery and routing rules
Spam Quarantine And NotificationsEnd-user spam management experience Spam quarantine for each address (optional) Personalized spamdigest delivered to end userson configurable interval
Exchange Hosted Filtering provides a comprehensive set ofService Level Agreements (SLAs) covering network performance andspam and virus filtering effectiveness Each SLA is backed by a financial commitment from Microsoft Exchange Hosted Filtering SLAsSLAs Covering Network Performance and Effectiveness 100% VirusProtection 98% SpamDetection 1:250,000 Spam False Positives Spam and VirusFiltering Effectiveness 99.999% Network Uptime Rapid E-mail Delivery (Average delivery commitment ofless than 1 minutes) Filtering Network Performance Terms and conditions apply. Please visit the Admin Center Resource Center at http://admin.global.frontbridge.comYou may have to login to the system to view the service level agreement. Please contact your reseller or Microsoft AccountManager if you wish to view these prior to signing up for the service.
SPAM COPY COPY Microsoft Exchange Hosted ArchiveMessage archiving for compliance and legal discovery If server is unavailable, e-mail is queued up for up to five days Global Data Center Network Corporate Network Internet Queue E-mailServer NO Filtering Managed Anti-Virus Managed Anti-Spam Policy Enforcement YES Is e-mail server available? End User/Admin Access Internal Mail E-mail, IMArchive Auditors, Outside Counsel Access Archive repository benefits from upstream spam and virus protection features Full text indexing of e-mail and attachments, IM and Bloomberg mail HR/Legal can search all message streams and tag, forward, export content Compliance tools for supervising, escalating, tracking messages Admin tools for message restoration, communication during an outage Users can access message archive via the web for real time e-mail functionality
Value of EHA • Has functionality/features for compliance and e-Discovery efforts • Provides a centralized, easily accessible/searchable repository for all corporate messages – e-mail, IM and Bloomberg data • Lowers the TCO compared to on-premise archive solutions with no capital investment • Simplifies IT environment to frees up IT personnel to focus on other projects and the company’s core competency • Fast on-boarding process can enable customer to help meet requirements within days • EHA also provides emergency e-mail access in the event of a disaster or maintenance downtime, which is important if e-mail is a critical business application to a business
Backup vs. Archiving Tape backups are a snapshot of an environment at a point in time and does not encompass every message/transaction sent/received • There are no special purpose storage requirements for backups (storage agnostic) and can be overwritten. Most backups are typically retained for no more than 90 days before being overwritten. • Using backups as archives can expose firms to risk • Backup retrieval can be difficult • A discovery order on backups is costly, time-consuming and disruptive to IT: to search for a message that is no longer currently in the online e-mail system, an IT administrator would need to recover several tapes for entire servers/databases from onsite storage or possibly offsite storage (or from third party offsite), ensure the tape is viable, and then restore to online server. • Searching backup tapes can cost more than $3000 per tape.
COPY COPY Microsoft Exchange Hosted ContinuityE-mail continuity during network outages If server is unavailable, e-mail is queued up for up to five days Global Data Center Network Corporate Network Internet Queue NO E-mailServer Filtering Managed Anti-Virus Managed Anti-Spam Policy Enforcement YES Is e-mail server available? Internal Mail End User/Admin Access 30-DayMessage Store Message store benefits from upstream spam and virus protection features Messages captured and copied in real time Searchable message store always contains last 30-days of e-mail Familiar GUI means minimal end user training Recovery Manager for e-mail restoration, seamless access during an outage
End User AccessFamiliar interface enables full e-mail functionality
Recovery Management ToolsRestore messages simply to the primary environment
EHS Hosted EncryptionPolicy-based e-mail encryption for the enterprise Global Data Center Network Corporate Network Recipient Network INTERNET Secure Replyvia ZDM Filtering ManagedAnti-Virus ManagedAnti-Spam PolicyEnforcement Encrypt Rule GatewayEncryptionServer TLS Encrypted E-mail KeyServer Zero Download Manager (ZDM) enables secure, Web-based decryption and encrypted repliesfor any recipient Supports all systems ande-mail clients Communication viaTLS-enabled network Managed Service for an effective secure message strategy Encryption is performed via rules and enforced by Gateway Voltage Identity Based Encryption uses a common ID for public key Encrypt any e-mail and attachments
Policy-Based EncryptionIT admins take control of what is encrypted • Define outbound encrypt policy rules based on • Sender address/domain • Recipient address/domain • Keyword in subject/body • Built-in HIPAA dictionary • Auto-decrypt policyfor inbound messages • No infrastructure requirements
Easy To Use EncryptionEasy to use for both IT Administrators and end-users • Policy-based encryption transparent to the end-user • Built-in HIPAA dictionary • Encrypted messages delivered directly to desktop • Message body + attachments remain encrypted • No additional software required for decryption • No need for keys or certificates • Zero Download Messenger Example: Send Example: Receive
End-To-End SecurityEncrypted e-mail is delivered directly to recipients inbox • Recipients authenticated before viewing encrypted message • E-mail Answerback • Decryption can be performed by all levels of technologists • Supports unknown and “one-time” recipients • Authenticity verified by digital signature • Recipients able to reply securely to encrypted messages
“SaaS providers actually offer better data security and better application reliability than in-house operations, because the data centers are up to date with security management and have built-in redundancy.” - BethEnslow, senior vice president, Enterprise Research, Aberdeen Group Advantages Of Hosted Services March 16, 2009 | Page 29
Exchange Hosted Archive • USL (Archive) for each user storing data in the Archive • Each USL includes 3.6 GB of storage (equivalent of 100 MB/month new storage) • Sold as stand alone USL following standard MS waterfall • Requires Filtering; no set-up fees required; no trial available • Current seat limitation = 5000 • May license a subset of users (ex. 100 user company may license 100 filtering with10 archive) • Add-on SL (Archive Extra Storage) is priced per GB/month • Used when total data in storage for combined users has been exceeded • EX: 100 users = 360 GB in total storage allowed. Buy 40 SSLs to store 400 GBs • Typically will be used for customers with heavy usage, retention longer than 3 years • Required for Historical Data Load • Forecasted amount based on storage needed at the end of the agreement • Aligned with standard 3 year VL agreement • Customers must renew VL agreement, USLs and SSLs to continue to use archive * Monthly per userprice * Monthly per GB price for extra storage
Más acciones desde TechNet Para ver los webcast grabados sobre éste tema y otros temas, diríjase a: http://www.microsoft.com/spain/technet/jornadas/webcasts/webcasts_ant.aspx Para información y registro de Futuros Webcast de éste y otros temas diríjase a: http://www.microsoft.com/spain/technet/jornadas/default.mspx Para mantenerse informado sobre todos los Eventos, Seminarios y webcast suscríbase a nuestro boletín TechNet Flash en ésta dirección: http://www.microsoft.es/technet/boletines/default.mspx Descubra los mejores vídeos para TI gratis y a un solo clic: http://www.microsoft.es/technet/itsshowtime/default.aspx Para acceder a toda la información, betas, actualizaciones, recursos, puede suscribirse a Nuestra Suscripción TechNet en: http://www.microsoft.es/technet/recursos/cd/default.mspx
© 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.