InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe 08.11.06.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Introducing Quick Heal Terminator.
Which server is right for you? Get in Contact with us
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
FIREWALLS Chapter 11.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Firewall Ercan Sancar & Caner Sahin. Index History of Firewall Why Do You Need A Firewall Working Principle Of Firewalls Can a Firewall Really Protect.
1 Trend Micro InterScan Web Security Suite ™ 2.5 戴 燊 Samson Tai 趨勢科技 台灣區技術行銷部 技術顧問.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Wi-Fi Structures.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Barracuda Networks Steve Scheidegger Commercial Account Manager
EDUCAUSE Security 2006 Internet John Brown University.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
Barracuda Load Balancer Server Availability and Scalability.
InterScan Messaging Security Solutions
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Firewall Security.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Enterprise Messaging & Collaboration. e-Interact Modules.
Secure Services Shared Hosted MS Exchange 2010.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
BUILD SECURE PRODUCTS AND SERVICES
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Barracuda Web Security Flex
Top 5 Open Source Firewall Software for Linux User
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Information Security Session October 24, 2005
AbbottLink™ - IP Address Overview
Securing web applications Externally
Presentation transcript:

InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe

Copyright Trend Micro Inc. What is a Mid-Market customer? Limited security expertise –A few generalists -often < 5 Networks can be complex Don’t have time to become experts But still like to feel in control Need to be seen to have taken appropriate security measures More price sensitive than Enterprise IT owns budget and makes purchase decision ?

Copyright Trend Micro Inc. What products do they want? THEY DON’T! They want SOLUTIONS which: Solve recognizable business problems Employ best of breed technology Are simple to buy, deploy and manage Are flexible and scaleable Help IT staff to feel in control

Copyright Trend Micro Inc. Relative positioning of gateway solutions # IT staff & Level of Expertise Degree of flexibility & control desired Managed / hosted services Appliances Software Cost of deployment & administration Cost of purchase TCO is similar for each

Copyright Trend Micro Inc. Internet cloud SCM – Secure Content Management SCM Appliance Firewall Protected LAN Most medium businesses already have a firewall SCM builds upon This investment

Copyright Trend Micro Inc. What appliances do customers need at the gateway? Users Importance of best of breed, flexibility & performance Worry free Easy, All-in-one – UTM? Flexibility, Easy Price performance All-in-one -SCM ScalabilityPerformance Separate Mail & Web

Copyright Trend Micro Inc. What appliances do customers need at the gateway? Users Price sensitive All-in-one -SCM Flexibility, Easy Price performance All-in-one -SCM ScalabilityPerformance Separate Mail & Web IGSA IWSA IMSA Below 100 users customers may prefer UTM Since best of breed becomes less important Seamless SCM portfolio ASA 5500

Customer Pain

Copyright Trend Micro Inc. Customer Pain : Internet Threats Malware –Viruses still #1 IT Security concern1 –Targeted Attacks: Bots - Variants increasing rapidly –15,820 unique phishing reports reported in October 2005 –Web mail bypasses SMTP gateway scanning Spyware –67% of all computers have some form of spyware –Increased burden on IT resources –Reduced system performance and stability –Reduced employee productivity –Compromised customer data

Copyright Trend Micro Inc. Customer Pain : Internet Threats Spam –Spam now 70% of traffic growing to 78% by 2009* –Bandwidth, storage problems –Legal Liability concerns –Employee productivity concerns Mail Content –Government and industry regulations (SOX, HIPAA, …etc) –Loss or leakage of confidential or customer information –Loss or leakage of intellectual property –Legal liability due to inappropriate or offensive material Web Content –Employee Productivity –Ensure Business Efficiency –Legal liability due to inappropriate or offensive material Mail Content Web Content

InterScan Gateway Security Appliance 1.0 The Gateway Solution for MB

Copyright Trend Micro Inc. IGSA Key Features Entry-point protection for SMTP, POP3, HTTP & FTP Transparent scanning Antivirus –True type file recognition –IntelliTrap Anti-spyware Anti-phishing Content filtering Outbreak Prevention Active Update Quarantine Logging Notifications Secure web-based console

Copyright Trend Micro Inc. Internet cloud Malware– the IGSA Solution X X X X Block Malware at the internet gateway Keep desktops & Servers free of malware InterScan Gateway Security Appliance

Copyright Trend Micro Inc. Malware & Spyware – the IGSA solution 1. Block Spyware at Internet Gateway SECRET 2. Block Phone Home Attempts X 3. Clean-Up Spyware InterScan Gateway Security Appliance X X X Internet cloud

Copyright Trend Micro Inc. Internet cloud Spam – the IGSA solution Reduced Storage Challenges Heuristic Filters highly effective with reduced load Fewer Productivity Challenges End-User Quarantine Connection Dropped Before Mail is sent X or X DIRECTORY HARVEST ATTACKS X mail server desktops Prevents: Network Reputation Services InterScan Gateway Security Appliance

Copyright Trend Micro Inc. desktops Mail Content – the Solution Confidential Damaging Profanity Hate Inappropriate X X X X Filter Mail leaving or entering your organisation at the internet gateway InterScan Gateway Security Appliance Add Disclaimers – Legal Liability

Copyright Trend Micro Inc. Web Content – the IGSA solution Hate Shopping X XXX X Block at Internet Gateway auctionauction Allow personal access at appropriate times InterScan Gateway Security Appliance

Copyright Trend Micro Inc. Basic Deployment Scenario Deployment notes: All traffic should physically passthrough the IGSA device Can deploy multiple IGSAs for multiple entry points Supports failopen/LAN bypass Can deploy redundant IGSAs with use of L4 switch Internet Access / Edge Router Firewall IGSA LAN Switch, Router, or Hub Users

Copyright Trend Micro Inc. Operation Modes—Transparent Proxy Mode Outgoing Traffic Access / Edge Router / Firewall Incoming Traffic Internet IGSA User Request IP Address: IP Address: IP Address Seen on the Outside: Internet Access / Edge Router / Firewall IGSA SMTP Server IP Address Seen on Inside: IP Address: Source IP Address:

Copyright Trend Micro Inc. Operation Modes— Transparent and Fully Transparent Compared Transparent Proxy Mode (outgoing traffic) Internet Access / Edge Router / Firewall IGSA User Request IP Address: IP Address: IP Address Seen on the Outside: Fully Transparent Mode (outgoing traffic) Internet Access / Edge Router / Firewall IGSA User Request IP Address: IP Address: IP Address Seen on the Outside:

Copyright Trend Micro Inc. IGSA Integration— One Firewall without a DMZ Internet Firewall POP3 Clients FTP Clients Web (HTTP) Clients Corporate LAN SMTP Server IGSA Switch/Hub

Copyright Trend Micro Inc. IGSA Integration— Two Firewalls with a DMZ Internet External Firewall Internal Firewall DMZ POP3 Clients FTP Clients Web (HTTP) Clients SMTP Server Corporate LAN SMTP Relay (optional)

Features and Benefits

Copyright Trend Micro Inc. Why Gateway? All-in-one, Internet Gateway Secure Content Management –Protects at the most effective point in your infrastructure –Scan all potentially infected traffic at the gateway to your infrastructure –Protect un-patched/out-of date PCs /Servers –Filter mail from viruses and spam before it gets to your mail servers –Ensure employee productivity –Limit legal liability/leakage of confidential documents

Copyright Trend Micro Inc. Top 5 IGSA Customer Silver Bullets 1.First in Internet gateway antivirus, six years running 2.Only gateway appliance with automated desktop cleanup of spyware and malware Saves time and removes the need for sneakernet solution 3.All-in-one solution, no hidden add-ons or extra costs 4.Automated threat protection closes the window of vulnerability quickly Improving your security and reducing your stress 24 by 7 5.Simplified purchase, one decision, one price, one device

Copyright Trend Micro Inc. IGSA Global pricing model Pricing and licensing: –IGSA Hardware replacement –IGSA 100 users * –IGSA 200 users * –IGSA 300 users * –IGSA 600 users * –IGSA 800 users * –IGSA 1000 users * * Includes hardware and software license with all functionality enabled so NRS, URL etc. become differentiators rather than optional add- ons. Hardware Warranty is included in 1 st year price.

Q&A and Thank You!