eSafe – Secure Web Gateway Shimon Gruper, CISSP – VP Security Technologies.

Slides:



Advertisements
Similar presentations
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Eyal Sheratzki, co-CEO August 2009 Investor Presentation.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Barracuda Web Application Firewall
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Department Of Computer Engineering
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman Endpoint Protection Advanced security made easy.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
A l a d d i n. c o m eSafe ® Overview a l a d d i n. c o m 2 © Copyright 2008 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Hacker Zombie Computer Reflectors Target.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Black Box Corporation Overview. Black Box Corporation 2 Forward-Looking Statements - Any forward-looking statements contained in this presentation are.
Internet Security facilities for secure communication.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
A l a d d i n. c o m eSafe ® eSafe – Content security proactive Simone Fratus Technical PreSales Manager
Moving from Reactive to Proactive – DeepNines and ESU 3 Nate Jackson, Territory Manager Greg Jackson, Vice President of Technical Services Martin Rosas,
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Michael Miller Senior Director Real-Time Collaboration Products Oracle Collaboration Suite 10g Oracle Corporation.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
BUILD SECURE PRODUCTS AND SERVICES
TMG Client Protection 6NPS – Session 7.
Barracuda Web Filtering Service
Securing the Network Perimeter with ISA 2004
Threat Management Gateway
Firewalls.
Introducing ProxyClient
Presentation transcript:

eSafe – Secure Web Gateway Shimon Gruper, CISSP – VP Security Technologies

a l a d d i n. c o m Safe Harbor Statement Except for statements of historical fact, the information presented herein constitutes forward-looking statements within the meaning of and subject to the safe harbor created by the Private Securities Litigation Reform Act of In some cases, you can identify forward-looking statements by terminology such as "expect," "estimate," "anticipate," "intend," "predict," "believe," and similar expressions and variations thereof. Such forward-looking statements include statements regarding the intent, belief, current expectations or projections about future events of Aladdin Knowledge Systems Ltd. Readers are cautioned that these forward looking statements are not guarantees of future performance and involve known and unknown risks, uncertainties and other factors which may cause the actual results, performance or achievements of Aladdin Knowledge Systems Ltd. to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. Such factors include without limitation, general economic and business conditions, the loss of market share, changes in the competitive landscape, failure to keep up with technological advances and other factors over which Aladdin Knowledge Systems Ltd. has little or no control. Aladdin Knowledge Systems Ltd. undertakes no obligation to revise or update these forward-looking statements to reflect events or circumstances after the date hereof.

a l a d d i n. c o m Agenda About AladdinAbout Aladdin Content Security ChallengesContent Security Challenges Introduction to eSafeIntroduction to eSafe Delivery optionsDelivery options Implementation optionsImplementation options Support & UpdatesSupport & Updates

a l a d d i n. c o m Aladdin Knowledge Systems (NASDAQ: ALDN) is a global provider of software protection and network security solutions since With a distribution network of more than 50 partners in over five continents, Aladdin provides unmatched service and support to its customers.

a l a d d i n. c o m Headquarters: Tel Aviv, Israel Global Presence: Strong Financial Momentum: Founded: 1985, publicly traded since 1993 Employees Worldwide: 465 Q4/07 revenues: $29.1M Q4/07 profits: $4.8M (Non-GAAP) 2007 revenues: $105.9M 2007 profits: $17.6M (Non-GAAP) Consistent growth in revenues and profits World Renowned Products: Global leader in Software DRM (Digital Rights Management), fast growth, innovative Enterprise Security products USA, UK, Germany, France, The Netherlands, India, Spain, Italy, Japan and China Aladdin Snapshot

a l a d d i n. c o m Aladdin: Securing the Global Village Our Mission To create value by enabling the secure use and distribution of digital content Our Vision To be the leading provider of innovative security solutions to protect digital assets and enable secure business

a l a d d i n. c o m Aladdin Product Lines Software Rights Management – copy protection, IP protection and secure licensing solution for software vendors Software Publishers and System Vendors Solutions for authentication and password/digital identity management Enterprise Education Banking Pharmacy Government TARGET MARKET Web gateway content security and proactive security Enterprise and ISP’s DRM ENTERPRISE SECURITY

a l a d d i n. c o m Aladdin – Strong in Europe North America: 18% Europe: 61% ROW: 21% Business Segments: Geographical Segments: 41% 59%

a l a d d i n. c o m Web Content Security Challenges

a l a d d i n. c o m The shift in Content Security Threats From amateur virus writers to organized money making professionals ! Virus TrojanWorm Internet Trojan PhishingSpywareSpam Mobile Threats 2007 Web Threats

a l a d d i n. c o m 2007 Was A Very Bad Year Over 1,000,000 unique malware in 2007 Some estimate there are over 5.5 million In-The-Wild malware (AV-Test.org) Thousands of new malware a day 1,000,000

a l a d d i n. c o m Source: AV-TEST Lab, Germany

a l a d d i n. c o m It’s all about money…

a l a d d i n. c o m

“ Last year was the first year that proceeds from cybercrime were greater than proceeds from the sale of illegal drugs… law enforcement cannot catch up with it." Valerie McNiven, US Treasury Cybercrime 'more lucrative' than drugs

a l a d d i n. c o m BotNets

BotNet Controllers

a l a d d i n. c o m “Of the 600 million computers currently on the internet, between 100 and 150 million are already part of botnets” Davos, January 2007 Dr. Vinton Cerf

a l a d d i n. c o m Why do threats increase?

a l a d d i n. c o m Security is not transparent! I should probably click ‘Yes’…

a l a d d i n. c o m Today’s Internet Threats

a l a d d i n. c o m The Web 2.0 Dilemma MySpace Face- book Google Apps Gray BadGood

a l a d d i n. c o m Malware 2.0 Inspection HTML AJAX Scripts Good Gray

a l a d d i n. c o m Anti-virus ? We’re trying our best to stay on top, but unfortunately I must confess that the detection level is slowly going down. We develop new technology to stop them and they develop new technology to bypass. We still have the highest detection rate, but we cannot stop some malicious code. This makes us scared if we will be able to stop them in the future. There was a time when we thought that antivirus technology was enough, but that time has gone. It’s not enough, obviously. Natalya & Eugene Kaspersky

a l a d d i n. c o m URL Filter? No time for updates! Months Days Weeks Avg. exploit in days. Vulnerabilities Exploited Faster Hours Seconds Minutes % of the hosts within 10-minutes. Threats Propagating Faster

a l a d d i n. c o m Essential Solution Ingredients Desktop Antivirus URL Filter Antivirus

a l a d d i n. c o m Essential Solution Ingredients Web security Desktop Antivirus URL Filter Antivirus Less than 20% of organizations have Web Security in place !

a l a d d i n. c o m “The market is demanding a secure-Web gateway (SWG) solution that provides not only traditional URL-filtering but also malicious software (malware) filtering, as well as application control for Web applications such as instant messaging (IM).” Peter Firstbrook Introducing the Secure Web Gateway

a l a d d i n. c o m Recommendations IT organizations should recognize the increasing threat that Web traffic represents and the limitations of existing solutions at addressing this rising threat. Use URL filtering renewals and budget money to upgrade to a secure Web gateway solution that is capable of detecting and filtering malicious Web traffic. The Growing Web Threat

a l a d d i n. c o m The Ultimate Network Security Solution

a l a d d i n. c o m Introduction to eSafe

a l a d d i n. c o m Firewall VPN IDS/IPS Network Security Spyware, Malware Inappropriate content Confidential data loss Unauthorized applications (IM, P2P, tunneling, etc.) Web Surfing Network policies Business policies Content Security Enterprise Network Internet eSafe Web

a l a d d i n. c o m Security Golden Triangle The balance is crucial for a proper web security gateway

a l a d d i n. c o m What is the ultimate Web Security? eSafe 4 Security Layers

a l a d d i n. c o m Content Access Good Sites – Bad Sites Good ActiveX – Bad ActiveX – Preinstalled only Dynamic Web Threats File Analysis The Only 4 Layer Web Content Security Application Filtering

a l a d d i n. c o m URL Filtering & IP Reputation CRAWLING Data Center Security 500+ Crawlers worldwide 3.8 Billion Indexed Webpages / Images 120 Million Pages per Month 800 Spam Collectors Smart Search Engine ANALYZING Content Analyzing Technology OCR Full Text Classification Object Detection Logo Detection Face Recognition Porn Detection Digital Fingerprints PROCESSING Data Center Hardware > 1,000 Servers 45 Mbit / Sec Internet Access 20 Terabyte Cache 12 Worldwide Remote Servers Processing Four Million Webpages / s per Day 60 million URLs 8 Updates per Day 98% Sites Known 60 Categories 150,000 URL Updated per Day

a l a d d i n. c o m Content Access Dynamic Web Threats The Only 4 Layer Web Content Security Zero-day exploits Malicious scripts Pop-installers - In “Grey” sites - In Hacked sites Application Filtering File Analysis

a l a d d i n. c o m Real-time Deep Web 2.0 Content Analysis Real-time packet by packet analysis of all web content Inspects all HTML pages and all code in them (scripts, AJAX, etc.) for “Web. 2.0” threats. Detects the following in all HTML and script code: –Known vulnerabilities (exploit attempts) –Known malicious code and variations –Suspicious code. Inspects HTTP on any port and HTTPS on SSL port 443

a l a d d i n. c o m Transparent Real-time Content Modification eSafe removes only suspicious elements form web pages containing suspicious code The rest of the content remains intact Avoid over-blocking of legitimate hacked sites, “grey” unknown sites, etc. Web page content inspection, including HTML, and media files, is done in real-time Performance of over 50Mbps / 3000 connections per machine (scalable to ISP level)

a l a d d i n. c o m Download Dynamic Web Threats Signatures Communications blocking The Only 4 Layer Web Content Security Simple Known family (heuristic) Polymorphic, stealth Suspicious Spyware / Trojan / Worm

a l a d d i n. c o m Proactive eSafe AV engine

a l a d d i n. c o m eSafe CSRT - More Security 42

a l a d d i n. c o m Aladdin Blocks Sophisticated Web Attack

a l a d d i n. c o m Content Access Dynamic Web Threats File Analysis Application Filtering The Only 4 Layer Web Content Security Worms Browser Hijack Spyware / Adware Spyware protocols Outbound Trojan Selective IM (chat / file) Tunneling Remote PC P2P

a l a d d i n. c o m Unauthorized Applications Traffic P2P applications Spyware Instant Messengers TCP Worms Remote Control Tunneling …and more

a l a d d i n. c o m Application Filtering and Control eSafe’s AppliFilter™ helps protect and control: Over 500 Internet application protocols 20 application families 4 application family categories: –Malicious applications: Spyware, Trojans, Worms, Key-loggers –Unwanted applications: Adware and add-supported software, anonymizing tools –Exploits and vulnerabilities: TCP Exploits, drive-by attacks, browser hijackers –Controlled applications: Instant Messengers, IP Phone, P2P, streaming, tunnelling

a l a d d i n. c o m Anonymous Surfing

a l a d d i n. c o m Anonymous Proxies Protection Content Security products offer “list-based” approach against Anonymous proxies AppliFilter’s unique “Anonymous Web Proxy” filter catches requests for anonymous proxies on the fly, providing organizations zero-day protection against circumvention and anonymity techniques.

a l a d d i n. c o m Delivery Options

a l a d d i n. c o m Delivery Options Reduced complexity: Instant installation on any PC Hardened, secure & updatable OS Built-in web-based configuration GUI HG-200 HG-400 HG-300

a l a d d i n. c o m Flexible Integration options Active Directory integration –Microsoft AD –Novel ISA Server integration ArcSight integration Installation modes: –Bridge –Router –ICAP –Forwarding Proxy –Native Proxy –Load-balancing / High-Availability Cluster

a l a d d i n. c o m eSafe Web SSL –Enforces policy also on SSL encrypted anonymizer sites –Proactively identify and block unknown anonymizers –Blocks self-signed SSL sites (home-brew anonymizers) –Validates certificate policies, issuers, revocations, etc.

a l a d d i n. c o m eSafe Reporter Includes 34 canned reports Specifically geared for Enterprise Customers Works with MS-SQL Generate scheduled reports and them to predefined group of people

a l a d d i n. c o m Implementation Options

a l a d d i n. c o m eSafe Branch office Regional Office HQ Central Monitoring Central Configuration Central Reporting Central Logging Local Configuration Real Enterprise Solutions

a l a d d i n. c o m Real time monitoring

a l a d d i n. c o m Real-time monitoring

a l a d d i n. c o m Support & Customer Care

a l a d d i n. c o m Support services – Deluxe Support Security services –24x7 threats research (CSRT – Content Security Research Team) –Timely updates –Proactive security rules (XploitStopper™) – / SMS notifications –Emergency telephone support Technical Support Services –24x7 web / telephone support –Immediate escalation to R&D –Continuous case status update –Personal case supervision by Customer Care Director –On site visits (fee charged after 90 days warranty)

a l a d d i n. c o m Case Studies

a l a d d i n. c o m Large Enterprise Case Study: Large Enterprise Case Study: US Defense Contractor Distributed operation 70,000+ users Challenge: no affect on user browsing experience & minimal admin overhead Evaluated proxy solution but selected eSafe for speed and security Result: –High security –Increased productivity –No performance impact

a l a d d i n. c o m Case Study: Case Study: US School District 10,000 students, teachers and administrators in 30 separate schools Struggling with spyware control IT resources stretched thin by ongoing remediation Result: –Virtually eliminated spyware infections –Time spent on desktops remediation dropped by 95%

a l a d d i n. c o m Case Study – Managed Services “We monitor all traffic patterns throughout our network, we proactively defend you from all malicious or accidental attack, delivering 'clean pipes' to all our customers' corporate networks.” LSE: CW Leading international communications company Trading with eSafe (as Energies) since 2003 Joint Services: Managed Content Security Services (MSSP model), and Clean Pipe services Customers Include: Large enterprises, Carriers, Public Sector and local Service providers

a l a d d i n. c o m Case Study - ISP NASDAQ: IGLD Leading Israeli communications service provider Services: Internet, International telephony and IT Integration Services In January 2007, completed the acquisition of 012 Golden Lines Ltd. Jointly owns MSN-Israel with Microsoft No. of subscribers estimated by 1M Service name: Safety Net Target: Home, Small business Launch: February, 2006 Successful Marketing Campaign leads to a high acceptance rate: over 50% Over 1,500 subscribers per week Withdrawals: Marginal (less than 0.5%)

a l a d d i n. c o m

Web Threat Analyzer Reveals security and productivity threats Offers a realistic view of current, and real web threat status Provides a full and comprehensive Web-threat Audit report!

a l a d d i n. c o m Summary

The only proven proactive threat protection –Consistently blocks over 96% of previously unknown threats –Eliminates over 99% of common and driveby spyware –Prevents zero-day vulnerabilities and exploits Transparent deep web-content inspection –Wire-speed inspection of web pages including all HTML –Zero-latency with no impact on user experience –Complements firewalls, IPS, and desktop antivirus Starting at 5 million processed web pages per hour –Scalable for hundreds to millions of users –ISP-grade content security performance –Trusted by fortune 500 corporations eSafe Advantages

a l a d d i n. c o m Technology leader - Innovation is our key focus eSafe MCSG – Mobile security gateway 1997 eSafe Protect – Sandbox anti-vandal solution eSafe Gateway – Anti-virus gateway NitroInspection™ – Non-proxy HTTP gateway AppliFilter™ – Application filtering 2005 Spyware Neutralizer – Clientless scanner 2002 XploitStopper™ – Gateway exploits blocker st % Protection of Anonymizer Services 1 st

a l a d d i n. c o m Gartner Secure Web Gateway - Magic Quadrant Aladdin is an early visionary entrant into the SWG market. Aladdin gets very high marks for malware detection across all ports and protocols. The company was an early antivirus vendor and continues to utilize its own malware signatures in addition to several real-time malware detection techniques. The product has an extensive list (more than 1,000) of pre-developed application filter policies. The eSafe SWG is an in-line filter and supports an extensive list of deployment options that provide for scalability for more than 20,000 seats.

a l a d d i n. c o m Frost & Sullivan – WW Anti-virus Report “Aladdin Knowledge Systems content security business unit’s growth has been outperforming the average market growth rate… Aladdin’s recent product innovations in the integrated security area have proved the company’s ability to react fast to changing market demands.”

a l a d d i n. c o m More than 4,000 eSafe customers worldwide

a l a d d i n. c o m … more customers

a l a d d i n. c o m SOME EUROPEAN CUSTOMERS

a l a d d i n. c o m Thank you ! For more info:

a l a d d i n. c o m NitroInspection™ technology HTTPContentrecognitionfilter HTTPContentmixer 15% HTML inspection 5% Binaries inspection 10% Trusted content HTTP content European Patent EP % JPG inspection

a l a d d i n. c o m Improved user experience No time-outs No slowdowns Completely transparent Fast and efficient eSafe NIC TCP/IP stack eSafe PCA Content Inspector Content Inspector 80% of packets are released After inspection, the remaining 20% is released When the entire file is received, it is inspected NitroInspection™ technology