Download presentation
Presentation is loading. Please wait.
Published byLogan York Modified over 11 years ago
1
© 2008 Alt-N Technologies - Confidential Technical Training and Demonstration Matt McDermott Team Leader - Product Developer
2
© 2008 Alt-N Technologies - Confidential Agenda Product Overview Installation and Initial Configuration Dashboard and Navigation Setup and Security Menu Installation of ProtectionPlus Messages and Queues Log Files and Reporting Channel Training Overview Questions and Answer Session
3
© 2008 Alt-N Technologies - Confidential Overview Not a Delivery MTA (Mail Transfer Agent) Not an MDA (Mail Delivery Agent) SecurityGateway is a Border MTA or Edge Role Internet Email ServerSecurityGateway
4
© 2008 Alt-N Technologies - Confidential SecurityGateway is Not MDaemon Does not Store Email No POP or IMAP Support Custom Security Settings Per Domain Web-based GUI Database Backend Sieve Filtering Engine Comprehensive Reporting
5
© 2008 Alt-N Technologies - Confidential Interoperability SecurityGateway works with any email server Internet Email ServerSecurityGateway
6
© 2008 Alt-N Technologies - Confidential Hardware Microsoft Windows XP/2000/2003/Vista operating system Minimum System requirements – P4 Processor – 512MB RAM – NTFS formatted Hard Disk Drive with at least 500MB free
7
© 2008 Alt-N Technologies - Confidential Architecture Embedded FireBird SQL database Embedded secure web server High performance multi-threaded program
8
© 2008 Alt-N Technologies - Confidential Windows Server Operating System Multiple Core Processor 2GB or More RAM Multiple Hard Disk Drives – OS – SecurityGateway (Database) – Logging/Attachments/Backups Local DNS Server – Mirrored DNSBL/URIBL Zones Recommended Setup
9
© 2008 Alt-N Technologies - Confidential User Interface (UI) Web-based No pop-ups Task oriented Intuitive
10
© 2008 Alt-N Technologies - Confidential Begin Interactive Demo
11
© 2008 Alt-N Technologies - Confidential Installation
12
© 2008 Alt-N Technologies - Confidential Installation
13
© 2008 Alt-N Technologies - Confidential Installation
14
© 2008 Alt-N Technologies - Confidential Installation
15
© 2008 Alt-N Technologies - Confidential Installation
16
© 2008 Alt-N Technologies - Confidential Installation
17
© 2008 Alt-N Technologies - Confidential Installation
18
© 2008 Alt-N Technologies - Confidential Installation
19
© 2008 Alt-N Technologies - Confidential Installation
20
© 2008 Alt-N Technologies - Confidential Installation
21
© 2008 Alt-N Technologies - Confidential Installation
22
© 2008 Alt-N Technologies - Confidential Installation
23
© 2008 Alt-N Technologies - Confidential Installation
24
© 2008 Alt-N Technologies - Confidential Installation
25
© 2008 Alt-N Technologies - Confidential Installation
26
© 2008 Alt-N Technologies - Confidential Login
27
© 2008 Alt-N Technologies - Confidential Dashboard
28
© 2008 Alt-N Technologies - Confidential
33
User Verification Sources
34
© 2008 Alt-N Technologies - Confidential User Verification Sources
35
© 2008 Alt-N Technologies - Confidential User Options
36
© 2008 Alt-N Technologies - Confidential Data Retention
37
© 2008 Alt-N Technologies - Confidential Backup/Restore
38
© 2008 Alt-N Technologies - Confidential Quarantine Options
39
© 2008 Alt-N Technologies - Confidential Quarantine Options
40
© 2008 Alt-N Technologies - Confidential Quarantine Summary
41
© 2008 Alt-N Technologies - Confidential Quarantine Summary
42
© 2008 Alt-N Technologies - Confidential User Login View
43
© 2008 Alt-N Technologies - Confidential User Quarantine
44
© 2008 Alt-N Technologies - Confidential Message Log
45
© 2008 Alt-N Technologies - Confidential Message Log - Search
46
© 2008 Alt-N Technologies - Confidential Anti-Spam – SGSpamD
47
© 2008 Alt-N Technologies - Confidential Outbreak Protection
48
© 2008 Alt-N Technologies - Confidential Message Scoring
49
© 2008 Alt-N Technologies - Confidential Message Scoring
50
© 2008 Alt-N Technologies - Confidential Anti-Virus
51
© 2008 Alt-N Technologies - Confidential Anti-Spoofing – DKIM Signing
52
© 2008 Alt-N Technologies - Confidential Anti-Spoofing – DKIM Signing
53
© 2008 Alt-N Technologies - Confidential Sieve Scripts
54
© 2008 Alt-N Technologies - Confidential Sieve Scripts
55
© 2008 Alt-N Technologies - Confidential Sieve Scripts
56
© 2008 Alt-N Technologies - Confidential Sieve Scripts
57
© 2008 Alt-N Technologies - Confidential Log Files
58
© 2008 Alt-N Technologies - Confidential Log Files
59
© 2008 Alt-N Technologies - Confidential Log Files
60
© 2008 Alt-N Technologies - Confidential Log Files
61
© 2008 Alt-N Technologies - Confidential Reports
62
© 2008 Alt-N Technologies - Confidential Reports
63
© 2008 Alt-N Technologies - Confidential Reports
64
© 2008 Alt-N Technologies - Confidential Reports
65
© 2008 Alt-N Technologies - Confidential Reports
66
© 2008 Alt-N Technologies - Confidential Reports
67
© 2008 Alt-N Technologies - Confidential Reports
68
© 2008 Alt-N Technologies - Confidential Summary Dedicated, high performance email gateway Cutting edge security features Intuitive, task-based user interface Detailed reports prove effectiveness
69
© 2008 Alt-N Technologies - Confidential Questions & Answers Conclusion
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.