Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2010 Cellopoint International Corp. 1 Cellopoint Sales Presentation © 2011 Cellopoint International Corp. All copyrights reserved.

Similar presentations


Presentation on theme: "© 2010 Cellopoint International Corp. 1 Cellopoint Sales Presentation © 2011 Cellopoint International Corp. All copyrights reserved."— Presentation transcript:

1 © 2010 Cellopoint International Corp. 1 Cellopoint Sales Presentation © 2011 Cellopoint International Corp. All copyrights reserved.

2 Company Profile Cellopoint International Corporation – Founded in 2003 – 8 Years of experience in Email security and management solutions Proven Track Record and Customer Commitment – Proven benefits with 6.8M+ mailboxes – Over 1000 Customers deploy Cellopoint Solutions – Proven success with quantifiable ROI (Return on Investment) – 2007, 2008, 2009 IT BEST CHOICE Award in Email Content Security/ Held by Institute Information of Technology © 2011 Cellopoint International Corp. 2 Milestones 2005 Established ‘’Anti-spam Lab’’ in Tokyo 2008 Market Launch: Data Loss Protection(DLP) Solution 2003 2004 Strategic Alliance with Sophos 2006 Strategic Alliance with Kaspersky 2008 Market Launch: Cellocloud Security 2009 IT Best Choice Award in Anti-spam

3 Technology Innovations © 2011 Cellopoint International Corp. 3 Leading Developer in effective comparison engine for image spam Leading Developer in effective comparison engine for ZIP Spam Leading Developer in Policy Engine exclusively for email monitoring Leading Developer in Digital Signature to prevent Email forgery Innovator in Email Encryption though HTTPs Email Security Mgmt. Email Risk Mgmt.

4 Competitive Advantage © 2011 Cellopoint International Corp. 4 Provides the total solution for email security and risk management All-in-one solution creates unified management interface and reports Flexibility in different platform solutions including hardware/ Software/ SaaS (Software as a Service)

5 Cellopoint Email UTM Product Line © 2011 Cellopoint International Corp. 5 Email SecurityEmail Risk Management (Email DLP Solution) CelloOS TM Hardware / Software / VM Anti-SpamAnti-Virus AuditingArchivingEncryption

6 Support all levels of organizations Soho/SMB SMB Enterprise Service Provider Education Email Accounts © 2011 Cellopoint International Corp.

7 Cellopoint Email Security Solution Email Security Anti-spam / Anti-virus © 2011 Cellopoint International Corp. 7

8 Email Security Anti-spam+Anti-virus in the cloud Defend against email threats Lowest TCO All-in-one hardware solution Cluster capability Effective management Integrate with your own hardware Deploy in just minutes into your virtualization environment © 2011 Cellopoint International Corp. 8 Cellopoint Hosted Email Security 1. Pure SaaS Hosted Email Security 2. Appliance Email UTM 3.Software/VM Email UTM

9 Email Security Features Utilize CGAC © 2011 Cellopoint International Corp. 9  Utilizes Cellocloud online defense system to provide hourly update to our sender reputation data base  Create Honey Pot system: Million decoy accounts are set up to collect spam traffic regarding spammers and Botnet (Zombie Network)  Threat Sensor System: Gathers email information from millions of sensors across all threat vectors using an in-the-cloud collection and distribution model  Cellopoint Global Anti-spam Center, CGAC: Experts in CGAC monitor and analyze worldwide spam volume 24*7

10 Four Layers of Spam Filter System © 2011 Cellopoint International Corp. 10 Connection Control Content Filter Client Mail Server Transaction Check DoS Defense SRL (Sender Reputation List) DHA (Directory Harvest Attack) Grey List Sender Policy Framework ICA (Intelligent Content Analysis) Social Engineering URL reputation Cellocloud TM Anti-Virus Zero-Hour Defense System ClamAV AVG (Optional) Anti-spam detection rate ≧ 99%

11 Connection Control: Prevent Dos Attacks Sophisticated SMTP Rate Limit 1.IP SMTP Connection Rate Limit 2.IP send rate limit 3.Limitation of authenticated account send rate: prevent Hackers of breaking through authorized mail account and sending spam 4.Limitation of negative account authentication: to prevent hackers from speculating account and passwords 5.False Sender Limitation: to verify sender and prevent spam © 2011 Cellopoint International Corp.

12 Cellopoint Sender Reputation List © 2011 Cellopoint International Corp. Check Sender Reputation Sender A Spam Sender B eDM Sender C Valid Mail Block spam Quarantine Suspicious Sender A: Bad Sender B: Suspect Sender C: Good CelloCloud TM Allow Valid

13 Anti-Virus Engine ClamAV AVG(Optional) Provide maximize protection against – Viruses – Worms – Spywares – Trojans – Malwares Offer customizable scan sequence and flexible policy enforcement © 2011 Cellopoint International Corp. 13

14 Cellopoint Mail Archiver E-discovery and regulation compliance © 2011 Cellopoint International Corp. 14

15 Email Archive Reasons Currently 70% of business critical information is delivered through email, therefore making message archiving an important cycle of Business Continuity Plan(BCP). Litigation issues require enterprise to find relevant evidence through email (E-discovery) Regulation Compliance requires enterprises to keep email information for years. Effective usage of storage space, and increase the efficiency of mail server. Email is one of the most important knowledge source and asset for enterprise, therefore email archiving can be utilized as knowledge management (KM) Email archiving can also regulate the behavior of email usage by employees © 2011 Cellopoint International Corp. 15

16 Regulations regarding email archiving Message information has become important legal evidence to many industries especially for financial, medical, technology and government entities which are required to store large amount of message data for future retrieval purpose. © 2011 Cellopoint International Corp. US 2002 SOX (Sarbanes-Oxley Act) –Required to store digital file(including messages) for at least 5 years. When facing litigation issues, fast retrieval of specific content in email should be able to conduct. Basel II require banking industry to store at least 3 years effective risk evaluation information. HIPPA Health Care Industry also need to preserve medical data for 6 years. Sec 17 CFR Part 210, Financial Account Dept need to preserve data for 7 years. Japan 2005 Personal information protection law regulates enterprise,organizations the duty to prevent personal information from leaking out. Information need to be archived and insure the availability of retrieving information. 2008 Japan announced their own Sarbanes-Oxley-Act(SOX) 16

17 Email Storage Problems The storage space that messages are using is increasing rapidly, hence MIS need to separate storage location, however causing difficulty in searching and locating certain emails. Email Storage management can only set email quota to prevent storage space from depleting, which may cause incomplete messages when storage space runs out. Email can’t be categorized, therefore causing inefficiency of searching emails. Email restoration takes time and effort, hence business opportunity may be lost or further cannot provide litigation evidence. © 2011 Cellopoint International Corp. 17 If the message you stored is incomplete, or cannot be retrieved or search in an efficient manner, then what is the use of email backup?

18 Cellopoint Solutions-Email Archiver All-in-one hardware solution Cluster capability Effective management Integrate with your own hardware Deploy in just minutes into your virtualization environment © 2011 Cellopoint International Corp. 18 Appliance Mail Archiver Software/VM Mail Archiver

19 Cellopoint Email Archiver Features Preserve Digital Assets Easy Retrieval/Restore/ Search Mail Email Files Compressed and save storage cost Save management time Increase Mail Server Efficiency High Availability © 2011 Cellopoint International Corp. 19

20 Email Life Cycle Management © 2011 Cellopoint International Corp. 20

21 How Cellopoint Mail Archiver works © 2011 Cellopoint International Corp. 21 Cellopoint Email UTM Mail Archiver Internet Email Server.................... Inbound / Outbound / Local Mail Auditor User FINGERPRINT INDEX COMPRESS ENCRYPT ARCHIVE Policy-based ELM Search & retrieve personal mail Audit user’s mail

22 Cellopoint Mail Archiver Policy Provide Policy Based Classification 1. Mail Archiving Policy – Define Mail archiving Policy: Keywords, Group – Define Message Life Cycle Policy: Retention years 2. Analyze Email content and attachment and create index 3. Google style search engine – Intuitive Search engine provides easy method to retrieve and search mail – Can review and search mails in online and near-line storage – Mail that has predefined email lifecycle policy will be auto expired which make efficient use of storage space © 2011 Cellopoint International Corp. 22

23 Cellopoint Mail Auditing Data Loss Prevention Solution © 2010 Cellopoint International Corp. 23

24 Why Mail Auditing? Email has become one of the most important carrier of organizations information Real time content filtering for email and attachment can assure sensitive data can be audit and protected from intentional or unintentional mail behavior Regulation Compliance requires organizations to protect certain information which makes mail filtering essential, especially financial data, RD research report etc…. © 2010 Cellopoint International Corp.

25 How does Mail Auditing works © 2010 Cellopoint International Corp. 25

26 Mail Auditing conditions and actions © 2010 Cellopoint International Corp. 26 ConditionAction Keyword Search Attachment Content Attachment file type Sender Domain Receiver Domain Sender Account Recipient Account Mail Size Quarantine Delete To be confirm Allow Encryption Reject Forward

27 Mail Auditing example To prevent employees to send out wrong mails or attachments - Attachment or mail to the wrong recipient © 2010 Cellopoint International Corp. Cellopoint Solution Mail Auditing ConditionsApply Actions Keyword+ Recipient :Competitor mail domain Quarantine / to be confirmed by group admin. Recipient account+ Mail from head hunter Quarantine Mail + Notify HR Mail Contains BCC Forward to Group admin

28 Why Cellopoint Mail Auditing Support Software/ Hardware/ Virtualization Multiple Mail Conditions and actions -Strip attachment -Quality of service(Qos) -Support gateway encryption(optional) Multiple Mail Conditions and actions -All Mail auditing actions provide log record -Log Search Engine -Offer Virtual Group administrator for auditing Auditing authorization -System administrators can choose to have the authorization to see mail content or not © 2010 Cellopoint International Corp.

29 Cellopoint Email encryption © 2010 Cellopoint International Corp. 29

30 Cellopoint Email Encryption Business to User – S/MIME Through Cellopoint Gate-to-Client structure to conduct email encryption Recipient needs to install private key to decrypt – HTTPs Through HTTPs to connect to Cellopoint personal encrypted area to view mail Gateway-to-Client email encryption © 2010 Cellopoint International Corporation30

31 Cellopoint ENC Solution Flow S/MIME: End-User with Certificate HTTPs: End-User without Certificate internet Reading email via https internet S/MIME message notification

32 Why Cellopoint Email Encryption? © 2010 Cellopoint International Corporation32 Cellopoint Encryption Appliance Mail Server ( Groupware ) HTTPs S/MIME Encrypted mail Internet Normal mail Sender Recipient Private key(pfx) Policy Engine

33 Cellopoint Email Encryption Features Auto generate certificate, and save the problem of certificate management Recipient can use intuitive interface and simplify the deployment flow of encrypt/ decrypt mails. Meet industry encryption standards User doesn’t need to install additional software Easily integrate with current mail system © 2010 Cellopoint International Corporation33

34 Q&A Visit Cellopoint Website : http://www.cellopoint.com/ sales@cellopoint.com © 2011 Cellopoint International Corp. 34


Download ppt "© 2010 Cellopoint International Corp. 1 Cellopoint Sales Presentation © 2011 Cellopoint International Corp. All copyrights reserved."

Similar presentations


Ads by Google