Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sushant Rao, Senior Product Manager www.mailfrontier.com Emerging Threats: Stop Spam, Virus, and Phishing Outbreaks through End-to-End Attack Monitoring.

Similar presentations


Presentation on theme: "Sushant Rao, Senior Product Manager www.mailfrontier.com Emerging Threats: Stop Spam, Virus, and Phishing Outbreaks through End-to-End Attack Monitoring."— Presentation transcript:

1 Sushant Rao, Senior Product Manager www.mailfrontier.com Emerging Threats: Stop Spam, Virus, and Phishing Outbreaks through End-to-End Attack Monitoring

2 2 Threats Are More Complex & Dangerous

3 3 Typical Attacks Are Worldwide Events

4 4 Attack Lifecycle

5 5 Typical Approaches in Email Security Sender Reputation Message Content Attachment

6 Real Spam Attack

7 7 Messages Scored: What’s the Right Number? Re: Loan info - 15 years 6.0% You are pre-approved Spam that hit user’s inbox Legitimate email caught by filter

8 8 Reputation Services  Sender ID Framework Validates sender’s claimed identity  Reputation Service Evaluates sender’s reputation

9 9 Content Evaluation (Bayesian)

10 10 Community Response

11 11  Content Analysis  80% effectiveness  0.5% false positive rate There’s No One Way  Sender ’ s Identification & Reputation 70% effectiveness 1.0% false positive rate  Community Response 75% effectiveness 0.25% false positive rate

12 12 Chained: High Effectiveness, High False Positive 70% effectiveness 1.0% false positive rate 75% effectiveness 0.25% false positive rate 80% effectiveness 0.5% false positive rate Overall 70% Effectiveness 1.0% False Positive Rate

13 13 Chained: High Effectiveness, High False Positive 70% effectiveness 1.0% false positive rate 75% effectiveness 0.25% false positive rate 80% effectiveness 0.5% false positive rate Overall 94% Effectiveness 1.5% False Positive Rate

14 14 Chained: High Effectiveness, High False Positive 70% effectiveness 1.0% false positive rate 75% effectiveness 0.25% false positive rate 80% effectiveness 0.5% false positive rate Overall 98% Effectiveness 1.75% False Positive Rate (1 in 50)

15 15 Messages Judged: Good, Spam, or Likely Spam Overall 98% Effectiveness 0.0% False Positive Rate for Definite

16 Real Virus Attack

17 17

18 18 http://itmanagement.earthweb.com/columns/executive_tech/article.php/3316511

19 19 Virus Attack Timeline Time

20 20 Decisive Anti-Virus Technology

21 21 Responsive Anti-Virus Technology

22 22 Predictive Anti-Virus Technology

23 23 Multiple Technologies Detect & Protect Conventional Signature ProtectionSimulation Behavior Monitoring & Pattern Heuristics MailFrontier Time Zero Virus Technology

24 24 Time Zero Virus Technologies Deceptive File Type Detection invoice.txt really invoice.exe Statistical Attachment Analysis picture.jpg.exe

25 25 Time Zero Virus Technologies Deceptive File Type DetectionStatistical Attachment Analysis MIME Exploit Protection Dangerous Attachment Blocking.exe.bat.pif picture.jpg.exe resume.bat File name is picture.jpg File type is.exe

26 26 Statistical Attachment Analysis 069 139 139 012.TXT.JPG.DOC.EXE 119 111 114 100 Gateway Server 069 139 139 211 invoice.txt 069 139 139 211 ?? ORIs it invoice.txt?Is it invoice.exe?

27 27 Statistical Attachment Analysis 069 139 139 012119 111 114 100 Gateway Server 069 139 139 211 invoice.txt 069 139 139 211 == invoice.exe OR.TXT.JPG.DOC.EXE

28 Real Phishing Attack

29 29 Consumer Phish

30 30 Phishing for Enterprise Information

31 31 Phishing is Not Spam

32 32 A Phishing Attack Sending Machines Phish Web Sites 66.165.106.111 152.146.187.172 161.58.214.148 195.75.241.4 212.250.162.8 Receivers 61.152.175.161 210.114.175.226 211.23.187.151 Mary Tomas Andy Tonia George John Frank Tim Herman Luann Ramona Evan Jan Scott Venkat Charlie Phil Elisa Dom Joe Lana June Chao Vadim Oliver

33 33 Phishing Protection

34 Other Enterprise Email Threats

35 35 Zombies – Compromised Internal Nodes Mail Server Enterprise Network Internet X Only legitimate emails are sent Emails from Zombies are identified and quarantined

36 36 Directory Harvest Attacks Enterprise Network

37 37 Outbound Compliance – Regulatory & Corporate CONFIDENTIAL Mail Server Enterprise Network Virus Policy Violation CONFIDENTIAL Disguised Text C*NFIDENTIAL Only legitimate emails are sent

38 MailFrontier Gateway

39 39 MailFrontier Cognite: End-To-End Email Attack Monitoring

40 40 MailFrontier – Security Against All Threats

41 41 MailFrontier – All Threats, 1 Product Typical Mail Data Center Mail Data Center Consolidated with MailFrontier Gateway e.g. Microsoft Exchange

42 42 MailFrontier: Effortless Control Powerful Reporting Provides Quick Insight

43 43 MailFrontier:High Performance

44 44 1400+ Enterprise Customers 98% Retention HealthcareTransportation Nonprofit Retail Education Real Estate Hospitality Financial Services Software Media/Publishing Pharmaceutical TelecommunicationsManufacturing Technology Government Consumer Goods Financial Services Retail Media/Publishing Consumer Goods

45 45 Extraordinary Awards & Reviews NetworkWorld Top-Rated Enterprise Anti-Spam Software “…MailFrontier’s ASG put up some impressive results in terms of blocking spam and letting legitimate mail pass.” – September 15, 2003 Recommends MailFrontier be included on “Short List” of products evaluated for large-scale, high-performance anti-spam systems – December 20, 2004 Red Herring Top 100 Private Companies/Innovators Recognizing the company for its innovation and strategy – May 2004 and December 2004 CRN Recommended “MailFrontier's hands-off approach can help ease the administration burden on IT departments.” – June 7, 2004 InfoWorld Rated Excellent “MailFrontier had the easiest installation…provides lots of control to the admin…[and] provides excellent accuracy.” – September 27, 2004 IT WEEK Editor’s Choice – 5 out of 5 Stars “MailFrontier Gateway Appliance m500 setup was easy…and took less than an hour..lt really blocks all unwanted email.” – June 6, 2005

46 46 MailFrontier - The Leader in Email Security Best Protection Effortless Control High Performance Appliances Software

47 47 Powerful Protection without Complexity “MailFrontier offered me a solution that delivered on every front.” -- Kristi Reese Exchange Administrator


Download ppt "Sushant Rao, Senior Product Manager www.mailfrontier.com Emerging Threats: Stop Spam, Virus, and Phishing Outbreaks through End-to-End Attack Monitoring."

Similar presentations


Ads by Google