CELFRAME ® CELFRAME.KAV. www.Celframe.com Agenda  Security Appliance  Email Security  Web Security  Network Security  Intranet Security.

Slides:



Advertisements
Similar presentations
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Advertisements

Defining Network Infrastructure and Security
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.
Course 201 – Administration, Content Inspection and SSL VPN
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
EDUCAUSE Security 2006 Internet John Brown University.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
ProtectionProfiles. 2 Fortinet Technologies Protection Profiles Protection profiles control t the type of traffic protected t HTTP t FTP t IMAP t POP3.
CELFRAME ® CELFRAME.GT Unified Communications over IP.
CELFRAME ®. CELFRAME ® Agenda  CELFRAME  CELFRAME.IC (OS suited for Intranet and Communications Servers)‏  CELFRAME.GT (Communications.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
FTP Web SQL Web failover SQL backup backup Active Directory Active Directory Failover Cluster.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
Lanxin Ma Institute of High Energy physics (IHEP) Chinese Academy of Sciences September 30, 2004 CHEP 2004, Interlaken The Security Protection System at.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Endian Firewall Community Edition Roy Hickman Technology Director Peck Community Schools #
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Alan Schmarr Consultant BUI Session Code: 303 Agenda Forefront Overview TMG Value Proposition The deep dip Deployment and Management Web client protection.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Module 11: Designing Security for Network Perimeters.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Security fundamentals Topic 10 Securing the network perimeter.
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Federal Acquisition Service 1 Networx – Enterprise Services: Awarded May 31, 2007 Telecommunications Services Communications Transport – Voice – Circuit.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
CELFRAME ® CELFRAME.BS. Agenda  Celframe Business Server  Celframe.I  Document Management  CRM  Gestix.
Introduction to Networking
Astaro Security Gateway V7.5 Screenshots. Astaro Overview – Page 2 © Astaro 2009 Dashboard.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Defining Network Infrastructure and Network Security Lesson 8.
CompTIA Security+ Study Guide (SY0-401)
3.1 Types of Servers.
3.1 Types of Servers.
Capabilities Matrix Access and Authentication
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Working at a Small-to-Medium Business or ISP – Chapter 7
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 7
ISMS Information Security Management System
Working at a Small-to-Medium Business or ISP – Chapter 7
Presentation transcript:

CELFRAME ® CELFRAME.KAV

Agenda  Security Appliance  Security  Web Security  Network Security  Intranet Security

CELFRAME.KAV Security Appliance  This Solution integrates with CELFRAME.ICCELFRAME.IC Kaspersky Antivirus and AntiSpamKaspersky Antivirus and AntiSpam Professional HardwareProfessional Hardware

CELFRAME.KAV Security Appliance  The basis of CELFRAME.KAV Appliance  To bring together in a single solution: Content ProtectionContent Protection  Antivirus  Web Antivirus  AntiSpam Communications ServerCommunications Server Firewall & VPN ServerFirewall & VPN Server FunctionalityFunctionality

CELFRAME.KAV Security Appliance  Communications Server Prevents direct communication between workstations and InternetPrevents direct communication between workstations and Internet Allows SNAT disablingAllows SNAT disabling Proxy Mode for all critical servicesProxy Mode for all critical services  SMTP  HTTP/HTTPS  FTP  Instant Messaging

CELFRAME.KAV Security  Relay running Kaspersky Antivirus  Kaspersky AntiSpam with image analysis  Protection against Denial of Service by Mail Bombing  Servers Validation Correct MX record registration on the DNSCorrect MX record registration on the DNS Reverse resolution that suites servers namesReverse resolution that suites servers names

CELFRAME.KAV Web Security  Proxy HTTP with Kaspersky Antivirus  Access Control Black ListsBlack Lists White ListsWhite Lists  Access statistics: UserUser WorkstationWorkstation

CELFRAME.KAV Network Security  Communications Server  Firewall  VPN Server (Road Warriors)‏ SSLSSL PPTPPPTP  VPN Server (LAN to LAN)‏ IPSecIPSec  IDS (Intrusion Detection)‏

CELFRAME.KAV Intranet Security  Security Auditor for Windows Workstations  Infected Machines Detection Network ScanningNetwork Scanning

CELFRAME.KAV Demo

CELFRAME.KAV Questions www. CELFRAME.com