Securing Email: Comprehensive Messaging Security. Kip Trout, Proofpoint Regional Sales Manager. Agenda. What is Messaging Security? Major Spam Trends Outbound Content Security & Compliance The Proofpoint Solution. Outbound Threats Followed. Inbound Threats Came First. Spam.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Kip Trout, Proofpoint
Regional Sales Manager
Inbound Threats Came First
Denial of service
Security, privacy and compliance
Directory harvestWhat is Messaging Security?
Security threats have always been a problem to enterprises
SMTP, HTTP, IM and FTP services
Spam continues to be a problem facing organizations
> 3-4x in 12 months
Volume (msg/day) 500 Thousand 2 Million 2 Million
Effectiveness 94% 95%99%
Spam getting through 30,000 100,000 20,000
# Users 20,000 25,000 25,000
Spam/User 1.5 spams 4 spams 0.8 spams
Better effectiveness = less spam in users’ Inbox = fewer Help Desk calls
At Time = 0
At Time = 0
(Launch Spam Attack)
At Time = 0Spam Attacks in the Old Days
OrganizationSpam Attacks Today: Botnets
(Listen for Instructions)
(Launch Image Spam Attack)
7181 e3bdd4b0073a502544df4f07647764dbEmbedded Images, Often Randomized
Global Color Map
Local Color Map
Raster (Image) Data
Viewable image contains “pump and dump” spam...
… but in slow motion…
Note that this is a transparent GIF, but only the parts required to complete the image are transparent!
Frame 1 contains broken text
Frame 2 (transparent GIF) appears after 10ms completing the image
Both images contain broken text – OCR Resistant!
Proofpoint’s MLX technology is dynamic and well-suited to the dynamic nature of spam
Read the Proofpoint-Forrester Research report: www.proofpoint.com/outbound
See a chronological list of security breaches at: www.privacyrights.org
Source: ZDNet, Bradenton, Boston.com
P(Data Loss) =
no. of channels x data availability
* Source: Gartner #G00138425, 3/15/06
Proofpoint Attack Response Center
Network Content Sentry
Digital Asset Security
Web-based Management Interface & Policy Engine