Microsoft Security Microsoft Ireland Michael RIVA, MCSE: Security, MCT Partner Technical Specialist V2.1 – Sep 2007.

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Secure Lync mobile Authentication
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Security Training Lunch ‘n Learn. Agenda  Threat Analysis  Legal Issues  Threat Mitigation  User Security  Mobile Security  Policy Enforcement.
7 Effective Habits when using the Internet Philip O’Kane 1.
Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman Endpoint Protection Advanced security made easy.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
eScan Total Security Suite with Cloud Security
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
2011 / 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
CYBER CRIME.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Implementing Microsoft Exchange Online with Microsoft Office 365
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Cybersecurity Test Review Introduction to Digital Technology.
Computer Security Sample security policy Dr Alexei Vernitski.
Santa Clara, CA (408)
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
TMG Client Protection 6NPS – Session 7.
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Unit 27: Network Operating Systems
Check Point Connectra NGX R60
Presentation transcript:

Microsoft Security Microsoft Ireland Michael RIVA, MCSE: Security, MCT Partner Technical Specialist V2.1 – Sep 2007

Overview Microsoft Forefront Edge Security and Access Why should we be more secure? What is Microsoft Forefront Security Suite ? → Overview Forefront for client → Overview Forefront for server → Forefront for Exchange and SharePoint server 2007 Forefront for Edge → IAG Server (Intelligent Application Gateway Server) Exchange Hosted Services

Why should we be more secure ?

Cybercrime is a real threat. Hackers are interested in gathering information (Credit card details, individual details...) => Fraudulous use of credit cards and or personal individual details for identity theft... Cyber crime affects individuals, customers, insurance companies, companies image and long term existence. Hackers are not kids anymore. Hackers are a lot smarter than you think. They are organised crime organisations, they have an in depth knowledge in programming, Windows, Unix, Linux, Network and they will use any opened door to gain access. Social engineering is an easy way to gather information as many employees will give out information if they find their interlocutor pleasant and nice. We can never win against the threat, this is a perpetual fight. Over 60% of the people who were asked to provide their company login’s password gave it out to a guy who just asked them gently ! (INFOSEC 2007)

Consequences for affected companies : Loss of productivity, loss of data, termination or resignation of employees, increased insurance cost, long-term loss of business, loss of significant business/profit Companies are not securing their data as they should be... 75% of security investment focused here Network Attacks Application Attacks 75% of attacks focused here

54,8744,7183, In the last 6 months of 2006: Mobiles PDAs Laptops Were left in taxis, in London alone… Memory Sticks Source: Pointsec

English Revenue and Customs admits theft of 13,000 civil servants personal information. Tax Credit system had to be shut down to halt the fraud. £15m was stolen. – Dec 05 A printing firm contracted by Marks & Spencers in the UK has had a laptop stolen putting 26,000 employees at risk for identity theft – May Employee of Nationwide Building Society has their laptop stolen from home containing account information for 11m customers. – Aug 06 (Fined £1m for this…) Although the scientist downloaded about 15 times more data than the second most active user, no alarm bells rang until after he submitted his resignation from DuPont, the company behind Kevlar, Teflon, and hundreds of other brands and trademarks. Although the scientist downloaded about 15 times more data than the second most active user, no alarm bells rang until after he submitted his resignation from DuPont, the company behind Kevlar, Teflon, and hundreds of other brands and trademarks. The value of the stolen information is set at 400 million USD – Feb The price of stolen information

FOREFRONT SECURITY SUITE

What is Forefront Security Suite ? Forefront for client Secure Windows clients (Desktops and file servers) against spywares, viruses... Forefront for server Secure Exchange/SharePoint servers against viruses, spam, worms in order to deliver clean s and documents. Forefront for edge Inter network communications protection to insure security of information and application between clients and servers.

Forefront for clients Integrated antivirus and antispyware engine, delivering real-time protection from and scheduled scanning for viruses, spyware, and other threats. Central management system, generating reports and alerts on the security status of their environment. State assessment or scans for determining which managed computers need patches or are configured insecurely.

Forefront for Exchange Anti Spam, Anti Virus and Anti Worm protection for Exchange server. Can run 5 different anti virus engines at the same time reducing the risk because we do not depend on one vendor only. Filter the Spam with rules (Keywords or combination) and automated antivirus signature updates.

Internet A B C D E Exchange Server/ Windows-based SMTP Server Distributed protection Performance tuning Content filtering Central management

Forefront engines VirusBusterSophosNorman Microsoft Anti Malware Kaspersky CA VET CA Inoculate Authentium Command AhnLab All engines are independent from each other. Updates are made available from Microsoft website, 15 mn after they have been sent from the partners.

Forefront for Sharepoint Scan uploaded and downloaded documents before they are saved against worms, malicious code, viruses.

IAG SERVER

IAG Server Intelligent Application Gateway Server SSL-based application access with endpoint security management.

IAG Server Intelligent Application Gateway Server Browser based access. Block malicious traffic and attacks (No network traffic) Drive policy compliance (Limit exposure and liability, better ROI)

IAG Server Intelligent Application Gateway Server Remote machine profiling Determine the health status of the remote machine and dynamically give access accordingly. Cache wiper Clear browser cache, disk cache and overwrite 7 times the clusters where the file was initially downloaded. It is impossible to recover a file after this process. Authentification vendors Works with 60 different vendors such as Radius, RSA SecureID... Network integration SharePoint 2003/2007, OWA, Dynamics, ActiveSync, Terminal-Services, Citrix, SAP, Lotus Domino, WebSphere and many more… Network isolation No network connectivity between the remote user and the remote server/service. The remote client does have an IP address (Unless this is required by IP Phone or any other application/device that requires an IP address)

Overview Intelligent Application Gateway External Firewall Port 443 LDAP Oracle Exchange Server SharePoint Server Partners IBM / Lotus SAP Web Active Directory SSL VPN connectivity and endpoint security verification

Exchange Hosted Services

TraditionalHosted SMTP store Virus (<1%) Spam (70%) Legitimate(30%) SMTP store Virus (<1%) Spam (70%) Legitimate(30%)

Why outsource AV & AntiSpam? Manage cost and complexity Secure, protect and comply Inbox value and access No HW/SW to install and manage Outsource routine IT management Predictable subscription based service Scalable at no additional cost Eliminate threats before they reach the network Policy-compliant infrastructure Service-based archiving for rapid deployment Eliminate spam and viruses from the stream to boost productivity Reliable availability and continuity systems Recover from unplanned outages or disasters

End-user access

Easy recovery

Infrastructure SLAs % network uptime < 2 minute delivery Accuracy SLAs 100% virus detection and blocking 95% spam effectiveness 1:250,000 false positive ratio Service Level Agreement

Any questions ? Please do not hesitate to contact me