Presentation is loading. Please wait.

Presentation is loading. Please wait.

IDC eGovernment The Future of Email Security John Ryan Operations Director Entropy.

Similar presentations


Presentation on theme: "IDC eGovernment The Future of Email Security John Ryan Operations Director Entropy."— Presentation transcript:

1 IDC eGovernment The Future of Security John Ryan Operations Director Entropy

2 Fixing - Where Are We Now? The Current State of Messaging (Security) Top Enterprise Threats & The Cost to Corporations Where Is The Industry Going? Reactive Point Solutions Proposed Identity Standards New Technologies to Address these Issues? Identity, Reputation, Policy Control Unique solutions available now

3 images blank

4 Source: Information Security Breaches survey 2004 – DTI UK

5

6 The Mission-Critical App Is Collapsing Is The Form Of Business Communication 80% Of Businesses Consider More Important Than Phones Is No Longer Reliable Spam, False-Positives, Viruses, Forgery And Other Threats Make Unreliable Users Are Rapidly Losing Trust In 52% Say They Trust Less 25% Have Reduced Use Pew Internet Life Project

7 Challenges of E Mail Today! E mail has become a mission critical communications vehicle E mail has become a major delivery mechanism for marketing messages…SPAM! Most of these marketing messages are unsolicited and unwanted Spam is perceived as the most significant problem of enterprise. Source: Osterman Research

8 Some Statistics 18B message per day (73% of which is SPAM) Message volume has increased by 2B in January 9.4B messages coming for Zombie hosts 290,000 infected hosts tracked last week alone 15,000+ compromised zombie networks 75% of all Viruses are deployed via an Phishing scams accounted for 1% of SPAM Source: Senderbase network – go to Top countries sending SPAM …….. 1.United States 2.China 3.South Korea 4.Poland 5.France 6.Great Britain 7.Germany 8.Brazil 9.Spain 10.Japan

9 Stats January 2006

10 Corporations Pay the Consequences Spam Will cost corporate users over £10B in the US alone. 1 Overall cost of spam between £10B and £87B, or £50 to £1400 per worker per year. 2 Set to get worse Corporate spam traffic will rise from 44 billion messages per day in 2006, to 83 billion messages per day in Viruses Sobig virus cost more than £1B. 4 Disaster recovery costs increased by 23% in 2003 to almost £100,000 per organization per virus outbreak. 5 Confidential information Difficult to estimate Devastating impacts 1. Ferris Research 2. Pew Internet and American Life Project 3. Radicati Group 4. Computer Economics 5. ICSA Labs Prevalence Survey

11 It Takes Two: Senders and Receivers We Are All Senders And Receivers Solving Receiver Problems Means Addressing Sender Issues And Vice Versa The Solution To Fixing Is NOT One-sided A Healthy System Requires Feedback Loops Integrating complaint and other corrective data back into the system is a fundamental requirement

12 Gateway Infrastructure Issues On top of all the Security vulnerabilities, the infrastructure itself is at breaking point….. Bespoke deployments Complexity Performance issues & bottlenecks Reliability of the solutions Huge Admin Overhead Limited visibility or control Managing the escalating costs $$$

13 Fixing - Where Are We Now? The Current State of Messaging (Security) Top Enterprise Threats & The Cost to Corporations Where Is The Industry Going? Reactive Point Solutions Proposed Identity Standards New Technologies to Address these issues? Identity, Reputation, Policy Control Unique solutions available now

14 The Industry Reacts Solutions are reactive NOT proactive Point solution approach Content-based filtering band-aids Cat and mouse game – its never going to end! New filter, new threat, new filter, new threat, new filter, new threat, new filter There is some good news! >>>>

15 Industry Adopts Identity Sender-ID/SPF Technical Solution For Sender Address Forgery Yahoo! Domain Keys Authenticating Entire Message Based On Sender Domain There are limitations to this partial solution.

16 Fixing - Where Are We Now? The Current State of Messaging (Security) Top Enterprise Threats & The Cost to Corporations Where Is The Industry Going? Reactive Point Solutions Proposed Identity Standards New technologies to Address these Issues? Identity, Reputation, Policy Control Unique solutions available now

17 Critical Components of a Complete Solution The vulnerability exposed by spam, viruses, phishing is inherent to the protocol, SMTP Reputation services are a critical component of the solution: Advanced authentication standards IDENTITY POLICY REPUTATION A holistic view of a senders trustworthiness Intelligently apply filtering techniques based on the apparent threat

18 Black and White Lists

19 SenderBase: Leading Reputation Service 75,000 contributing organizations 4 billion queries daily >25% of worlds Internet 30,000 organizations (25% of all ) Other Data Open Proxy Data Blacklists Global Complaint Data Global Volume Data SpamCop, ISP abuse data, BondedSender abuse data SpamCop, SpamHaus (SBL), NJABL SORBS, OPM, DSBL… Fortune 1000 status, length of sending history, location, whether domain accepts , etc. Authenticated Unknown Sender Extensive network of invalid" accounts 3 rd party accreditation Reputation Established Spamtraps

20 Traffic Shaping: Mail Flow Control NOT Filtering

21 Security Appliances: Enforcing Policy Known good is delivered Suspicious is throttled & spam filtered Known bad is deleted/tagged IronPort Appliances Use Identity And Reputation To Apply Policy Trusted Known Senders Bypass Spam Filters Suspicious Unknown Senders Are Throttled And Filtered Hostile Senders Are Deleted Or Tagged Appliance Anti-Spam

22 Scale is required

23 Outbreak Filter Advantage 28:46 hours28:46 hours 22:54 Next Day22:54 Next Day 18:0818:08 15 Feb 0515 Feb 05 Mydoom.bbMydoom.bb 3 Dec 043 Dec Jan 0530 Jan Feb 0515 Feb 05 DateDate 7:58 PM7:58 PM 09:2109:21 16:1716:17 First Anti-virus Signature AvailableFirst Anti-virus Signature Available Outbreak Filter Lead TimeOutbreak Filter Lead Time Virus Threat Level RaisedVirus Threat Level Raised VirusVirus 4:47 hours4:47 hours 3:11PM3:11PM Cidra-DCidra-D 10:20 hours10:20 hours 23:0123:01 Sober.JSober.J 17:13 hours17:13 hours 23:0423:04 Goldun.HGoldun.H

24 Prevention: Temporary Quarantine Pulls outbreak rules for all incoming attachments Triggers automated quarantine for suspicious attachments Releases messages for rescanning through standard filters Outbreak Rules Temporary Quarantine Virus Filter Closes the Reaction Gap MyDoom.bb 6503 files Quarantined 100% capture

25 VoF Advantages

26 Consolidation of the Perimeter BEFORE AFTER Appliance

27 Summary Security spend has to increase to meet the ever increasing business demands is now THE critical communications system Our systems are under attach and straining to deliver We need to re-think our approach to delivery and invest in new technology


Download ppt "IDC eGovernment The Future of Email Security John Ryan Operations Director Entropy."

Similar presentations


Ads by Google