SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Il cloud a difesa delle email e del web


Antonio Ricci
Symantec.cloud
Email and Web usage
                                          Users’ behaviour is changing
                   Benefits




                                                          Risks
                              • Job                               • Phishing attacks
                                optimization                      • Confidentiality
                              • Improving team                    • Loss of sensitive
                                collaboration                       information
                              • Information                       • Social
                                always available                    engineering
                              • Quick access to
                                information



Il cloud a difesa delle email e del web                                                 2
The Convergence of Threats:
Botnets, Spyware, Viruses and Spam




                                               Spyware




                                              Spammer

                  Viruses                 Uses botnet to send spam   Spam



Il cloud a difesa delle email e del web                                     3
SPAM – Unsolicited Bulk Email




         www.symanteccloud.com/intelligence
Il cloud a difesa delle email e del web       4
Email containing Virus




         www.symanteccloud.com/intelligence
Il cloud a difesa delle email e del web       5
Phishing Distribution and Targets

     Automated Toolkits                                    21.8%

 Other Unique Domains                                              58.7%

     IP Address Domains             4.1%

 Free Web Hosting Sites                            13.3%

          Typosquatting        2.0%




                 Financial                                          85.7%


      Information Services                 11.6%


                   Others      2.6%


             Government      0.2%


          www.symanteccloud.com/intelligence
Il cloud a difesa delle email e del web                                     6
Email misuse impacts




       Loss of
                                          • Sensitive data sent via email
  information
        Loss of
                                          • Improper content sent via email
     reputation




Il cloud a difesa delle email e del web                                       7
Protecting email infrastructure

                                          Cloud solutions
                                          •   Clean Pipe
                                          •   Opex vs Capex
                                          •   Workload optimization
                                          •   Easy to Implement

                                          Symantec.cloud
                                          •   Global Intelligence Network
                                          •   10.7 million SaaS users
                                          •   Service Level Agreement
                                          •   24x7 Support



Il cloud a difesa delle email e del web                                     8
Symantec.cloud SLA
                                                                         Actual Aug
                                                                   SLA        2010

       17                Million pieces of
                         Malware captured
                         in August 2010
                                                  AntiSpam
                                              effectiveness
                                                                  99%    99.99997%

                                                Spam false
                                                               0.0003%   0.000007%

              1          Billion Web
                         requests
                         per day in August
                                               positive rate

                                             AntiVirus false
                                              positive rate
                                                               0.0001%   0.000006%

                                              Email & Web

               6         Billion emails
                         scanned by
                         Skeptic
                                                   Service
                                               Availability
                                                                 100%        100%



Il cloud a difesa delle email e del web                                          9
Email flow


                                               ACME.COM
                                          10 mail1.acme.com
                                          20 mail2.acme.com



  XYZ.COM




> > host–t–t type mx ACME.COM
  host     type mx ACME.COM                                   ACME.COM
     10 mail1.acme.com
 10 cluster.symanteccloud.com
     20 mail2.acme.com
 20 clusterA.symanteccloud.com




Il cloud a difesa delle email e del web                            10
Email protect and Control




Il cloud a difesa delle email e del web   11
Web Security Challenges

 Defending Against Malware
           • Attackers use the Web to deliver viruses, spyware, and other malware


 Web Misuse
                 • Reduces productivity, consumes bandwidth, and creates
                   exposure to security and legal risk


Enforcing a Web Acceptable Use Policy
                • Often difficult and time consuming



 An Increasingly Mobile Workforce
             • Extending security and policy enforcement can be difficult when
               workers are located away from the corporate LAN

Il cloud a difesa delle email e del web                                             12
Web Threat Landscape
Attackers are increasing their volume and frequently use legitimate Websites…
Average amount of Website                   Analysis of Blocked Domains:
requests blocked by our Service:


                    +20%
             Vs. 2009 on a per client per
                                             10%                              Newly
                                                                              Established
             month basis.                                                     Domains
                                                                              Legitimate
New Malware Sites per Day                                                     Websites


  Sites with spyware = 200+ per day
                                              90%
                                            Legitimate Websites compromised by
  Sites with Web viruses: 4000+ per day     malware without the owners knowledge
                                                             Source: MessageLabs Intelligence, July 2010

 Il cloud a difesa delle email e del web                                                          13
Protecting Web Navigation

                                          Cloud solutions
                                          •   Easy to Implement
                                          •   Scalability
                                          •   Roaming users control
                                          •   Cost prediction



                                          Symantec.cloud
                                          •   Global Intelligence Network
                                          •   14 Datacenters in the world
                                          •   URL filtering based on 90 categories
                                          •   Strong security focus
                                          •   Protection against known and unknown malware




Il cloud a difesa delle email e del web                                                      14
Web Security.cloud
 How it works


A user initiates a Web request which is                         Policies determine whether traffic is sent
checked against the customer policies                         on, flagged or denied. Each request is logged.




                           Firewall



                                                                                                    Internet


 Web content is retrieved by               Multi-layer scanning detects        Clean content is delivered
 Symantec.cloud                                Web-borne threats               without noticeable delay




                                                                           Firewall




 Il cloud a difesa delle email e del web                                                                    15
Integrated Management Interface
Portal dashboard




Il cloud a difesa delle email e del web   16
Summary

             Email and Web usage

             • Benefits and threats

             Threat landscape is evolving quickly

             • Need for protection

             Migration to the cloud

             • Benfits

             Symantec.cloud protection:

             • Leader in security protection
             • SLA
             • Email and Web Protection integration


Il cloud a difesa delle email e del web               17
I prossimi appuntamenti online:

> 28 novembre
“Symantec Endpoint Protection 12.1”

> 13 dicembre
“Integrare Data Loss Prevention con Encryption per una
più efficace protezione delle informazioni”

                  Registrati sul sito:
         www.emea.symantec.com/blackmarket/it
Il cloud a difesa delle email e del web              18
Contatti

                    Stop Black Market



                    twitter.com/stopblackmarket




@                   blackmarket@messagegroup.it




Il cloud a difesa delle email e del web           19

Weitere ähnliche Inhalte

Was ist angesagt?

Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...INSPIRIT BRASIL
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)DnaSylCotter
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-finalMarco Morana
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Trend Micro
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013Imperva
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revistathe_ro0t
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...Global Risk Forum GRFDavos
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? CypSec - Siber Güvenlik Konferansı
 
Corona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesCorona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesPluribus One
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Marco Morana
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacksGFI Software
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesKislaychd
 

Was ist angesagt? (20)

Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
Owasp e crime-london-2012-final
Owasp e crime-london-2012-finalOwasp e crime-london-2012-final
Owasp e crime-london-2012-final
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
We present Bugscout
We present BugscoutWe present Bugscout
We present Bugscout
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
 
2 phishing
2 phishing2 phishing
2 phishing
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
New Age Cybersecurity
New Age CybersecurityNew Age Cybersecurity
New Age Cybersecurity
 
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
READ - Risk Exposure Awareness and Deflection - creating an organization-wide...
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
 
Corona - Ph.D. Defense Slides
Corona - Ph.D. Defense SlidesCorona - Ph.D. Defense Slides
Corona - Ph.D. Defense Slides
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacks
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
 

Andere mochten auch

Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniLe minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniSymantec Italia
 
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Symantec Italia
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Italia
 
Agenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows ServerAgenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows ServerSymantec Italia
 
Symantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequentiSymantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequentiSymantec Italia
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiSymantec Italia
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Symantec Italia
 
Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Italia
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Symantec Italia
 
Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoSymantec Italia
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Italia
 

Andere mochten auch (12)

Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioniLe minacce, le tecniche di attacco e i canali di vendita delle informazioni
Le minacce, le tecniche di attacco e i canali di vendita delle informazioni
 
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
Garantire la confidenzialità delle informazioni: la soluzione PGP per l'Encry...
 
Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?Duqu: il nuovo Stuxnet?
Duqu: il nuovo Stuxnet?
 
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
Symantec Backup Exec 12.5 for Windows Server e Symantec Backup Exec System Re...
 
Agenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows ServerAgenti e opzioni di Symantec Backup Exec 12 per Windows Server
Agenti e opzioni di Symantec Backup Exec 12 per Windows Server
 
Symantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequentiSymantec Backup Exec 12 for Windows Server. Domande frequenti
Symantec Backup Exec 12 for Windows Server. Domande frequenti
 
Backup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequentiBackup Exec 2010. Domande frequenti
Backup Exec 2010. Domande frequenti
 
Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010Sicurezza Internet: tendenze e previsioni 2010
Sicurezza Internet: tendenze e previsioni 2010
 
Symantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business ServerSymantec Backup Exec 2010 per Windows Small Business Server
Symantec Backup Exec 2010 per Windows Small Business Server
 
Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010Storage: le Tendenze per il 2010
Storage: le Tendenze per il 2010
 
Backup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodottoBackup Exec 2010: la matrice di prodotto
Backup Exec 2010: la matrice di prodotto
 
Symantec Backup Exec 2010
Symantec Backup Exec 2010Symantec Backup Exec 2010
Symantec Backup Exec 2010
 

Ähnlich wie Il Cloud a difesa della mail e del web

Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websenselihig
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorCA API Management
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mefRafael Junquera
 
MessageLabs_Investor_Presentation
MessageLabs_Investor_PresentationMessageLabs_Investor_Presentation
MessageLabs_Investor_Presentationfinance40
 
Taking your open source email security to the next level
Taking your open source email security to the next levelTaking your open source email security to the next level
Taking your open source email security to the next levelCyren, Inc
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security SolutionsSymantec
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloudeophiladelphia
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8Nerve2012
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionF5 Networks
 
Ibm Smart Business Overview Jimmy Mills
Ibm Smart Business Overview   Jimmy MillsIbm Smart Business Overview   Jimmy Mills
Ibm Smart Business Overview Jimmy MillsJimmy Mills
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpointvoliverio
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.martin_lee1969
 
Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on CloudSATYAVEER PAL
 
Volume of Threat: The AV update deployment bottleneck
Volume of Threat:  The AV update deployment bottleneckVolume of Threat:  The AV update deployment bottleneck
Volume of Threat: The AV update deployment bottleneckAnthony Arrott
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 

Ähnlich wie Il Cloud a difesa della mail e del web (20)

Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 
גיא אילון Websense
גיא אילון   Websenseגיא אילון   Websense
גיא אילון Websense
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
 
MessageLabs_Investor_Presentation
MessageLabs_Investor_PresentationMessageLabs_Investor_Presentation
MessageLabs_Investor_Presentation
 
Taking your open source email security to the next level
Taking your open source email security to the next levelTaking your open source email security to the next level
Taking your open source email security to the next level
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security Solutions
 
Eo navigating the cloud
Eo navigating the cloudEo navigating the cloud
Eo navigating the cloud
 
Eo navigating the cloud v8
Eo navigating the cloud v8Eo navigating the cloud v8
Eo navigating the cloud v8
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
Ibm Smart Business Overview Jimmy Mills
Ibm Smart Business Overview   Jimmy MillsIbm Smart Business Overview   Jimmy Mills
Ibm Smart Business Overview Jimmy Mills
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpoint
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.How Adopting the Cloud Can Improve Your Security.
How Adopting the Cloud Can Improve Your Security.
 
Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on Cloud
 
S series presentation
S series presentationS series presentation
S series presentation
 
Volume of Threat: The AV update deployment bottleneck
Volume of Threat:  The AV update deployment bottleneckVolume of Threat:  The AV update deployment bottleneck
Volume of Threat: The AV update deployment bottleneck
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 

Mehr von Symantec Italia

Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Symantec Italia
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Italia
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009Symantec Italia
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSymantec Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...Symantec Italia
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Italia
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Italia
 
Symantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Italia
 
Symantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard EditionsSymantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard EditionsSymantec Italia
 
Symantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows ServersSymantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows ServersSymantec Italia
 
Proteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciutiProteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciutiSymantec Italia
 

Mehr von Symantec Italia (15)

Phishing Report Gennaio 2010
Phishing Report Gennaio 2010Phishing Report Gennaio 2010
Phishing Report Gennaio 2010
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010Symantec Backup Exec System Recovery 2010
Symantec Backup Exec System Recovery 2010
 
Phishing Report Novembre 2009
Phishing Report Novembre 2009Phishing Report Novembre 2009
Phishing Report Novembre 2009
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Smb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey ItaliaSmb Disaster Preparedness Survey Italia
Smb Disaster Preparedness Survey Italia
 
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
I primi dieci vantaggi di Symantec Protection Suite e i primi dieci motivi pe...
 
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
Symantec Endpoint Protection: la tecnologia Antivirus Symantec di nuova gener...
 
Symantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIVSymantec Internet Security Threat Report, Volume XIV
Symantec Internet Security Threat Report, Volume XIV
 
Symantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequentiSymantec Backup Exec System Recovery 8. Domande frequenti
Symantec Backup Exec System Recovery 8. Domande frequenti
 
Symantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard EditionsSymantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
Symantec Backup Exec 12.5 Small Business Server Premium And Standard Editions
 
Symantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows ServersSymantec Backup Exec 12.5 For Windows Servers
Symantec Backup Exec 12.5 For Windows Servers
 
Proteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciutiProteggere l'azienda dai rischi sconosciuti
Proteggere l'azienda dai rischi sconosciuti
 
SMB Protection Guide
SMB Protection GuideSMB Protection Guide
SMB Protection Guide
 

Kürzlich hochgeladen

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Kürzlich hochgeladen (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Il Cloud a difesa della mail e del web

  • 1. Il cloud a difesa delle email e del web Antonio Ricci Symantec.cloud
  • 2. Email and Web usage Users’ behaviour is changing Benefits Risks • Job • Phishing attacks optimization • Confidentiality • Improving team • Loss of sensitive collaboration information • Information • Social always available engineering • Quick access to information Il cloud a difesa delle email e del web 2
  • 3. The Convergence of Threats: Botnets, Spyware, Viruses and Spam Spyware Spammer Viruses Uses botnet to send spam Spam Il cloud a difesa delle email e del web 3
  • 4. SPAM – Unsolicited Bulk Email www.symanteccloud.com/intelligence Il cloud a difesa delle email e del web 4
  • 5. Email containing Virus www.symanteccloud.com/intelligence Il cloud a difesa delle email e del web 5
  • 6. Phishing Distribution and Targets Automated Toolkits 21.8% Other Unique Domains 58.7% IP Address Domains 4.1% Free Web Hosting Sites 13.3% Typosquatting 2.0% Financial 85.7% Information Services 11.6% Others 2.6% Government 0.2% www.symanteccloud.com/intelligence Il cloud a difesa delle email e del web 6
  • 7. Email misuse impacts Loss of • Sensitive data sent via email information Loss of • Improper content sent via email reputation Il cloud a difesa delle email e del web 7
  • 8. Protecting email infrastructure Cloud solutions • Clean Pipe • Opex vs Capex • Workload optimization • Easy to Implement Symantec.cloud • Global Intelligence Network • 10.7 million SaaS users • Service Level Agreement • 24x7 Support Il cloud a difesa delle email e del web 8
  • 9. Symantec.cloud SLA Actual Aug SLA 2010 17 Million pieces of Malware captured in August 2010 AntiSpam effectiveness 99% 99.99997% Spam false 0.0003% 0.000007% 1 Billion Web requests per day in August positive rate AntiVirus false positive rate 0.0001% 0.000006% Email & Web 6 Billion emails scanned by Skeptic Service Availability 100% 100% Il cloud a difesa delle email e del web 9
  • 10. Email flow ACME.COM 10 mail1.acme.com 20 mail2.acme.com XYZ.COM > > host–t–t type mx ACME.COM host type mx ACME.COM ACME.COM 10 mail1.acme.com 10 cluster.symanteccloud.com 20 mail2.acme.com 20 clusterA.symanteccloud.com Il cloud a difesa delle email e del web 10
  • 11. Email protect and Control Il cloud a difesa delle email e del web 11
  • 12. Web Security Challenges Defending Against Malware • Attackers use the Web to deliver viruses, spyware, and other malware Web Misuse • Reduces productivity, consumes bandwidth, and creates exposure to security and legal risk Enforcing a Web Acceptable Use Policy • Often difficult and time consuming An Increasingly Mobile Workforce • Extending security and policy enforcement can be difficult when workers are located away from the corporate LAN Il cloud a difesa delle email e del web 12
  • 13. Web Threat Landscape Attackers are increasing their volume and frequently use legitimate Websites… Average amount of Website Analysis of Blocked Domains: requests blocked by our Service: +20% Vs. 2009 on a per client per 10% Newly Established month basis. Domains Legitimate New Malware Sites per Day Websites Sites with spyware = 200+ per day 90% Legitimate Websites compromised by Sites with Web viruses: 4000+ per day malware without the owners knowledge Source: MessageLabs Intelligence, July 2010 Il cloud a difesa delle email e del web 13
  • 14. Protecting Web Navigation Cloud solutions • Easy to Implement • Scalability • Roaming users control • Cost prediction Symantec.cloud • Global Intelligence Network • 14 Datacenters in the world • URL filtering based on 90 categories • Strong security focus • Protection against known and unknown malware Il cloud a difesa delle email e del web 14
  • 15. Web Security.cloud How it works A user initiates a Web request which is Policies determine whether traffic is sent checked against the customer policies on, flagged or denied. Each request is logged. Firewall Internet Web content is retrieved by Multi-layer scanning detects Clean content is delivered Symantec.cloud Web-borne threats without noticeable delay Firewall Il cloud a difesa delle email e del web 15
  • 16. Integrated Management Interface Portal dashboard Il cloud a difesa delle email e del web 16
  • 17. Summary Email and Web usage • Benefits and threats Threat landscape is evolving quickly • Need for protection Migration to the cloud • Benfits Symantec.cloud protection: • Leader in security protection • SLA • Email and Web Protection integration Il cloud a difesa delle email e del web 17
  • 18. I prossimi appuntamenti online: > 28 novembre “Symantec Endpoint Protection 12.1” > 13 dicembre “Integrare Data Loss Prevention con Encryption per una più efficace protezione delle informazioni” Registrati sul sito: www.emea.symantec.com/blackmarket/it Il cloud a difesa delle email e del web 18
  • 19. Contatti Stop Black Market twitter.com/stopblackmarket @ blackmarket@messagegroup.it Il cloud a difesa delle email e del web 19

Hinweis der Redaktion

  1. • Customers point their Mail Exchange (MX) records to Symantec.cloud Infrastructure• Inbound and outbound email is directed by Symantec.cloud, where it is scanned • Our perimeter defenses detect and reject known malware and spam originating from known sources• Proprietary Skeptic™ heuristic technology provides a vital layer of security, identifying and stopping new or unknown threats and proactively detecting and rejecting spam from unknown origins.• Email containing a virus is blocked and quarantined for 30 days, and the recipient is notified. Email containing Spam will be acted on according to your policy. Actions can include, block and delete, quarantine for 14 days or pass through with a tagged subject line or appended header• ‘Link following’ technology checks all web pages referenced within an email for viruses and other threats, blocking the email if malware is found on the linked sites. Suspicious links confirmed as viral will have a signature created for them so that future emails containing that link will be treated as being infected and are quarantined• Administrators and / or end users manage quarantined email and spam pens as well as approved and blocked sender lists
  2. Difesa dell’email in cloudClean pipeOpexottimizzazioneDifesa delle email con Sym.cloudGINUpdate auotomatici e in tempo realeSLA
  3. Hosted services enable organizations to lower total cost of ownership and simplify administration by replacing on-site hardware and software with infrastructure managed by a service provider in the cloud. As with any service arrangement with a third party, it’s critical to know what you’re paying for. One way to tell hosted service providers apart is by looking at the targets and redress policies that are outlined in their Service Level Agreement (SLA). Symantec.cloud has spent more than a decade developing highly accurate, effective, and reliable hosted services for securing and managing information delivered via email, Web, and instant messaging. We have invested heavily in proprietary heuristics for detecting malware and spam, a global infrastructure presence with 14 data centers spread across 4 continents, redundancy within and across our service delivery sites, and high quality technical support delivery. Together, these investments enable us to offer an aggressive, comprehensive and industry leading Service Level Agreement. Email SecurityAntiVirus Effectiveness – 100% protection against known and unknown email viruses AntiVirus Accuracy - no more than 0.0001% false positives AntiSpam Effectiveness – 99% spam capture (95% for email with Asian characters) AntiSpam Accuracy - no more than 0.0003% false positives Email Delivery – 100% email delivery Latency – average email scanning time within 60 seconds Availability – 100% service uptime Web SecurityAntiVirus – 100% protection against known web viruses Latency – average Web content scanning time within 100 milliseconds Availability - 100% service uptime
  4. Unlike competitors, we have made tremendous investments in our architecture to deliver the highest levels of accuracy with the fewest false positives possible. We believe the best approach is to have multiple layers of protection: Traffic management slows down bad traffic at the TCP/IP layer Connection management uses heuristics to block unwanted email and prevents attacks at the user layer. Next, multiple commercial scanners are used to identify known viruses while our proprietary Skeptic technology is used to identify unknown, zero-hour, or emerging threats. Skeptic includes engines and heuristics (10 patents granted and pending) that cannot be tested by attackers. As a result of this unique technology, we capture threats that others miss.When all is said and done, customers benefit from a cleaner inbox, more regained bandwidth, and greater threat protection than they can receive through competitor offerings.
  5. Common Web Security challenges that organizations are facing today include:Malware – malicious software designed to steal information or system resources. Without proper defense measures, web-borne malware can cause system downtime, cause data loss, or reduce productivity.Web Misuse – can reduce employee productivity, consume valuable bandwidth resources, and introduce legal risks to organizations in cases where inappropriate material is being viewed by users in view of peers.Enforcing a Web Acceptable Use Policy – implementing a Web Acceptable Use Policy is critical for controlling web misuse. However, without the proper tools, policies are difficult to monitor and enforce. An Increasingly Mobile Workforce– Remote workers and the need to travel for business have made protection for users who access the Web away from the corporate LAN a necessity for many businesses.
  6. This slide will help you understand how Web Security.cloud works. Web Security.cloud examines the web traffic requests your users initiate and checks them against the policies you create. If a policy rule is triggered, the web request is either logged and allowed to pass or is denied. If no policy rules are triggered the web request is allowed to pass Web page requests are retrieved and scanned by Symantec.cloud using multi-layer malware scanning technologies. If a threat is detected, the web page request is denied and the user is notified with a message in their web browser (which you may choose to customize) If no threats are found, page content is delivered with no noticeable delay
  7. This image shows a screenshot of the ClientNet dashboard reporting console for Symantec.cloud customers detailing the service activities and virus threats processed by our Email AntiVirus.cloud and Email AntiSpam.cloud services. Domains and reflected time period are configurable to the desired level of detail.