Presentation is loading. Please wait.

Presentation is loading. Please wait.

Simplifying Email, Web & Network Protection. Astaro Overview – Page 2 © Astaro 2007 Topics Astaro Company Profile The Security Struggle Overview of Astaro.

Similar presentations


Presentation on theme: "Simplifying Email, Web & Network Protection. Astaro Overview – Page 2 © Astaro 2007 Topics Astaro Company Profile The Security Struggle Overview of Astaro."— Presentation transcript:

1 Simplifying Email, Web & Network Protection

2 Astaro Overview – Page 2 © Astaro 2007 Topics Astaro Company Profile The Security Struggle Overview of Astaro Security Gateway Security Applications Web Security Email Security Network Security Appliances and Software Additional Astaro Products Business Value Network Security Web Security Email Security

3 Astaro Overview – Page 3 © Astaro 2007 Astaro Company Profile Founded in 2000 Pioneered what is called Unified Threat Management market Profitable, growing 60% Award-Winning Products Astaro Security Gateway – the most flexible solution for integrated email, web, and network protection protects 40.000+ networks in over 60 countries Easy to deploy and manage Global Presence Headquarters in Karlsruhe, Germany and Boston, USA 100+ employees in EMEA, Americas and APAC 24x7 technical support 1000+ partners & reseller worldwidet (700+ in EMEA)

4 Astaro Overview – Page 4 © Astaro 2007 Customers

5 Astaro Overview – Page 5 © Astaro 2007 Recognition Best of the year 2004 Best of the year 2005 Best of the year 2006 Editor's choice (2x) 5/5 Star Review (2x) Best of the year 2004 Best of the year 2005 Editor's choice Recommended product Product of the year 2005 Product of the year 2006

6 Astaro Overview – Page 6 © Astaro 2007 The Security Struggle MULTIPLYING THREATS DEMAND MULTIPLE DEFENSES THAT ARE DIFFICULT TO INTEGRATE AND MANAGE ∞ Evaluate ∞ Purchase ∞ Train ∞ Install ∞ Integrate ∞ Configure ∞ Manage ∞ Update Firewall VPN Spam Blocking Anti- Virus Intrusion Detection URL Filtering Anti- Spyware

7 Astaro Overview – Page 7 © Astaro 2007 Firewall 1995 VPN URL Filter IDS Email Anti Virus Firewall 2000 Central report tool Central config tool Central mgmt tool Signing/encryption VoIP Security VPN Remote access NAC Wireless security P2P filter IM filter Anti Spyware Multi protocol AV IPS VPN URL Filter IDS Email Anti Virus Firewall 2005 App 3 App 2 App 1 UTM Gateways Clean pipe 2010 The growing demand for Internet Security

8 Astaro Overview – Page 8 © Astaro 2007 Astaro Security Gateway Complete Perimeter Security Network Security Web Security Email Security

9 Astaro Overview – Page 9 © Astaro 2007 Integrated Email, Web and Network Protection Content Filter Anti Virus & Spyware IM & P2P Control Web Filtering Firewall IPS VPN Network Protection Email Security Spam Filter Anti Virus & Phishing Encryption

10 Astaro Overview – Page 10 © Astaro 2007 Layered Security External users Internet Firewall and VPN Intrusion Protection Content Filtering– Virus/Spam/URL/ Spyware/Phishing Internal users LANs EmailDatabaseWeb Internal Resources Astaro Security Gateway V7

11 Astaro Overview – Page 11 © Astaro 2007 Integrated Management Installation Update Logging and Reporting Network Security Web Security Email Security Management Interface

12 Astaro Overview – Page 12 © Astaro 2007 Web Security Network Security Email Security Content Filtering Virus Protection IM and P2P Control Web Security Spyware Protection

13 Astaro Overview – Page 13 © Astaro 2007 Spyware Protection Blocks downloads of spyware, adware, and other malicious software Prevents infected systems from sending information back to the spyware server Checks against a database of known spyware URLs Gateway spyware blocking complements desktop anti-spyware tools

14 Astaro Overview – Page 14 © Astaro 2007 Virus Protection for the Web Block viruses, worms, trojans, and other “malware” before they reach desktops Scans HTTP and FTP traffic Web & ftp downloads Web-based email (MSN Hotmail, Yahoo! Mail) Dual virus scanners with multiple detection methods Virus signatures, heuristic analysis Database of more than 300,000 virus signatures Frequent automatic updates Flexible management Can specify file formats and text strings to block

15 Astaro Overview – Page 15 © Astaro 2007 Content Filtering (URL Blocking) Enforces policies on appropriate use of the web Administrators can define web use policies based on pre-defined categories of web sites Nudity, gambling, criminal activities, shopping, drugs, job search, sports, entertainment, etc. Sophisticated classification techniques text classification, recognition of symbols and logos Whitelists and blacklists to tailor access for groups of users Measure and report on activities

16 Astaro Overview – Page 16 © Astaro 2007 IM & P2P Control Manage the use of Instant Messaging Clients AOL IM, ICQ, MSN Messenger, Yahoo! Messenger, IRC, Google Talk/Jabber, Skype Manage the use of Peer-to-Peer applications Bittorrent, Edonkey, Gnutella,WinMX, Winny, Manolito, Ares, Direct Connect Flexible control For each application administrator can define, if it should be allowed or blocked and if he should receive a notice about its usage.

17 Astaro Overview – Page 17 © Astaro 2007 Email Security Network Security Web Security Email Security Virus Protection Spam Protection Phishing Protection Email Security

18 Astaro Overview – Page 18 © Astaro 2007 Virus Protection for Email Block viruses, worms, trojans, and other “malware” before they reach email servers of desktops Scans SMTP and POP3 traffic Dual virus scanners with multiple detection methods Virus signatures, heuristic analysis Database of more than 300,000 virus signatures Frequent automatic updates Flexible management Can specify file formats and text strings to block Emails and attachments can be dropped, rejected with message to sender, passed with a warning, quarantined Gateway virus protection supplements desktop virus scanning.

19 Astaro Overview – Page 19 © Astaro 2007 Spam Protection Identifies and disposes unsolicited emails (spam) Scans SMTP and POP emails Multiple methods to identify spam Realtime Blackhole Lists, header and text analysis, whitelists, blacklists, URL scanning, greylisting, BATV, SPF record checking… Heuristic methods create a “spam score” based on probability Flexible management Emails and attachments can be dropped, rejected with message to sender, passed with a warning, quarantined User can individually release blocked messages via daily spam report or end user portal

20 Astaro Overview – Page 20 © Astaro 2007 Protection Against “Phishing” “Phishing” – Criminals imitate emails from banks, credit card companies, eBay and other sources to obtain confidential user information Astaro identifies and blocks phishing emails through several techniques: Virus scanner identifies phishing signatures URL filtering database captures phishing servers in the “suspicious” category Content downloaded from web sites will be blocked if it matches patterns of phishing content Internet Email Server Web Server Email Databases of Phishing Sites Scans for phishing signatures

21 Astaro Overview – Page 21 © Astaro 2007 Email Security Network Security Web Security Email Security Email Encryption

22 Astaro Overview – Page 22 © Astaro 2007 Email Encryption En-/Decryption and Digital Signatures for Emails supports OpenPGP and S/MIME Completely transparent No additional Software on Client required Easy Setup Only three configuration steps to start Central Management of all keys and certificates No key or certificate distribution required Allows Content/Virus scanning even for encrypted SMTP emails SMTP Email in clear text Email Server Encrypted Email ‘snmffdsa g Dsfg sdfgdsfgfdg Fdsg fgsdfgsdfgdsf Sfdgsdfdsfgsdf Fg fdsgdsfgsdfg Dfgdfsgfdsgfdsg dslsgdsfg External User Internal User

23 Astaro Overview – Page 23 © Astaro 2007 Network Security Web Security Email Security VPN Gateway Firewall Intrusion Protection Network Security

24 Astaro Overview – Page 24 © Astaro 2007 Firewall Stateful Packet Inspection Packet filtering – inspects packet headers Stateful packet inspection – tracks events across a session to detect violations of normal processes Time-based rules and Policy-based routing Application-Level Deep Packet Filtering Scans packet payloads to enforce protocol- specific rules Security proxies to simplify management HTTP, FTP, POP3, SMTP, DNS, Socks, Ident NAT (Network Address Translation) and masquerading DoS (Denial of Service Attack) protection Transparent mode eases administration

25 Astaro Overview – Page 25 © Astaro 2007 Virtual Private Network (VPN) Gateway Encrypts data to create a secure private communications “tunnel” over the public Internet Supports IPSec, SSL, L2TP, and PPTP VPNs Windows, Linux, Unix and MacOS x clients Advanced encryption Supports all major encryption methods Many authentication methods Internal certificate authority Full Public Key Infrastructure (PKI) support Supports VPN tunnels based on dynamic IP interface addresses (DynDNS)

26 Astaro Overview – Page 26 © Astaro 2007 Intrusion Protection Identifies and blocks application- and protocol- related probes and attacks Database of over 6,000 patterns and rules Probing, port scans, interrogations, host sweeps Attacks on application vulnerabilities Protocol exploitations Intrusion detection and prevention Notify administrator, or block traffic immediately Powerful management interface One click to enable or disable complete rule sets e.g. for email- or webservers

27 Astaro Overview – Page 27 © Astaro 2007 Astaro Security Gateway Appliances Astaro Security Gateway 110/120 Astaro Security Gateway 220 Astaro Security Gateway 320 Astaro Security Gateway 425 Astaro Security Gateway 525/525F Environment Small office/ branch office Small to Medium business Medium business Medium business, enterprise division enterprise division Hardware specs 3 x 10/100 Base-TX ports integrated HD 8 x 10/100 Base-TX ports integrated HD 4 x 10/100 Base-TX ports 4 x Gigabit Base-TX port integrated HD 4 x Gigabit ports – PCI bus 4 x Gigabit ports – PCI Express bus Hardware acceleration card integrated HD Dual Intel Xeon CPU 10 x Gigabit ports – PCI Express bus - 525: 10 x Copper - 525F: 4 x Copper/6 x SFP Hardware acceleration card 2 integrated HD (RAID1) 1) 2 redundant Power supplies ) Performance Firewall VPN IPS 100 Mbps 30 Mbps 55 Mbps 260 Mbps 150 Mbps 110 Mbps 420 Mbps 200 Mbps 180 Mbps 1,200 Mbps 265 Mbps 450 Mbps 3,000 Mbps 400 Mbps 750 Mbps Astaro Security Gateway Software Runs on Intel-compatible PCs and servers 1) hot-swappable

28 Astaro Overview – Page 28 © Astaro 2007 Other Astaro Products Centralized management and real-time monitoring of installations with multiple ASG appliances Astaro Command Center Advanced IPSec VPN client with personal firewall and integrated dialer Astaro Secure Client Centralized security reporting engine that collects, correlates and analyzes security data and provides a huge portfolio of grafical reports Astaro Report Manager

29 Astaro Overview – Page 29 © Astaro 2007 Business Value Enhance Security Block threats with complete perimeter security Integrated management reduces human error and increases speed of response Increase productivity Keep systems, networks and web sites up and running Increase productivity by blocking spam and inappropriate web surfing Simplify management A complete perimeter security solution that is easy to deploy, manage and update, and that scales seamlessly from small offices to large headquarters installations. Network Security Web Security Email Security

30 Discussion and Follow-Up


Download ppt "Simplifying Email, Web & Network Protection. Astaro Overview – Page 2 © Astaro 2007 Topics Astaro Company Profile The Security Struggle Overview of Astaro."

Similar presentations


Ads by Google