Effective Perimeter Content Security. What is eSafe? eSafe is: –Best of breed web Surfing Security Gateway with anti- spyware & unauthorized applications.

Slides:



Advertisements
Similar presentations
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Advertisements

Intrusion Prevention anno 2012: Widening the IPS concept.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
What's new in Threat Management Gateway (TMG) 2010 Ronald Beekelaar
AVG Internet Security 7.5 Product presentation.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Trend Micro InterScan Web Security Suite ™ 2.5 戴 燊 Samson Tai 趨勢科技 台灣區技術行銷部 技術顧問.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
Course 201 – Administration, Content Inspection and SSL VPN
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Securing Schools Firewalling and Filtering on the Broadband for Schools Network. Liam Kennedy Network Engineer HEAnet Ltd.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Cyberoam Complete Network Security for Banks. Cyberoam for Security in Banks Dimensions of Banking Security Cyberoam Solution User Identity in Security.
Simplifying , Web & Network Protection. Astaro Overview – Page 2 © Astaro 2007 Topics Astaro Company Profile The Security Struggle Overview of Astaro.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
A Holistic Approach to Malware Defense Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
A l a d d i n. c o m eSafe ® Overview a l a d d i n. c o m 2 © Copyright 2008 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Hacker Zombie Computer Reflectors Target.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Virtual techdays INDIA │ august 2010 Threat Management Gateway 2010 – A Deep Dive Anirudh Singh Rautela │ TSP – Security, Microsoft Corporation.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
A l a d d i n. c o m eSafe ® eSafe – Content security proactive Simone Fratus Technical PreSales Manager
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
eSafe ® SmartSuite™ Overview Noam Lando, Director Product Strategy Nilly Assia, Sr. Product Marketing.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Complete Proactive Content Security from the Gateway to the Desktop Copyright © 2003 Aladdin Knowledge Systems.
Web Content Security Unlock the Power of the Web
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
Web Content Security Unlock the Power of the Web
TMG Client Protection 6NPS – Session 7.
Barracuda Web Filtering Service
CONNECTING TO THE INTERNET
Securing the Network Perimeter with ISA 2004
Jon Peppler, Menlo Security Channels
Virtualization & Security real solutions
Lecture 3: Secure Network Architecture
Using Software Restriction Policies
Presentation transcript:

Effective Perimeter Content Security

What is eSafe? eSafe is: –Best of breed web Surfing Security Gateway with anti- spyware & unauthorized applications filtering –Best of breed Proactive Security with spam management –Transparent inspection of: HTTP, FTP, SMTP, POP3 eSafe provides zero-day protection for top security problems eSafe is backed by 24x7 Security Services

OR: eSafe Integrated SCM Solution Network security should be separated at the gateway eSafe takes care of all Content Security

We Should Not Make This Choice! SECURITY PERFORMANCE

High End Solutions (blade-based) Anti-spyware HTTP/FTP Security URL Filtering IM, P2P, Spyware, apps. anti-virus Spam management Firewall VPN IDS/IPS Secure Content Management Network Security Management & Reporting - Up to 40Mbps* each -1,200-2,000 HTTP connections/sec (avg.) - Up to 1Gbps* on a single chassis with full load balancing! *Net HTTP traffic with full content inspection

Blade Center (Up to 14 blades in a cluster) ISP cloud Internet eSafe Solution for ISPs & Telcos Security Services Consolidation for the ISPs Tiered Services: Web Anti-Spyware Web URL Filtering Anti-virus Anti-spam

eSafe’s 4 Layer Spyware Blocking Layer 1: Web surfing ‘driveby’ blocking Layer 2: Download (URL, ActiveX) Layer 3: Signature (simple + smart) Layer 4: Communications blocking NEW: Spyware Neutralizing

Enhanced Web Security [ 4-Layer Anti-spyware [ XploitStopper™ & SmartScript™ [ Fast - 40Mbps NitroInspection [ HTTP/FTP protocol security

Using Malicious Scripts

URL Filtering: Security – Productivity - Safety

Objectionable Categories Phishing Malware Spam Virus/Hacker/Spyware Pornography Gambling Racism Drugs Violence, Anarchy, Weapons Illegal activity Non-Productive Categories Dating Swimwear Gaming Travel Amusement Job Search Television

URL Filtering – Security and Productivity - 60 million URLs - 60 categories - 150,000 sites updated daily - 97% sites known

What Is A Profile? A Web surfing policy –List of site categories and specific exclusions Applied to an entity –User, group, IP, IP range, VLAN, host According to priority and time frame

URL Filtering Profiles in eSafe 5 FR2 LDAP and Active Directory integration User/Group-based profiles Flexible user identification User-based web- access reporting X-Ray mode for web usage monitoring

Unauthorized Applications Traffic P2P applications Spyware Instant Messengers TCP Worms Remote Control Tunneling …and more

Application Filtering Many more rules and rule families [ P2P: KaZaa, eDonkey, Bit Torrent, more [ Instant Messengers: MSN Messenger, ICQ, Yahoo, AOL [ Spyware: communication [ Remote Control: GoToMyPC, PC-Anywhere, more [ Protocol enforcement: tunneling prevention, browser enforcement, protocol exploits [ More…

Enhanced Security [ Proactive anti-virus [ Signature anti-virus [ Phishing prevention [ standardization [ Turn-off hyperlinks [ Remove web beacons [ Many more…

Threats Shift in 2006 Phishing  Phishing sites  Malicious code in Phishing Sites  2006 Forecast Increase in Three-stage targeted Phishing attacks: 1.Targeted Phishing  2. Redirect to Phishing site  3.Malicious code attack on the site Source: antiphishing.org

eSafe Phishing Prevention Most massive phishing is blocked as spam UNIQUE to eSafe: Phishing elements are stripped from all suspicious blocking targeted attacks on organizations Added value: Prevent tracking Actual link:

Moving From Anti-spam to Spam Management No lost No angered end-users No administrator hassle No need for “special spam mailbox” Learning system – not prone to user error

[ 20 Spam-detection Technologies [ Spam tagging, blocking, guaranteeing [ Remote quarantine [ User-managed quarantine [ 12 new features in eSafe 5 Advanced Spam Management

eSafe Proactive Detection ThreatProactiveNotes Netsky-P Yes Suspicious worm/Trojan Zafi-B Yes Suspicious worm/Trojan Sasser No TCP/IP worm Netsky-B Yes Double extension exploit Netsky-D Yes Restricted extension (PIF) Netsky-Z Yes Double extension exploit MyDoom-A Yes Suspicious worm/Trojan Sober-I Yes Suspicious worm/Trojan Netsky-C Partial Most variants blocked Bagle-AA Yes Suspicious worm/Trojan Top Outbreaks 69% proactive outbreak blocking!

eSafe Proactive Detection ThreatProactiveNotes Win32.Mydoom.bb Yes Very large circulation Win32.Bagle.be Yes Very high threat (CERT) Win32.Serflog.a Yes Suspicious worm/Trojan Win32.Sober.s Yes Suspicious worm/Trojan Win32.Mytob.ar Yes Suspicious worm/Trojan Win32.Mytob.bi Yes Suspicious worm/Trojan Win32.Zotob.d Yes Suspicious worm/Trojan Win32.Zotob.e Yes Suspicious worm/Trojan Win32.Sober.ac Yes Suspicious worm/Trojan Win32.Sober.y Yes Huge circulation Top Outbreaks 96% proactive outbreak blocking!

Unique Proactive Technologies [ Signature AV Engine Certified to block 100% ITW viruses [ NEW: EV13x SmartSig™ quicker response to threats and more efficient signatures [ Zero-hour blocking of most Trojans and worms [ Improved XploitStopper™ [ Global OutbreakSentry™

Management and Reporting

Focus on: Outbound Content HTTP/FTP inspection & loggings SOX compliance Suspicious Trojans/Keyloggers outbound traffic detection Content anomalies

“Aladdin Knowledge Systems' eSafe 5 can do so much that the hardest part may be just explaining it all. This is a comprehensive content security package to protect your organization's Internet operations.” “The list of eSafe's capabilities could go on for pages, and the product definitely lived up to expectations.” – Hotpick: eSafe Gateway 5 –INFORMATION SECURITY MAGAZINE, Sep ‘05

eSafe – technology leadership 1997 eSafe Protect – 1 st sandbox anti-vandal solution eSafe Gateway – 1 st anti-virus gateway NitroInspection™ - 1 st non-proxy HTTP gateway AppliFilter™ - 1 st application filtering 2005 Spyware Neutralizer 1 st clientless scanner 2002 XploitStopper™ - 1 st gateway exploits blocker

Sample eSafe Customers

Thank You!