© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
1 Effective, secure and reliable hosted security and continuity solution.
IP Warming Overview and Implementation Using Eloqua.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Barracuda Security Service. Barracuda Networks Introduction to Barracuda Security Service 2 Easy to Deploy Cloud-based security Nothing.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
How secure is your ? Secure Primer Presented by 4Secur .com.
Lisa Farmer, Cedo Vicente, Eric Ahlm
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
What’s New in WatchGuard XCS v9.1. Introducing WatchGuard XCS v9.1  Enhancements that improve ease of use Improved web-based installation wizard After.
Sushant Rao, Senior Product Manager Emerging Threats: Stop Spam, Virus, and Phishing Outbreaks through End-to-End Attack Monitoring.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
Fortinet An Introduction
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Vantage Report 3.0 Product Sales Guide
Module 6 Planning and Deploying Messaging Security.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
UC Opportunities For Service Providers. Agenda Software + Services recap Services through SPLA –Exchange Hosted Services –Live Meeting –Dedicated Hosted.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1 Marc Modersitzki.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Unit 3 Section 6.4: Internet Security
Introducing Barracuda Essentials for Office 365
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Trend Micro Consumer 2010 Easy. Fast. Smart.
Top 5 Open Source Firewall Software for Linux User
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Microsoft Üzleti Megoldások Konferencia 2005
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 Agenda  Announcement Overview  Product  How to Order the Spam & Virus Blocker  Customers Pain  How Spam & Virus Blocker stops Spam  Why Blocker  Top Reasons to Sell

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 Cisco is proud to announce the Small Business Launch of Spam and Virus Blocker

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 Cisco’s Spam & Virus Blocker The Cisco Spam & Virus Blocker is a dedicated security appliance for small business with up to 250 users. It provides powerful protection against spam, viruses and other threats to secure your network and business data while improving productivity.

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 Product NameProduct DescriptionList (USD) Point of Sale BLKR-SVB-50U-1YCisco Spam & Virus Blocker - 50 User - 1 year $ 2,599 BLKR-SVB-100U-1YCisco Spam & Virus Blocker User - 1 year $ 2,999 BLKR-SVB-250U-1YCisco Spam & Virus Blocker User - 1 year $ 4,399 BLKR-SVB-50U-3YCisco Spam & Virus Blocker - 50 User - 3 year $ 3,599 BLKR-SVB-100U-3YCisco Spam & Virus Blocker User - 3 year $ 3,999 BLKR-SVB-250U-3YCisco Spam & Virus Blocker User - 3 year $ 5,399 Renewal CON-BLK-BLKR50U SW and Supp Subscr NBD Blocker 50 User (annual) $ 499 CON-BLK-BLKR100U SW and Supp Subscr NBD Blocker 100 User (annual) $ 599 CON-BLK-BLKR250U SW and Supp Subscr NBD Blocker 250 User (annual) $ 899  Bundles include everything (hardware, software, support) to simplify ordering to just one SKU.  Available only through distribution and competitively priced. Benefit Highlight: Simplified Single SKU Ordering

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 Spam Trends Through September 2008 Average Daily Volume – billions Month

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 “Spam, viruses, spyware, and phishing all have one thing in common—they make profitable businesses. And these profits create incentive for innovation on the part of the perpetrators.” Business Challenge – Peter B. Danzig, Ph.D. University of Southern California

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID nd Qtr 2006 Text Spam Image Spam PDF Spam Excel Spam MP3 Spam Evolution of Spam Spammers Testing New Techniques “2007 has seen a proliferation of different attachment types…Spammers are using these different attachments in order to try and get past security gateways that are unable to look into complicated file types” Internet Security Trends Report Published By Cisco and IronPort 3rd Qtr 4th Qtr

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 Cisco Spam Defense – Reputation Filtering Block 80% of Spam >99% Catch Rate < 1 in 1 mil False Positives Cisco Anti-Spam Multi-Layer Spam Defense CASE Score How? Where? Who? What? Senderbase Reputation Filtering Data Modeling Reputation

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Cisco SenderBase Network First, Biggest, Best & Web Traffic Monitoring Network – Data Makes the Difference View into over 30% of traffic 20M+ IP addresses tracked globally Data from ~ 120,000 sources ; 8 of the 10 largest ISPs Millions of human reporters & spamtraps

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11 Easy Installation and Use  Installs into network in minutes (ah: Quick and Easy Installation)  Provides immediate protection out of the box (ah: once installed in the network)  Automatic threat updates with no intervention required (ah: Automatic threat updates directly to the appliance)  Simple browser-based wizards support management and reporting  Reduce operational costs of administration

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 12 Peace of Mind It just works. Set it and forget it.

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 13 Host Base and UTM’s Versus Blocker Unified Threat Management (UTM) Pro: Inexpensive, one box to manage Con: Lack of granular per user control, lacks filtering features and some lack quarantine feature Key Question to ask Customers: How often do you receive spam? If it’s a major problem customer should think about buying a dedicated solution leveraging Sender Base Host Based Pro: Customer has a limited IT staff, they prefer to outsource Con: Customer has IT Staff and does not want critical data leaving their premise Key Question to ask customer: Do you have the IT staff that manages currently manages ? If so, adding a set and forget technology makes sense.

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 14 Cisco Versus Barracuda CiscoBarracuda Reputation Filtering Based on SenderBase data, largest traffic monitoring system in the world, blocks 80% of mail at the gateway without opening messages No reputation filtering Anti-Spam Engine Purpose built, high catch rate and accuracy Open source Anti-Virus EngineSophos – one of the top Anti-Virus vendors in the world Open source ReportingFlexible, interactive, multiple views Limited reporting

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 15 Top Reasons for Selling Spam & Virus Blocker  Increased revenue short sell cycle  is a critical application for your customers, they are struggling with Spam Become a Hero to your Customer!

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 16