TrustPort Net Gateway traffic protection
Keep It Secure Entry point protection –Clear separation of the risky internet and secured intranet –Malware and spam blocked before reaching endpoints –No need to remove threats individually on every computer Unified security concept –Compact user interface –Remote control of the solution possible –Easy analysis of traffic and incidents Advantages of centralised protection
Keep It Secure Handling traffic TrustPort Net GatewayMail server Firewall TrustPort Net GatewayMail server Firewall
Keep It Secure Principal components of incoming protection Receiving SMTP server Backup of messages Antivirus and antispam kernel Sending SMTP server
Keep It Secure Antispam shield Blacklists and whitelists DNS records Greylisting Autowhitelist Receiving SMTP server
Keep It Secure Receiving SMTP server Antispam shield TrustPort Net Gateway
Keep It Secure Basic whitelist and blacklist LDAP AD Text
Keep It Secure Blacklists and whitelists Blacklist of banned servers Blacklist of banned senders Whitelist of trusted recipients Whitelist of trusted senders Whitelist of trusted servers Exceptions
Keep It Secure To: From: Greylisting TrustPort Net Gateway IP:
Keep It Secure Criteria for the rules –direction –sender –recipient –IP address range Action to follow –forward –backup –delete Backup of messages
Keep It Secure Scanning by multiple antivirus engines Filtering out unwanted attachments Checking DKIM, SPF Checking DNS blacklists Forbidden words User regulars Database of regular rules Checking for image spam Bayes analysis Point evaluation Antivirus and antispam kernel Fully adjustable by the user Partially adjustable by the user
Keep It Secure User filters Forbidden words credit free offer viagra Regular rules Part: headers Field: from Part: body Regular: (free|share)ware Antivirus and antispam kernel
Keep It Secure Using DKIM Generating hash of the message Decrypting the electronic signature
Keep It Secure Using SPF HELO: MAIL From: IP:
Keep It Secure Bayes analysis Regular rules Spam dictionary Ham dictionary Bayes analysis spam ham User rules Updates
Keep It Secure Sending electronic mail to one target mail server –Fixed IP address Sending electronic mail to several target servers –Delivery table –MX records –Delivery table combined with MX records Sending SMTP server
Keep It Secure Components of outgoing protection Sending SMTP server Antivirus kernel Receiving SMTP server
Keep It Secure Components of outgoing protection Receiving SMTP server Antivirus kernel Sending SMTP server sender control based on computer address sender control based on address whitelist of trusted senders scanning using selected engines filtering out unwanted attachments adding to autowhitelist truncating dangerous headers sending out
Keep It Secure Sending SMTP server Autowhitelist From: company.com To: gmail.com From: gmail.com To: company.com
Keep It Secure Product certifications Virus Bulletin Reactive and proactive test, average values (April
Keep It Secure Product Virus Bulletin (April 2011) TrustPort Antivirus Avast Free Antivirus AVG Internet Security Eset NOD32 Antivirus Kaspersky Anti-Virus McAfee VirusScan Microsoft ForefrontEndpoint Protection RAP test, overall detection98.02%95.27%92.55%93.33%93.30%84.71%91.94% RAP test, reactive detection99.63%97.02%95.27%94.49%94.63%85.05%93.52% RAP test, proactive detection93.18%90.02%84.38%89.86%89.32%83.69%87.18%
Keep It Secure Product certifications Average on-demand detection of malware Missed samples (the lower the AV-Comparatives (April 2011)
Keep It Secure Product AV-Comparatives TrustPort Antivirus Avast Free Antivirus AVG Anti-Virus Eset NOD32 Antivirus Kaspersky Anti-Virus McAfee Antivirus Plus Microsoft SecurityEssentials Norton AntiVirus Overall on-demand detection (April 2011) 99.2%98.4%91.4%97.5%97.0%96.8%95.8%95.5% Detection of potentially unwanted apps (December 2010) 99.5%96.9%-97.7%97.6%98.7%92.7%99.6%
Thank you for your attention!