A l a d d i n. c o m eSafe ® Overview 2008. a l a d d i n. c o m 2 © Copyright 2008 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin.

Slides:



Advertisements
Similar presentations
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Palo Alto Networks Jay Flanyak Channel Business Manager
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
Security for Today’s Threat Landscape Kat Pelak 1.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Barracuda Web Application Firewall
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Lisa Farmer, Cedo Vicente, Eric Ahlm
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
LittleOrange Internet Security an Endpoint Security Appliance.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
A l a d d i n. c o m Aladdin Distributor Conference Laila Arad-Allan VP Software DRM September 12, 2008.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Network security Product Group 2 McAfee Network Security Platform.
Lesson 11: Configuring and Maintaining Network Security
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Bill Jensen Bashar Kachachi Session Code: SIA309.
A l a d d i n. c o m eSafe ® eSafe – Content security proactive Simone Fratus Technical PreSales Manager
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
eSafe – Secure Web Gateway Shimon Gruper, CISSP – VP Security Technologies.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
eSafe ® SmartSuite™ Overview Noam Lando, Director Product Strategy Nilly Assia, Sr. Product Marketing.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Palo Alto Networks - Next Generation Security Platform
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Complete Proactive Content Security from the Gateway to the Desktop Copyright © 2003 Aladdin Knowledge Systems.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
BUILD SECURE PRODUCTS AND SERVICES
TMG Client Protection 6NPS – Session 7.
Critical Security Controls
Barracuda Web Filtering Service
Forefront Security ISA
Threat Management Gateway
Prevent Costly Data Leaks from Microsoft Office 365
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
Check Point Connectra NGX R60
DATS International Portfolio.
Utilizing the Network Edge
Presentation transcript:

a l a d d i n. c o m eSafe ® Overview 2008

a l a d d i n. c o m 2 © Copyright 2008 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin Knowledge Systems, HASP ®, eToken TM and eSafe ® are only a few of Aladdin Knowledge Systems Ltd.’s (“Aladdin”) proprietary trademarks. The Aladdin Knowledge Systems logo is also proprietary to Aladdin. The information contained in this presentation is protected by international copyright laws. The copyrights are owned by Aladdin or the original creator of the material. The information contained herein is provided to you for informational purposes only, and except and to the extent specifically permitted, no portion of this presentation may be copied, reproduced (or the like), distributed or used in any way whatsoever whether directly or indirectly. In addition to Aladdin’s trademarks, logos, content and information, this presentation may contain references to trademarks and/or logos owned by other entities. Aladdin expressly disclaims any proprietary interest in trademarks and/or logos owned by other entities and makes no representation of any association, sponsorship, affiliation, or endorsement with or by the owners of such trademarks and/or logos. This presentation may contain references and use of third party web sites for purposes of providing examples relevant to this course. Aladdin assumes no responsibility and/or liability for any content and/or information contained in such third party web sites. Aladdin further does not endorse the companies or contents of any referenced sites. Aladdin does not assume any responsibility or liability for the accuracy of the information contained in this presentation. The information contained in this presentation is provided "as is" and does not constitute a warranty of any kind, either express or implied. Aladdin disclaims all warranties, expressed or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose, and non-infringement. a l a d d i n. c o m Legal Notice

a l a d d i n. c o m 3 Intelligent, real-time web and messaging security solutions that help organizations: Enforce Acceptable Use Policy Protect Information Assets Improve Productivity Aladdin Content Security

a l a d d i n. c o m 4 The Business Drivers of The Secure Gateway Enforcing Acceptable Use Policy: Maximize employee productivity Maximize utilization of network resources Comply with regulations Protecting Information Assets: Prevent malicious code from reaching the end points Prevent malicious/potentially malicious applications from running Prevent information loss Maximize Network Uptime & Productivity: Minimize end point remediation over head Minimize system down time Enforcing Acceptable Use Policy Protecting Information Assets Maximizing Network Uptime and Productivity Secure Gateway

a l a d d i n. c o m 5 Internet Evolution Challenges Traditional SGW Technologies 7M unique web sites Static HTML web access Basic web application (IM) Limited BW availability 60M unique web sites Dynamic HTML web access Application Evolution (PTP, remote control) BW increase 120M+ unique web sites Botnets drive SPAM growth “In–Browser” Applications (Ajax, JS, Flash), Mashups / CS Evasive applications SSL emergence BW commoditization BW=Bandwidth Internet Evolution Threat Evolution Solution Evolution Web/Mail AV Intelligent, Scalable Secure GW URL Filter Professional Spammers, Fraudsters Organized eCrime Amateur fame driven Web Web Web

a l a d d i n. c o m 6 eSafe – Content Security Solutions Reporting Management eSafe Web For Enterprise Appli- Filter Web SSL URL Filter eSafe Reporter Secure Surf Web Security Service Delivery Platform for ISPs Clean Pipe Parental Control Neutralizer Toolbar eSafe Mail For Enterprise Advanced Antispam eSafe Reporter

a l a d d i n. c o m 7 eSafe Web Real time. Intelligent. Secure Web Gateway eSafe Web For Enterprise Appli- Filter Web SSL URL Filter eSafe Reporter

a l a d d i n. c o m 8 “A secure Web gateway must bring together URL filtering, malicious code filtering and Web application control without compromising performance for end users, which has been a challenge for traditional Antivirus and Web filtering.” – Gartner 2008 Solution Evolution

a l a d d i n. c o m 9 Protect Information Assets Source independent inspection of all Web content Real-time protection against Web 2.0 threats Identifies & controls dangerous applications Optimizes user experience and minimize false positives Enforce Acceptable Use Policy Granular policy setting with 60m global URL categorization DB Control of 500+ Web applications Enforcement of policy over encrypted connections Prevents use of anonymizers and security circumvention tools Allows a clean, “access all” policy eSafe Web – Security for the New Web

a l a d d i n. c o m 10 eSafe Web Solution Portfolio SolutionBenefit eSafe Web AppliFilter™ URL Filter Web SSL Real time, source independent deep inspection and control of ALL web browsing content Detect, track and control Internet traffic and application protocols in over 500 categories, including P2P, IM, and Skype 60m strong URL rating database supporting global coverage and granular user control policies, support for multiple authentication modes SSL termination proxy enabling the intermediate scanning of incoming and outgoing SSL encrypted traffic Ensure policy enforcement and protection on SSL encrypted traffic Effectively enforce acceptable web use policy Enforce application usage policies & control malicious communications Information and resource protection with zero impact on user experience ©9/2008 Aladdin Knowledge Systems, Ltd. All rights reserved. Aladdin and eSafe are registered trademarks of Aladdin Knowledge Systems, Ltd. All other company and product names are trademarks or registered trademarks of their respective owners.

a l a d d i n. c o m 11 eSafe Web – Key Benefits Broad Protection Deep Inspection Fast Performance Scalable Platforms Flexible Deployment Advanced Management Enterprise-ready, unified management interface with rule-creation tools for easy monitoring, management and reporting More deployment options than any other solution - inline bridge/router, proxy, ICAP and SMTP relay Widest choice of platforms, including virtual appliance, VMware and purpose-built appliances Performs at wire speed with no latency, for full transparency to end users & scalable to ISP-level Patented Attack Intelligence™ technologies analyze, detect and defend in real-time without overblocking Leaves no gaps by inspecting all Web traffic, including legitimate Web sites, encrypted traffic and Web-enabled applications ©9/2008 Aladdin Knowledge Systems, Ltd. All rights reserved. Aladdin and eSafe are registered trademarks of Aladdin Knowledge Systems, Ltd. All other company and product names are trademarks or registered trademarks of their respective owners.

a l a d d i n. c o m 12 eSafe Web – Advanced URL Filtering CRAWLING Data Center Security 500+ Crawlers worldwide 3.8 Billion Indexed Webpages / Images 120 Million Pages per Month 800 Spam Collectors Smart Search Engine ANALYZING Content Analyzing Technology OCR Full Text Classification Object Detection Logo Detection Face Recognition Porn Detection Digital Fingerprints PROCESSING Data Center Hardware > 1,000 Servers 45 Mbit / Sec Internet Access 20 Terabyte Cache 12 Worldwide Remote Servers Processing Four Million Webpages / s per Day 60 million URLs 8 Updates per Day 98% Sites Known 60 Categories 150,000 URL Updated per Day

a l a d d i n. c o m 13 eSafe Web – Advanced Application Filtering AppliFilter™ controls and monitors: Over 500 Internet application protocols 20 application families 4 major categories: –Malicious applications: Spyware, Trojans, Worms, Key-loggers –Unwanted applications: Adware and add-supported software, anonymizing tools –Exploits and vulnerabilities: TCP Exploits, drive-by attacks, browser hijackers –Controlled applications: Instant Messengers, IP Phone, P2P, streaming, tunnelling

a l a d d i n. c o m 14 eSafe Web - SSL Identify malware hiding behind encrypted traffic (HTTPS) Blocks self-signed SSL sites Validates certificate policies, issuers, revocations, etc. Enforces web policy on SSL encrypted sites Proactively identifies and blocks unknown anonymizers

a l a d d i n. c o m 15 eSafe Web – Circumvention Prevention Unbeatable “Anonymous Web Proxy” filter catches requests for anonymous proxies on the fly, providing organizations zero-day protection against circumvention and anonymity techniques.

a l a d d i n. c o m 16 eSafe WTA – Test Yourself Now! Fast, deep inspection of your Web activity No impact on your network or user experience Virtually simulates the latest malware threats Identifies threats hidden from conventional firewalls, IPS, and gateway antivirus Effectiveness of current data protection Gap analysis for Web policy enforcement Detailed management report of results

a l a d d i n. c o m 17 eSafe Mail. Real time. Intelligent. Secure Messaging Gateway eSafe Mail For Enterprise Advanced Antispam eSafe Reporter

a l a d d i n. c o m 18 Mail is a vital business tool for organizations Controlling growing SPAM attacks and mitigating mail malware is a critical business issue eSafe Mail SPAM Growth eSafe Mail – Real-time Messaging Security and Spam protection

a l a d d i n. c o m 19 eSafe Mail – Key Benefits Dual-Engine Security: –First to combine Real-time Reputation and deep Content Analysis technologies –Blocks virtually all spam and malware, without blocking legitimate s Zero-hour malware, outbreak prevention: –Unique technology which identifies and proactively blocks malicious worm and other malware outbreak characteristics at zero-hour using a Real-time Reputation and Distribution Patterns Engine Comprehensive Anti Phishing : –Blocks Phishing attacks at the gateway –Phishing elements are stripped from all suspicious blocking targeted attacks on organizations Self Management SPAM Quarantine –Dramatically reduce administration overhead –Remove need for “special spam mailbox” –Learning system – not prone to user error

a l a d d i n. c o m 20 eSafe Secure Surf. Intelligent. Scalable. Secure. Secure Surf Web Security Service Delivery Platform for ISPs Clean Pipe Parental Control Neutralizer Toolbar

a l a d d i n. c o m 21 eSafe Secure Surf Industry first and only complete web security value- added services platform for broadband service providers (Fixed / Mobile) Live production platform Proven ISP-grade scalability Complete, modular and integrated service offering Unique, patented underlying technology platform ISP – Value Proposition Differentiate Drive Business Improve Productivity ISP – Value Proposition Offer a unique Value added service Offer solution to a well defined customer need Minimize chances of endpoint infection Reduce security Related help desk calls

a l a d d i n. c o m 22 Scalable, XSP ready service platform High availability, Telco grade design Proven field experience eSafe Secure Surf Solution Portfolio Enterprise- grade deep Web content inspection Non- blocking secure Web surfing Clean Pipe Complete Multi-user parental control Unique hybrid technology ensures zero bypass Desktop malware removal tool Clientless (ActiveX) Real-time Web browser notifications of service activity Secure Surf service reporting Toolbar Neutralizer Parental Control

a l a d d i n. c o m 23 Management & Reporting eSafe at the enterprise.

a l a d d i n. c o m 24 Enterprise-Ready Management and Control Centralized Management –Group/user based profiling –Central policy deployment and enforcement Enterprise integration –LDAP / AD integration –SIM integration Management Reporting –Pre-defined reports –OLAP/Cube based analysis –Multiple export formats –Scheduled distribution

a l a d d i n. c o m 25 Flexible & Scalable Deployment Flexible Deployment Options –Inline Bridge/Router –Native Proxy –Forwarding Proxy –ICAP –SMTP Relay Multiple Form Factors –Virtual appliance –VMWare –Purpose-built HG and XG appliances eSafe

a l a d d i n. c o m 26 eSafe Security Research

a l a d d i n. c o m 27 Attack Intelligence™ Research Center (AIRC) The AIRC Mission Deliver security research and intelligence that educates, supports and strengthens the security community, and drives innovation in eSafe solutions. 24x7 research Monthly threat forecast reports Technical blogs Regular security updates / SMS notifications Emergency support Security Services

a l a d d i n. c o m 28 What Others Are Saying. Proud of our endorsements.

a l a d d i n. c o m 29 Early visionary entrant in the SWG MQ Very high marks for malware detection across all ports and protocols Extensive list (1,000+) of pre-developed application filter policies Analyst Praise - Secure Web Gateway Gartner Magic Quadrant 2007 SC Magazine 2008 Judged on features, ease of use, performance, documentation, support and value for money, Aladdin eSafe was awarded the highest ranking in each SC Magazine category, leading to a perfect overall rating.

a l a d d i n. c o m 30 Canada Department of National Defense eSafe Customer Snapshot

a l a d d i n. c o m 31 Worldwide Customers

a l a d d i n. c o m Thank You!