Email content/exploit checking & anti-virus. GFI MailSecurity for Exchange/SMTP Provides email content checking, exploit detection, threats analysis and.

Slides:



Advertisements
Similar presentations
w w w. b y t w a r e. c o m NATIVE VIRUS DETECTION FOR THE iSERIES powered by McAfee Executive Presentation.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Network fax server for Exchange/SMTP
A Rudra Technologies Pvt Ltd. Product The New Age Protector against Known and Unknown Malicious Software Rudra.
What is a Firewall Anyway?
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Free Software Alternatives: Avast! Anti-virus
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
What’s New in WatchGuard XCS 10.0 Update 2 WatchGuard Training.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
1. 2 Presentation outline » One antivirus engine is not enough » IT pain points » The product » Testimonials » Kudos » Conclusion.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Viruses and their Cures Catherine Agnew CEDu 581 – Oconomowoc.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Data Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd.
1. 2 Presentation outline » IT pain points » The products □ GFI MailEssentials™ □ GFI MailSecurity™ » Testimonials » Kudos » Corporate overview.
Hacker Zombie Computer Reflectors Target.
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
How CERN reacted to the Blaster and Sobig virus attack Christian Boissat, Alberto Pace, Andreas Wagner.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
PC Security: Antivirus Presentation done by Ming-Li Emily Chang (A2980) Raymond Chok (A2419)
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Security fundamentals Topic 9 Securing internet messaging.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
NetTech Solutions Protecting the Computer Lesson 10.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
W elcome to our Presentation. Presentation Topic Virus.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
McAfee Antivirus Support By Techdotcomp nd Ave, Seattle, WA 98122, USA Phone: Based on Seattle, WA.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Three steps to prevent Malware infection
TMG Client Protection 6NPS – Session 7.
Call AVG Antivirus Support | Fix Your PC
Presentation transcript:

content/exploit checking & anti-virus

GFI MailSecurity for Exchange/SMTP Provides content checking, exploit detection, threats analysis and anti-virus and removes all types of -borne threats before they can affect your users.

The rise of security threats… In 2003, viruses, worms and Trojans caused worldwide damages worth US$ 55 billion. – Reuters, January 2004 The number of attacks between January and June 2003 exceeded 70,000 which is about twice the rate for – Reuters, January 2004 Research carried out by Hewlett-Packard shows that the signature update approach is fundamentally flawed, because worms can spread faster than anti- virus signature updates can be distributed. – The Register, September 2003 “I know that some of you think a virus scanner is the answer, but I don’t trust them. Many virus scanners were woefully slow to react when the ILOVEYOU, AnnaKournikova, or Sircam worms appeared.” – Mark Minasi, Windows 2000 Magazine, August 2001

Why choose GFI MailSecurity for protection? These are some of the key reasons why GFI MailSecurity is the ideal choice to protect against viruses, Trojans and malware:  Multiple virus engines guarantee higher detection rate and faster response  Unique Trojan & Executable Scanner detects malicious executables without the need for virus updates - MyDoom was detected immediately!  Exploit shield & HTML threats engine to disable exploits & HTML scripts  Unbeatable price: $350 (25), $999 (100) and $3999 (UNL) mailboxes.

Why you need multiple virus scanning engines The response time of a virus vendor to a new virus outbreak is critically important (i.e. the time it takes to update and deploy the virus signature files), as a virus could reak havoc in a matter of hours from its release. No single virus vendor is always the fastest, so by having three virus engines your chances of getting network protection on time increases threefold! You won't have to risk relying on a single vendor to be the fastest each time, but instead hedge your bets on three or more anti-virus vendors. See this white paper for more information.white paper

Why you need an exploit shield An exploit uses known vulnerabilities in applications or operating systems to execute a program/code or circumvent security measures. An exploit is an exploit embedded in an that can be executed on the recipient’s machine when a user opens or receives an . The exploit shield identifies s that contain exploits. Examples of viruses that used exploits are the Nimda, BadTrans.B and Klez viruses, which all use the same exploit to propagate. An exploit detection engine recognizes the exploit used and can block all worms immediately and automatically, without the need for updates. See this white paper for more information.white paper

Why you need a Trojan and executable scanner Because anti-virus software is signature-based, it can only detect known viruses and Trojans. It is therefore unable to detect new viruses or one-off Trojans as soon as they are released. GFI MailSecurity’s Trojan and Executable Scanner takes a different approach, it can detect unknown viruses and Trojans before they enter the network - and before anti-virus engine vendors have issued signatures against them. For example, in the January 2004 MyDoom outbreak, GFI’s Trojan and executable scanner blocked Mydoom before virus vendors had issued an update against it. See this white paper for more information.white paper

Why you need an HTML threats engine HTML mail has become very popular, however it can include scripts and Active Content, which can allow programs or code to be executed on the client machine. GFI's patented HTML threats engine disables scripts and active content in HTML mail, without affecting formatting or images. See this white paper for more information.white paper

GFI MailSecurity can be deployed in 3 ways: 1.In SMTP gateway mode as a mail relay server ( firewall). In this mode it integrates with IIS 5 for unparalleled speed and scalability. 2.In VS API mode on Exchange 2000/2003 – scanning message stores. GFI MailSecurity is the only content checking product that supports Exchange 2000/2003 VS API. VS API is recommended/required by Microsoft! 3.Both at the gateway level and on Exchange 2000/2003 for top security.

Configuring content security With GFI MailSecurity, you can configure multiple content checking and file checking rules. You can create multiple content checking rules, allowing you to set different policies for different keywords, file types and users. GFI MailSecurity configuration

Creating a content checking rule You can create new content checking rules and specify what to check for in the subject or body of an . 1.Enter keywords to content check the body of the

Creating a content checking rule Now specify what to do with the and who to apply the rule to. 2.Quarantine, delete or move 3. Optionally notify the user and/or log the occurrence

Creating a content checking rule GFI MailSecurity integrates with Active Directory enabling you to set user-based rules. Apply the content checking rule to one or more users

Attachment checking You can create attachment checking rules in the same way as content checking rules. Specify what attachment types to check

Moderating Once an is quarantined, it must be approved or rejected. This is done using the moderator client or an client. You can distribute the administrative load to multiple admins using a public folder. Use the moderator client OR approve/reject via your client

Virus checking with multiple virus scanning engines  GFI MailSecurity is virus engine independent - it includes multiple virus engines, providing much greater security.  Both the Norman Virus Control & BitDefender virus engines are included. The McAfee and/or Kaspersky virus engine can be purchased as an optional 3 rd /4 th engine.  The Norman virus engine is 16-time winner of the 100% Virus Bulletin award. BitDefender is ICSA certified.

Virus checking configuration GFI MailSecurity supports automatic updating of signature files. Click here to activate virus scanning Here you can choose to automatically remove all Office macros

The exploit engine GFI MailSecurity’s exploit detection engine builds on GFI’s leading research on exploits, and safeguards you from future viruses and attacks that use known application or operating system exploits. GFI SecurityLabs regularly finds new exploits, and these are automatically downloaded by GFI MailSecurity. GFI MailSecurity is the only security product to detect exploits. Exploit engine configuration

The Trojan and executable scanner GFI MailSecurity includes an advanced Trojan and executable scanner. This can analyze what an executable does, and quarantine any executables that perform suspicious activities. This way, potentially dangerous, unknown or one-off Trojans can be detected before they enter your network.

GFI MailSecurity: Excellent value GFI MailSecurity is the market leading content checking solution with over 30,000 servers installed worldwide. It offers unmatched value for money. GFI pricing is 70% lower than competitor prices: No. of users ,000 Major Competitor 1$1,234 $4,873 $11,695 Major Competitor 2 $1,900 $9,500 $38,000 GFI MailSecurity $550 $1,699 $3,499

Test if your system is vulnerable to threats! Is your system vulnerable to viruses, exploits & attacks? Find out today using GFI’s test page: Here, you can check whether your system is secure against threats such as s containing infected attachments, s with malformed MIME headers, HTML mails with embedded scripts & more.

What our customers say “GFI MailSecurity for Exchange/SMTP was flawless in installation and the software itself is actually better than some of the ‘major’ players that I have been evaluating. I did have a chance to fully test it this weekend as the SoBig worm flooded our servers: GFI MailSecurity stopped every single message and has performed to higher levels than I expected.” – Michael McKinnon, Director of Technical Operations - Equita Financial Services, Texas, USA “We’ve used GFI MailSecurity for Exchange now for over two years. During this time we’ve never had a virus although many have been caught by GFI MailSecurity’s screening of our . Administration is easy and fast. We feel very protected using GFI MailSecurity.” – Paula Chesbrough S.V.P. - Eagle Bank, MA, USA Click here for more testimonials!

Customer list Many leading companies have chosen GFI MailSecurity for Exchange/SMTP; here are just a few: NASA US Navy USAF Perotsystems IBM European Central Bank MG Rover Group Ltd Peugeot Toyota & many more!

More information and downloads Download your FREE eval copy of GFI MailSecurity for Exchange/SMTP For white papers on exploits, content checking, anti-virus, anti-Trojans and other security issues click here

About GFI GFI has five offices in the US, UK, Germany, Australia and Malta, and has a worldwide network of distributors. GFI is the developer of the market leading GFI FAXmaker, GFI MailSecurity, GFI MailEssentials, GFI Network Server Monitor and GFI LANguard product ranges. GFI is a Microsoft Gold Certified Partner and has won the Microsoft Fusion 2000 (GEM) Packaged Application Partner of the Year award. For further information, please visit our website.website Back to first slide