Presentacion Productos Marshal Sept 2008
-
Upload
ggarciaggarcia -
Category
Technology
-
view
754 -
download
0
Transcript of Presentacion Productos Marshal Sept 2008
Secure. Protect. Comply.
Marshal
Your preferred and trusted partner for email and internet content security.
Secure. Protect. Comply.
Agenda
• The Marshal Story• MailMarshal
– Inbound/Outbound Content Filtering• WebMarshal
– Inbound/Outbound Internet Filtering• Marshal Endpoint Security
– Control User Access Points• Security Reporting Center
Secure. Protect. Comply.
What Does Marshal Do?
Marshal provides comprehensive security solutions that include:
– Email Security – Web Security – EndPoint Security– Security Reporting
Secure. Protect. Comply.
Who is Marshal?
• First MailMarshal Customer in 1997• 40% of Fortune 500 Use Marshal Products• Customers in 97 Countries• 19,000+ Companies Utilizing Marshal World Wide with 8,500 in the US• Offices in Atlanta (HQ), Houston (Support), UK (HQ), New Zealand (Development)• WebMarshal finalist in the "Best Web Filtering Solution" category in the SC
Magazine's 2007 and 2008 U.S Reader Trust Awards (at RSA)• Gartner Email Security Boundary Magic Quadrant 2007• Key Product points – Easy to eval, install, deploy and use. High performance
(fast), functionally, superior content engine with lexical analysis and very good price point.
Secure. Protect. Comply.
Representative Customers GOVERNMENTEDUCATION
HEALTHCAREBANKING / INSURANCE
PROFESSIONAL SERVICESMANUFACTURING
OTHERS
Secure. Protect. Comply.
Secure Email Gateway• Where Does Marshal software run
Internet
Normal Email
S/Mime Encryption
SMTP ServerEmail Gateway
Internal Email Server
Secure Email Gateway
Firewall
DMZ PerimeterSecurity Zone
InternalNetwork
End User Workstations
Secure. Protect. Comply.
Common Policy Engine Components
• AV Scanners• Spyware Scanners• Urlcensor• Textcensor & Textcensor Scripts• File Un-packer• File Type Identifier• Policy Definition Wizard (Customized To Suit Product)
Secure. Protect. Comply.
Marshal Products work for InBound and Outbound Traffic
They Want In…
WebMarshal Web Content Security Secure Web Gateway - HTTP Proxy
C O M M O N P O L I C Y E N G I N E
MailMarshal for ExchangeInternal Email
MailMarshal Email Content SecuritySMTP Gateway
Email Content & Compliance • File Attachment Control and Filtering• Lexical Text Analysis of Email & Files• Email Header Re-writing• Deep Image Analysis (Anti-Porn)*• Policy driven Message Stamping• Compliance Templates
Edge Protection• DOS & DHA Attack Sending
Host Connection Policies• Anti-Phishing• Anti-Virus* & Anti-Spyware*• Data Loss Prevention
TLS&
S / MIMEENCRYPTION
Data LossPrevention• Full Content
Scanning• File finger-printing
Web Threat Security• Anti-Phishing• Anti-Virus & Anti-
Spyware*• File-type Identification• File & Content upload
control
Employee Internet Management• URL Filtering Lists*• Real-time Categorization engine• Quota Management by Size & Time• File download controls• Lexical Text Analysis of files/content
1.
2.
Web
Secure. Protect. Comply.
MailMarshal SMTPv6.4
Email Content Security
Secure. Protect. Comply.
MailMarshal SMTP• Gateway Solution: Secure-Protect-Comply • Anti-Spam: Controls spam based on extensive array architecture• Prevents Directory Harvesting Attack (DHA): Secures data to prevent DHA • Prevents Denial of Service Attacks (DoS): Stops flood of spam from bringing
email servers down • Anti-Virus: Scans messages in real-time • Anti-Spyware: Isolates suspicious email attachments
at the gateway• Manage Email Attachments: Strips attachments or
blocks file types per user• Deep Message Analysis: All layers of email dissected
into basic components for comprehensive security• Image Analyzer: Scans and sorts images to comply
with acceptable use policiesCHRISTINA NEUSTADT,
Director of Customer Service,The Weather Channel
Secure. Protect. Comply.
SPAM
Reputation Lists
80.0%
SpamProfiler
95.0%
SpamCensor
99.5%
RBL/URL Censor
99.9%
Custom(Whitelists, etc.)
99.95%
Defense-in-Depth
• Marshal's Anti-Spam & Anti-Phishing System
Secure. Protect. Comply.
MailMarshal SMTP v6.4• SpamProfiler - Spam Signature Service, Deployed at the MMReceiver• Marshal IP Reputation Service – Mixture Of White & Black Data
– Auto white-listing for Reputation/RBL lists based on number of successfully delivered email and % of Spam received
• Enhanced Email Routing Options• Marshal Notification Service – RSS feeds from Marshal, 4 feeds: Product
Updates & Notifications, TRACE Alerts, TRACE News and Offers & Promotions• Image Analyzer Update – More Accurate, Faster• Full Office 2007 File Support• McAfee Engine Update• Dead-letter updates – Expanded Support for Bulk E-mailers• SQM Update• Extending SpamCensor Scans Complete Message Body and Attachments
Secure. Protect. Comply.
Anti-Spam Arsenal
• Reputation Lists - Automatic Adaptive Whitelisting• SpamProfiler - Regularly updated list of intelligent profiles for Spam
Messages, run at receiver• SpamCensor - Heuristic detection engine with more than 1800
checks on Email header alone• URLCensor - Looks for URL links inside email messages – Phishing
Detection, de-obfuscates mined URL’s• Custom – CountryCensor, Whitelists, etc.
Secure. Protect. Comply.
SpamCensor
• Heuristic detection engine with more than 1800 checks on Email header alone – Most Configurable
• Works on a scoring system, by default over 60 pts is considered a Spam message
• Has series of Spam categories to identify Spam makeup• Automatically updated weekly• Framework for delivering Zero day Spam & Virus updates• Can be used for many other functions in MailMarshal
Secure. Protect. Comply.
URLCensor
• Looks for URL links inside email messages – Phishing Detection• De-obviouscates mined URL’s• Performs DNS check against external suRBL lists to see if URL is
listed
Secure. Protect. Comply.
DNS Blacklists
• One of the traditional methods of Spam detection• Looks up IP addresses or Sender names in remote DNS lists• Examples of DNS Blacklists are:-
– SpamHaus– SpamCop
Secure. Protect. Comply.
CountryCensor
• Identifies the IP address of the original sender• Looks up this IP address against a database of the IP address
ranges allocated to different countries• Can allow, Block or just log in the instance of an Email coming in from
a region or a particular country – Detects country of origin
Secure. Protect. Comply.
TRACE Team
Marshal TRACE: Threat Research and Content Engineering
MailMarshalServer
Global Spam Honeypots and
Submitters
Research by Security Experts
Threat Database Automatic Machine Learning Analysis
TRACEThreat Research and Content Engineering
Spam, Threat andZero Day Updates
Secure. Protect. Comply.
TRACE Website
• Currently covering Email, Web and malware threats• Full range of emerging threats and advice• Detailed statistics and reports• Blogs & RSS feeds• Future is for greater automatic protection directly into products and
correlation of threat data from customer base
www.marshal.com/trace
Secure. Protect. Comply.05/03/2023
Summary
• Marshal’s Defense-in-Depth Anti-Spam & Anti-Phishing engine is the most advanced available, with multiple facets and layers to cover the ever evolving Spam & Phishing threat
• Combination of technologies providing consistent results, Zero False Positives and a 99.5% detection rate
• Designed and tuned for speed without compromising performance• Marshal’s Trace team of experts providing the vigilance and
protection for your ease of mind
Free 30 Day Trial Software atwww.marshal.com
Secure. Protect. Comply.
MailMarshal For Exchange
• Monitor Internal Microsoft Exchange Email• Addresses Acceptable Use Policy (AUP) of Inter-office Communications • Pre-Configured Rule Sets• Anti-Virus for Internal Email• Same Attachment & Message Scanning Engine as MailMarshal• Reporting Includes ALL Internal Email
On average, 70% of corporate email,
excluding spam, is internal, 30% external
Internet
Exchange ServerFirewall
Secure. Protect. Comply.05/03/2023
Marshal e10000 Security Appliance
• Provides ‘the best of both worlds’ – appliance hardware and software– Easy to deploy - hardened platform - low administration overhead– Flexible – upgradeable - scalable – multi-function security
• ‘MailMarshal software solution in a box’– Full functionality of MailMarshal software – packaged in a box!
• Hardened Email Security Appliance– Standard 1U 19” rack mountable chassis
• Unified solution for anti-virus, anti-spam and email security
Secure. Protect. Comply.
WebMarshalv6.0
Beyond URL Filtering
Secure. Protect. Comply.
The Wild, Wild Web
• “To date, most large enterprises already have some combination of network firewall, URL filter and proxy server to protect and manage Web traffic. However, most organizations do not effectively filter malware from Web traffic. Gartner estimates that fewer than 15% of enterprises scan Web traffic for viruses.” (Gartner March 2007)
• “Marshal’s TRACE Team last year predicted that social networking sites such as MySpace would be increasingly used as vehicles for spreading malware in 2008. Their popularity and rapid growth with Internet savvy users makes them an ideal vehicle for this kind of activity. People’s guards are lower and they are more accepting of familiar looking messages coming from seemingly trusted and frequently used websites.”
Secure. Protect. Comply.
Web 2.0, Employee 2.0
• Web 2.0 is the term that refers to a second generation of hosting and online communities, social-networking sites (personal and business), content sharing (videos and photos), wikis (user created content) that facilitates sharing, creativity and collaboration between users.
• The next generation Employee 2.0 has grown accustomed to these services and stopping all access could cause hiring issues and corporate culture stigmas.
• What are your choices?
Secure. Protect. Comply.
What Are Your Choices?
• Stop all access to these websites, or…• Create an Acceptable Use Policy and institute some simple, yet
thorough protections against the malware and malicious content that grows each day on the web.
Secure. Protect. Comply.05/03/2023
Market Future - Web
• The rise of Web 2.0 and lack of protection is causing a rapid rise in the attacks using Internet browsing. Organizations need to protect this widely used communication path in and out of their networks.
• Companies need to look for products delivering a Secure Web Gateway vision, moving beyond only URL Filtering to provide real ‘web access control’ for the content users are actually visiting
• Advanced multi-layered threat protection in real-time on the content being accessed and Data Leakage protection across this popular outbound path of data.– Web Access Control– Web Threat Protection– Data Loss Prevention
Secure. Protect. Comply.
Securing the Web Gateway
“The Internet has become a major source of infection for PCs, and the massive adoption of Web applications, in addition to the popularity of blogs and social-networking sites, has made this vector much harder to control. The Internet and Internet applications will be the primary sources of malware infections in the enterprise in 2008 and beyond. Most companies have focused on the desktop or e-mail gateway to block malicious content. The enterprise Web gateway is another tier in need of additional protection from malicious code and inappropriate use.” (Gartner March 2007)
Secure. Protect. Comply.05/03/2023
WebMarshal-Beyond URL Filtering
• WebMarshal 6.0 is a Secure Web Gateway• It Goes Beyond URL Filtering
– Provides real-time content analysis of incoming and outgoing Web traffic
• Webmarshal Is Designed To Meet The Needs Of All Organizations – Large And Small– Array Manager architecture allows management of distributed
multi-server environments
Secure. Protect. Comply.
Key Functionalities
WebMarshal combines 3 key functions into one Secure Web Gateway: • Web Access Control – management of employee Internet use • Web Threat Security – protection against Web-based security threats • Data Leakage Prevention – security of confidential or sensitive
information
Free 30 Day Trial Software atwww.marshal.com
Secure. Protect. Comply.
Common Policy Engine Components
• AV Scanners• Spyware Scanners• URLCensor• TextCensor & TextCensor Scripts• File Un-packer• File type identifier• Policy definition wizard (Customized to suit product)
Secure. Protect. Comply.
Secure Web Gateway Appliance
• All in one combined Email & Web Security Appliance• Unified Administration, Management & Reporting• Suited for sub 2500 user companies that are looking for a single all in
one appliance, a hardened solution for MailMarshal & WebMarshal products
05/03/2023
Secure. Protect. Comply.
Marshal EndPoint Security
Email Content Security
Secure. Protect. Comply.
Where Does The Threat Originate?
• 74% of survey respondents said threats to corporate security are now coming from inside the organization.– IBM Security Survey 2006
• Up to 70% of identity theft starts with the deliberate removal of personal data from a company by an employee– Professor Judith Collins, Michigan State University
• Human Error was responsible for nearly 60% of security breaches in 2005– 4th Annual CompTIA Study on Information security and the Workforce
• 70% of threats come from inside the organization– Analyst Firm
Secure. Protect. Comply.
Marshal EndPoint Security
Helps protect your data, both on and off the network:
• Prevention - Prevents the transfer of files to or from unauthorized portable devices
• Protection - Automatically encrypts data copied to approved devices • Visibility - Provides complete visibility of device and file accesses on
the network • Flexibility - Provides granular control over who has access to what
devices and for how long
Secure. Protect. Comply.
Security Reporting Center
v2.5
Reporting Tool
Secure. Protect. Comply.
Highlights:
URL filtering list integration
ISA Security log support
Updated Borderware support
Updated Netscreen support
Updated Juniper support
MailMarshalEmail Content Security
WebMarshalInternet Browsing Content Security
Security Reporting CenterFirewall Reporting
Security Reporting Center v2.5• Integration with new Marshal URL Filtering List• New Device Support
– Microsoft ISA Security Logs in addition to current proxy support
– Borderware update to latest OS– NetScreen update to latest OS– Juniper update to latest OS
Secure. Protect. Comply.
When Selecting a Security Partner…
• Consistent Policy Engine• Does Spam Filtering Occur Inside the Firewall• Zero Day Protection• Allow Custom File Type Definitions• Is There a 24-hour Protection Team• Actively Scan all Web Content in Real Time
Secure. Protect. Comply.
Marshal
Your preferred and trusted partner for email and internet content security.