TrustPort Net Gateway Web traffic protection. WWW.TRUSTPORT.COM Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Solutions for businesses. Keep It Secure Contents Protection objectives Network secured Supplementary products Unique.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
By Hiranmayi Pai Neeraj Jain
7 Effective Habits when using the Internet Philip O’Kane 1.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
LittleOrange Internet Security an Endpoint Security Appliance.
Free Software Alternatives: Avast! Anti-virus
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet safety By Lydia Snowden.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Safe Internet Use Mark Wheatley CSI Onsite
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Module 6 Planning and Deploying Messaging Security.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Small Business Security Keith Slagle April 24, 2007.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
What is Spam? d min.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
W elcome to our Presentation. Presentation Topic Virus.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Kaspersky Small Office Security INTRODUCING New for 2014!
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Computer Security Keeping you and your computer safe in the digital world.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Chapter 40 Internet Security.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Managing Windows Security
TMG Client Protection 6NPS – Session 7.
Computer Virus and Antivirus
Threat Monitoring Center
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Call AVG Antivirus Support | Fix Your PC
Home Internet Vulnerabilities
Presentation transcript:

TrustPort Net Gateway Web traffic protection

Keep It Secure Contents Latest security threats spam and malware Advantages of entry point protection safety and efficiency Web security gateway in action

Keep It Secure State of current threats Spam –Percentage of spam increased to 87,7 % from 81,2 % year over year –Contribution of botnets to spam decreased to 83,4 % from 90 % –Sleeping botnets backing up active botnets –Spam including masked links –Non-English spam increased to 5 % of all spam Malware –Percentage of s with malware attached decreased to 0,35 % from 0,70 % –Increase in targeted attacks aimed at government, banks, media –Taking advantage of social networks vulnerabilities –Increase in fake security software –Shift from manual to automatic installation of web malware –Using a changeable sequence of redirects Statistics: MessageLabs Intelligence, December 2009

Keep It Secure Typical web attack Legitimate website Fraudulent website Hacker User Malicious code Web request Redirect Malicious code Malware installation Botnet

Keep It Secure Possible defensive methods against web attacks Legitimate website Fraudulent website Hacker User

Keep It Secure Entry point web protection User Web application Infected website Fraudulent website Remote user Hacker Security gateway

Keep It Secure Clear separation of internet and intranet Checks all data only once Does not allow malware and spam to endpoints Enables unified security management Provides data for traffic analysis Enables remote administration of the solution Advantages of security gateway

Keep It Secure Integration of the gateway into the network TrustPort Net Gateway

Keep It Secure Principal functions of web security gateway Antivirus control Access management Web filtering Traffic analysis

Keep It Secure Processing a web query User privileges verification –Comparison with the local list of authorized users –Authentication using AD, LDAP Verification of server and domain –Trusted servers – content may be downloaded without prior control –Allowed servers – only these servers can be accessed –Trusted sites – domains are neither controled nor blocked –Blocked sites – domains cannot be accessed Antiphishing – comparing with a database of phishing sites Web filtering – comparing with a database of categorized servers

Keep It Secure Checking the downloaded content Establishing file format – three modes –Based on extension –Based on declared content type –By analysis of data sample List of banned formats – file download will be blocked List of trusted formáts – downloaded file will not be scanned Web filtering –Heuristic analysis of the downloaded page –Classification of page into relevant categories Antivirus scanning – several scanning engines

Keep It Secure Which engines to use – balancing server load and network security How many threads to use – according to the capacity of server Heuristic analysis activation available Archive scanning activation available Antivirus control Setting up scanning engines

Keep It Secure The condition for successful scanning is downloading the whole file. Gateway will download the file, scan it and send it to client. Gateway uses two methods to maintain an open connection to the client: Data trickling –Gateway sends periodically bits of the downloaded and scanned file to the client Indication page –Gateway displays periodically updated status page –This page will offer saving file or announce infection Antivirus control Methods of downloading

Keep It Secure Web filtering Categorization of websites Web filtering is based on regularly updated database of web addresses, classified into defined categories. It is also possible to analyze and categorize unknown websites while downloading. Category examples Chat Dating Porn Gambling Violence Ilegal software

Keep It Secure Web filtering Meaning of web filtering In the interest of the employer: Efficiency of work Optimum connectivity usage Protecting company reputation Security of company network Observed in business practice: Private web browsing Private downloading Illegal software downloading Dangerous web browsing TrustPort Net Gateway TrustPort WebFilter

Keep It Secure Web filtering Setting up web filtering Choosing monitored categories –According to company needs Web filtering mode –Allowing all websites –Monitoring selected categories –Blocking selected categories –Blocking all websites (with explicitly defined exceptions) Using heuristic analysis –With no websites –With unknown websites –With all websites

Keep It Secure Traffic analysis Generování statistik Administrátor vyplní dotaz: Jaké období chce analyzovat Které kategorie chce analyzovat Jakou formu výstupu požaduje –Textový výpis odpovídajících záznamů –Graf provozu podle zadaných kritérií

Keep It Secure Product certifications Virus Bulletin Reactive and proactive test, average values (April

Keep It Secure Product Virus Bulletin (April 2011) TrustPort Antivirus Avast Free Antivirus AVG Internet Security Eset NOD32 Antivirus Kaspersky Anti-Virus McAfee VirusScan Microsoft ForefrontEndpoint Protection RAP test, overall detection98.02%95.27%92.55%93.33%93.30%84.71%91.94% RAP test, reactive detection99.63%97.02%95.27%94.49%94.63%85.05%93.52% RAP test, proactive detection93.18%90.02%84.38%89.86%89.32%83.69%87.18%

Keep It Secure Product certifications Average on-demand detection of malware Missed samples (the lower the AV-Comparatives (April 2011)

Keep It Secure Product AV-Comparatives TrustPort Antivirus Avast Free Antivirus AVG Anti-Virus Eset NOD32 Antivirus Kaspersky Anti-Virus McAfee Antivirus Plus Microsoft SecurityEssentials Norton AntiVirus Overall on-demand detection (April 2011) 99.2%98.4%91.4%97.5%97.0%96.8%95.8%95.5% Detection of potentially unwanted apps (December 2010) 99.5%96.9%-97.7%97.6%98.7%92.7%99.6%

Thank you for your attention!