Sushant Rao, Senior Product Manager www.mailfrontier.com Emerging Threats: Stop Spam, Virus, and Phishing Outbreaks through End-to-End Attack Monitoring.

Slides:



Advertisements
Similar presentations
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
Advertisements

Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
Used by many 100,000s of customers Used by many 10,000,000s of users Processing Billions of s a day Using Thousands of servers Across dozens of.
On-premises Exchange Online Protection Office 365 Directory Sync ADFS (optional) Single sign on Secure mail flow Existing environment.
Security and Organizational Governance Anand Lakshminarayanan Senior Product Manager Microsoft Corporation.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
Lisa Farmer, Cedo Vicente, Eric Ahlm
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
Phishing Definition: a criminal mechanism employing both social engineering and technical subterfuge to steal consumers’ personal identity data and financial.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
LittleOrange Internet Security an Endpoint Security Appliance.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Security challenges Used by many 100,000s of customers Used by many 10,000,000s of users Processing Billions of s a day Using Thousands of.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
1. 2 Presentation outline » One antivirus engine is not enough » IT pain points » The product » Testimonials » Kudos » Conclusion.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Overview Presentation Robert Gorbahn Emerging Server Sales Manager München – Frankfurt/Berlin/Munich - May 2006.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
InterScan Messaging Security Solutions
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
1. 2 Presentation outline » IT pain points » The products □ GFI MailEssentials™ □ GFI MailSecurity™ » Testimonials » Kudos » Corporate overview.
2011 / 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for.
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
BUSINESS B1 Information Security.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Module 6 Planning and Deploying Messaging Security.
Norman Protection Powerful and flexible Protection Gateway.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Content Control Stewart Duncan Technical Manager.
Mail-Filters The Global Leader in OEM Anti-Spam Solutions.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Information explosion 1.4X 44X Protect communications.
On-premises Exchange Online Protection Office 365 Directory Sync Secure mail flow Existing environment.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Page Service Brief Security Service is an essential business tool for organisations of all sizes – yet it is.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Exchange Online Advanced Threat Protection
TMG Client Protection 6NPS – Session 7.
Exchange Online Advanced Threat Protection
Real World Advanced Threat Protection
Introduction to Symantec Security Service
Cybersecurity Simplified: Phishing
Presentation transcript:

Sushant Rao, Senior Product Manager Emerging Threats: Stop Spam, Virus, and Phishing Outbreaks through End-to-End Attack Monitoring

2 Threats Are More Complex & Dangerous

3 Typical Attacks Are Worldwide Events

4 Attack Lifecycle

5 Typical Approaches in Security Sender Reputation Message Content Attachment

Real Spam Attack

7 Messages Scored: What’s the Right Number? Re: Loan info - 15 years 6.0% You are pre-approved Spam that hit user’s inbox Legitimate caught by filter

8 Reputation Services  Sender ID Framework Validates sender’s claimed identity  Reputation Service Evaluates sender’s reputation

9 Content Evaluation (Bayesian)

10 Community Response

11  Content Analysis  80% effectiveness  0.5% false positive rate There’s No One Way  Sender ’ s Identification & Reputation 70% effectiveness 1.0% false positive rate  Community Response 75% effectiveness 0.25% false positive rate

12 Chained: High Effectiveness, High False Positive 70% effectiveness 1.0% false positive rate 75% effectiveness 0.25% false positive rate 80% effectiveness 0.5% false positive rate Overall 70% Effectiveness 1.0% False Positive Rate

13 Chained: High Effectiveness, High False Positive 70% effectiveness 1.0% false positive rate 75% effectiveness 0.25% false positive rate 80% effectiveness 0.5% false positive rate Overall 94% Effectiveness 1.5% False Positive Rate

14 Chained: High Effectiveness, High False Positive 70% effectiveness 1.0% false positive rate 75% effectiveness 0.25% false positive rate 80% effectiveness 0.5% false positive rate Overall 98% Effectiveness 1.75% False Positive Rate (1 in 50)

15 Messages Judged: Good, Spam, or Likely Spam Overall 98% Effectiveness 0.0% False Positive Rate for Definite

Real Virus Attack

17

18

19 Virus Attack Timeline Time

20 Decisive Anti-Virus Technology

21 Responsive Anti-Virus Technology

22 Predictive Anti-Virus Technology

23 Multiple Technologies Detect & Protect Conventional Signature ProtectionSimulation Behavior Monitoring & Pattern Heuristics MailFrontier Time Zero Virus Technology

24 Time Zero Virus Technologies Deceptive File Type Detection invoice.txt really invoice.exe Statistical Attachment Analysis picture.jpg.exe

25 Time Zero Virus Technologies Deceptive File Type DetectionStatistical Attachment Analysis MIME Exploit Protection Dangerous Attachment Blocking.exe.bat.pif picture.jpg.exe resume.bat File name is picture.jpg File type is.exe

26 Statistical Attachment Analysis TXT.JPG.DOC.EXE Gateway Server invoice.txt ?? ORIs it invoice.txt?Is it invoice.exe?

27 Statistical Attachment Analysis Gateway Server invoice.txt == invoice.exe OR.TXT.JPG.DOC.EXE

Real Phishing Attack

29 Consumer Phish

30 Phishing for Enterprise Information

31 Phishing is Not Spam

32 A Phishing Attack Sending Machines Phish Web Sites Receivers Mary Tomas Andy Tonia George John Frank Tim Herman Luann Ramona Evan Jan Scott Venkat Charlie Phil Elisa Dom Joe Lana June Chao Vadim Oliver

33 Phishing Protection

Other Enterprise Threats

35 Zombies – Compromised Internal Nodes Mail Server Enterprise Network Internet X Only legitimate s are sent s from Zombies are identified and quarantined

36 Directory Harvest Attacks Enterprise Network

37 Outbound Compliance – Regulatory & Corporate CONFIDENTIAL Mail Server Enterprise Network Virus Policy Violation CONFIDENTIAL Disguised Text C*NFIDENTIAL Only legitimate s are sent

MailFrontier Gateway

39 MailFrontier Cognite: End-To-End Attack Monitoring

40 MailFrontier – Security Against All Threats

41 MailFrontier – All Threats, 1 Product Typical Mail Data Center Mail Data Center Consolidated with MailFrontier Gateway e.g. Microsoft Exchange

42 MailFrontier: Effortless Control Powerful Reporting Provides Quick Insight

43 MailFrontier:High Performance

Enterprise Customers 98% Retention HealthcareTransportation Nonprofit Retail Education Real Estate Hospitality Financial Services Software Media/Publishing Pharmaceutical TelecommunicationsManufacturing Technology Government Consumer Goods Financial Services Retail Media/Publishing Consumer Goods

45 Extraordinary Awards & Reviews NetworkWorld Top-Rated Enterprise Anti-Spam Software “…MailFrontier’s ASG put up some impressive results in terms of blocking spam and letting legitimate mail pass.” – September 15, 2003 Recommends MailFrontier be included on “Short List” of products evaluated for large-scale, high-performance anti-spam systems – December 20, 2004 Red Herring Top 100 Private Companies/Innovators Recognizing the company for its innovation and strategy – May 2004 and December 2004 CRN Recommended “MailFrontier's hands-off approach can help ease the administration burden on IT departments.” – June 7, 2004 InfoWorld Rated Excellent “MailFrontier had the easiest installation…provides lots of control to the admin…[and] provides excellent accuracy.” – September 27, 2004 IT WEEK Editor’s Choice – 5 out of 5 Stars “MailFrontier Gateway Appliance m500 setup was easy…and took less than an hour..lt really blocks all unwanted .” – June 6, 2005

46 MailFrontier - The Leader in Security Best Protection Effortless Control High Performance Appliances Software

47 Powerful Protection without Complexity “MailFrontier offered me a solution that delivered on every front.” -- Kristi Reese Exchange Administrator