290 likes | 452 Views
銳擎智識股份有限公司. Executive Vice President Richard Chuang Richard@andreach.com. eScan, MailScan 企業防毒解決方案. Richard Chuang richard@andreach.com. MicroWorld Technologies Inc. Proudly Presents. eScan & MailScan Content-Security & Anti-Virus World’s first “Real-Time” Email Scanner.
E N D
銳擎智識股份有限公司 Executive Vice President Richard Chuang Richard@andreach.com
eScan, MailScan企業防毒解決方案 Richard Chuang richard@andreach.com
MicroWorld Technologies Inc. Proudly Presents eScan & MailScan Content-Security & Anti-Virus World’s first “Real-Time” Email Scanner.
MicroWorld Technologies Inc. (MWTI) • Leaders in Content-Security and Communications software. • Strong technical and technological expertise • Our clients include Govt.. Organization Banks, Financial Institutions, Corporates, Airlines, Travel Agencies, etc. • World Wide Presence. • Nearly 100 staff members and about 50 partners • Company growing at more than 100% p.a.
MWTI’s Software Products CONTENT SECURITY SOFTWARE MailScan MailScan for Mail-Servers MailScan for SMTP MailScan for Exchange MailScan for Lotus Notes MailScan for WinRoute MailScan for Mdaemon MailScan for VPOP3-Servers eScan eScan for Servers eScan for Workstations
Business Partners • Paul Smith Computer Services PLC., UK - MailScan for VPOP3 • MailScan for SMTP servers – Partners in about 30 countries across the globe. • Distributors & Partners for other products across the globe - A reseller network of about 10,000 resellers
CONTENT-SECURITY Need & Definition
The world-market trend The rise of information needs from the open network will fuel Network Security demand. As corporate entities transform their business models to leverage internet communications, network security will be transformed from a “cost of doing business” to a “business enabler” A heterogeneous security market - several related, but distinct segments (Antivirus, Content Scanning, Firewall, etc.).
Content-Security Definition - Threats • The contemporary virus threats have now ballooned into ‘content-security’ threats. • Content-security threats includes: • email virus threat, web-based virus downloads threat, Word-based macro bomb threat • offensive email and web content threat • Threat of misuse and abuse of email & web resources • Threat of Intrusion of anonymous internet users • Threat of Trespassing of unauthorized users into company’s internal network
Loss that an organization suffers due to security violations & other related problems Assumption: Network of about 1000 PCs; Average loss per year over a span of 3 years: Courtesy Aberdeen Consultants
MWTI’s Content-Security Solution eScan & MailScan
eScan Solution Framework eScan is a comprehensive Content-Security Software that offers: • Comprehensive Security Policy framework • Scanning of TCP/IP Traffic for restricted words, content or profane substance • Anti-Virus capabilities • Anti-Spamming utilities • eServ – The Central Management Console
eScan Solution Framework -Value proposition for customers • Integrated solutions for different platforms/networks • Centralised installation and management • Low cost for leasing software • Cost savings, as security components are integrated, thereby doing away with the need to invest in different solutions • Increase in productivity due to 99% uptime of computers • Solution completely transparent to end-users • Complete control for network administrators
Our claim“eScan is the world’s first real-time email scanner” How do we justify?
Let’s first understand how other “Anti-Virus” Software Products function.
E-mail Client With User Accessing their Mails Internet XYZ. DOC E-mails Mail Server User Opening Attachment Attachment Infected How other Antivirus Software Functions Virus Warning
Deficiencies in this system of scanning mails: Source of Problem Changed Business scenario and Advanced & Faster modes of business communication like Internet and E-mails. Consequences Faster Spreading of Malicious Codes Causing More destruction. The ineffective ‘cure’ provided by other software Data is scanned only after saving on to the hard disk, when its already done its harm. Other Causes Improper update distribution and frequency.
A different approach adopted by another popular Anti-Virus Software for scanning of emails
Antivirus Server becomes the E-mail Server/Pop3 Server i.e. All mails are forwarded to the server and checked for viruses Internet Mails Mails Checked Mails E-mail Client With User Accessing their Mails Mail Server Antivirus Server for Mails
Is this Solution effective? • A better Approach compared to the common solution. • No real time scanning is done and Scanning of mails happens only after execution. • No scanning is done while emails are sent out to the Internet
Alternative Solutions offered by our competitors • Avoid using MS-Outlook Express • Avoid sending and receiving email attachments. • Disconnect your network/modem cable when not in use. • Switch off your computer when not in use. • Never accept attachments during online chat. • Avoid downloading files from public newsgroups. • Do not share your directories or folders.
This is not the right way of attacking the problem.So what’s the right solution? Conclusion:
Internet Mails Network ‘B’ Internal Mails WebContents Winsock 2 I E ICQ Outlook Mail Server Network ‘A’ Communication in Network The Internet Any In coming Communication and out going communicationshave to pass Through the Winsock Layer at the server level and the client level
Internet Mails Network ‘B’ Internal Mails WebContents Winsock 2 MicroWorld Winsock Layer Mail Server IE ICQ Outlook Network ‘A’ eScan MWL Technology The Internet Since MWL Sits on Winsock, That means any content passing through Winsock has to pass through MWL where it is checked and then forwarded to the application
MailScan Content-Parser (Object Dis-assembler) MWL (MicroWorld-WinSock-Layer) MailScan Attachment-Filter and ZIP Analyzer eScan Auto -Update Module eScan Content-Analyser Report Consolidation Module eScan Antivirus Module MailScan object Assembler IE Outlook ICQ WINSOCK MWL sits on WinSock 2 and above and assemble all packets Coming on different ports Decodes Mails and Attaachments Checks the validity of the file and file decompression is done Functions of MWL Virus checking & Content checking is done by eScan All the objets are reassembled and passed on to the application layer Only clean objects
MWTI’s Vision For Security Solutions • Leverage the power of Internet to offer the best breed of solutions to customers. • Centralised Installation, administration, deployment and management of security solutions. • Integrated solutions that will understand the existence of another product under MWTI’s umbrella; thus providing the power of internet to leverage the benefits of a combined suite of products. • Product architecture based on Internet technology that can be adapted and modified without much delay. • Automatic Incremental Upgradation of software.
MWTI Your Internet Security Guardian • MWTI has discovered a revolutionary technique (MWL) to implement layer above WinSock. • MWTI has integrated solutions that are unique in terms of technology and product architecture. • MWTI’s solutions stand-out in a crowded market-place as other vendors are providing solutions which are not only expensive but are not worth the money and are incomplete. • Our products are futuristic.
MWTI Your partner in growth. Our solutions will take you into a Safe & Secure future.