TrustPort Net Gateway Email traffic protection. WWW.TRUSTPORT.COM Keep It Secure Entry point protection –Clear separation of the risky internet and secured.

Slides:



Advertisements
Similar presentations
Solutions for businesses. Keep It Secure Contents Protection objectives Network secured Supplementary products Unique.
Advertisements

TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Basic Communication on the Internet:
· SoftScan Solna Strandväg Solna Sweden The less you hear from us the better Shhh… The less.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Course 201 – Administration, Content Inspection and SSL VPN Filtering
Barracuda Security Service. Barracuda Networks Introduction to Barracuda Security Service 2 Easy to Deploy Cloud-based security Nothing.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
AVG Internet Security 7.5 Product presentation.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
Petros Lam VP, Sales & Marketing The Hong Kong School Net Ltd.
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
LittleOrange Internet Security an Endpoint Security Appliance.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
IP Blacklisting Causes & Solution Marcus Low, R&D Director InternetNow International Sdn Bhd.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Update Unix Users Feb 2006 Kevin Hill. Update Spam Cop (We’ve been busted!) Greylisting- Next Generation Spam Fighting.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Copyright© Microsoft Corporation Speaker:Engagement consultant Title of presentation:Assessment of the Environment Length of presentation: 45 minutes Audience:Customer.
Securing Your GroupWise ® System Morris Blackham Software Engineer Novell, Inc. Danita Zanrè Senior Consultant Caledonia.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
ProtectionProfiles. 2 Fortinet Technologies Protection Profiles Protection profiles control t the type of traffic protected t HTTP t FTP t IMAP t POP3.
Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Module 6 Planning and Deploying Messaging Security.
Norman Protection Powerful and flexible Protection Gateway.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Security fundamentals Topic 9 Securing internet messaging.
Implementing Microsoft Exchange Online with Microsoft Office 365
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
PHP Scripts Mall provided Advanced SMTP Server, it is very fast and deliver s multiple recipients. Using Our SMTP Server you can send 1,00,000.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Anti-Spam Managing Spam with Kerio Connect
Internet Business Associate v2.0
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Pavel Dobrý Engineering Director
Slides Credit: Sogand Sadrhaghighi
Presentation transcript:

TrustPort Net Gateway traffic protection

Keep It Secure Entry point protection –Clear separation of the risky internet and secured intranet –Malware and spam blocked before reaching endpoints –No need to remove threats individually on every computer Unified security concept –Compact user interface –Remote control of the solution possible –Easy analysis of traffic and incidents Advantages of centralised protection

Keep It Secure Handling traffic TrustPort Net GatewayMail server Firewall TrustPort Net GatewayMail server Firewall

Keep It Secure Principal components of incoming protection Receiving SMTP server Backup of messages Antivirus and antispam kernel Sending SMTP server

Keep It Secure Antispam shield Blacklists and whitelists DNS records Greylisting Autowhitelist Receiving SMTP server

Keep It Secure Receiving SMTP server Antispam shield TrustPort Net Gateway

Keep It Secure Basic whitelist and blacklist LDAP AD Text

Keep It Secure Blacklists and whitelists Blacklist of banned servers Blacklist of banned senders Whitelist of trusted recipients Whitelist of trusted senders Whitelist of trusted servers Exceptions

Keep It Secure To: From: Greylisting TrustPort Net Gateway IP:

Keep It Secure Criteria for the rules –direction –sender –recipient –IP address range Action to follow –forward –backup –delete Backup of messages

Keep It Secure Scanning by multiple antivirus engines Filtering out unwanted attachments Checking DKIM, SPF Checking DNS blacklists Forbidden words User regulars Database of regular rules Checking for image spam Bayes analysis Point evaluation Antivirus and antispam kernel Fully adjustable by the user Partially adjustable by the user

Keep It Secure User filters Forbidden words credit free offer viagra Regular rules Part: headers Field: from Part: body Regular: (free|share)ware Antivirus and antispam kernel

Keep It Secure Using DKIM Generating hash of the message Decrypting the electronic signature

Keep It Secure Using SPF HELO: MAIL From: IP:

Keep It Secure Bayes analysis Regular rules Spam dictionary Ham dictionary Bayes analysis spam ham User rules Updates

Keep It Secure Sending electronic mail to one target mail server –Fixed IP address Sending electronic mail to several target servers –Delivery table –MX records –Delivery table combined with MX records Sending SMTP server

Keep It Secure Components of outgoing protection Sending SMTP server Antivirus kernel Receiving SMTP server

Keep It Secure Components of outgoing protection Receiving SMTP server Antivirus kernel Sending SMTP server sender control based on computer address sender control based on address whitelist of trusted senders scanning using selected engines filtering out unwanted attachments adding to autowhitelist truncating dangerous headers sending out

Keep It Secure Sending SMTP server Autowhitelist From: company.com To: gmail.com From: gmail.com To: company.com

Keep It Secure Product certifications Virus Bulletin Reactive and proactive test, average values (April

Keep It Secure Product Virus Bulletin (April 2011) TrustPort Antivirus Avast Free Antivirus AVG Internet Security Eset NOD32 Antivirus Kaspersky Anti-Virus McAfee VirusScan Microsoft ForefrontEndpoint Protection RAP test, overall detection98.02%95.27%92.55%93.33%93.30%84.71%91.94% RAP test, reactive detection99.63%97.02%95.27%94.49%94.63%85.05%93.52% RAP test, proactive detection93.18%90.02%84.38%89.86%89.32%83.69%87.18%

Keep It Secure Product certifications Average on-demand detection of malware Missed samples (the lower the AV-Comparatives (April 2011)

Keep It Secure Product AV-Comparatives TrustPort Antivirus Avast Free Antivirus AVG Anti-Virus Eset NOD32 Antivirus Kaspersky Anti-Virus McAfee Antivirus Plus Microsoft SecurityEssentials Norton AntiVirus Overall on-demand detection (April 2011) 99.2%98.4%91.4%97.5%97.0%96.8%95.8%95.5% Detection of potentially unwanted apps (December 2010) 99.5%96.9%-97.7%97.6%98.7%92.7%99.6%

Thank you for your attention!