Presentation is loading. Please wait.

Presentation is loading. Please wait.

A l a d d i n. c o m eSafe 6 FR2 Product Overview.

Similar presentations


Presentation on theme: "A l a d d i n. c o m eSafe 6 FR2 Product Overview."— Presentation transcript:

1 a l a d d i n. c o m eSafe 6 FR2 Product Overview

2 a l a d d i n. c o m © Copyright 2008 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin Knowledge Systems, HASP ®, eToken TM and eSafe ® are only a few of Aladdin Knowledge Systems Ltd.s (Aladdin) proprietary trademarks. The Aladdin Knowledge Systems logo is also proprietary to Aladdin. The information contained in this presentation is protected by international copyright laws. The copyrights are owned by Aladdin or the original creator of the material. The information contained herein is provided to you for informational purposes only, and except and to the extent specifically permitted, no portion of this presentation may be copied, reproduced (or the like), distributed or used in any way whatsoever whether directly or indirectly. In addition to Aladdins trademarks, logos, content and information, this presentation may contain references to trademarks and/or logos owned by other entities. Aladdin expressly disclaims any proprietary interest in trademarks and/or logos owned by other entities and makes no representation of any association, sponsorship, affiliation, or endorsement with or by the owners of such trademarks and/or logos. This presentation may contain references and use of third party web sites for purposes of providing examples relevant to this course. Aladdin assumes no responsibility and/or liability for any content and/or information contained in such third party web sites. Aladdin further does not endorse the companies or contents of any referenced sites. Aladdin does not assume any responsibility or liability for the accuracy of the information contained in this presentation. The information contained in this presentation is provided "as is" and does not constitute a warranty of any kind, either express or implied. Aladdin disclaims all warranties, expressed or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose, and non-infringement. a l a d d i n. c o m Legal Notice

3 a l a d d i n. c o m Why eSafe?

4 a l a d d i n. c o m More security - The only proven proactive threat protection –Consistently blocks over 96% of previously unknown threats –Eliminates over 99% of common and drive-by spyware –Prevents zero-hour vulnerabilities and exploits Transparent user experience Transparent deep web-content inspection –Patented NitroInspection technology –Wire-speed inspection of web pages including all HTML –Zero-latency with no impact on user experience –Complements firewalls, IPS, and desktop antivirus Why eSafe Web?

5 a l a d d i n. c o m Best performance & scalability - Starting at 5 million processed web pages per hour –Scalable for hundreds to millions of users –Multiple installation modes for seamless integration into customers network –ISP-grade content security performance –Trusted by fortune 500 corporations Unique inbound/outbound application control –Regulate Internet-enabled applications traffic (P2P, IM, Skype, etc…) –Prevent use of Anonymous Proxies for security circumvention –Identify and block spyware/malware information extrusion Why eSafe Web?

6 a l a d d i n. c o m The most effective email security and spam control eSafes Dual-Engine Email Security is the first to combine the worlds Real-time Reputation and deep Content Analysis technologies. It blocks virtually all spam and malware, without blocking legitimate emails, including messages from mailing lists. Zero-hour malware, outbreak prevention –Unique technology which identifies and proactively blocks malicious worm and other malware outbreak characteristics at zero-hour using the Realtime Reputation and Distribution Patterns Engine. Why eSafe dual engine email security?

7 a l a d d i n. c o m Comprehensive Microsoft Office document filtering –Unique stripping of meta-data from Office documents– prevents exposure of hidden, confidential information embedded in Office files, including revisions and collaboration information. –including selective stripping of macros, and embedded objects with enhanced support for Microsoft Office 2007 file formats Why eSafe dual engine email security?

8 a l a d d i n. c o m eSafe solutions and add-ons

9 a l a d d i n. c o m eSafe Gateway: Mail and web traffic eSafe Web: High performance Web security and control HTTP/S & FTP traffic eSafe Mail: High performance dual engine email security and control SMTP traffic eSafe Components

10 a l a d d i n. c o m eSafe Web add-ons URL FilterAppliFilterWeb SSL eSafe Reporter

11 a l a d d i n. c o m eSafe Mail add-ons Dual Antispam Engine & Worm Outbreak Protection eSafe Reporter

12 a l a d d i n. c o m URL filtering (Web Filtering) Control & Security

13 a l a d d i n. c o m URL Filtering

14 a l a d d i n. c o m Web Application Filtering Security & Control - AppliFilter

15 a l a d d i n. c o m Communications Security eSafe AppliFilter inspects, tracks, and controls inbound and outbound application traffic on all possible communication venues using its deep packet inspection technology, eliminating the security risk and network clogs caused by Web 2.0 and P2P applications. The Value: –Identify and block malicious inbound and outbound communication activities (Over 500+ applications) Regulate various IM and SKYPE activity. Block P2P communications. Block and Control other Web 2.0 internet applications.

16 a l a d d i n. c o m Anonymous Proxy technology is used to bypass almost any organizational security solution Content Security products offer list-based approach against Anonymous proxies AppliFilters unique Anonymous Web Proxy filter catches requests for anonymous proxies on the fly, providing organizations zero-hour protection against circumvention and anonymity techniques Anonymous Proxies

17 a l a d d i n. c o m eSafe Web SSL Encrypted Communications Scanning

18 a l a d d i n. c o m Encrypted Web Traffic Facts It is assumed that over 15% of Public web sites are protected by SSL and todays encrypted traffic accounts for up to 30% of web traffic Invisible to virtually every security product, including firewalls and intrusion prevention solutions Encrypted site can be malicious to begin with, or a hacked site implanted with malware

19 a l a d d i n. c o m eSafe - Encrypted Web Traffic eSafe Web SSL Enforces web policy also on SSL encrypted sites Proactively identify malware hiding behind encrypted traffic Blocks self-signed SSL sites Validates certificate policies, issuers, revocations, etc… Provide a platform solution for web Anonymizers Tunneling applications eSafe AppliFilter Blocks Tunneling applications that were designed to bypass content filtering products

20 a l a d d i n. c o m How does it work? Operates similarly to an IPS Source is neutral Inspects content in transit, without delay, at the gateway Fast: Does not need to cache or write to disk In-depth inspection of all packets Ignores irrelevant content or protocols Analyzes the application protocol and content

21 a l a d d i n. c o m Dual engine email security Secure and Control

22 a l a d d i n. c o m Mail is a vital business tool. Keeping it clean is the top agenda of every CISO eSafe Dual Engine Email Security provides a complete robust security and productivity solution: Proven proactive security solution protects against known and unknown threats eSafe Anti Spam provides; 99% spam detection and SPAM management Real-time distribution pattern analysis detects and blocks all email worm outbreaks at zero-hour Anti Phishing solutions blocks Phishing attacks at the gateway Most massive phishing is blocked as spam UNIQUE to eSafe: Phishing elements are stripped from all suspicious email blocking targeted attacks on organizations Added value: Prevent email tracking Dual Engine Email Security

23 a l a d d i n. c o m Email security and spam control eSafes Dual-Engine Email Security is the first to combine the worlds Real-time Reputation and deep Content Analysis technologies. It blocks virtually all spam and malware, without blocking legitimate emails, including messages from mailing lists. Zero-hour malware, outbreak prevention –Unique technology which identifies and proactively blocks malicious worm and other malware outbreak characteristics at zero-hour using the Realtime Reputation and Distribution Patterns Engine. Comprehensive Microsoft Office document filtering –including selective stripping of macros, and embedded objects with enhanced support for Microsoft Office 2007 file formats –Unique stripping of meta-data from Office documents– prevents exposure of hidden, confidential information embedded in Office files, including revisions and collaboration information.

24 a l a d d i n. c o m No lost email No angered end-users No administrator hassle No need for special spam mailbox Learning system – not prone to user error Moving From Antispam to Spam Management

25 a l a d d i n. c o m Securing the Global Village Thank You


Download ppt "A l a d d i n. c o m eSafe 6 FR2 Product Overview."

Similar presentations


Ads by Google