1 / 29

Integrated Messaging Security for Exchange

Integrated Messaging Security for Exchange. Presented by: Alex Eckelberry, President Greg Kras, VP Product Management May 23, 2006. Agenda. About Sunbelt Software The latest threats to messaging security Third-generation messaging security Messaging security products today

gerken
Download Presentation

Integrated Messaging Security for Exchange

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Integrated Messaging Security for Exchange Presented by: Alex Eckelberry, President Greg Kras, VP Product Management May 23, 2006

  2. Agenda • About Sunbelt Software • The latest threats to messaging security • Third-generation messaging security • Messaging security products today • Overview of Sunbelt Messaging Ninja • Questions and answers

  3. About Sunbelt Software • Established in 1994 • Leading provider of best-of-breed Windows security tools including: • Antispyware • Antispam • System management • Product lines include: • CounterSpy and CounterSpy Enterprise • iHateSpam for Exchange • Sunbelt Network Security Inspector • Kerio Personal Firewall

  4. Latest Messaging Threats • Spam • Percentage of spam as a portion of all traffic remains high--up to 80% in some cases • Phishing • Employs a fraudulent message to obtain personal information • Viruses and Worms • Virus and malware authors create networks of "zombie" computers by using viruses disguised as legitimate file attachments • Spread across the world and infect millions of computers in just minutes

  5. Latest Messaging Threats Email Scams and Hoaxes* Latest Phishing Attacks* *Source: Trend Micro, May 2006

  6. Third Generation Messaging Security • Third generation email security platform • Multi-layered and policy-based approach • Comprehensive protection against all email-borne threats • Policy-based framework with best-of-breed messaging security plug-ins • Plug-ins seamlessly work together in an easy to use, “all-in-one” MMC environment • Allows you to create policies for the different groups in your organization • Easily secure messaging infrastructure and stop threats at the Exchange server

  7. Current Messaging Security • Separate products for: • Antivirus • Antispam • Attachment filtering • Disclaimers • Content auditing/filtering • Archiving • Integrated solutions with antispam and antivirus • Often includes “extension” filtering but not true “attachment” filtering

  8. Integrated Solutions are Better • According to a study by IDC, the complexity of managing security technologies is fast becoming a major priority for organizations • Vendors are shifting their focus from a single type of protection towards a broad protection from a range of emerging threats to enterprise security. • Centrally managed, integrated, all in one offering that tackles several threats Source:Brian Burke, Research Manager, IDC - May 2006

  9. Integrated Solutions are Better • Installing a combination of separate security software: • Do not “talk” to, or cooperate with, one another • Leaves numerous entry points for hackers or virus writers • Lacking resources, SMBs have been forced to assemble piecemeal security “solutions” • Multiple patch points • Exposure is higher to vulnerabilities Source: CipherTrust, June 2005

  10. Sunbelt Messaging Ninja • Built for Microsoft Exchange • A significant evolution in message security • Layered antivirus protection • Comprehensive plug-in architecture: • Antispam and anti-phishing • Attachment Filtering • Future versions will include: • Content inspection (internal and external) • Content auditing • Disclaimers • Server-based auto replies • Archiving

  11. Server-based approach • Eliminates deployment and administration hassle involved with desktop-based products • More affordable and simpler to license • Stops spam and viruses at the server, preventing them from entering your email infrastructure • Server level software can detect spam and viruses more effectively • Speed of deployment

  12. Flexible Messaging Security • Designed with flexibility and extendibility in mind • Enables administrators to manage entire messaging security needs • Layered Antivirus • Policy-based plug-in management • Antispam • Attachment filtering • Create customizable policies • Groups of users or single user using Active Directory • Separate policy templates for different groups • Fine tune aggressiveness of detection for all plug-ins

  13. Multiple Scanning Engines • Scans and eliminates spam and viruses at the server level • Antispam Filtering • Sunbelt’s heuristic antispam engine • Cloudmark’s signature-based engine • Antivirus Filtering • BitDefender • Authentium

  14. Advanced Antispam Filtering • Support for Real-time Blackhole lists (RBLs) • Prevent phishing attacks using Sender Policy Framework (SPF) • Rules can be created on a number of email message properties: • Body • Sender IP • Header • Subject • Ability to strip HTML content prior to scanning • Support for custom rules using regular expressions • Automatic inclusion of sent items into personal allow lists

  15. Aggressive Virus Protection • Industrial strength AV engines • Scan messages in real time as well as background scanning of the entire store • Disinfect pieces of email – quarantining or cleaning only infected files instead of stripping all attachments • Advanced settings for handling of: • Encrypted messages • Password protected compressed files • Maximum nested files and maximum message size

  16. SMART™ Attachment Filtering • Ninja’s Suspicious Mail Attachment Removal Technology™ (SMART) • Policy based • Instead of simply looking at file extensions, SMART actually looks inside many types of files to determine their true identity • Unlike legacy security products that filter at the gateway, Ninja’s attachment filtering can be used to filter all attachments: • outbound • Inbound • within the organization

  17. SMART™ Attachment Filtering • Configure inspection and filtering on a per-policy basis • Quarantine potentially harmful attachments by file extension • No more renaming .exe. files to circumvent filters • Flexible rules allow multiple actions: • Allow delivery • Quarantine attachment • Quarantine entire message • Delete attachment • Delete entire message • For a limited time, Ninja’s SMART attachment filtering is free to all organizations

  18. Powerful Reporting • Reporting available for all plug-ins • Pre-defined reports with ability to customize • Database-driven reporting engine • Generate reports at the system, group, or user level • Reports include: • Number of inbound messages scanned • Number of spam deleted or marked • Number of viruses intercepted • Percentage of viruses by name • And more

  19. How Ninja Works

  20. At-a-glance view of all messaging traffic

  21. Sunbelt Messaging Ninja Antivirus summary of virus activity within your organization

  22. Detailed information on configuring proper settings

  23. Simple configuration options for setting up policies

  24. Antispam summary of spam activity with your organization

  25. Set quarantine actions at the policy level

  26. Global policy settings for antivirus engines

  27. Use custom rules for different attachment filtering options

  28. Powerful reporting options for all plug-ins

  29. Downloads • Download your FREE eval copy of Sunbelt Messaging Ninja from: http://www.sunbelt-software.com/sunbeltmessagingninja.cfm. • For a PDF brochure go to http://www.sunbelt-software.com/SunbeltMessagingNinja-Docs.cfm.

More Related