Maintaining a Secure Messaging Environment Across Email, IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.

Slides:



Advertisements
Similar presentations
Symantec & IMlogic January © 2006 Symantec - CONFIDENTIAL Contents Intro Vision Key Benefits Product Strategy Business Strategy Roadmap.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Lisa Farmer, Cedo Vicente, Eric Ahlm
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Internet basics, Browsers, application, advantages and disadvantages, architecture, WWW, URL, HTML Week 10 Mr. Mohammed Rahmath.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
[Name / Title] [Date] Effective Threat Protection Strategies.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Internet Security Threat Report Volume 9. 2 Internet Security Threat Report Volume 9 – Spokesperson Training Internet Security Threat Report VI What the.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Protection from internal threats: Evolution of DLP or Who sets trends.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Changing World of Endpoint Protection
Crimeware: An Emerging, Acute Threat Dave Green.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
Mail-Filters The Global Leader in OEM Anti-Spam Solutions.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
How a major ISP built a new anti-abuse platform Mike O’Reirdan Comcast Distinguished Engineer Internet Systems Engineering Comcast National Engineering.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Sky Advanced Threat Prevention
Safe’n’Sec IT security solutions for enterprises of any size.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
TMG Client Protection 6NPS – Session 7.
Securing Information Systems
Contact Center Security Strategies
Module 7 Questions Prepared by Mr O Seguna next.
Module 4 System and Application Security
Microsoft Üzleti Megoldások Konferencia 2005
Presentation transcript:

Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist Symantec, Federal Sales

Optional Footer Information HereSymantec Vision Agenda Emergence of Information Risk1 Messaging Threat Landscape2 Symantec Messaging Solutions3

Optional Footer Information HereSymantec Vision Nature of Information Risk Management Information is Distributed, High-Volume and Real-Time –Messaging and collaboration accelerate information risks and costs Information Risks Cross System Boundaries –Risks follow information, not systems Databases File Servers Servers Portal Servers IM Servers Data Loss Discovery & Audit Archiving & Retention External Threats

Optional Footer Information HereSymantec Vision Retain Things Only As Long As Necessary3 Find Things Easily When Needed4 1 Keep The Bad Things Out Web Servers File Servers Servers IM Servers Requirements for Information Risk Management Keep The Important Things In2 External Threat Protection Data Loss Prevention Archiving / Retention Electronic Discovery

Messaging Threat Landscape

Optional Footer Information HereSymantec Vision Current Spam Trends Spam is 90% of traffic Spam attack duration shortening: from hours/days to minutes/hours Increased frequency of rotating through URLs in spam attacks Image spam with multiple obfuscation tactics is the latest tactic Increased use of zombies to send spam (e.g. ~80% of image spam) Adult content - reverted to plain text from HTML with adult images 6

Optional Footer Information HereSymantec Vision The Rise of Image Spam 7 As vendors crush image spam, spammers getting more desperate: –Started w/ background noise –Neopolitan –Mr. Ransom –CAPTCHA –Magic Eye

Optional Footer Information HereSymantec Vision Attack Trends Bot Networks During the current reporting period Symantec observed an average of 63,912 active bot network computers per day, an 11% increase over the first half of the year. The worldwide total of distinct bot-infected computers that Symantec identified rose to just over 6,049,594 - a 29% increase. Command and control servers decreased during this period to 4,746 - a 25% decrease. The United States continues to have the highest number of command and control servers worldwide with 40% - a 2% drop from it’s previous total. China has increased its global proportion of bot-infected computers to 26% while the United States continues to decline. EMEA countries, with the exception of the U.K., showed the largest increase.

Optional Footer Information HereSymantec Vision Attack Trends Data Breaches Information on data breaches that could lead to identity theft. Data collected is not Symantec data The government sector accounted for the majority of data breaches with 25%, followed by Education (20%) and Healthcare (14%) - the majority of breaches (54%) were due to theft or loss with hacking only accounting for 13%

Optional Footer Information HereSymantec Vision Malicious Code Trends Threats to Confidential Information During the current reporting period, threats to confidential information made up 66% of the volume of top 50 malicious code reported to Symantec, up from 48% in the previous reporting period. While the volume of threats that allow remote access have decreased from the same reporting period last year, the volume of threats that log keystrokes and export user and system data have all increased - Keystroke loggers represent 79% of the report threats to confidential information.

Optional Footer Information HereSymantec Vision Symantec Vision Instant Messaging Threats “As one of the most successful and widely deployed applications on the Internet, IM has become a potent means for the propagation of viruses, worms, and other threats.” Symantec Security Response 2006 Client Vulnerabilities 1% Viruses & Trojans 12% Worms 87% Top 5 IM Threat Mutations 2006 Monthly Unique IM Threats Note: Symantec Security Response WormLatest VariantMutations Distribution Method Kelvir W32/Kelvir-BJ140All IM Bropia Bropia-K29MSN Opanki W32/Opanki-W26AIM, IRC Chode W32/Chode-Q16AIM, IRC, MSN Rbot W32/Rbot-BDV16AIM, IRC

Symantec Messaging Solutions

Optional Footer Information HereSymantec Vision Multilayered Security

Optional Footer Information HereSymantec Vision Symantec Solutions - Overview Secure Transmission Symantec operations  Collects spam, virus, sender reputation, and other security data  Employs technicians 24/7 who analyze threats and create filters in real time  Deploys updated filters and reputation information to customer sites every 7 minutes Spam and Reputation Data Symantec Global Intelligence Network Customer site Mail Gateway Symantec Mail Security 8300 Scanner Control Center Server (e.g. Exchange, Domino) User Mailbox SpamViruses Inbound and Outbound mail Updated Spam Filters Updated Virus Signatures Updated Reputation Information ~ Content filtering Viruses in the wild Symantec Security Response Centers

Optional Footer Information HereSymantec Vision Information Foundation 2007 Delivers Market Leading Products A Recognized Leader In Security Source: Gartner (Mail Security + IM Management)

Thank You

Optional Footer Information HereSymantec Vision Symantec Vision Case Study SMS 8300 Reputation SMS 8300 Content 20K End Users Cut Volume In Half. Throttle mail from known bad senders to reduce unsolicited . Purify Mail Stream Deeper analysis of structure and content of message Control Infrastructure The reduced mail volume equals fewer strains on Groupware and Archiving servers. Satisfy End Users Only 1 Spam message per user. Internet Groupware + Archiving 1M eliminated 600K Good 400K Spam 30 Good 1 Spam 1M messagesUser Mail Stream 600K Good 1.4M Spam 2M messages 1.38M eliminated 600K Good 20K Spam 620K messages 1.38M eliminated 600K Good 20K Spam 620K messages