© 2008 Alt-N Technologies - Confidential Technical Training and Demonstration Matt McDermott Team Leader - Product Developer
© 2008 Alt-N Technologies - Confidential Agenda Product Overview Installation and Initial Configuration Dashboard and Navigation Setup and Security Menu Installation of ProtectionPlus Messages and Queues Log Files and Reporting Channel Training Overview Questions and Answer Session
© 2008 Alt-N Technologies - Confidential Overview Not a Delivery MTA (Mail Transfer Agent) Not an MDA (Mail Delivery Agent) SecurityGateway is a Border MTA or Edge Role Internet ServerSecurityGateway
© 2008 Alt-N Technologies - Confidential SecurityGateway is Not MDaemon Does not Store No POP or IMAP Support Custom Security Settings Per Domain Web-based GUI Database Backend Sieve Filtering Engine Comprehensive Reporting
© 2008 Alt-N Technologies - Confidential Interoperability SecurityGateway works with any server Internet ServerSecurityGateway
© 2008 Alt-N Technologies - Confidential Hardware Microsoft Windows XP/2000/2003/Vista operating system Minimum System requirements – P4 Processor – 512MB RAM – NTFS formatted Hard Disk Drive with at least 500MB free
© 2008 Alt-N Technologies - Confidential Architecture Embedded FireBird SQL database Embedded secure web server High performance multi-threaded program
© 2008 Alt-N Technologies - Confidential Windows Server Operating System Multiple Core Processor 2GB or More RAM Multiple Hard Disk Drives – OS – SecurityGateway (Database) – Logging/Attachments/Backups Local DNS Server – Mirrored DNSBL/URIBL Zones Recommended Setup
© 2008 Alt-N Technologies - Confidential User Interface (UI) Web-based No pop-ups Task oriented Intuitive
© 2008 Alt-N Technologies - Confidential Begin Interactive Demo
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Installation
© 2008 Alt-N Technologies - Confidential Login
© 2008 Alt-N Technologies - Confidential Dashboard
© 2008 Alt-N Technologies - Confidential
User Verification Sources
© 2008 Alt-N Technologies - Confidential User Verification Sources
© 2008 Alt-N Technologies - Confidential User Options
© 2008 Alt-N Technologies - Confidential Data Retention
© 2008 Alt-N Technologies - Confidential Backup/Restore
© 2008 Alt-N Technologies - Confidential Quarantine Options
© 2008 Alt-N Technologies - Confidential Quarantine Options
© 2008 Alt-N Technologies - Confidential Quarantine Summary
© 2008 Alt-N Technologies - Confidential Quarantine Summary
© 2008 Alt-N Technologies - Confidential User Login View
© 2008 Alt-N Technologies - Confidential User Quarantine
© 2008 Alt-N Technologies - Confidential Message Log
© 2008 Alt-N Technologies - Confidential Message Log - Search
© 2008 Alt-N Technologies - Confidential Anti-Spam – SGSpamD
© 2008 Alt-N Technologies - Confidential Outbreak Protection
© 2008 Alt-N Technologies - Confidential Message Scoring
© 2008 Alt-N Technologies - Confidential Message Scoring
© 2008 Alt-N Technologies - Confidential Anti-Virus
© 2008 Alt-N Technologies - Confidential Anti-Spoofing – DKIM Signing
© 2008 Alt-N Technologies - Confidential Anti-Spoofing – DKIM Signing
© 2008 Alt-N Technologies - Confidential Sieve Scripts
© 2008 Alt-N Technologies - Confidential Sieve Scripts
© 2008 Alt-N Technologies - Confidential Sieve Scripts
© 2008 Alt-N Technologies - Confidential Sieve Scripts
© 2008 Alt-N Technologies - Confidential Log Files
© 2008 Alt-N Technologies - Confidential Log Files
© 2008 Alt-N Technologies - Confidential Log Files
© 2008 Alt-N Technologies - Confidential Log Files
© 2008 Alt-N Technologies - Confidential Reports
© 2008 Alt-N Technologies - Confidential Reports
© 2008 Alt-N Technologies - Confidential Reports
© 2008 Alt-N Technologies - Confidential Reports
© 2008 Alt-N Technologies - Confidential Reports
© 2008 Alt-N Technologies - Confidential Reports
© 2008 Alt-N Technologies - Confidential Reports
© 2008 Alt-N Technologies - Confidential Summary Dedicated, high performance gateway Cutting edge security features Intuitive, task-based user interface Detailed reports prove effectiveness
© 2008 Alt-N Technologies - Confidential Questions & Answers Conclusion