Introducing SEG V4 Clearswift.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Optinuity Confidential. All rights reserved. C2O Configuration Requirements.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Introducing VMware vSphere 5.0
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
SP2 Mikael Nystrom. Agenda Översikt Installation.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
1 Enabling Secure Internet Access with ISA Server.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Migrating Applications to Windows Azure Virtual Machines Michael Washam Senior Technical Evangelist Microsoft Corporation.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
What’s New in WatchGuard XCS v9.1. Introducing WatchGuard XCS v9.1  Enhancements that improve ease of use Improved web-based installation wizard After.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
What’s New in WatchGuard XCS v9.2. WatchGuard XCS v9.2  New Feature Introduction  Ease of use enhancements  Frequent Tasks page  DLP and QMS Wizards.
May l Washington, DC l Omni Shoreham Nick Dobrovolskiy VP Parallels Open Platform May 19 th, 2008 Introducing Parallels Server.
systemhound © Raxco Software Belgium systemhound PC inventory software.
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
October, Scientific Linux INFN/Trieste B.Gobbo – Compass R.Gomezel - T.Macorini - L.Strizzolo INFN - Trieste.
DNS & SPAM SHAREPOINT 2010 IT:NETWORK:APPLICATIONS.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Module 6 Planning and Deploying Messaging Security.
Sakai/OSP Portfolio UvA Bas Toeter Universiteit van Amsterdam
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Computer Emergency Notification System (CENS)
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 MSE Virtual Appliance Presenter Name: Patrick Nicholson.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Windows Azure Migrating Applications and Workloads Speaker Title Organization.
Samba – Good Just Keeps Getting Better The new and not so new features available in Samba, and how they benefit your organization. Copyright 2002 © Dustin.
Integrating and Troubleshooting Citrix Access Gateway.
VApp Product Support Engineering Rev E VMware Confidential.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—1-1 Getting Started with Cisco Unified Communications Manager Installing and Upgrading Cisco.
Implementing Microsoft Exchange Online with Microsoft Office 365
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 OS Management with TPM for OS Deployment.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
Copyright ©2016 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training What’s New in Fireware v
Copyright © Clearswift SECURE Gateway Moving to Version 4.4 from Version 3.x Released 7 th July 2016.
IBM Tivoli Provisioning Manager IPv6 Enablement
System Center 2012 Configuration Manager
Overview – SOE PatchTT November 2015.
Securing the Network Perimeter with ISA 2004
EPAM Cloud Orchestration
Xen Summit Spring 2007 Platform Virtualization with XenEnterprise
Tips to pass your Check Point CCSA exam Pass your exam successfully html.
Chapter 27: System Security
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
[Internal Use] for Check Point employees​
Features Overview.
PerformanceBridge Application Suite and Practice 2.0 IT Specifications
Presentation transcript:

Introducing SEG V4 Clearswift

Gateways – SEG v4.0 Features Upgrade Roadmap Q&A Platform New spam engine DKIM support New Adaptive Redaction Features Japanese character set improvements Upgrade Roadmap Q&A

Gateways v4.0 - Platform 64 bit Operating system and Platform SECURE Email Gateway Non-root application (and other security tightening) Some files moved to fit in with RHEL formats Linux style upgrade process Tighter integration with O/S Red Hat Enterprise Linux x64 6.6 Wider support for Hardware and virtualisation platforms Long life support License included with SEG product (non-transferable) New file systems (ReiserFS to Ext4) IPv6 capable (but not activated at this point) Red Hat Enterprise Linux is trusted in the financial sector and is used by numerous Investment Banks, 28 stock exchanges, retail banks and insurance companies and is used by every company in the Fortune 500.

Gateways v4.0: Why RedHat? (RHEL 6.6) Red Hat Enterprise Linux is trusted in the financial sector and is used by numerous Investment Banks, 28 stock exchanges, retail banks and insurance companies and is used by every company in the Fortune 500. https://access.redhat.com/search/browse/certified-hardware/#?&col=portal_certified_hardware&language=All&portal_certification_version=Red+Hat+Enterprise+Linux+6 Shows 1785

Gateways v4.0: Why RedHat? Initially delivered as software, appliance to follow Standard OS permits customers to load System Management agents UPS System Monitoring Backup Virtualisation tools Should enable us to work on other platforms (AWS etc) Deployments in cloud more cost effective than on a VM Supported platform by vendor - rather than the open source community

RHEL is a commercial product Red Hat is not free, $799 pa (1 physical or 2 virtual) Does a customer have to buy it…..No its included…. Support comes from Clearswift, as do upgrades If you have your own RedHat license you can still use it Support and Upgrades comes from RHEL

Gateways v4.0: Why RedHat? Clearswift repositories RHEL repositories ~small delay Device drivers Security fixes (checked) Clearswift customer Red Hat customer

SEG v4.0: Improved Anti-Spam New Anti-Spam Engine Reputation Removes old legacy “Clearswift” engines (Bayes, CURBL and ASE) New signatures engine Consistent improved detection rates Reduced false positive rates Enables simple whitelisting of business partners Full whitelisting by domain/IP address

Comparison With a feed of ~1m spam messages per day

Revised UI – SpamLogic filters

Revised UI – Whitelisting by domain

Domain Keys Identified Mail (DKIM) DKIM is a method of identifying if an email is authentic Will help to reduce the amount of spoofed messages being sent into an organization Add’s validity to messages that are sent by an organization so their business partners are more trusted Similar to Sender Policy Framework (SPF), but different

Comparision of authentication methods SPF Senders publish the IP addresses of mail servers that may send mail from their domains in DNS Receivers get messages and compare the source addresses to see if the message came from a listed address If it does, the message is authentic DKIM Senders publish their public key in DNS. Messages are sent containing a cryptographic hash of the message Receivers get message and decode the hash of the message using the published public key If it matches, the message is authentic

Adaptive Redaction: Open Office Support Popular alternative to MS Office 135m copies in use (Wikipedia) Top 5 countries by users USA France Germany Italy Japan Cost-effective choice, especially for governments Included as part of the AR license

DLP enhancements Adaptive Redaction Selective scanning

DLP enhancements Document properties

Upgrade path There is no simple upgrade Changing the operating system completely Changing the disk layout Changing the file system Customers will need to build a new system Can request PSO Hardware refresh Virtualisation opportunity Install SEG 4.0 and customers can import their existing SEG 3.8 backup Or just their policy file

A. About 10 minutes, slowest part can be rebooting if on hardware Install steps Start RHEL 6.6 install Deploy a Clearswift Kickstarter script Setup network settings Installs required operating system Reboots Login and initiate the Gateway install Gateway installs Run wizard Rename as required Q. How long does it take ? A. About 10 minutes, slowest part can be rebooting if on hardware

Migrating from 3.8 to 4 V3.8 V4.0 Policy Message Management Reporting

Migrating from 3.8 to 4 V3.8 V4.0 Policy FTP Backup Message Management Reporting

Peering in a mixed environment Policy X Message Management Reporting

How do I test 4.0? Initially can sit behind a 3.8 platform Spam settings should be configured with the 3.8 as the upstream host You should see expect to see the V4.0 catching spam missed by 3.8 Gradually implement content rules from 3.8 to 4.0 platform V3.8 V4.0

How do I test 4.0? Bring the V4.0 to the front Most of policy should be running on 4 Spam settings should be configured with the 4.0 as the upstream host Spam being detected on the 3.8 should be minimal V4.0 V3.8 V3.8 V4.0

How do I test 4.0? Use a relay-to action and “dual deliver” messages Drop messages after processing on the V4 system V3.8 V4.0

Collateral/Training plan Install Guide FAQ document Updated Hardware compatibility list (HCL) Ports and Protocols Support KB - Technotes Support video’s Available on w/c 19th January

Near term roadmap SEG 4.1 (April 2015) SEG 4.2 (Summer 2015) Import whitelists from file Support for whitelists with range and CIDR formats LDAP/S for address list connections FTP/S & SFTP for backups FTP/S & SFTP for Logfile export Keyserver lookups using LDAP/S & HTTP/S SEG 4.2 (Summer 2015) tbc

Questions