1 / 30

Symantec Messaging Security Family

Symantec Messaging Security Family. Multiple layers of defense and deployment options. Symantec Mail Security Overview. Agenda. Today’s Threats Impact to the Customer Business Symantec Mail Security. 1. 2. 3. Today’s Threats. Email infrastructure under attack.

meliora
Download Presentation

Symantec Messaging Security Family

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Symantec Messaging Security Family

  2. Multiple layers of defense and deployment options

  3. Symantec Mail SecurityOverview

  4. Agenda Today’s Threats Impact to the Customer Business Symantec Mail Security 1 2 3

  5. Today’s Threats

  6. Email infrastructure under attack

  7. Impacting the Customers Business

  8. Threat Impact on Customers Business Direct Losses Indirect Losses • Theft, Money, Digital Assets • Computer Resources • Trade Secrets • Consumer Information • Loss of Potential Sales • Negative Brand Impact • Loss of Competitive Advantage • Loss of Goodwill Productivity Losses Legal Exposure • Diversion of Funds • Continuity Expenses • Corruption of Data • Recovery Expenses • Failure to Meet Contracts • Failure to Meet Privacy Regulations • Illegal User Activity • Director Liability

  9. The impact of spam and other email security issues Viruses and Malicious Content Escalating UnwantedTraffic at Gateway Spam Content Control • Lost productivity • Resource drain • False positives due to incorrect filtering • System downtime • Compromised machines • Decreased bandwidth • Overloaded server resources and mail storage space • Increased resource cost • Lack of policy enforcement • Regulatory compliance vulnerability • Danger of lawsuits Administrator’s Key Challenges • Safeguard organization from email threats • Preserve free flow of vital email from legitimate sources • Do this with as little administration as possible

  10. Symantec’s Approach to Threat Protection

  11. Simplified Security for Your Business • Multiple security technologies in a set of integrated devices • Single-vendor solution for any company size • Prevent network intrusions • Increase control and efficiency • Ensure business continuity • Decrease complexity • Global intelligence and early warning services

  12. Addressing Security Challenges with Symantec Integrated Solutions The challenge: • Secure all levels of the network infrastructure • Secure email messaging • Truly securing the perimeter • Control and ensure remote access security • Securing network borders Symantec solutions: • Symantec Mail Security 8100 and 8200 Series

  13. Deploying Security Solutions Large Enterprise Symantec Mail Security - Model 8160 Symantec Network Security - Model 7160/7161 Headquarters Symantec Gateway Security - Model 5660 Symantec Mail Security - Model 8260 Symantec Gateway Security - Model 5640 Division Office Symantec Network Security - Model 7120 Symantec Gateway Security - Model 1660 Symantec Mail Security - Model 8240 Medium Enterprise Regional Office Symantec Gateway Security - Model 1620 Symantec Gateway Security - Model 5620 Symantec Mail Security 8220 Small Enterprise Symantec Gateway Security 400 Series - Models 420, 440, 460, 460R Branch OfficeTelecommuters Symantec Gateway Security 300 Series -Models 320, 360, 360R Small Business Affordable, Plug-and-Play, Low Maintenance Powerful, Scalable, Flexible, Cost-effective

  14. Email Security from Symantec

  15. Symantec • Is positioned as the clear leader in E-mail Boundary Security • Develops visionary products • Delivers unparalleled execution and brings the vendor stability that customers expect Gartner’s Magic Quadrant for E-Mail Security Boundary E-mail Security Boundary includes... • Antispam • Antivirus • Intrusion prevention of both inbound and outbound threats Source: Magic Quadrant for E-Mail Security Boundary, 1H05 ;Arabella Hallawell, 2005

  16. Preventsviruses Symantec Mail Security Overview Comprehensive and integrated gateway messaging security Stops spamat the gateway ControlsInboundandoutbound content Enterprise-class administration

  17. Stop spam—without the risk Effective Brightmail’s reputation remains unsurpassed for ensuring that spam filters don’t block legitimate e-mail. Accurate Low administration

  18. Protect users from malicious code Award-winning Symantec Antivirus • Signatures backed by Symantec Response • Heuristics settings for emerging threats • Mass-mailer cleanup Proven, rapid, and reliable engine • 23 Virus Bulletin 100% awards • Multi-threaded scanning system for added performance • Same core engine found in all Symantec products and platforms

  19. Monitor and control inbound and outbound content Next generation content filtering engine • Scans for regular expressions, keywordsand dictionary matches • Scans in messages, attachments, and ZIPs • Detects true file type (over 350 file types) Benefits • Enforce acceptable use policies • Block unwanted attachments • Scan for restricted keywords and patterns • Block leaks of sensitive information • Plug data leaks • Customer lists • Social security numbers • Non public information

  20. Enforce different policies for different groups/users Policy editor for spam, virus, & content • Per-user and group-based policies • Choose from over 20 actions • Combine actions for more control (e.g., markup message and then quarantine) Easy to manage • Populate groups w/ LDAP or email addresses • Synchronize with popular LDAP directories(including Active Directory, and Domino) • Control distribution list expansion

  21. Multi-layered email protection

  22. How it works

  23. High level overview

  24. Symantec SOCs Symantec Support 20,000 Registered Sensors in 180 Countries Symantec Security Response Labs + + + + Over 4,300 Managed Security Devices + 120 Million Symantec Systems Worldwide Dublin, Ireland Calgary, Canada Springfield, OR Waltham, MA Tokyo, Japan San Francisco, CA London, England Redwood City, CA Munich, Germany Santa Monica, CA Alexandria, VA Orem, UT/American Fork, UT Newport News, VA Taipei, Taiwan Sydney, Australia Supported by Symantec Security Response Symantec Monitored Countries 28

  25. Defending Against Spam: A Multi-layered Approach

  26. Symantec Mail Security 8160

  27. Symantec Mail Security 8200 Series • Easy to deploy solution • All in one hardware, operating system, MTA, filtering engine and web-based Control Center • Group policies for flexible mail handling • Secure email infrastructure • Hardened hardware and software • Software update for easy administration

  28. Click to edit Master text styles Second level Third level Fourth level Fifth level

  29. Internet SMS 8000 Series Combined Advantage 2M messages 1M messages 620K messages 620K messages User Mail Stream 600K Good 1.4M Spam 1M eliminated 600K Good 400K Spam 1.38M eliminated 600K Good 20K Spam 1.38M eliminated 600K Good 20K Spam 30 Good 1 Spam 0 FPs Groupware + Archiving 20K End Users SMS 8260 SMS 8160 Purify Mail Stream 95% Effectiveness. 99.9999% Accuracy. Delivers cleanest mail stream available on the market. Control Infrastructure The reduced mail volume equals fewer strains on Groupware and Archiving servers. Satisfy End Users Only 1 Spam message per user. Only one of 20K users gets 1 False Positive Cut Volume In Half. The SMS 8160 throttles mail from known bad senders to reduce unsolicited email.

  30. Questions?

More Related