© Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.

Slides:



Advertisements
Similar presentations
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Advertisements

Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Used by many 100,000s of customers Used by many 10,000,000s of users Processing Billions of s a day Using Thousands of servers Across dozens of.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Curtis Parker | December 2010 | Microsoft Corporation.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Unified. Simplified. Unified Communications Launch 2007.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
V1.00 © 2009 Research In Motion Limited Introduction to BlackBerry Smartphone Web Development—The BlackBerry Infrastructure Trainer name Date.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Chapter 7 HARDENING SERVERS.
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
Unified Logs and Reporting for Hybrid Centralized Management
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Forefront Online Protection for Exchange Renato Francesco Giorgini Evangelist IT Pro
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Lecture 11 Intrusion Detection (cont)
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Overview of Exchange 2013 Architecture Transport components shipping with Exchange 2013 Mail Routing Scenarios Transport High Availability SMTP Client.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Copyright © 2000, ZipLink Inc. Patent Pending 1 Mail Message Metering or, how to block outbound spam Robert D. Haskins.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Overview Presentation Robert Gorbahn Emerging Server Sales Manager München – Frankfurt/Berlin/Munich - May 2006.
Securing Your GroupWise ® System Morris Blackham Software Engineer Novell, Inc. Danita Zanrè Senior Consultant Caledonia.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
SIM309. Connection Analysis (IP-based edge blocks) Reputation Analysis Connection Filtering Protect businesses from receiving –borne viruses.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
Securing Microsoft® Exchange Server 2010
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
Vantage Report 3.0 Product Sales Guide
Module 6 Planning and Deploying Messaging Security.
Norman Protection Powerful and flexible Protection Gateway.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
The Changing World of Endpoint Protection
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Mail-Filters The Global Leader in OEM Anti-Spam Solutions.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Module 5 Planning and Deploying Message Transport in Microsoft® Exchange Server 2010.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
Understanding Microsoft Forefront Online Protection for Exchange Nathan Winters Microsoft Corporation EXL201.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Security fundamentals Topic 9 Securing internet messaging.
Mailjet and Microsoft Azure Offer All-in-One Infrastructure and Deliverability while Saving IT and Enterprise Time and Money with Scalability MICROSOFT.
Unified. Simplified. Unified Communications Launch 2007.
Implementing Microsoft Exchange Online with Microsoft Office 365
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
LIMS (Location Information Management System) is the Smart Claim Solution for Motor Insurers, Built on the Powerful Microsoft Azure Platform MICROSOFT.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Module 4 System and Application Security
Slides Credit: Sogand Sadrhaghighi
Security Insights: Secure Messaging
Presentation transcript:

© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright MX Logic, Inc. All rights reserved. 2 Strictly Confidential Corporate Overview ─ What We Do MX Logic provides advanced defense solutions that safeguard enterprises, service providers, government organizations and resellers worldwide Delivered as a managed service or on-premise software, MX Logic’s technology analyzes over 3 billion messages a month for more than 1.7 million end-users

© Copyright MX Logic, Inc. All rights reserved. 3 Strictly Confidential Corporate Overview SERVICE PROVIDER ENTERPRISE PARTNERS DEFENSE SERVICE 3,900+ enterprise customers 720,000+ end users SOLUTION FEATURES Anti-Spam Anti-Virus DoS Protection Content Filtering Policy Enforcement Abuse Reporting Disaster Recovery DEFENSE SERVICE 3,900+ enterprise customers 720,000+ end users SOLUTION FEATURES Anti-Spam Anti-Virus DoS Protection Content Filtering Policy Enforcement Abuse Reporting Disaster Recovery DEFENSE GATEWAY NTT / Verio Tucows Bellsouth Level 3 Bresnan Communications US Interactive IIJ CyberTrust SOLUTIONS Managed Service Enabling Hosted Mailbox Protection Outbound Filtering DEFENSE GATEWAY NTT / Verio Tucows Bellsouth Level 3 Bresnan Communications US Interactive IIJ CyberTrust SOLUTIONS Managed Service Enabling Hosted Mailbox Protection Outbound Filtering HOSTED STRATEGIC PARTNERS Symantec Surfcontrol DISTRIBUTION PARTNERS 250+ Resellers / VARs Defense Service TECHNOLOGY PARTNERS Symantec / Brightmail Authentium, HP-Compaq NTT/Verio HOSTED STRATEGIC PARTNERS Symantec Surfcontrol DISTRIBUTION PARTNERS 250+ Resellers / VARs Defense Service TECHNOLOGY PARTNERS Symantec / Brightmail Authentium, HP-Compaq NTT/Verio

© Copyright MX Logic, Inc. All rights reserved. 4 Strictly Confidential Corporate Overview – Snapshot of Growth 2003 to % increase in top-line revenue 338% customer growth, currently servicing over 3,900 enterprise accounts and 1.7 million end users 343% increase in seat count Strong growth in VAR channel program with over 250 active channel partners 457% increase in top-line revenue 338% customer growth, currently servicing over 3,900 enterprise accounts and 1.7 million end users 343% increase in seat count Strong growth in VAR channel program with over 250 active channel partners

© Copyright MX Logic, Inc. All rights reserved. 5 Strictly Confidential Strong Customer Growth

© Copyright MX Logic, Inc. All rights reserved. 6 Strictly Confidential Corporate Overview ─ Vision A managed service approach to security will become even more widely adopted –Security software vendors now consider a managed service offering a key component of their marketing strategy –Large enterprise will deploy a layered approach Transport carriers must inoculate their networks threat detection will move from submission technology to sensor networks Software deployment into large service providers creates the best potential for market dominance Bridging the gap between identity management and for outbound message submission will provide new opportunities for service provider penetration A managed service approach to security will become even more widely adopted –Security software vendors now consider a managed service offering a key component of their marketing strategy –Large enterprise will deploy a layered approach Transport carriers must inoculate their networks threat detection will move from submission technology to sensor networks Software deployment into large service providers creates the best potential for market dominance Bridging the gap between identity management and for outbound message submission will provide new opportunities for service provider penetration

SUBSCRIBER REPUTATION FILTERING New Product Initiative from MX Logic

© Copyright MX Logic, Inc. All rights reserved. 8 Strictly Confidential Subscriber Reputation Filtering (SRF) Spam is being distributed through the service provider outbound gateway authentication standards are spawning reputation services (Habeas, Kelkea, Equifax, etc.) Service providers will need to focus on policing their subscriber base to ensure healthy reputation and successful deliverability of subscribe There is little outbound specific anti-spam protection at the sender level ─ majority of focus currently resides with inbound filtering technologies Spam is being distributed through the service provider outbound gateway authentication standards are spawning reputation services (Habeas, Kelkea, Equifax, etc.) Service providers will need to focus on policing their subscriber base to ensure healthy reputation and successful deliverability of subscribe There is little outbound specific anti-spam protection at the sender level ─ majority of focus currently resides with inbound filtering technologies Current Market Situation

© Copyright MX Logic, Inc. All rights reserved. 9 Strictly Confidential SMTP was designed as a message transfer protocol However, SMTP is now being widely used as a message submission protocol Separating messages into submissions and transfers allows for new gateway functionality that can provide enhanced security and submission (outbound) policies Message Transfer Agent Message Transfer Agent MTA Relays to Other MTAs Port 25 Relays to Other MTAs Port 25 Message Submission Agent Message Submission Agent MSA Transfers to MTA Port 587 / 25 Transfers to MTA Port 587 / 25 Message User Agent Message User Agent MUA Submits to MSA Outlook, Eudora, Thunderbird Submits to MSA Outlook, Eudora, Thunderbird Subscriber Reputation Filtering (SRF) Submission Security Policies, Control and Identity Management Technology Overview

© Copyright MX Logic, Inc. All rights reserved. 10 Strictly Confidential Subscriber Reputation Filtering (SRF) First introduced as RFC 2476 in 1998 Allows for flexible authentication Enforces service provider AUP Enables identity management tied to SMTP transactions on a per subscriber basis Protects outbound MTA infrastructure Enables reputation-based routing Logical place for authentication signing (i.e., Domain Keys) First introduced as RFC 2476 in 1998 Allows for flexible authentication Enforces service provider AUP Enables identity management tied to SMTP transactions on a per subscriber basis Protects outbound MTA infrastructure Enables reputation-based routing Logical place for authentication signing (i.e., Domain Keys) Why an MSA?

© Copyright MX Logic, Inc. All rights reserved. 11 Strictly Confidential Subscriber Reputation Filtering (SRF) Leverages MX Logic’s MTA framework of technology Easily integrates into existing service provider messaging infrastructure as a MSA gateway Provides outbound content filtering for spam and worm originating messages Monitors a subscriber’s sending behavior to build a reputation model for outbound filtering Enables the service provider to detect account misuse with abuse trend reporting and alerts Provides subscriber notification with problem remediation instructions Can be leveraged for either consumer or business subscribers Leverages MX Logic’s MTA framework of technology Easily integrates into existing service provider messaging infrastructure as a MSA gateway Provides outbound content filtering for spam and worm originating messages Monitors a subscriber’s sending behavior to build a reputation model for outbound filtering Enables the service provider to detect account misuse with abuse trend reporting and alerts Provides subscriber notification with problem remediation instructions Can be leveraged for either consumer or business subscribers SRF Gateway Features

© Copyright MX Logic, Inc. All rights reserved. 12 Strictly Confidential Subscriber Reputation Filtering (SRF) Analogous fraud and misuse detection in the credit card, telecom and utility industries Behavior models are constructed from each individual subscriber’s sending behavior (leverages attributes such as time, size, attachments, format, mail client software) A reputation is constructed from historical sending behavior and associated message content Uses advanced algorithms such as Hellinger’s Distance to detect deviation and misuse Analogous fraud and misuse detection in the credit card, telecom and utility industries Behavior models are constructed from each individual subscriber’s sending behavior (leverages attributes such as time, size, attachments, format, mail client software) A reputation is constructed from historical sending behavior and associated message content Uses advanced algorithms such as Hellinger’s Distance to detect deviation and misuse Behavior−Based Reputation Filtering

© Copyright MX Logic, Inc. All rights reserved. 13 Strictly Confidential Subscriber Reputation Filtering (SRF) Misuse Detection Engine Real-Time Attack Recognition Network Operations Analyst Network Operations Analyst Subscriber Reputation Subscriber Reputation Message Disposition Policies Message Disposition Policies Alert on Known Attacks Alert on NEW Attacks Spam Signatures Predictive Detection Model SMTP Data SMTP Data Mining Data Mining Subscriber Activity Subscriber Activity Subscribe Profile Data Subscribe Profile Data Model Evaluation

© Copyright MX Logic, Inc. All rights reserved. 14 Strictly Confidential Subscriber Reputation Filtering (SRF) Architecture SRF Gateway sits in front of your current outbound delivery pool and filters traffic from authenticated users, building reputation and sending behavior profiles for each subscriber. Messages are filtered using the subscriber reputation, behavior profile and message content. SRF Gateway sits in front of your current outbound delivery pool and filters traffic from authenticated users, building reputation and sending behavior profiles for each subscriber. Messages are filtered using the subscriber reputation, behavior profile and message content. Subscriber Database Subscriber Database Reputation and Behavior Database Reputation and Behavior Database Radius Server Gateway Control Console Gateway Control Console SMTP XML HTTP LDAP Internet Service Provider Authenticated SMTP Gateway (MTA) Service Provider Authenticated SMTP Gateway (MTA) Subscribe (MUA) Subscribe (MUA) Subscribe (MUA) Subscribe (MUA) Subscribe (MUA) Subscribe (MUA) MX Logic SRF Gateway (MSA) MX Logic SRF Gateway (MSA) Authentication Module Authentication Module SMTP AUTH proxy SMTP AUTH proxy

© Copyright MX Logic, Inc. All rights reserved. 15 Strictly Confidential Service Provider Product Vision Own The Edge MX LOGIC THREAT MANAGEMENT SERVICES MX LOGIC THREAT MANAGEMENT SERVICES , Instant and Mobile Messaging MX LOGIC INBOUND EDGE SERVICES MX LOGIC INBOUND EDGE SERVICES Anti-Spam Anti-Virus DoS Protection Compliance Filtering Reputation Filtering Authentication Anti-Spam Anti-Virus DoS Protection Compliance Filtering Reputation Filtering Authentication SERVICE PROVIDER CUSTOMER SERVICE PROVIDER CUSTOMER Commercial Managed Services Application Hosting Domain Registration Services Appliance Services Commercial Managed Services Application Hosting Domain Registration Services Appliance Services Service Provider Messaging Infrastructure (Openwave, Sun, Critical Path) Service Provider Messaging Infrastructure (Openwave, Sun, Critical Path) MX LOGIC OUTBOUND EDGE SERVICES MX LOGIC OUTBOUND EDGE SERVICES Anti-Spam Anti-Virus DoS Protection Compliance Filtering Reputation Filtering Sender Authentication Anti-Spam Anti-Virus DoS Protection Compliance Filtering Reputation Filtering Sender Authentication Service Provider Message Store Service Provider Message Store Service Provider Managed Services Service Provider Managed Services MX Logic SRF Gateway MX Logic SRF Gateway Consumer Subscriber Consumer Subscriber Business Subscriber Business Subscriber Appliance Attached Appliance Attached Internet MX Logic Defense Gateway MX Logic Defense Gateway MX Logic Threat NOC MX Logic Threat NOC