Sonic Wall Email Security End User

39
SonicWALL Email Security

description

 

Transcript of Sonic Wall Email Security End User

Page 1: Sonic Wall Email Security End User

SonicWALL Email Security

Page 2: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved2

Agenda

SonicWALL Overview

Email Threat Landscape

Protecting Against Email Threats

SonicWALL Email Security Product Line

Page 3: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved3

SonicWALL Market Leadership

*Appliances Selling for $490 - $1,499 and $1,500 - $5,000Sources: IDC 2004, IDC 2005, Infonetics, Q3’05 2005

in Units and Revenuein Units and Revenue inin Unified Threat Unified Threat ManagementManagement

#1

in in Security AppliancesSecurity Appliances in Revenue and Units* in Revenue and Units*

#2Web Filtering Web Filtering

Appliance Appliance ProviderProvider

#3

Secure Content Secure Content Management Management

ProviderProvider

#4

Page 4: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved4

Policy and Management

Business ContinuityBusiness Continuity

SecureContent

Management

SecureContent

Management

NetworkSecurityNetworkSecurity

SonicWALL Solution Suite

Page 5: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved5

Global ManagementSecure Wireless

SonicPoint GMS

Content SecurityNetwork Security

TZ & PRO Email Security & CSM

Business Continuity

CDP

Remote Access

SSL-VPN

SonicWALL Solution Suite

Page 6: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved6

Agenda

SonicWALL Overview

Email Threat Landscape

Protecting Against Email Threats

SonicWALL Email Security Product Line

Page 7: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved7

IT Security Concerns

Top 5: Virus, Spyware, SPAM, Intrusion & TheftTop 5: Virus, Spyware, SPAM, Intrusion & Theft

Page 8: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved8

Threats: More, and More Malicious…and Now Compliance Requirements

That 3 year old spam box just isn’t cutting it anymore!That 3 year old spam box just isn’t cutting it anymore!

U.S. Email volume 2.4Bn/day in 2006(1)

Email is the perimeter application that reaches all users

Cost of email threats is over $20Bn(2)•Volume is exploding •Threats spreading faster, more malicious•Hybrids more like viruses in their approach

Enterprise’s infrastructure is at stake

Notes:(1) eMarketer, 2004(2) National Technology Readiness Survey, Rockbridge Associates, Inc. & Maryland Business School, 11/2004

Page 9: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved9

Spam

Many messages are obviously spamMany messages are obviously spam

Page 10: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved10

Is it Spam?

Other messages will be disagreed uponOther messages will be disagreed upon

Page 11: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved11

Phishing

Some emails are easy to determine as phishSome emails are easy to determine as phish

Page 12: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved12

Phishing?

Sometimes it is hard to tellSometimes it is hard to tell

Page 13: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved13

Viruses Spread Rapidly

Virus outbreaks continue to happenVirus outbreaks continue to happen

Page 14: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved14

Virus Signatures Take Time

Stop gap reactions•Disconnect from Internet•Send multiple “do not open” warnings•Panic

Virus signatures take hours to become availableVirus signatures take hours to become available

Page 15: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved15

Outbound Risks and Compliance

•U.S. Federal: HIPAA, GLBA, SOX, Sec 17a-4, NASD3010, PATRIOT Act Section 326•European: Safe Harbor, EU Data Protection Directive 95/46 •Organization: VISA CISP, MasterCard Site Data Protection Program, FERPA•State: CA SB 1386 & AB 1950 / NY Bill A04254 / IL H.B. 1633•Corporate: Prevent offensive language, add disclaimers, block files•Many more…

All organizations need to be address compliance requirementsAll organizations need to be address compliance requirements

Page 16: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved16

Inbound and Outbound Threats

Threats Require Inbound and Outbound ProtectionThreats Require Inbound and Outbound Protection

Page 17: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved17

Proliferation of Systems

Typical Mail Data Center

Management of Multiple Systems Becomes ComplexManagement of Multiple Systems Becomes Complex

Page 18: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved18

Agenda

SonicWALL Overview

Email Threat Landscape

Protecting Against Email Threats

SonicWALL Email Security Product Line

Page 19: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved19

Collect Worldwide Threat Data

Page 20: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved20

Analyze for Bad/Good Email Patterns

Likely Virus

Bad Pattern Good Pattern50 people

… in 6 different countries

… receive a new attachment

…that has never been seen before

… within 30 minutes

40 million emails

… sent by [email protected]

… from 3 IP addresses

… in Seattle

… and never junked

Good Email

SonicWALL Analyzes Patterns

Page 21: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved21

Cross Analyze Patterns with Content Evaluation and Reputation

SonicWALL Determines a Definitive Judgment – Not Just a ScoreSonicWALL Determines a Definitive Judgment – Not Just a Score

Page 22: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved22

SonicWALL Email Security Stops Today’s and Tomorrow’s Threats

Threats Evolve – SonicWALL ProtectsThreats Evolve – SonicWALL Protects

Page 23: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved23

Agenda

SonicWALL Overview

Email Threat Landscape

Protecting Against Email Threats

SonicWALL Email Security Product Line

Page 24: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved24

Best-of-Breed Product

Healthcare Transportation

Nonprofit

Retail

Consumer Goods

Automotive

Entertainment

Financial Services

Technology

Media/Publishing

Pharmaceutical

Aerospace/Defense Manufacturing

Technology

Government

Hospitality

EducationRetail

Media/Publishing

Consumer Goods

2,000+ Customers & 96% Retention2,000+ Customers & 96% Retention

Page 25: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved25

Award Winning Email Security

FINALISTS: Barracuda Networks, Inc. for Barracuda Spam Firewall BorderWare Technologies for MXTreme Mail Firewall Clearswift for Clearswift/MIMEsweeper for SMTP CipherTrust, Inc. for CipherTrust IronMail Gateway eSoft, Inc. for eSoft ThreatWall 300 GFI Software Ltd for GFI MailSecurity for Exchange/SMTP

Best Content Security SolutionOverall Category Winner and Winner for Best Anti-Spam

AND MORE FINALISTS: MailFrontier, Inc. for MailFrontier Gateway MailShell for MailShell SDK Solinus, Inc. for MailFoundry Email Filtering Appliance Sunbelt Software for iHateSpam for Exchange Symantec Corporation for Symantec Brightmail AntiSpam Tumbleweed Communications for MailGate Email Firewall

http://scmagazine.com/us/news/article/546173/best+content+security+solution/

Page 26: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved26

SonicWALL Email Security Anti-Spam, Anti-Phishing, Anti-Virus Compliance and Policy Management Appliance and Software options Works with any email system (SMTP) Unified inbound and outbound protection Installs in < 1 Hour…managed in < 10 minutes/week For businesses from Less than 50 users to Over 5000 Users

Page 27: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved27

Product Overview

Quick Installation

Anti-Spam, Anti-Phishing, Anti-Virus

Administrative and End-User Junk Box

Junk Box Summaries

Policy & Compliance Management

Email Auditing

Reporting & Monitoring

Page 28: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved28

Quick Configuration

5 Steps to Configure

Full install in < 1 hour

High availability options

Page 29: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved29

Anti-Spam, Anti-Phishing, Anti-Virus

Complete protection Inbound/Outbound Spam, Virus, Phishing Zombies, DHA, DoS

Automatic updates No rules to write

Complete flexibility Per-user and per-group

Page 30: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved30

Administrative and End-User Junk Box

Web-based Junk Box Search, sort, preview View all threats

1-click UnJunk Retrieves Adds to allowed list Provides feedback

Administrative, End-User

Page 31: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved31

Junk Box Summary

Easy quarantine view Email summary

Configurable Frequency Specific time and day 11 languages All or just questionable

Preview and UnJunk 1-click

Page 32: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved32

Email Policy & Compliance Approach

Robust tools to Identify, Monitor, and EnforceRobust tools to Identify, Monitor, and Enforce

Page 33: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved33

Policy and Compliance Management

Powerful filters Search any message part Scan within attachments Check for disguised text Match against dictionaries Judgment-based policies

15 action options Bounce, quarantine, log Add disclaimers Strip attachments Etc.

Apply to specific groups LDAP-based

Page 34: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved34

Email Auditing

Full email audit All good mail All bad mail Inbound Outbound

Searchable From, To, Subject Today or multi-day

Detailed information Per-recipient data Full audit trail

Page 35: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved35

Reporting and Monitoring

25+ Web-based reports Dashboard, System Status Spam, Phishing, Virus Policy and Compliance Return-on-Investment

Custom reports

Emailed reports

Schedulable reports

Page 36: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved36

Instant Deployment

Page 37: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved37

High Availability Deployment

Page 38: Sonic Wall Email Security End User

CONFIDENTIAL All Rights Reserved38

Products & Subscriptions

Page 39: Sonic Wall Email Security End User

Thank you.

www.sonicwall.com