Download
effective perimeter content security n.
Skip this Video
Loading SlideShow in 5 Seconds..
Effective Perimeter Content Security PowerPoint Presentation
Download Presentation
Effective Perimeter Content Security

Effective Perimeter Content Security

107 Vues Download Presentation
Télécharger la présentation

Effective Perimeter Content Security

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Effective Perimeter Content Security

  2. What is eSafe? • eSafe is: • Best of breed web Surfing Security Gateway with anti-spyware & unauthorized applications filtering • Best of breed ProactiveEmailSecurity with spam management • Transparent inspection of:HTTP, FTP, SMTP, POP3 • eSafe provides zero-day protection for top security problems • eSafe is backed by 24x7 Security Services

  3. OR: eSafe Integrated SCM Solution Network security should be separated at the gateway eSafe takes care of all Content Security

  4. We Should Not Make This Choice! SECURITY PERFORMANCE

  5. High End Solutions (blade-based) • Up to 40Mbps* each • 1,200-2,000 HTTP connections/sec (avg.) • - Up to 1Gbps* on a single chassis with full load balancing! • *Net HTTP traffic with full content inspection Network Security Secure Content Management Anti-spyware HTTP/FTP Security URL Filtering IM, P2P, Spyware, apps. Email anti-virus Spam management Firewall VPN IDS/IPS Management & Reporting

  6. eSafe Solution for ISPs & Telcos Security Services Consolidation for the ISPs Internet Blade Center (Up to 14 blades in a cluster) ISP cloud • Tiered Services: • Web Anti-Spyware • Web URL Filtering • Email Anti-virus • Email Anti-spam

  7. NEW: Spyware Neutralizing eSafe’s 4 Layer Spyware Blocking Layer 1: Web surfing‘driveby’ blocking Layer 2: Download (URL, ActiveX) Layer 3: Signature (simple + smart) Layer 4: Communications blocking

  8. Enhanced WebSecurity • 4-Layer Anti-spyware • XploitStopper™ & SmartScript™ • Fast - 40Mbps NitroInspection • HTTP/FTP protocol security

  9. Using Malicious Scripts

  10. URL Filtering:Security – Productivity - Safety

  11. Objectionable Categories Phishing Malware Spam Virus/Hacker/Spyware Pornography Gambling Racism Drugs Violence, Anarchy, Weapons Illegal activity Non-Productive Categories Dating Swimwear Gaming Travel Amusement Job Search Television URL Filtering:Security – Productivity - Safety

  12. URL Filtering – Security and Productivity - 60 million URLs - 60 categories - 150,000 sites updated daily - 97% sites known

  13. What Is A Profile? • A Web surfing policy • List of site categories and specific exclusions • Applied to an entity • User, group, IP, IP range, VLAN, host • According to priority and time frame

  14. URL Filtering Profiles in eSafe 5 FR2 • LDAP and Active Directory integration • User/Group-based profiles • Flexible user identification • User-based web-access reporting • X-Ray mode for webusage monitoring

  15. Unauthorized Applications Traffic • P2P applications • Spyware • Instant Messengers • TCP Worms • Remote Control • Tunneling • …and more

  16. Application FilteringMany more rules and rule families • P2P: KaZaa, eDonkey,Bit Torrent, more • Instant Messengers: MSN Messenger, ICQ, Yahoo, AOL • Spyware: communication • Remote Control: GoToMyPC, PC-Anywhere, more • Protocol enforcement: tunneling prevention, browser enforcement, protocol exploits • More…

  17. Enhanced Email Security • Proactive anti-virus • Signature anti-virus • Phishing prevention • Email standardization • Turn-off hyperlinks • Remove web beacons • Many more…

  18. Phishing Email  Phishing sites  Malicious code in Phishing Sites  2006 Forecast Increase in Three-stage targeted Phishing attacks: Targeted Phishing email Redirect to Phishing site Malicious code attack on the site Threats Shift in 2006 Source: antiphishing.org

  19. eSafe Phishing Prevention • Most massive phishing is blocked as spam • UNIQUE to eSafe: Phishing elements are stripped from all suspicious email blocking targeted attacks on organizations • Added value: Prevent email tracking Actual link: http://68.255.44.238:87/%63%69%74/%69%6E%64%65%78%2E%68%74%6D

  20. Moving From Anti-spam toSpam Management • No lost email • No angered end-users • No administrator hassle • No need for “special spam mailbox” • Learning system – not prone to user error

  21. Advanced Spam Management • 20 Spam-detection Technologies • Spam tagging, blocking, guaranteeing • Remote quarantine • User-managed quarantine • 12 new features in eSafe 5

  22. eSafe Proactive Detection Top-10 2004 Outbreaks 69% proactive outbreak blocking!

  23. eSafe Proactive Detection Top-10 2005 Outbreaks 96% proactive outbreak blocking!

  24. Unique Proactive Technologies • Signature AV EngineCertified to block 100% ITW viruses • NEW: EV13x SmartSig™quicker response to threats and more efficient signatures • Zero-hour blocking of most Trojans and worms • Improved XploitStopper™ • Global OutbreakSentry™

  25. Management and Reporting

  26. Focus on: Outbound Content • HTTP/FTP inspection & loggings • SOX compliance • Suspicious Trojans/Keyloggersoutbound traffic detection • Content anomalies

  27. “Aladdin Knowledge Systems' eSafe 5 can do so much that the hardest part may be just explaining it all. This is a comprehensive content security package to protect your organization's Internet operations.” • “The list of eSafe's capabilities could go on for pages, and the product definitely lived up to expectations.” • Hotpick: eSafe Gateway 5 • INFORMATION SECURITY MAGAZINE, Sep ‘05

  28. eSafe – technology leadership eSafe Protect – 1st sandbox anti-vandal solution NitroInspection™ - 1st non-proxy HTTP gateway XploitStopper™ - 1st gateway exploits blocker AppliFilter™ - 1st application filtering Spyware Neutralizer 1st clientless scanner eSafe Gateway – 1st anti-virus gateway 1998 1997 2005 2000 2002 2003

  29. Sample eSafe Customers

  30. Thank You!www.eSafe.com