1 / 37

Enterprise Messaging Management Symantec Mail Security – 8300 Appliances

Enterprise Messaging Management Symantec Mail Security – 8300 Appliances. >. >. >. >. Agenda. Enterprise messaging management. Symantec Mail Security. Key features Market leading spam and virus filtering Proactive threat defenses Next generation content filtering

tmonique
Download Presentation

Enterprise Messaging Management Symantec Mail Security – 8300 Appliances

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enterprise Messaging ManagementSymantec Mail Security – 8300 Appliances

  2. > > > > Agenda Enterprise messaging management Symantec Mail Security Key features • Market leading spam and virus filtering • Proactive threat defenses • Next generation content filtering • Flexible and powerful management Purchasing and licensing

  3. The state of messaging management Email messaging is critical… …with more protocols on the rise • Over75% • Of a typical company’s intellectualproperty is contained in email • Of companies accept email aswritten confirmation of transactions • Of Fortune 500 litigation involvesdiscovery of email communication Enterprise Strategy Group, 2005

  4. Requirements for messaging management A policy-driven platform that Classifies, Controls, and Captures message traffic Classify Control Capture • Intercept all messages across protocols • Evaluate messages based on sender reputation, content, headers, etc. • Determine message classification—spam, virus, confidential, etc. • Take per-user actions based on corporate policies • Quarantine, archive, encrypt, delete, alert, etc. • Provide messaging audit trail from sender to archive • Archive for analysis, recovery, backup • Deliver legal and compliance records

  5. 1 Data Reduction • SMS 8160 • SMS Hosted Enterprise Vault Server 2 5 4 3 Discovery and Retrieval RecordsRetention Internal Email and IM Protection Gateway Protection • SMS for SMTP • SMS 8300 • IM Manager • SMS for MS Exchange • SMS for Domino • IM Manager • EV Compliance Accelerator & Discovery Accelerator • Enterprise Vault (EV) Vault Store Symantec’s comprehensive portfolio for Enterprise Messaging Management IM and MTAGateways 2 Email remains accessible by IT, legal and compliance officers 5 Microsoft Exchange IBM Lotus Domino 1 3 4 Internet SMTP and IM Traffic Spam Retention (Regulation-dependent) Spam Quarantine SMS = Symantec Mail Security

  6. Symantec Mail Security

  7. “Spam & Virus Mitigation” “Infrastructure Integration” “Content Filtering & Compliance” Challenge of Gateway ProtectionManaging Messages in Motion

  8. SMS Gateway Overview Security – Spam & Virus Content Filtering & Compliance Quick Operational Deployment • Encrypted email services • Integration into current LDAP deployment • Centralized Admin • Incident Management • Automatic Archiving • Fifty pre-built policy scanning templates • Sixty pre-built word dictionaries • Thirty-seven pre-built regular expressions • True file typing • Gateway Spam Protection • Day Zero Virus & Antiphishing protection • Spyware/Adware verdicts • Scan in containers and zips Benefit Benefit Benefit Block and neutralize the latest email threats & outbreaks Help meet regulatory, legal, and internal content requirements Increases operational efficiency of IT Staff

  9. Spam and Virus Mitigation

  10. Stop spam—without the risk Effective Reputation remains unsurpassed for ensuring that spam filters don’t block legitimate e-mail. Accurate Low administration

  11. Probe Network – Immediate Antispam Protection • Collects spam, virus, sender reputation, and other email security data • Employs technicians 24/7 who analyze threats and create filters in real time • Deploys updated filters and reputation information to customer sites every 10 minutes

  12. Protect users from malicious code Award-winning Symantec Antivirus • Signatures backed by Symantec Security Response • Heuristics settings for emerging threats • Mass-mailer cleanup Proven, rapid, and reliable engine • 23 Virus Bulletin 100% awards • Multi-threaded scanning system for added performance • Same core engine found in all Symantec products and platforms

  13. The problem: “Day Zero” attacks Signature Response Period Contagion Period 2000 TIME 2006

  14. Provide Encrypted Email Services Web Server TLS Encrypted Email • Define partner domains that require encryption • Use message content, sender, recipient and other criteria during policy creation • Capable of using certificate verification when establishing a secured session Encrypted Data Internet Benefit Help meet regulatory, legal, and internal content requirements for out bound email.

  15. Email Firewall: Proactive first line of defense Stop threats at IP connection level Customize for your site Change (SPF) to (SPF and Sender ID) • Directory harvest attacks • High volume spam and virus attacks • Senders with low Symantec reputationscores • Site-specific allowed/blocked senders • Optional RBL configurations • Wide range of actions

  16. Content Filtering and Compliance

  17. Changing Threats to Data Security Insiders have surpassed threats from external hackers Data leaks are due to bad business practices or employee oversights Inadvertent vs. Malicious Insider vs. The Hacker 96% of leaks are due to faulty processes or oversight 2005 Data Security Breaches <1% malicious other 1% manager approved Hacker 48% 50% of leakage is due to business practices 46% of leakage is due to employee oversight Insider 52% Data compiled from indistry sources including EPIC.org and PerkinsCole.com Source: Vosta risk assessment findings.

  18. Assess Risk Group Policy Policy Actions • Data Leakage • Compliance • Internal Governance • Acceptable Use • Select policy template • Determine users for violations • Determine users for exceptions if applicable • Apply Group Policy • Violations • Block or Deliver, Incident, Notify • Mitigation • Deliver with TLS • Define Actions Analyze Threat • Incident Management • Access Control • Message Tracking • Reporting • Select policy template Data Leakage & Compliance Workflow

  19. Advanced Content Scanning Capabilities Data Filtering Included Word / Phrase Filtering Premium Content Control* Information Filtering * Optional Premium Content Control Module

  20. Enforce different policies for different groups/users Policy editor for spam, virus, & content • Per-user and group-based policies • Choose from over 20 actions • Combine actions for more control (e.g., markup message and then quarantine) Easy to manage • Populate groups w/ LDAP or email addresses • Synchronize with popular LDAP directories(including Active Directory, and Domino) • Control distribution list expansion

  21. Build Policies on True File Typing Deep Content Scanning • Detects over 350 file types regardless of file extension • Protects Inbound email against disguised malware • Protects Outbound mail flow for confidential files

  22. Quickly track and audit missing messages 1 Filter with multiple criteria • Sender • Recipient • Subject • etc. Retrieve Message Status 2 • Time message processed • Sender • Recipient • Subject of the message • Disposition (spam, virus, blocked sender, etc) • Actions Taken Drill down for detailed forensics 3

  23. Infrastructure Integration and Operations

  24. LDAP Integration Directory LDAP User Authentication Email Routing • Removes burden of email management from administrators • Provides End User Quarantine Access 2 1 • New email triggers directory look-up • Routes email to specific mail server based on message recipient Mail Server LDAP Synchronization • Directory Harvest Attack Protection • Drops Invalid recipients • Establish Group Policies

  25. Powerful and centralized administration Centralized Administration • Configuration settings • Group member changes • Manages all mail scanners Consolidates and aggregates • Logs • Reporting and statistics Centralized dashboard of all Scanners

  26. Control configuration of AV definitions and policies More visibility • View status of definitions across all scanners • Check manifest to confirm protection against recent viruses More control • Scheduled UpdatesDownload cutting edge incremental updates to emerging threats • Rapid ResponseDownload latest defs to counter the latest threats

  27. Easily Archive Scanned Messages Archive action sends a copy or message to email and/or Enterprise Vault archiving Server Add archive X header Further categorize message with X header (leveraged by archival solution) Messages to archive x-archive: Relates to Discovery Motion #591 Route to specific archive host Specify a specific host and port to receive archived mail archive@example.com 192.168.248.106:25

  28. Authenticated Access to Incident Folders • Incident based Message Management • Dictionary and key phrase scanning • Send a copy of violation to custom compliance folder • Multiple Access Controlled Folders • Push folder management to content experts • Assign severity and status to compliance violations • Once incidents are resolved, delete or archive the messages • Assign content compliance folders to specific content experts (e.g. Sarbanes Oxley)" message

  29. Generate detailed reports Full set of reporting options • Over 50 preset reports • Customize by content, date, etc • Schedule report generation • Export to HTML and CSV Benefits • Gain insight into performance • Identify trends & compliance issues • Determine ROI

  30. Gartner’s Magic Quadrant for E-Mail Security Boundary E-mail Security Boundary includes... • Antispam • Antivirus • Intrusion prevention of both inbound and outbound threats Symantec • “Symantec remains the reference leader in effectiveness” • “Symantec’s…ability to execute is high” • Symantec garners high markets for IM security and archiving integration investments Source: Magic Quadrant for E-Mail Security Boundary, Sept 2006

  31. Consulting Education TechnicalSupport ManagedSecurity Services EarlyWarning Services • Advisory Services • Enablement Services • Technology Deployment • Operational Integration • Residency Services • Operational Services • Skills Assessment • Classroom Training • Customized Training • Virtual Academy • Self-study • Certification • Business Critical Service Assessments • Incident Management • Problem Resolution • Onsite Support & Best Practices • Monitor • Manage • Respond • DeepSight Threat Management System • DeepSight Alert Services Symantec Global Services –Integrated to meet all your service needs Symantec Global Services provides you with the right people, process, and technology to optimize your IT infrastructure and service delivery while managing your business risk. We keep your enterprise up, running, and growing – no matter what happens.

  32. Assessment Services Design and Implementation Services Residency Services for on-going management Continuous on-site technology and business expertise, allowing clients to realize the full value of technology investments and optimize resources in support of core business strategies Symantec Mail Security Consulting Services Extensive knowledge and insight, experienced business, industry and technology experts, and flexible consulting approach to deliver mail security solutions that proactively protect the infrastructure and improve operational performance Manage Assess Business / IT Alignment Implement Design People Process Technology

  33. Why Train With Symantec: Faster, more successful product implementation Better return on security investment Unrivaled product training expertise with the most up-to-date content available Certified instructors with real-world experience Available Training: Symantec SMS for 8300 Appliance (Classroom), available January 2007 Deploying and Installing Symantec Mail Security Configuring Symantec Mail Security Authentication and Components Configuring Email Settings Creating and Assigning Filter Policies Configuring Premium Content Control Monitoring and Administering the Symantec Mail Security Environment Symantec Mail Security 8300 Education Services eLearning

  34. Enterprise Support Services Three levels of support offer Flexibility and Choice: Personalized, proactive support from elite technical experts, coordinated by a single point of contact and featuring Symantec’s highest levels of response Business Critical Services Around-the clock access to Symantec’s technical experts, with faster response times and access to all product upgrades* Essential Support Lowest price option including access to product upgrades and business hour support Basic Maintenance * Response time targets are faster for Essential Support than for Basic Maintenance • UNIQUE EXPERTISE • COMMITMENT TO CUSTOMER ADVOCACY • INNOVATIVE APPLICATION OF SUPPORT TECHNOLOGIES • FLEXIBLE SUPPORT OFFERINGS

  35. In Summary The experts agree Stronger gateway protection “…spam protection mark was among the highest in our review, which makes the fact that the appliance registered no false positive especially impressive. Symantec appears to have finely tuned engines right out of the box.” – 6/5/06 Expanded content filtering Next generation threat prevention More visibility & admin control

  36. Join the Symantec mail security team Over 75,000+ customers, including…

  37. Questions?

More Related