1999-2002 銳擎智識股份有限公司 銳擎智識股份有限公司 Executive Vice President Richard Chuang

Slides:



Advertisements
Similar presentations
1 Effective, secure and reliable hosted security and continuity solution.
Advertisements

Introducing FailSafeSolutions Online Backup Software.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Module 5: Configuring Access for Remote Clients and Networks.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Computer Networks IGCSE ICT Section 4.
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
All Rights Reserved © Alcatel-Lucent | Presentation Title | Month 2009 Office Mobility Solutions Office Solutions Group Philippe JEAN February 4th,
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
The Leading Anti-Virus and Content Security Solution Provider MicroWorld.
eScan Total Security Suite with Cloud Security
INTRODUCING F-SECURE POLICY MANAGER
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Barracuda Load Balancer Server Availability and Scalability.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Securing Microsoft® Exchange Server 2010
銳擎智識股份有限公司 銳擎智識股份有限公司 Executive Vice President Richard Chuang
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Module 6 Planning and Deploying Messaging Security.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Computer Emergency Notification System (CENS)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
銳擎智識股份有限公司 銳擎智識股份有限公司 Executive Vice President Richard Chuang
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Chapter 4 Intranets and Extranets. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
Computer Security Sample security policy Dr Alexei Vernitski.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
BUILD SECURE PRODUCTS AND SERVICES
Segmap Solutions Mapping segments.
CONNECTING TO THE INTERNET
(With Hybrid Network Support)
Presentation transcript:

銳擎智識股份有限公司 銳擎智識股份有限公司 Executive Vice President Richard Chuang

銳擎智識股份有限公司 MailScan 企業防毒解決方案 Richard Chuang

銳擎智識股份有限公司 MicroWorld Technologies Inc. proudly presents MailScan Content-Security & Anti-Virus world’s first “Real-Time” scanner.

銳擎智識股份有限公司 MicroWorld Technologies Inc. (MWTI) Leaders in Content-Security and Communications Software. Strong technical and technological expertise Our clients include Govt. Organizations, Banks, Financial Institutions, Corporates, Airlines, Travel Agencies, etc. World Wide Presence. Nearly 100 staff members, Company growing at more than 100% p.a.

銳擎智識股份有限公司 MWTI ’ s MailScan Range Of Products MailScan for POP Servers MailScan for Mail Servers MailScan For MDaemon MailScan for VPOP3 MailScan for WinRoute MailScan For SMTP MailScan for Exchange MailScan for Lotus Notes

銳擎智識股份有限公司 CONTENT SECURITY Need & Definition

銳擎智識股份有限公司 Business Partners Paul Smith Computer Services PLC., UK - MailScan for VPOP3 Deerfield.com - MailScan for MDaemon MailScan for SMTP servers – Partners in about 30 countries across the globe. Distributors & Partners for other products across the globe - A reseller network of about 10,000 resellers

銳擎智識股份有限公司 The World-market Trend The rise of information needs from the open network will fuel Network Security Demand. As corporate entities transform their business models to leverage internet communications, network security will be transformed from a “cost of doing business” to a “business enabler”. A heterogeneous security market - several related, but distinct, segments (Antivirus, Content Scanning, Firewall, etc.).

銳擎智識股份有限公司 Content-Security Definition - Threats The contemporary virus threats has now ballooned into ‘content-security’ threats. Content-security threats includes: – virus threats, web-based virus downloads, Word- based macro bombs –offensive and web content –misuse and abuse of & web resources –Intrusion of anonymous internet users –Trespassing of unauthorized users into company’s internal network

銳擎智識股份有限公司 Loss that an organization suffers due to security violations & other related problems Assumption: Network of about 1000 PCs; Average loss per year over a span of 3 years: Courtesy Aberdeen Consultants

銳擎智識股份有限公司 MWTI ’ s Content-Security Solution MailScan

銳擎智識股份有限公司 MailScan Solution Framework MailScan is a comprehensive Content- Security Software that offers : Comprehensive Security Policy framework Scanning of TCP/IP Traffic for restricted words, content or profane substance on a “ real-time ” basis. Anti-virus capabilities Anti-spamming utilities Effective Bandwidth utilization Hands-Free Incremental Updation

銳擎智識股份有限公司 MailScan Solution Framework - Value proposition for customers Integrated solutions for different products/networks Low cost of Ownership Cost savings, as security components are integrated, thereby doing away with the need to invest in different solutions Increase in productivity due to 99% uptime of computers Solution completely transparent to end-users Complete control for network administrators

銳擎智識股份有限公司 Our claim “ MailScan is the world ’ s first real-time scanner ” – How do we justify?

銳擎智識股份有限公司 To Justify This, Let ’ s First Understand How The Other Anti-Virus And Content-Scanning Software Products Function:

銳擎智識股份有限公司 Internet Mail Server AntiVirus GateWay Clients Mails Normal Antivirus Providing Protection to Mail-Servers

銳擎智識股份有限公司 Problems With this kind of Setup No POP3 download scanning. Since first point of SMTP contact is the AntiVirus gateway, all functionality offered by the mail-server is lost like... Relay control Spam Block (ORBS) Sender authentication SMTP authentication Firewall Capability And many more Configuration changes has to be done on the Mail- Server. Scanning is not “ real-time ”. This system works only with a dedicated IP-address.

銳擎智識股份有限公司 Internet Clients Mails Mail-Server With MailScan MailScan Providing Protection to Mail-Server

銳擎智識股份有限公司 Advantages With MailScan No features of Mail-Server is Compromised Provides Protection to POP server also Does Real-Time Content Checking using MWL Technology No configuration changes required. No additional gateway machine required. Checks all paths of incoming & outgoing mails

銳擎智識股份有限公司 What is MWL Technology?

銳擎智識股份有限公司 The Internet Network ‘B’ Any Communication by the Application and With the Application Has to Pass Through the Winsock Layer at the server level and the client level Network ‘A’ Winsock 2 Mail Server OutlookICQIE WebContents Internal Mails Internet Mails How Communication happens inside a Network?

銳擎智識股份有限公司 Network ‘B’ Network ‘A’ Winsock 2 Mail Server Outlook ICQ IE MicroWorld Winsock Layer WebContents Internal Mails Internet Mails The Internet MWL Technology Since MWL Sits on Winsock, That means any content passing through Winsock has to pass through MWL where it is checked and then forwarded to the application

銳擎智識股份有限公司 eScan Auto -Update ModuleReport Consolidation Module MailScan Content-Parser (Object Dis-assembler) MWL (MicroWorld-WinSock-Layer) MailScan Attachment-Filter and ZIP Analyzer eScan Content- Analyser eScan Antivirus Module MailScan object Assembler Functions of MWL MWL sits on WinSock 2 and above and assemble all packets Coming on different ports Decodes Mails and Attaachments Checks the validity of the file and file decompression is done Virus checking & Content checking is done by eScan All the objets are reassembled and passed on to the application layer Only clean objects IEOutlookICQ WINSOCK

銳擎智識股份有限公司 Winsock-Layer ??? What is Winsock Winsock is the basic program that is used for any TCP/IP based application. Winsock is the DLL that is invoked before any program starts running..

銳擎智識股份有限公司 What is MWL layer? This is the first-time in the world that a program has been developed which loads over Winsock. MWTI has pioneered in researching & implementing the technology that will load when Winsock loads. The best part about this is that all applications have to first interface with MWL before it can reach Winsock. Microworld Winsock-Layer (MWL) ? The revolutionary technology. MWL captures all the mails and processes it further with the help of eScan and MailScan Thus making MailScan the world ’ s first software to do ‘ Real-time Scanning ’. On all the traffic coming into you organisation.

銳擎智識股份有限公司 Port Configured Pull updates Pull Updates Workstation Server, Gateways eScanMailScaneConceal The Complete Internet Security Guardian eServ Server with Management Console Security Manager MailScan Framework Your Internet Security Guardian Pull Updates Internet

銳擎智識股份有限公司 MailScan – Your Internet Security Guardian

銳擎智識股份有限公司 USA Office UK Office Australia office Virus Reported Pull Updates Yourcompany.com User Network Security Manager Virus Report INTERNET Push Updates Pull Updates Pull Updates Pull Updates Internet Server MWTI.com Mirror server in Australia, USA,India Internet Your Internet Security Guardian ---- On the guard always with our Unique automatic Incremental Security Policies Update.

銳擎智識股份有限公司 MWTI’s Vision For Security Solutions Leverage the power of Internet to offer the best breed of solution to customers. Centralised Installation, administration, deployment and management of security solutions. Integrated solutions that will understand the existence of another product under MWTI’s umbrella; thus providing the power of internet to leverage the benefits of a combined suite of products. Product architecture based on Internet technology that can be adapted and modified without much delay Hands-free (Automatic) Upgradation of software.

銳擎智識股份有限公司 CONCLUSION

銳擎智識股份有限公司 MWTI - Your Internet Security Guardian MWTI has discovered the technique of Real Time Scanning using Microworld Winsock Layer. MWTI has integrated solutions that are unique in terms of technology and product architecture. MWTI’s solutions stand-out in a crowded market-place as other vendors are providing solutions which are not only expensive, but do not give the money’s worth and completely disparate. Our products are futuristic. MWTI is your partner in growth. Our solutions will take you into a safe & secure future.

銳擎智識股份有限公司 Q&A