TrustPort Net Gateway Web traffic protection. WWW.TRUSTPORT.COM Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.

Slides:



Advertisements
Similar presentations
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
Advertisements

TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
By Hiranmayi Pai Neeraj Jain
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Trojan Horse Program Presented by : Lori Agrawal.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
Cyber X-Force-SMS alert system for threats.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
LittleOrange Internet Security an Endpoint Security Appliance.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet safety By Lydia Snowden.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Module 6 Planning and Deploying Messaging Security.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Because you need to protect your computers!!! By: Ashley Hubbard.
Small Business Security Keith Slagle April 24, 2007.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
What is Spam? d min.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Computer Security Keeping you and your computer safe in the digital world.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Chapter 40 Internet Security.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Managing Windows Security
TMG Client Protection 6NPS – Session 7.
Chapter 7: Identifying Advanced Attacks
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Call AVG Antivirus Support | Fix Your PC
Information Security Awareness
The Internet: Encryption & Public Keys
Presentation transcript:

TrustPort Net Gateway Web traffic protection

Keep It Secure Contents Latest security threats spam and malware Advantages of entry point protection safety and efficiency Web security gateway in action

Keep It Secure State of current threats Spam –Percentage of spam increased to 87,7 % from 81,2 % year over year –Contribution of botnets to spam decreased to 83,4 % from 90 % –Sleeping botnets backing up active botnets –Spam including masked links –Non-English spam increased to 5 % of all spam Malware –Percentage of s with malware attached decreased to 0,35 % from 0,70 % –Increase in targeted attacks aimed at government, banks, media –Taking advantage of social networks vulnerabilities –Increase in fake security software –Shift from manual to automatic installation of web malware –Using a changeable sequence of redirects Statistics: MessageLabs Intelligence, December 2009

Keep It Secure Typical web attack Legitimate website Fraudulent website Hacker User Malicious code Web request Redirect Malicious code Malware installation Botnet

Keep It Secure Possible defensive methods against web attacks Legitimate website Fraudulent website Hacker User

Keep It Secure Entry point web protection User Web application Infected website Fraudulent website Remote user Hacker Security gateway

Keep It Secure Clear separation of internet and intranet Checks all data only once Does not allow malware and spam to endpoints Enables unified security management Provides data for traffic analysis Enables remote administration of the solution Advantages of security gateway

Keep It Secure Integration of the gateway into the network TrustPort Net Gateway

Keep It Secure Principal functions of web security gateway Antivirus control Access management Web filtering Traffic analysis

Keep It Secure Processing a web query User privileges verification –Comparison with the local list of authorized users –Authentication using AD, LDAP Verification of server and domain –Trusted servers – content may be downloaded without prior control –Allowed servers – only these servers can be accessed –Trusted sites – domains are neither controled nor blocked –Blocked sites – domains cannot be accessed Antiphishing – comparing with a database of phishing sites Web filtering – comparing with a database of categorized servers

Keep It Secure Checking the downloaded content Establishing file format – three modes –Based on extension –Based on declared content type –By analysis of data sample List of banned formats – file download will be blocked List of trusted formáts – downloaded file will not be scanned Web filtering –Heuristic analysis of the downloaded page –Classification of page into relevant categories Antivirus scanning – several scanning engines

Keep It Secure Which engines to use – balancing server load and network security How many threads to use – according to the capacity of server Heuristic analysis activation available Archive scanning activation available Antivirus control Setting up scanning engines

Keep It Secure The condition for successful scanning is downloading the whole file. Gateway will download the file, scan it and send it to client. Gateway uses two methods to maintain an open connection to the client: Data trickling –Gateway sends periodically bits of the downloaded and scanned file to the client Indication page –Gateway displays periodically updated status page –This page will offer saving file or announce infection Antivirus control Methods of downloading

Keep It Secure Web filtering Categorization of websites Web filtering is based on regularly updated database of web addresses, classified into defined categories. It is also possible to analyze and categorize unknown websites while downloading. Category examples Chat Dating Porn Gambling Violence Ilegal software

Keep It Secure Web filtering Meaning of web filtering In the interest of the employer: Efficiency of work Optimum connectivity usage Protecting company reputation Security of company network Observed in business practice: Private web browsing Private downloading Illegal software downloading Dangerous web browsing TrustPort Net Gateway TrustPort WebFilter

Keep It Secure Web filtering Setting up web filtering Choosing monitored categories –According to company needs Web filtering mode –Allowing all websites –Monitoring selected categories –Blocking selected categories –Blocking all websites (with explicitly defined exceptions) Using heuristic analysis –With no websites –With unknown websites –With all websites

Keep It Secure Traffic analysis Generování statistik Administrátor vyplní dotaz: Jaké období chce analyzovat Které kategorie chce analyzovat Jakou formu výstupu požaduje –Textový výpis odpovídajících záznamů –Graf provozu podle zadaných kritérií

Thank you for your attention!