E-mail Defense System (a.k.a. Junk mail & Virus Filtering at the Server level)

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

Pennsylvania BANNER Users Group 2007 Structuring a reporting environment for success.
Example policy elements and their role in bandwidth management and optimisation.
1 Effective, secure and reliable hosted security and continuity solution.
Uniworld Wire-less Wireless at Your Fingertips.
Vodacom Microsoft Hosted Lync
Lotus Notes - the University of Nebraska Experience Greg Gray University of Nebraska Central Administration Computing Services Network.
With Microsoft ® Enrolment for Education solutions Be the school of tomorrow, today.
Session Objectives Illustrate benefits of BOCES and EES membership Introduce the Enrollment for Education Solutions (EES) Academic licensing solution.
Security and Organizational Governance Anand Lakshminarayanan Senior Product Manager Microsoft Corporation.
Unified. Simplified. Unified Communications Launch 2007.
Association Management System Norman Campbell Director, Information Systems.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
Visit us on the Web at Breaking the WebMail Habit Jason Hale Fall 2007.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Web 2.0 security Kushal Karanjkar Under guidance of Prof. Richard Sinn.
Secure Messaging Nick Hall & James Clifford Microsoft.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Clean Out the Junk! Outsmarting Unsolicited NUIT Tech Talk Presentation February 18, 2005 Sherry Minton Dan Frommer.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Defense System (a.k.a. Junk mail & Virus Filtering at the Server level)
Presentation to the ITCC by Wendy Woodward Director Technology Support Services.
The Times Are Changing What’s New & Changing with Technology at Northwestern NUIT Tech Talk – May 13, 2005.
Kerio Connect 7.1 More Than Just a Mail Server
1 Microsoft Open Licensing & Software Assurance 6.0 Training.
Defense System (EDS). The problem today 15,000,000 virus-infected messages and millions of junk messages go across the NU Network.
EProcurement at the University of Pennsylvania SciQuest “Find, Buy & Manage” Seminar Princeton, New Jersey October 23, 2003.
Maintaining and Updating Windows Server 2008
Electronic Mail and Security Services Robert V Jones, Staff Director, IT Infrastructure and Operations 11 August 2004.
1 Outsourcing Student & Other Collaboration Services Wendy Woodward Director, Technology Support Services Copyright Wendy Woodward This work.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
University of Washington Infrastructure IEEAF – RENU Network Design Workshop Seattle - 30 Nov 2007 Lori Stevens, Director, Distributed Systems Brad.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Separate your corporate environment from unknown threats of the WEB. Define trusted WEB policy. Enforce the use of WEB browsers. Automatically distribute.
Review of NWS IT Consolidation Efforts For HIC Meeting July 2006 Tom Schwein Team Leader of Desktop Management Tiger Team SOD CRH.
The University of Texas at San Antonio The Office of Information Technology Network Upgrade Overview.
Phone No: / Id: Web : /
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
Akamai Technologies - Overview RSA ® Conference 2013.
A Web Based Workorder Management System for California Schools.
Outsourcing Student and Other Collaboration Services John Calkins Assistant General Counsel Northwestern University Office of General Counsel (OGC)
Project 2003 Presentation Ben Howard 15 th July 2003.
Np163 Dennis Baron, April 3, 2008 Page 1 VoIP at MIT Merit VoIP Seminar Dennis Baron April 3, 2008.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
University of WashingtonComputing & Communications Portals: A Framework For Customer Centered Resources Oren Sreebny Oren Sreebny Assistant Director Computing.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Chandler What's in it for my university? Oren Sreebny University of Washington Educause 2003 This work is licensed under a Creative Commons license.
Enterprise Customer/ Field Services Overview of Client Integration Processes August 9, 2012.
Spam Wrangling on UC Berkeley's CalMail. Spam detection CalMail uses Sophos PureMessage, running on CommuniGate Pro's front-end servers PureMessage.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
Maintaining and Updating Windows Server 2008 Lesson 8.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
Information Technology Proprietary and Confidential © Copyright 2007 – Peralta Community College District.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
NORTHEASTERNERS, INC. IRS 990 filing instructions presentation
Technology 101 Changing the way, we work, live, play and learn.
Presentation transcript:

Defense System (a.k.a. Junk mail & Virus Filtering at the Server level)

The problem today 15 million virus messages go across NU’s network annually. University constituents & NUIT are very concerned about the increase of junk mail & viruses, & the effect on productivity. Webmail & handheld devices cannot benefit from desktop client junk mail filtering tools.

What has NU been doing about this? Information about client side filtering has been made available on the NUIT web site. Conversations with NU Legal have been in process to ensure that server level filtering does not violate the pursuit of academic freedom. NUIT has been monitoring the marketplace. It wasn’t until recently that a clear leader emerged at a price point that is acceptable to the University. NUIT has conferred with peer institutions to learn from their experience. Trial, purchase and deployment of Sophos PureMessage (a.k.a. NU’s Defense System) on our central servers.

How will this help with viruses? Stops an infected embedded message from getting to the desktop. Automatically downloads the latest enterprise level virus definitions (versus current home grown system).

What are the benefits? Productivity increases (less time spent going through junk ). Webmail becomes a more useful tool. Less chance of a user hitting the 50MB quota on the server. Increased network security.

How does it work?

EDS Deployment plan Virus filtering started May Phase 1: Further refine system set up parameters with input from “key early adopters” (July 2005) –Three groups: Faculty/Staff/Graduate students: 48%-100% probability quarantined. Undergraduates: 48%-94% probability quarantined, 95%+ rejected. Alumni: 50%+ probability rejected, no quarantine. –Quarantine kept 7 days (can increase to 120 days). –Digest of junk sent to users overnight. –Individual “approved” and “unapproved” lists. –Users may need to continue to use client side junk mail filters.

EDS Deployment plan Phase 2: Expand early adopters list to include technical support staff throughout the University. (August 2005) Implement campus wide education plan (including how to easily opt out of the service and how to use client side filters with server side filters). October 3 rd, 2005 “full launch”.

Defense System Demo

Questions? Wendy Woodward Director, Technology Support Services