May 19-20 l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.

Slides:



Advertisements
Similar presentations
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Advertisements

1 Network-Level Spam Detection Nick Feamster Georgia Tech.
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
1 Effective, secure and reliable hosted security and continuity solution.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
IMF Mihály Andó IT-IS 6 November Mihály Andó 2 / 11 6 November 2006 What is IMF? ­ Intelligent Message Filter ­ provides server-side message filtering,
Lisa Farmer, Cedo Vicente, Eric Ahlm
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
InterScan Messaging Security Solutions
Phishing and Intrusion Prevention Tod Beardsley, TippingPoint (a division of 3Com), 02/15/06 – IMP-201.
Saturday, September 05, 2015 © Cloudmark Inc. ioMemory: Higher performance in a smaller foot-print 14 th April, 2010.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
Module 6 Planning and Deploying Messaging Security.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Mail-Filters The Global Leader in OEM Anti-Spam Solutions.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
How a major ISP built a new anti-abuse platform Mike O’Reirdan Comcast Distinguished Engineer Internet Systems Engineering Comcast National Engineering.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Sky Advanced Threat Prevention
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Information explosion 1.4X 44X Protect communications.
Server Implementation. NETGATE 2 Netgate2 Spam Firewall and Server deliver the most robust, effective and easy to manage security available.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
On-premises Exchange Online Protection Office 365 Directory Sync Secure mail flow Existing environment.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Anti-Spam Managing Spam with Kerio Connect
BUILD SECURE PRODUCTS AND SERVICES
A Virtual Tour of SophosLabs Building next-generation protection
TMG Client Protection 6NPS – Session 7.
Barracuda Web Security Flex
Barracuda Web Filtering Service
OLMEK Building a confidential and secure communication between a Bank and its customers March 2006.
Vendor of Solutions and Services Integrates Office 365 in Its Management Solution Partner Logo “Our new version of iQ.Suite makes safe and flexible.
Symantec Web Isolation Secure Access to Uncategorized and Risky Sites Protect Your Most Privileged Users Prevent Phishing and Ransomware Attacks John Moore.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Microsoft Üzleti Megoldások Konferencia 2005
Cybersecurity Simplified: Phishing
Presentation transcript:

May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.

Parallels Summit © Cloudmark Inc. | CONFIDENTIAL 2 About Cloudmark Market Leader in Carrier-Grade Messaging Security Anti-Spam, Anti-Phishing, Anti-Virus Solutions Protecting 600 Million Mailboxes in 190+ countries Customers: Leading ISPs and Web Hosting Providers

Cloudmark & Parallels Partnership under development Integrated with Plesk solution

Parallels Summit © Cloudmark Inc. | CONFIDENTIAL 4 The Direction of Spam What do Spammers and Legitimate Sender(s) have in Common? Both send in order to Make $$$

Parallels Summit © Cloudmark Inc. | CONFIDENTIAL 5 The Direction of Spam Spammers challenged by advances in anti-abuse technologies.

Parallels Summit The Direction of Spam Spammers have responded.

Parallels Summit More Sophisticated Attacks Blended Threats Indistinguishable Phishing Attacks

Parallels Summit Higher Margin Spam Pump and Dump Image Spam

Parallels Summit Broader Distribution Bots Dynamic Server Mapping Target Attacker Servers Botnets for Spam Distribution

Parallels Summit Spam as % of Worldwide Volume Greater Volume of Spam 25% 95%

11 Impact on Web Hosting Companies Infrastructure Operations/Administration Customer Satisfaction Parallels Summit 2008

© Cloudmark Inc. | CONFIDENTIAL 12 What We’ve Learned  Specific approaches and attacks can’t be predicted  Flexible architecture is required for rapid integration of new anti-abuse schemes  Analysis must be language and content- type agnostic  Fast distribution of threat intelligence is key Parallels Summit 2008

13 Evolution of Spam 2002 Threats Solutions Whitelist IP Blacklist Content rules Attach Scan Policies More rules Desktop security URL Scan OCR More rules More policies Heuristics Laws Regulations Indictments Fingerprinting and collective network intelligence Mass MailingViruses Malicious HTML Phishing Image Spam Spyware Botnets Stock Scams Blended threats Hacked URLs Mutating attacks 25% Mid % % % spam % 13 Parallels Summit 2008

© Cloudmark Inc. | CONFIDENTIAL 14 How Fingerprinting Works Spam Legit. User Fingerprint Cache Reject AlgorithmsFingerprintsLocal Lookup/ Verdict

© Cloudmark Inc. | CONFIDENTIAL 15 Collective Network Intelligence: Cloudmark Example GLOBAL THREAT NETWORK SERVICE TRUST EVALUATION SYSTEM CLOUDMARK RESEARCH ADVANCED MESSAGE FINGERPRINTING TM ALGORITHMS Threats 15 Parallels Summit 2008

© Cloudmark Inc. | CONFIDENTIAL Fingerprinting Advantages Identifies mutations in real time Language, content agnostic Significantly less CPU intensive Higher Accuracy and Performance Updates every minute 16 Parallels Summit 2008

© Cloudmark Inc. | CONFIDENTIAL 17 Impact of Better Messaging Security Performance Filtering Accuracy Filtering servers Rack space Storage Support Churn Improved Management Admin 17 Parallels Summit 2008

© Cloudmark Inc. | CONFIDENTIAL 18 Web Hosting Typical Results SpamAssassin deployed Filtering accuracy at 75-80% Administering rules and lists became unmanageable Storage and mail servers getting overwhelmed Filtering 0.5 messages/sec Customer complaints about spam (approx. $6 customer complaint per spam message) Challenges Plug-in with fingerprinting Accuracy jumped to 98% (23% improvement) man-hours week saved in administration 700GB storage saved (2 yrs) Filtering 10 messages/sec 80-90% reduction in filtering servers (from 10 → 2) Near zero customer complaints related to spam Results 18 Parallels Summit 2008

© Cloudmark Inc. | CONFIDENTIAL 19 Economic Impact of Better Messaging Security Performance Filtering Accuracy Filtering servers Rack space Storage Support Churn +20% $6K - $30K $80K - $900K $20K- $100K $6K - $54K $30K - $150K Improved Management First Year Savings Admin $42K - $52K $180K -$1.3M 10X Faster 19 Parallels Summit 2008

20 Thank you