Download presentation
Presentation is loading. Please wait.
Published byStuart Cole Modified over 9 years ago
1
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 銳擎智識股份有限公司 Executive Vice President Richard Chuang Richard@andreach.com
2
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 eScan, MailScan 企業防毒解決方案 Richard Chuang richard@andreach.com
3
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 MicroWorld Technologies Inc. eScan & MailScan Content-Security & Anti-Virus World’s first “Real-Time” Email Scanner. Proudly Presents
4
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 MicroWorld Technologies Inc. (MWTI) Leaders in Content-Security and Communications software. Strong technical and technological expertise Our clients include Govt.. Organization Banks, Financial Institutions, Corporates, Airlines, Travel Agencies, etc. World Wide Presence. Nearly 100 staff members and about 50 partners Company growing at more than 100% p.a.
5
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 MWTI ’ s Software Products CONTENT SECURITY SOFTWARE MailScan MailScan for Mail-Servers MailScan for SMTP MailScan for Exchange MailScan for Lotus Notes MailScan for WinRoute MailScan for Mdaemon MailScan for VPOP3-Servers eScan eScan for Servers eScan for Workstations
6
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Business Partners Paul Smith Computer Services PLC., UK - MailScan for VPOP3 MailScan for SMTP servers – Partners in about 30 countries across the globe. Distributors & Partners for other products across the globe - A reseller network of about 10,000 resellers
7
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 CONTENT-SECURITY Need & Definition
8
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 The world-market trend The rise of information needs from the open network will fuel Network Security demand. As corporate entities transform their business models to leverage internet communications, network security will be transformed from a “cost of doing business” to a “business enabler” A heterogeneous security market - several related, but distinct segments (Antivirus, Content Scanning, Firewall, etc.).
9
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Content-Security Definition - Threats The contemporary virus threats have now ballooned into ‘content-security’ threats. Content-security threats includes: –email virus threat, web-based virus downloads threat, Word-based macro bomb threat –offensive email and web content threat –Threat of misuse and abuse of email & web resources –Threat of Intrusion of anonymous internet users –Threat of Trespassing of unauthorized users into company’s internal network
10
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Loss that an organization suffers due to security violations & other related problems Assumption: Network of about 1000 PCs; Average loss per year over a span of 3 years: Courtesy Aberdeen Consultants
11
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 MWTI ’ s Content-Security Solution eScan & MailScan
12
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 eScan Solution Framework eScan is a comprehensive Content-Security Software that offers : Comprehensive Security Policy framework Scanning of TCP/IP Traffic for restricted words, content or profane substance Anti-Virus capabilities Anti-Spamming utilities eServ – The Central Management Console
13
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 eScan Solution Framework - Value proposition for customers Integrated solutions for different platforms/networks Centralised installation and management Low cost for leasing software Cost savings, as security components are integrated, thereby doing away with the need to invest in different solutions Increase in productivity due to 99% uptime of computers Solution completely transparent to end-users Complete control for network administrators
14
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Our claim “ eScan is the world ’ s first real-time email scanner ” How do we justify?
15
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Let ’ s first understand how other “ Anti-Virus ” Software Products function.
16
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Attachment Infected Internet E-mails Mail Server E-mail Client With User Accessing their Mails XYZ. DOC User Opening Attachment Virus Warning How other Antivirus Software Functions
17
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Deficiencies in this system of scanning mails: Source of Problem Changed Business scenario and Advanced & Faster modes of business communication like Internet and E- mails. Consequences Faster Spreading of Malicious Codes Causing More destruction. The ineffective ‘ cure ’ provided by other software Data is scanned only after saving on to the hard disk, when its already done its harm. Other Causes Improper update distribution and frequency.
18
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 A different approach adopted by another popular Anti-Virus Software for scanning of emails
19
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Mail Server Antivirus Server for Mails Internet Antivirus Server becomes the E-mail Server/Pop3 Server i.e. All mails are forwarded to the server and checked for viruses E-mail Client With User Accessing their Mails Mails Checked Mails
20
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Is this Solution effective? A better Approach compared to the common solution. No real time scanning is done and Scanning of mails happens only after execution. No scanning is done while emails are sent out to the Internet
21
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Alternative Solutions offered by our competitors Avoid using MS-Outlook Express Avoid sending and receiving email attachments. Disconnect your network/modem cable when not in use. Switch off your computer when not in use. Never accept attachments during online chat. Avoid downloading files from public newsgroups. Do not share your directories or folders.
22
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 This is not the right way of attacking the problem. So what ’ s the right solution? Conclusion :
23
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Network ‘A’ Winsock 2 Mail ServerOutlook ICQI E The Internet Network ‘B’ Any In coming Communication and out going communications have to pass Through the Winsock Layer at the server level and the client level Internet Mails Communication in Network WebContents Internal Mails
24
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Network ‘B’ The Internet eScan MWL Technology Since MWL Sits on Winsock, That means any content passing through Winsock has to pass through MWL where it is checked and then forwarded to the application Network ‘A’ Winsock 2 Mail Server Outlook ICQIE MicroWorld Winsock Layer Internet Mails WebContents Internal Mails
25
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 eScan Auto -Update ModuleReport Consolidation Module MWL (MicroWorld-WinSock-Layer) eScan Content- Analyser eScan Antivirus Module MailScan object Assembler Functions of MWL Decodes Mails and Attaachments MailScan Content-Parser (Object Dis-assembler) Checks the validity of the file and file decompression is done All the objets are reassembled and passed on to the application layer Only clean objects IEOutlookICQ MWL sits on WinSock 2 and above and assemble all packets Coming on different ports WINSOCK Virus checking & Content checking is done by eScan MailScan Attachment- Filter and ZIP Analyzer
26
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 MWTI’s Vision For Security Solutions Leverage the power of Internet to offer the best breed of solutions to customers. Centralised Installation, administration, deployment and management of security solutions. Integrated solutions that will understand the existence of another product under MWTI’s umbrella; thus providing the power of internet to leverage the benefits of a combined suite of products. Product architecture based on Internet technology that can be adapted and modified without much delay. Automatic Incremental Upgradation of software.
27
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 MWTI Your Internet Security Guardian MWTI has discovered a revolutionary technique (MWL) to implement layer above WinSock. MWTI has integrated solutions that are unique in terms of technology and product architecture. MWTI’s solutions stand-out in a crowded market- place as other vendors are providing solutions which are not only expensive but are not worth the money and are incomplete. Our products are futuristic.
28
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Your partner in growth. Our solutions will take you into a Safe & Secure future. MWTI
29
www.AndReach.Comwww.AndReach.Com 1999-2002 銳擎智識股份有限公司 Q&A
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.