1 / 29

銳擎智識股份有限公司

銳擎智識股份有限公司. Executive Vice President Richard Chuang Richard@andreach.com. eScan, MailScan 企業防毒解決方案. Richard Chuang richard@andreach.com. MicroWorld Technologies Inc. Proudly Presents. eScan & MailScan Content-Security & Anti-Virus World’s first “Real-Time” Email Scanner.

step
Download Presentation

銳擎智識股份有限公司

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 銳擎智識股份有限公司 Executive Vice President Richard Chuang Richard@andreach.com

  2. eScan, MailScan企業防毒解決方案 Richard Chuang richard@andreach.com

  3. MicroWorld Technologies Inc. Proudly Presents eScan & MailScan Content-Security & Anti-Virus World’s first “Real-Time” Email Scanner.

  4. MicroWorld Technologies Inc. (MWTI) • Leaders in Content-Security and Communications software. • Strong technical and technological expertise • Our clients include Govt.. Organization Banks, Financial Institutions, Corporates, Airlines, Travel Agencies, etc. • World Wide Presence. • Nearly 100 staff members and about 50 partners • Company growing at more than 100% p.a.

  5. MWTI’s Software Products CONTENT SECURITY SOFTWARE MailScan MailScan for Mail-Servers MailScan for SMTP MailScan for Exchange MailScan for Lotus Notes MailScan for WinRoute MailScan for Mdaemon MailScan for VPOP3-Servers eScan eScan for Servers eScan for Workstations

  6. Business Partners • Paul Smith Computer Services PLC., UK - MailScan for VPOP3 • MailScan for SMTP servers – Partners in about 30 countries across the globe. • Distributors & Partners for other products across the globe - A reseller network of about 10,000 resellers

  7. CONTENT-SECURITY Need & Definition

  8. The world-market trend The rise of information needs from the open network will fuel Network Security demand. As corporate entities transform their business models to leverage internet communications, network security will be transformed from a “cost of doing business” to a “business enabler” A heterogeneous security market - several related, but distinct segments (Antivirus, Content Scanning, Firewall, etc.).

  9. Content-Security Definition - Threats • The contemporary virus threats have now ballooned into ‘content-security’ threats. • Content-security threats includes: • email virus threat, web-based virus downloads threat, Word-based macro bomb threat • offensive email and web content threat • Threat of misuse and abuse of email & web resources • Threat of Intrusion of anonymous internet users • Threat of Trespassing of unauthorized users into company’s internal network

  10. Loss that an organization suffers due to security violations & other related problems Assumption: Network of about 1000 PCs; Average loss per year over a span of 3 years: Courtesy Aberdeen Consultants

  11. MWTI’s Content-Security Solution eScan & MailScan

  12. eScan Solution Framework eScan is a comprehensive Content-Security Software that offers: • Comprehensive Security Policy framework • Scanning of TCP/IP Traffic for restricted words, content or profane substance • Anti-Virus capabilities • Anti-Spamming utilities • eServ – The Central Management Console

  13. eScan Solution Framework -Value proposition for customers • Integrated solutions for different platforms/networks • Centralised installation and management • Low cost for leasing software • Cost savings, as security components are integrated, thereby doing away with the need to invest in different solutions • Increase in productivity due to 99% uptime of computers • Solution completely transparent to end-users • Complete control for network administrators

  14. Our claim“eScan is the world’s first real-time email scanner” How do we justify?

  15. Let’s first understand how other “Anti-Virus” Software Products function.

  16. E-mail Client With User Accessing their Mails Internet XYZ. DOC E-mails Mail Server User Opening Attachment Attachment Infected How other Antivirus Software Functions Virus Warning

  17. Deficiencies in this system of scanning mails: Source of Problem Changed Business scenario and Advanced & Faster modes of business communication like Internet and E-mails. Consequences Faster Spreading of Malicious Codes Causing More destruction. The ineffective ‘cure’ provided by other software Data is scanned only after saving on to the hard disk, when its already done its harm. Other Causes Improper update distribution and frequency.

  18. A different approach adopted by another popular Anti-Virus Software for scanning of emails

  19. Antivirus Server becomes the E-mail Server/Pop3 Server i.e. All mails are forwarded to the server and checked for viruses Internet Mails Mails Checked Mails E-mail Client With User Accessing their Mails Mail Server Antivirus Server for Mails

  20. Is this Solution effective? • A better Approach compared to the common solution. • No real time scanning is done and Scanning of mails happens only after execution. • No scanning is done while emails are sent out to the Internet

  21. Alternative Solutions offered by our competitors • Avoid using MS-Outlook Express • Avoid sending and receiving email attachments. • Disconnect your network/modem cable when not in use. • Switch off your computer when not in use. • Never accept attachments during online chat. • Avoid downloading files from public newsgroups. • Do not share your directories or folders.

  22. This is not the right way of attacking the problem.So what’s the right solution? Conclusion:

  23. Internet Mails Network ‘B’ Internal Mails WebContents Winsock 2 I E ICQ Outlook Mail Server Network ‘A’ Communication in Network The Internet Any In coming Communication and out going communicationshave to pass Through the Winsock Layer at the server level and the client level

  24. Internet Mails Network ‘B’ Internal Mails WebContents Winsock 2 MicroWorld Winsock Layer Mail Server IE ICQ Outlook Network ‘A’ eScan MWL Technology The Internet Since MWL Sits on Winsock, That means any content passing through Winsock has to pass through MWL where it is checked and then forwarded to the application

  25. MailScan Content-Parser (Object Dis-assembler) MWL (MicroWorld-WinSock-Layer) MailScan Attachment-Filter and ZIP Analyzer eScan Auto -Update Module eScan Content-Analyser Report Consolidation Module eScan Antivirus Module MailScan object Assembler IE Outlook ICQ WINSOCK MWL sits on WinSock 2 and above and assemble all packets Coming on different ports Decodes Mails and Attaachments Checks the validity of the file and file decompression is done Functions of MWL Virus checking & Content checking is done by eScan All the objets are reassembled and passed on to the application layer Only clean objects

  26. MWTI’s Vision For Security Solutions • Leverage the power of Internet to offer the best breed of solutions to customers. • Centralised Installation, administration, deployment and management of security solutions. • Integrated solutions that will understand the existence of another product under MWTI’s umbrella; thus providing the power of internet to leverage the benefits of a combined suite of products. • Product architecture based on Internet technology that can be adapted and modified without much delay. • Automatic Incremental Upgradation of software.

  27. MWTI Your Internet Security Guardian • MWTI has discovered a revolutionary technique (MWL) to implement layer above WinSock. • MWTI has integrated solutions that are unique in terms of technology and product architecture. • MWTI’s solutions stand-out in a crowded market-place as other vendors are providing solutions which are not only expensive but are not worth the money and are incomplete. • Our products are futuristic.

  28. MWTI Your partner in growth. Our solutions will take you into a Safe & Secure future.

  29. Q&A

More Related