© 2008 Alt-N Technologies - Confidential Technical Training and Demonstration Matt McDermott Team Leader - Product Developer.

Slides:



Advertisements
Similar presentations
© , Actuate Corporation Engineer Orientation IT Facility.
Advertisements

Module 1: Introduction to SQL Server Reporting Services.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
2.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 2: Installing Windows Server.
Lesson 18 – INSTALLING AND SETTING UP WINDOWS 2000 SERVER.
1.1 Installing Windows Server 2008 Windows Server 2008 Editions Windows Server 2008 Installation Requirements X64 Installation Considerations Preparing.
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
McGraw-Hill/Irwin© 2006 The McGraw-Hill Companies, Inc. All rights reserved. 5-1.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Exchange 2007 Overview. What Will We Cover? New features in Microsoft® Exchange 2007 The Exchange Management Console The Exchange Management Shell New.
VMware vCenter Server Module 4.
Take advantage of the SMS technology in your organization today!
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Deploying and Managing Windows Server 2012
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
OM. Brad Gall Senior Consultant
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.

ApexSQL Log Recover accidentally truncated, dropped or deleted data with or without transaction log or its backup. Recover data from un-attachable/corrupted.
Introduction to Windows XP Professional Chapter 2 powered by dj.
Windows XP Professional Windows XP Professional Overview Install and Upgrade Windows XP Pro Customize and Manage Windows XP Pro Troubleshoot Common Windows.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
Learningcomputer.com SQL Server 2008 – Installation of SQL Server 2008.
Exchange Online Protection. About Speaker Prabhat Nigam Microsoft MVP: Exchange Server MCSE: Messaging 2013, MCITP 2010/2007, MS Ex – Microsoft Exchange.
By: Bill Stevenson Jose Plancarte Erik Magsino. Overview Messaging and collaboration server Send and Receive electronic mail and other forms of interactive.
Team Members ? ? Chintan Goswami Nirav Tank Project Guide ? ? Mrs. Darshana H. Patel [Internal] Mr. Manish I. Vora [External]
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Guide to MCSE , Second Edition, Enhanced1 The Microsoft Networking Family Collection of operating systems (OS) Operating Systems Work directly with.
1 Microsoft Exchange 2000 Server Maintenance and Troubleshooting System Maintenance and Monitoring Database Operation and Maintenance Backup, Restore,
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
EPolicy Orchestrator WNUG June Meeting 6/6/2002. Presentation Contents What is ePO? What are the requirements? ePO components Demo of ePO Where to get.
Chokchai Junchey Microsoft Product Specialist Certified Technical Training Center.
Name Region Assisting Partners to Do the Day in the Life Demonstration.
Chapter 3 Installing Windows XP Professional. Preparing for installation Pre-installation requirement; ◦ Hardware requirements ◦ Hardware compatibility.
Group I Renjith Deepesh Praveesh P Varun V Subramanian Halesh P K.
Module 3: Preparing for and Recovering from Non- Mailbox Server Failures.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
IT Essentials 1 Chapter 12 JEOPADY Questions by R. Prensky and students Pinetree Secondary School Coquitlam, BC, Canada.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
1 Microsoft Outlook 2000 Deployment Microsoft Outlook 2000 Installation Types Configuring the Exchange Transport Messaging-Related Outlook Options.
Microsoft Management Seminar Series SMS 2003 Change Management.
Advanced file encryption Copyright © 2002 Deerfield.com, All Rights Reserved.
1 Chapter Overview Planning to Install SQL Server 2000 Deciding SQL Server 2000 Setup Configuration Options Running the SQL Server 2000 Setup Program Using.
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July 2012.
Exchange Server 2007 Deployment and Migration Strategies Nireshen Beerbul
Intro to Datazen.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
IPS Infrastructure Technological Overview of Work Done.
IPariksha Automating Examination System. Brief iPariksha is a complete online examination system designed and developed for accelerating the manual examination.
Chapter 5 Server Installation NT Server Requirements NT Server File Systems Installation.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Troubleshooting Workflow 8 Raymond Cruz, Software Support Engineer.
Microsoft Office Outlook 2007 with Business Contact Manager 김민국 대리 파트너기술지원센터 / 서비스사업부 ㈜다우데이타.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
Using Virtualization in the Classroom
ETL Validator Deployment Options
Technical Specifications
Answer to Summary Questions
DIT314 ~ Client Operating System & Administration
UTM Content Security Gateway
Introduction to Operating Systems
InGenius Connector Enterprise Microsoft Dynamics CRM
Securing the Network Perimeter with ISA 2004
Servicenow Admin Certification Training
Computer Repair & Maintenance
Presentation transcript:

© 2008 Alt-N Technologies - Confidential Technical Training and Demonstration Matt McDermott Team Leader - Product Developer

© 2008 Alt-N Technologies - Confidential Agenda Product Overview Installation and Initial Configuration Dashboard and Navigation Setup and Security Menu Installation of ProtectionPlus Messages and Queues Log Files and Reporting Channel Training Overview Questions and Answer Session

© 2008 Alt-N Technologies - Confidential Overview Not a Delivery MTA (Mail Transfer Agent) Not an MDA (Mail Delivery Agent) SecurityGateway is a Border MTA or Edge Role Internet ServerSecurityGateway

© 2008 Alt-N Technologies - Confidential SecurityGateway is Not MDaemon Does not Store No POP or IMAP Support Custom Security Settings Per Domain Web-based GUI Database Backend Sieve Filtering Engine Comprehensive Reporting

© 2008 Alt-N Technologies - Confidential Interoperability SecurityGateway works with any server Internet ServerSecurityGateway

© 2008 Alt-N Technologies - Confidential Hardware Microsoft Windows XP/2000/2003/Vista operating system Minimum System requirements – P4 Processor – 512MB RAM – NTFS formatted Hard Disk Drive with at least 500MB free

© 2008 Alt-N Technologies - Confidential Architecture Embedded FireBird SQL database Embedded secure web server High performance multi-threaded program

© 2008 Alt-N Technologies - Confidential Windows Server Operating System Multiple Core Processor 2GB or More RAM Multiple Hard Disk Drives – OS – SecurityGateway (Database) – Logging/Attachments/Backups Local DNS Server – Mirrored DNSBL/URIBL Zones Recommended Setup

© 2008 Alt-N Technologies - Confidential User Interface (UI) Web-based No pop-ups Task oriented Intuitive

© 2008 Alt-N Technologies - Confidential Begin Interactive Demo

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Installation

© 2008 Alt-N Technologies - Confidential Login

© 2008 Alt-N Technologies - Confidential Dashboard

© 2008 Alt-N Technologies - Confidential

User Verification Sources

© 2008 Alt-N Technologies - Confidential User Verification Sources

© 2008 Alt-N Technologies - Confidential User Options

© 2008 Alt-N Technologies - Confidential Data Retention

© 2008 Alt-N Technologies - Confidential Backup/Restore

© 2008 Alt-N Technologies - Confidential Quarantine Options

© 2008 Alt-N Technologies - Confidential Quarantine Options

© 2008 Alt-N Technologies - Confidential Quarantine Summary

© 2008 Alt-N Technologies - Confidential Quarantine Summary

© 2008 Alt-N Technologies - Confidential User Login View

© 2008 Alt-N Technologies - Confidential User Quarantine

© 2008 Alt-N Technologies - Confidential Message Log

© 2008 Alt-N Technologies - Confidential Message Log - Search

© 2008 Alt-N Technologies - Confidential Anti-Spam – SGSpamD

© 2008 Alt-N Technologies - Confidential Outbreak Protection

© 2008 Alt-N Technologies - Confidential Message Scoring

© 2008 Alt-N Technologies - Confidential Message Scoring

© 2008 Alt-N Technologies - Confidential Anti-Virus

© 2008 Alt-N Technologies - Confidential Anti-Spoofing – DKIM Signing

© 2008 Alt-N Technologies - Confidential Anti-Spoofing – DKIM Signing

© 2008 Alt-N Technologies - Confidential Sieve Scripts

© 2008 Alt-N Technologies - Confidential Sieve Scripts

© 2008 Alt-N Technologies - Confidential Sieve Scripts

© 2008 Alt-N Technologies - Confidential Sieve Scripts

© 2008 Alt-N Technologies - Confidential Log Files

© 2008 Alt-N Technologies - Confidential Log Files

© 2008 Alt-N Technologies - Confidential Log Files

© 2008 Alt-N Technologies - Confidential Log Files

© 2008 Alt-N Technologies - Confidential Reports

© 2008 Alt-N Technologies - Confidential Reports

© 2008 Alt-N Technologies - Confidential Reports

© 2008 Alt-N Technologies - Confidential Reports

© 2008 Alt-N Technologies - Confidential Reports

© 2008 Alt-N Technologies - Confidential Reports

© 2008 Alt-N Technologies - Confidential Reports

© 2008 Alt-N Technologies - Confidential Summary Dedicated, high performance gateway Cutting edge security features Intuitive, task-based user interface Detailed reports prove effectiveness

© 2008 Alt-N Technologies - Confidential Questions & Answers Conclusion