Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.

Slides:



Advertisements
Similar presentations
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Visibility. Then Control. Keep good employees from doing bad things on the Internet.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Web Content Filter: technology for social safe browsing Ilya Tikhomirov Institute for Systems Analysis of the Russian Academy of Sciences
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Julian Martin Director of Channel Development, UK and Ireland.
Norman SecureSurf Protect your users when surfing the Internet.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Module 6 Planning and Deploying Messaging Security.
Norman Protection Powerful and flexible Protection Gateway.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Security fundamentals Topic 9 Securing internet messaging.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Security fundamentals
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Information Technology Acceptable Use An Overview
Trend Micro Consumer 2010 Easy. Fast. Smart.
TMG Client Protection 6NPS – Session 7.
Proventia Network Intrusion Prevention System
Top 5 Open Source Firewall Software for Linux User
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Basic Policy Overview Palo Alto.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
GetWired Internet Manager
Avira Antivirus Support via a Dedicated Helpline Number The antivirus software of Avira is recommended as a reliable as well as a proficient software security.
Virus Attack Final Presentation
Information Security Session October 24, 2005
Firewalls Jiang Long Spring 2002.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Firewall Installation
Employee Monitoring Solution
Microsoft Üzleti Megoldások Konferencia 2005
Hosted Security.
Presentation transcript:

Telnet Media

Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda

Who is Tel.net Media Ex Sun Microsystems engineers Australian Software Company Established 1998 Enterprise Class Secure Content Management Over 500,000 users

You’re just browsing pages? You’re not downloading anything are you? You’re not sending anything out? You’re not putting company confidential information at risk? It’s safe isn’t it? Surfing the Web

Secure Content Management Web Content Filtering Internet Sheriff Filtering Sheriff Anti-Spam Anti-Spam Sheriff Anti-Virus Sophos Anti-Virus

Compelling Reasons to Buy Internet traffic is the second largest consumer of the overall corporate network Up to 40% of Internet surfing during business hours is not business related Employees spend on average 3.6 hours a week, using the Internet for personal reasons

Compelling Reasons to Buy 16 times more Spam than 2 years ago16 times more Spam than 2 years ago (Source) Gartner group 60 Billion messages by 2006, Approx. 40% Spam60 Billion messages by 2006, Approx. 40% Spam (Source) IDC 80% of viruses enter via gateway (Source) IDC

Increase employee PRODUCTIVITY Manage bandwidth Reduce legal LIABILITY Manage corporate Internet Access Policy Prevent breaches in network SECURITY Meet budgets Compelling Reasons to Buy

Why is SCM important? Business Integrity Issues Damage to reputation Reduced productivity Loss of confidential data Pornographic material Theft of data Legal liability Network Integrity Issues Data corruption Virus infection Malicious code ActiveX Executables Degradation in service Mp3’s, movies, etc.

Employee Internet Management Real-time Dynamic Modelling Monitors & reports Customer relevant database Fast & efficient Manages network bandwidth Reduce costs Increases employee productivity Limits non-productive Internet use

content filtering (Real-time) Monitors & reports Manages network bandwidth Stop large attachments Scans and intercepts All s from & to employees Web-based administration Scanning

Anti-Spam Context sensitive phrase recognition(multi-lingual) Information hiding URL Classification Formatting & heuristics Real-time black-hole lists (but not in the traditional way) Techniques to detect Spam :

Anti-Spam Block Spam efficiently – 90% Absolute minimum false positives – less than 0.5% Flexible ‘rule set’ for response to spam (Quarantine, Tag & Allow, Discard, Bounce) Acts in real time messages analyzed per second Flexible interception options:

Anti-Spam & Anti-spoofing capabilities Stops Spammers pretending to be an authorised user Custom allow and deny lists Denied by Domain, address, or IP Anti-relaying capability Prevents Spammers using your server to distribute their messages

Anti-Virus - Sophos Complete anti-virus solution for corporates, education, government. Easily updated, flexible solution. Small local area networks to large multi- server, multi-platform WANs. 24 hour Virus identify updates

Implementation Stages Understanding Planning Implementation

Understanding Internet Offensive/Inappropriate Sinful Six Non Work RelatedSport, Travel, Jobs Categories/Solution Bandwidth IntensiveEntertainment,Games Objectionable content Malicious Code Guns,Drugs Virus Scanning Spam Groups Anti-Spam AttachmentsFile type blocking

Planning Internet Usage by Category File type Content (MIME) type Department Usage by file type File size Department User Using this information allows us to help create an accurate Internet Access Policy (IAP) clearly defining what is acceptable & allowing us to address inefficient & inappropriate usage

Implementation Internet Manage by Category File type Content (MIME) type Department Manage by file type File size Department User This is a continually evolving process, to fine tune the processes that have been implemented to provide both the staff & the organisation with the best possible outcome

Competitive Advantages Dynamic content recognition system providing real-time updates – on the fly Customer relevant database - lightweight Installed into existing networks Allows clients to develop own filtering policies and accessibility timeframes All in one solution ABA approved Scalable

Platforms Sun Solaris 7 or higher (Sparc) Sun Solaris 8 or higher on x86 Linux - Redhat, Mandrake BSD - FreeBSD, OpenBSD Mac OS X

Customers

Close Question period

Thank You Telnet Media