1 / 20

Commtouch: Cloud-based Internet Security Tim Johnson - Director, Strategic Alliances

Commtouch: Cloud-based Internet Security Tim Johnson - Director, Strategic Alliances Ian Hess - Technical Account Manager September 2010. Agenda. Who We Are What We Do How it Works Cloud Architecture & Security Q&A. Foundations. Cloud-based security services leader

jovan
Download Presentation

Commtouch: Cloud-based Internet Security Tim Johnson - Director, Strategic Alliances

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Commtouch:Cloud-based Internet Security Tim Johnson - Director, Strategic Alliances Ian Hess - Technical Account Manager September 2010

  2. Agenda • Who We Are • What We Do • How it Works • Cloud Architecture & Security • Q&A

  3. Foundations • Cloud-based security services leader • Award-winning Internet security technology • Global delivery & service platform • Unique business model • Focus on OEM partners and Service Providers • Partner-centric support organization • Solid financial foundation • Est. 1991, Public (NASDAQ: CTCH) • Profitable and growing

  4. Selected Customers and OEM Partners Security & Network Vendors Service Providers

  5. Messaging Security, Web Security & Antivirus Services Anti-spam Protect against spam & phishing outbreaks in real-time 2002 Zero Hour Virus Outbreak Protection Block email-borne malware outbreaks in real time 2004 GlobalView Mail Reputation Block unwanted email traffic at the network perimeter 2006 GlobalView URL Filtering Comprehensive coverage, accuracy and real-time security 2008 Outbound Spam Protection Block and identify outbound spam & spammers 2010 Command Antivirus Protect against malware threats 2010 Industry Standard Plugins

  6. 2Q10 Email Threats by the numbers • 82% of all emails are spam • 179 Billion spam messages per day • Pharmacy spam 62% of all spam • 307,000 zombies lit up per day • 1800 variants of Mal/Bredo virus • 1.3 Sextillion ways to spell \/ l @ g r /-\ everincreasingflow ofSPAM

  7. Virus Attacks Aren’t Letting Up Zero hour virus outbreaks – last 90 days

  8. Spam Maxims Spam is only economical in large volumes Single endpoint or rule-based systems cannot detect spam and viruses quickly or accurately enough A cloud-based solution with global view of internet email can solve the problem

  9. Cloud Security Market Requirements

  10. Commtouch’s GlobalView Network Infrastructure • 5 Carrier grade data centers: US (3), Europe, Asia • Operational for over 12 years • Multiple collection nodes distributed worldwide • Collection of billions of Internet transactions daily • Across diversified segments & geographies • RPD™ technology, multiple analysis engines and 3rd party sources Collection & Analysis • Unified service platform for Internet security applications • Servicing OEM vendors & service providers • Protecting hundreds of millions of users worldwide Service platform

  11. Commtouch Technology Overview Global collection of Internet traffic & data Real-time analysis Queries by endpoints Resolution; Query results build locally relevant DB Real-time traffic Web data sources Security Alliance Malware samples Email Analysis Recurrent Pattern Detection URL analysis Multiple engines Malware analysis Multiple engines OEM partner & Service Provider Endpoints

  12. Commtouch Technology Overview: Messaging Malware patterns IP Addresses 取/m取 Spam/ phishing patterns URLs 三最機是般 • Patented RPD™ • Distribution and structure pattern correlation • Real time detection of global outbreaks

  13. Commtouch Technology Overview: Web Spam/ phishing URLs Userqueries Open trafficcollectors Threat research 3rd party Security Alliance data URL dynamics,popularity & reputation Analysis Engines • User-behavior driven URL filtering cloud database • Multiple sources and analysis engines for broadest coverage and highest accuracy • Zero-hour Web threat protection • More than 100M sites in 64 categories including 8 security categories 12

  14. Commtouch Architecture Detail ZeroHour

  15. Data Center Nuts and Bolts • 5 Operated by Commtouch, 4 co-operated by Commtouch • North America, Europe, Asia • Colo with Tier 1 DC providers • They provide building, physical security, connectivity, power & cooling • Host our equipment in our own cage • We own network equipment, firewalls, etc. • Complete physical redundancy • Multi-peering with different local ISPs • Managed remotely • Highly scalable • 2 months to spin up from A to Z

  16. Datacenter Security • Hosted in dedicated cage • Hand scan/Iris scan access • DC provides physical security protocols • Who has access • Who can request/make changes • Who can receive shipments, etc. • We manage technical security • Communications to DC from Ops is encrypted and via private VPN • Access, change, etc.

  17. Technology Nuts and Bolts • Connectivity • Local engine/client • Checks local cache first • Contacts DC if not found locally • Variable TTL in cache • Client chooses ‘best’ DC to work with • 100% up time to clients for 8 years

  18. Technology Security • Protocols • Proprietary protocol over HTTP • 100% proprietary servers • Service requires authentication • We manage keys and can disable key/service • Partners have optional 2nd level key management • No successful attacks on DCs or clients

  19. Questions?

  20. Thank You

More Related