Complete Proactive Content Security from the Gateway to the Desktop Copyright © 2003 Aladdin Knowledge Systems.

Slides:



Advertisements
Similar presentations
InterScan AppletTrap Zhang Hong Trend Micro, AppletTrap Team (Nanjing)
Advertisements

A l a d d i n. c o m eSafe 6 FR2 Product Overview.
eSafe Implementation Topologies
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
Web Server Hardware and Software
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
LittleOrange Internet Security an Endpoint Security Appliance.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Firewalls: General Principles & Configuration (in Linux)
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
EDUCAUSE Security 2006 Internet John Brown University.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Firewall Security.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Module 7: Advanced Application and Web Filtering.
Implementing Microsoft Exchange Online with Microsoft Office 365
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Some Great Open Source Intrusion Detection Systems (IDSs)
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Chapter 40 Internet Security.
BUILD SECURE PRODUCTS AND SERVICES
CompTIA Security+ Study Guide (SY0-401)
TMG Client Protection 6NPS – Session 7.
Barracuda Web Filtering Service
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
Using Software Restriction Policies
Presentation transcript:

Complete Proactive Content Security from the Gateway to the Desktop Copyright © 2003 Aladdin Knowledge Systems

What is Content Security? Content Security ensures a clean flow of information  Free of malicious code: Vandals, viruses, worms, Trojans, ActiveX, Java, scripts  Free of Inappropriate and nonproductive content

Some Facts About Content Security  96% of corporations use anti-virus products  Virus attacks are constantly rising, and so are the damages  Most anti-virus products are desktop solutions  Many organizations use anti- virus solutions  Most organizations do not inspect Web (HTTP) traffic, yet...

A complete Content Security solution covers: Malicious code that destroys or steals digital assets Inappropriate and nonproductive material The misuse of company resources (P.S. If one of the checkmarks is empty, eSafe could be the solution you need)

Mail server level Content Inspection (SMTP and/or Exchange) Gateway level Content Inspection (FW-1 or other firewalls) Desktop level Content Inspection (P.S. If one of the checkmarks is empty, eSafe could be the solution you need) Multi-tiered Content Security

Proactive Security The eSafe Way - Multiple levels of content security throughout the enterprise - Multiple content security methods: Scanning Heuristics Blocking

Content Security Methods Scanning identifies malicious code using known signatures. Scanning is the most common anti-virus method.  Scanning is update dependant. Scanning is update dependant.  Pattern signatures can be applied to any type of malicious code. Pattern signatures can be applied to any type of malicious code. Ghost Machine™ is an advanced scanning technology that detects complicated polymorphic, encrypted, and stealth malicious code.

Heuristics Heuristics is a method of analyzing scripted programs such VB/Java scripts and MS Office macros. Heuristics can detect variants of known vandal code as well as completely new and unknown malicious code. Macro Terminator™ is used to eliminate VBA macros and SmartScript™ filtering removes malicious VBScript and JavaScript vandals. Content Security Methods

Blocking Used for stripping dangerous content sent by untrusted source, such as:  Executable attachments  Macros in Office documents  Scripts in s Effective as an immediate solution for outbreaks, until an update is available.

Content Security for Gateways and Mail Servers eSafe Gateway Proactive Content Security and Anti-virus for Internet gateways eSafe Mail Proactive Security and Anti-virus for Servers eSafe Appliance A hardware appliance preconfigured with eSafe Gateway or eSafe Mail

“eSafe is not just another anti-virus”  “Aladdin Knowledge Systems, with its eSafe products, has taken a pioneering step in the software security market by moving beyond only detecting and preventing virus attacks.”  “An important function that differentiates eSafe products from most competitors in the market is that it does not rely solely on scanning signatures.“ © Gartner Research Product Report

The Ultimate Proactive Content Security for Internet Gateways  Proactive Internet gateway security  Integrated security and anti-spam  Certified auto-updating anti-virus  Proactive malicious code protection  Filters non-productive content  Content Security policy enforcement  Scalable enterprise solution

eSafe Gateway Means:  Inspection of Web pages and HTML based s  Blocks malicious ActiveX, Java Applets and scripts  SmartScripts™ Filtering including ! (Malicious VB/Java scripts protection) No Malicious Code

eSafe Gateway Means:  ICSA and Checkmark certified anti-virus  Scans all MIME and compressed file types  Macro Terminator™ and Ghost Machine™ (Advanced Heuristic and Polymorphic Anti-virus protection) Certified Anti Virus

eSafe Gateway Means:  Keyword-based filtering (for inappropriate content and data exposure)  anti-spam and anti-spoof features  Removes all macros from untrusted documents  Blocks attachments by MIME and binary file types  Optional SurfControl ® URL Filtering database (Millions of URLs indexed in 40 categories) Content Filtering

eSafe Gateway Means:  Integrated Content Security solution for HTTP, FTP, and SMTP  Scalable architecture with load sharing  Remote secure management  Extensive reports and alerts Integration and Management

Remote eConsole All eSafe Products can be centrally managed over the network or across the Internet

Gateway eConsole Main Screen Allows a real-time view of the network traffic and content inspection results

eSafe Gateway for OPSEC Check Point FireWall-1 CVP The Best solution in the market for FireWall-1  Allows handling all content security in a secure DMZ  Simple and easy setup and configuration  Supports CVP load-sharing  NEW! Alternative SMTP traffic handling on the same machine! FireWall-1 NG Certified

eSafe Gateway NitroInspection Supports Most Networks

NT or Linux? Now you can have your choice!  eSafe Gateway and eSafe Mail are available for Windows or Linux platforms.  As a dedicated HARDENED machine, either choice would work great.

As Easy As Connect the eSafe Appliance in your LAN or DMZ. Configure your Check Point FireWall-1 and/or SMTP mail server. Configure the eSafe Appliance Content Security preferences. * Available with eSafe Gateway for FW-1 (CVP) and eSafe Mail

 1st Linux-based Content Security Appliance  Inspects HTTP, FTP and SMTP  Scans, filters and blocks viruses and malicious code  Integrated security and anti-spam  Pre-configured plug-and-play box  Check Point OPSEC certified solution

Hi-capacity Network Challenges  Full Content Inspection in networks with over 8Mbit connections can create bottlenecks  Traditional proxy solutions are difficult to implement and are not scalable  Traditional solutions can produce a single-point-of-failure situation

What is HTTP traffic composed of?  Nearly 80% of HTTP traffic is composed of safe data: GIF, JPEG, MPEG, etc.  Only 20% of HTTP traffic needs to be inspected

The Aladdin-Radware Solution eSafe Gateway with Nitro Inspection Routing (NIR) A fast, MIME type based content security routing policy system. Radware CID An advanced ITM (Internet Traffic Management) device capable of rerouting, load-balancing and health monitoring capabilities. + = The first high-capacity Internet content security and management for the large enterprise or xSP. Up to 500% content inspection speed increase and advanced scalability options.

How Does It Work? File Type Redirection Other protocols and Trusted HTTP traffic and files bypasses Content Inspectors (according to MIME type) Several ESG/ESM machines inspecting different content Potentially malicious content is routed for inspection in an eSafe content inspection farm. ESG1 ESG2ESG3ESM1 Only files that are potentially malicious are routed for content inspection Radware CID

Proactive Security and Anti-virus for Servers  Integrated security and anti-spam  Certified auto-updating anti- virus  Proactive malicious code protection  Blocks security exploits  Filters non-productive content  Content Security policy enforcement

In the June 12th 2001 issue of PC Magazine, Aladdin’s eSafe Mail™ content security solution received the prestigious Editors’ Choice Award. Outranking eight competitors, eSafe was labeled “impressive.” Editor Les Freed selected eSafe Mail for its: Simple integration into the eSafe suite of security products Unmatched logging methods through , a report file & Event Easily expandable, distributed server arrangement for future growth Strong scanning and filtering capabilities

Proactive Updates  Incremental scanning engine signatures (Similar to other anti-virus products)  New blocking policies  New monitoring policies  Incremental content (URL) filtering database  Instant alert/notification messages  Product updates and upgrades

eSafe Products Provide: Proactive gateway to desktop security Multi-tiered enterprise solution Central administration Scans and filters malicious code Blocks hostile attachments Analyses and blocks malicious scripts Content security policy enforcement Filters of nonproductive content

eSafe in the Press “eSafe Mail is the most suitable solution for small businesses… it provides very thorough virus protection and filtering in one package and it’s very easy to set up and manage.” PC Magazine June 12, 2001 “…don't let its size fool you: This device is packed with features. PC Magazine, Best Product of 2002 – Networking Category “Anyone can appreciate its multipurpose filtering abilities and strong throughput… The size of a cereal box, this Linux-based appliance is an easy addition to cramped offices… the eSafe Appliance is almost certain to make an impression.” PC Magazine, Editors’ Choice, 2002

Thank You! For more information: