Mail-Filters The Global Leader in OEM Anti-Spam Solutions.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Symantec & IMlogic January © 2006 Symantec - CONFIDENTIAL Contents Intro Vision Key Benefits Product Strategy Business Strategy Roadmap.
What is Business-to-Business E-Commerce? Any activity between companies that is supported electronically - - Online purchasing - Online sales -
1 Effective, secure and reliable hosted security and continuity solution.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Barracuda Security Service. Barracuda Networks Introduction to Barracuda Security Service 2 Easy to Deploy Cloud-based security Nothing.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
Lisa Farmer, Cedo Vicente, Eric Ahlm
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
AMD 50x15 Initiative Dan Shine Marketing Director Russian Economic Forum London April 11, 2005.
SHARE IN THE SUCCESS OF A PROVEN LEADER THE NEW HORIZONS FRANCHISE OPPORTUNITY.
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
REV Total SaaS global revenues of $13.1 billion in 2009 Total SaaS estimated revenues of $40.5 billion by % of CRM software in 2011 will.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Security Issues: Phishing, Pharming, and Spam
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1. 2 Presentation outline » IT pain points » The products □ GFI MailEssentials™ □ GFI MailSecurity™ » Testimonials » Kudos » Corporate overview.
CertAnon The feasibility of an anonymous WAN authentication service Red Group CS410 March 1, 2007.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Fortinet An Introduction
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Company factsheet May 2010 Experian is the leading global information services company, providing data and analytical tools. The company helps businesses.
THOMSON REUTERS TAX & ACCOUNTING Rick Kursik December 2, 2011.
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
Module 6 Planning and Deploying Messaging Security.
Mail-Filters Technical Presentation How it works, Why it’s Better.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Cisco Networking Academy Program  Welcome & Syllabus  Cisco System Fact Sheet  Course Structure  Cisco Line of Certification – CCNA Exam Objectives.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Genesys – Business Overview
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
SHARE IN THE SUCCESS OF A PROVEN LEADER THE NEW HORIZONS FRANCHISE OPPORTUNITY.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Accumulus Delivers Enterprise Class Subscription Billing and Automation Solutions for Gaming, Retail, and More on the Scalable Microsoft Azure Platform.
0 Archived presentation - 14 October This presentation may be deemed to include forward- looking statements relating to Reuters within the meaning.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Real-time Intelligence that Matters 1. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business 53% of consumers who experienced.
Nero Creators of liquid media January About Nero Founded in 1995 Corporate Headquarters: Karlsbad, Germany 500 employees worldwide Privately held.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1 Marc Modersitzki.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
WELCOME TO A WORLD OF SHARING. Collaboration as a Service Service-minded vision based on cloud collaboration With a vision rooted in the belief that progress.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Instructor Materials Chapter 7 Network Security
Connect Your Apps and Automate Your Business: OneSaas on Microsoft Azure Empowers SMBs to Save Time and Make Better Business Decisions MICROSOFT AZURE.
Firefish Software for Professional Recruiters Stays Available Around the Clock from Any Device and Anywhere by Using the Microsoft Azure Platform Partner.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Global ATM Market to hit $25bn.
Information Security Session October 24, 2005
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
Vendor of Solutions and Services Integrates Office 365 in Its Management Solution Partner Logo “Our new version of iQ.Suite makes safe and flexible.
Microsoft Üzleti Megoldások Konferencia 2005
Cybersecurity Simplified: Phishing
Web portals-B2B-B2C-B2E TRAVELOPRO
Presentation transcript:

Mail-Filters The Global Leader in OEM Anti-Spam Solutions

Who is Mail-Filters Founded in October 2001 Shipped First Product in March 2002 Based in San Mateo, California Offices in: United Kingdom: London Japan: Tokyo USA: California, Nevada, Oregon, Florida

Who is Mail-Filters Mail-Filters develops, operates and licenses proprietary anti-spam technology The technology seamlessly integrates into a wide range of partner solutions Our partners are OEMs offering security software and hardware to the consumer and enterprise markets

Sample of Customers THE STATE UNIVERSITY of NEW YORK

Where Is The Mail-Filter Technology Used? 10’s of Millions of mail-boxes 10’s of Thousands of enterprise customers Deployed in more than 100 Countries Detects spam in over 30 languages

Phishing: A Growing Problem Phishing attacks increased over 36% in February 2005 over January ,126% increase in phishing attacks from December 2003 to June 20, 2004 Phishing attacks have now hit over 100 million people worldwide Nearly 5% of all recipients have inadvertently responded Estimates are over $1.2 billion in total fraud from Phishing Phishers are getting more sophisticated

Phishing: Not Just a Consumer Problem

Personal Identity Theft (social security number, bank account number, etc.) Corporate Intelligence Theft (sales results, customer info, competitive intelligence, etc) Corporate Identity Theft (bank account number, e- commerce access, etc.) Technology Breach (hosted accounts, CRM accounts, etc.) General breach to online accounts

Phishing: New Techniques Types of information being requested Why the information is being requested Whom they are masquerading as… Messages delivery of worms, trojans, viruses, etc. That assist in the information theft (pharming) Means by which a phishing message is delivered (instant messaging, legitimate looking web-sites, pop-ups, etc.)

Mail-Filters Anti-Phishing SDK www Customer Deployment Bullet Signatures Mail-Filters Data Centers Phisher Spam Attack Phisher Web-Site Phisher List

Pre-Release: Anti-Phishing SDK Benefits: Consumer and enterprise application Blocks both: Inbound messages Outbound traffic Technology learns from all messages received (not just from the lab) Fast and simple integration (time-to-market) Small footprint New revenue opportunity Competitive differentiator

Competitive Advantage with Proprietary Technology Mail-Filters technology has been developed from the ground-up; not with freeware. Mail-Filters technology is based on a proprietary scan engine and a signature database generated by human editors. Mail-Filter partners have a competitive advantage over filters based on freeware. Mail-Filters proprietary technology allows you to: – Private Label – Co-brand – Sell as Mail-Filters