SlideShare ist ein Scribd-Unternehmen logo
1 von 22
[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Rejected Email Messages
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object]
[object Object]
[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object]
[object Object],Acceptable Use Intellectual Property Regulations Internal Policies Employee
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ The true value of content monitoring and filtering lies in helping management to identify and correct faulty business processes and accidental disclosures.” Gartner Research:  Content Monitoring and Filtering Helps Find Faulty Business Process, Accidental Disclosures
[object Object]
[object Object],[object Object]
[object Object]
[object Object]
[object Object],[object Object]
[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdfSun Technologies
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference Real Estate
 
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active Directory
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active DirectorySkyport Systems: Securing Your Biggest IT Risk: Microsoft Active Directory
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active DirectorySkyport Systems
 
WHS-hackability-Index-083013
WHS-hackability-Index-083013WHS-hackability-Index-083013
WHS-hackability-Index-083013Janis Weiss
 
Tip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksTip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksKeepnet Labs.
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionswathi78
 
Check your network security
Check your network securityCheck your network security
Check your network securityYour Virtual CTO
 
Db take you-out
Db take you-outDb take you-out
Db take you-outAvi Bartov
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2Monica Hamilton
 
Cyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium BusinessesCyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium Businessesebusinessmantra
 
Level Up Your WordPress Security
Level Up Your WordPress SecurityLevel Up Your WordPress Security
Level Up Your WordPress SecurityMitch Canter
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionJPINFOTECH JAYAPRAKASH
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08Michael Boman
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
Navigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website OwnersNavigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website OwnersTony Perez
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityHTS Hosting
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessKaspersky Lab
 

Was ist angesagt? (19)

BGA Eğitim Kataloğu
BGA Eğitim KataloğuBGA Eğitim Kataloğu
BGA Eğitim Kataloğu
 
Cloud Data Security Trends.pdf
Cloud Data Security Trends.pdfCloud Data Security Trends.pdf
Cloud Data Security Trends.pdf
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active Directory
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active DirectorySkyport Systems: Securing Your Biggest IT Risk: Microsoft Active Directory
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active Directory
 
WHS-hackability-Index-083013
WHS-hackability-Index-083013WHS-hackability-Index-083013
WHS-hackability-Index-083013
 
Tip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksTip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacks
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
Db take you-out
Db take you-outDb take you-out
Db take you-out
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
 
Cyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium BusinessesCyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium Businesses
 
Level Up Your WordPress Security
Level Up Your WordPress SecurityLevel Up Your WordPress Security
Level Up Your WordPress Security
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Navigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website OwnersNavigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website Owners
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website Security
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
 

Andere mochten auch

WatchGuard: Bring Your Own Device or Bring Your Own Danger
WatchGuard: Bring Your Own Device or Bring Your Own DangerWatchGuard: Bring Your Own Device or Bring Your Own Danger
WatchGuard: Bring Your Own Device or Bring Your Own DangerRoeing Corporation
 
Whats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressedWhats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressedgroberts52
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetationKaveh Khosravi
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introductionJimmy Saigon
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 

Andere mochten auch (8)

WatchGuard: Bring Your Own Device or Bring Your Own Danger
WatchGuard: Bring Your Own Device or Bring Your Own DangerWatchGuard: Bring Your Own Device or Bring Your Own Danger
WatchGuard: Bring Your Own Device or Bring Your Own Danger
 
Whats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressedWhats new fireware-v11-10.compressed
Whats new fireware-v11-10.compressed
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Discover what's new in Windows Server 2012 Active Directory
Discover what's new in Windows Server 2012 Active DirectoryDiscover what's new in Windows Server 2012 Active Directory
Discover what's new in Windows Server 2012 Active Directory
 
Active Directory
Active Directory Active Directory
Active Directory
 

Ähnlich wie WatchGuard XCS Email Security for SMBs

Mimecast Presentation
Mimecast PresentationMimecast Presentation
Mimecast PresentationMichelle6518
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platformcostigaj
 
Ds security
Ds securityDs security
Ds securityServium
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gatewayijsrd.com
 
Keep your Email Secure
Keep your Email SecureKeep your Email Secure
Keep your Email SecureShawn Jordan
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...Louis Göhl
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Ravikumar Sathyamurthy
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat LandscapeNuspire Networks
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...VOROR
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 

Ähnlich wie WatchGuard XCS Email Security for SMBs (20)

Mimecast Presentation
Mimecast PresentationMimecast Presentation
Mimecast Presentation
 
MMPL Watchguard overview
MMPL Watchguard overviewMMPL Watchguard overview
MMPL Watchguard overview
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
Ds security
Ds securityDs security
Ds security
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gateway
 
Keep your Email Secure
Keep your Email SecureKeep your Email Secure
Keep your Email Secure
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Azlan Security Offering
Azlan Security OfferingAzlan Security Offering
Azlan Security Offering
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Axigen cyren v3-web
Axigen cyren v3-webAxigen cyren v3-web
Axigen cyren v3-web
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat Landscape
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 

Mehr von INSPIRIT BRASIL

Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- DatasheetINSPIRIT BRASIL
 
INSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT BRASIL
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...INSPIRIT BRASIL
 
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011INSPIRIT BRASIL
 
IT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesIT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesINSPIRIT BRASIL
 
New-Desktop Central para IT Managers
New-Desktop Central para IT ManagersNew-Desktop Central para IT Managers
New-Desktop Central para IT ManagersINSPIRIT BRASIL
 
New institucional inspirit (esp)
New institucional inspirit (esp)New institucional inspirit (esp)
New institucional inspirit (esp)INSPIRIT BRASIL
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)INSPIRIT BRASIL
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageINSPIRIT BRASIL
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayINSPIRIT BRASIL
 
Trustwave - Segurança 360
Trustwave - Segurança 360Trustwave - Segurança 360
Trustwave - Segurança 360INSPIRIT BRASIL
 
NOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITNOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITINSPIRIT BRASIL
 
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)INSPIRIT BRASIL
 
Overview -IT360 ManageEngine
Overview -IT360 ManageEngineOverview -IT360 ManageEngine
Overview -IT360 ManageEngineINSPIRIT BRASIL
 
Estudo Gartner - IT360 ManageEngine
Estudo Gartner -  IT360 ManageEngineEstudo Gartner -  IT360 ManageEngine
Estudo Gartner - IT360 ManageEngineINSPIRIT BRASIL
 
Forrester - Wave Community
Forrester  - Wave CommunityForrester  - Wave Community
Forrester - Wave CommunityINSPIRIT BRASIL
 
Coletânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDColetânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDINSPIRIT BRASIL
 
INSPIRIT- Riverbed- Data protection and Disaster Recovery
INSPIRIT-  Riverbed- Data protection and Disaster RecoveryINSPIRIT-  Riverbed- Data protection and Disaster Recovery
INSPIRIT- Riverbed- Data protection and Disaster RecoveryINSPIRIT BRASIL
 
TrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoTrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoINSPIRIT BRASIL
 

Mehr von INSPIRIT BRASIL (20)

Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
INSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT nova institucional
INSPIRIT nova institucional
 
Projeto Zoo INSPIRIT
Projeto Zoo INSPIRITProjeto Zoo INSPIRIT
Projeto Zoo INSPIRIT
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
 
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
 
IT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesIT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simples
 
New-Desktop Central para IT Managers
New-Desktop Central para IT ManagersNew-Desktop Central para IT Managers
New-Desktop Central para IT Managers
 
New institucional inspirit (esp)
New institucional inspirit (esp)New institucional inspirit (esp)
New institucional inspirit (esp)
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
 
Trustwave - Segurança 360
Trustwave - Segurança 360Trustwave - Segurança 360
Trustwave - Segurança 360
 
NOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITNOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRIT
 
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)
 
Overview -IT360 ManageEngine
Overview -IT360 ManageEngineOverview -IT360 ManageEngine
Overview -IT360 ManageEngine
 
Estudo Gartner - IT360 ManageEngine
Estudo Gartner -  IT360 ManageEngineEstudo Gartner -  IT360 ManageEngine
Estudo Gartner - IT360 ManageEngine
 
Forrester - Wave Community
Forrester  - Wave CommunityForrester  - Wave Community
Forrester - Wave Community
 
Coletânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDColetânea de Cases - RIVERBED
Coletânea de Cases - RIVERBED
 
INSPIRIT- Riverbed- Data protection and Disaster Recovery
INSPIRIT-  Riverbed- Data protection and Disaster RecoveryINSPIRIT-  Riverbed- Data protection and Disaster Recovery
INSPIRIT- Riverbed- Data protection and Disaster Recovery
 
TrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoTrustWave - Visão Geral da Solução
TrustWave - Visão Geral da Solução
 

WatchGuard XCS Email Security for SMBs

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.

Hinweis der Redaktion

  1. Today’s email security landscape contains many threats to your messaging environment: Inbound threats center on spam and attacks to your network including viruses, malware and network attacks like denial of service Based on WatchGuard’s messaging research lab findings, more than 90% of all email is identified as spam . We predict that spam will continue to rise on an annual basis, from 30% growth in 2009 up to nearly 50% growth in 2010, and will become more sophisticated to avoid detection. As the universe of malware is doubling year over year across the internet, the potential dangers of spam to businesses will dramatically. The email security landscape has now become even more complex when compounded with web 2.0 and blended threats that use email as the invitation to web-based infections. The evolution of spam has also made a dramatic progression, evolving from simple plain text emails to sophisticated and malicious social engineering tactics that are all designed to fool systems and deceive even the smartest people.   The most alarming trend in spamming tactics is now the utilization of both email and web to achieve the desired outcome, in particular for profit-motivated crimes that utilize botnets, spyware, malware and other threats to manage and exploit the infection. By using email as the invitation, spammers have the delivery vehicle to locate and attract a victim. With Web 2.0, these criminals now have the mechanism to infect the unsuspecting victim with various destructive codes. These attacks have changed the landscape of spam management from one of productivity and networking issues to one of cyber-terrorism.   All it takes is one malicious email, one click of an employee’s mouse to place your network and business at risk for security breaches, regulatory violations, theft of confidential information, or an intrusion that turns your network into a source of internet threats.
  2. XCS provides comprehensive email security with: Defense-in-depth with multiple layers of inspection for malware, spyware, spam, etc. ReputationAuthority: in-the-cloud, best-in-class reputation filtering system Protection from blended threats delivered via email Set-it-and-forget-it administration, reporting, and policy management provide total control and visibility of email traffic entering your network Strong security at an affordable price – best value
  3. WatchGuard XCS uses a defense-in-depth process for security of email with multiple layers of protection including: First Line of Defense: ReputationAuthority The WatchGuard ReputationAuthority reputation service acts as the first line of defense for messaging security. Email traffic comes to the network perimeter from the internet. ReputationAuthority inspects all of the email traffic (including embedded links) based on DNSBL, volume, content and behavior analysis, looking to block all unwanted traffic at the connection level before it is passed to WatchGuard XCS for further examination. ReputationAuthority eliminates more than 98% of unwanted traffic at the perimeter. Second Line of Defense: Spam Prevention In this layer of defense, XCS validates spam based on the unique messaging patterns of the customer’s environment (e.g. if you are a pharmacy, having the word “Viagra” may not be objectionable or considered spam) and notifying back to ReputationAuthority what has been identified positively as spam, a threat, etc. so that it blocks it and contributes the data to the network to protect from future attacks. Third Line of Defense: Malware Prevention WatchGuard’s third line of defense is its sophisticated malware prevention engine. This is where in-depth scanning is occurring, looking at embedded links and web components to prevent blended threats, malware, spyware, viruses, phishing attacks, etc.
  4. WatchGuard ReputationAuthority provides a powerful first line of defense in protecting your network from email threats. It provides in-the-cloud real-time threat prevention, blocking more than 98% of unwanted traffic at the perimeter before they enter your network. WatchGuard ReputationAuthority is the first next generation reputation system Hybrid In-the-Cloud model Rejects Unwanted Email and Web Traffic at the perimeter More than 98% Catch Rate 99% Accuracy Rate Unique and Patented WatchGuard ReputationAuthority offers a proactive global threat network that gathers data from deployed systems to identify malicious senders and block threats based on real-time behavior, providing a superior level of threat intelligence to defend your network. ReputationAuthority goes beyond simple sender reputation to provide an all-encompassing view of the real-time behavior of an IP address by cross-referencing and analyzing data across multiple protocols to threat feeds from multiple sources. Unlike older reputation service technologies which act simply as a credit bureau, relying on historical background and DNSBLs, ReputationAuthority combines historical information with patented, adaptive identification techniques including: sender information (who is sending it) volume behavioral analysis of an IP to determine the reputation and risk level aggregates feeds from globally deployed XCS appliances and contributes them to the network to make ReputationAuthority more intelligent in blocking threats And best of all….ReputationAuthority is included with EVERY XCS appliance.
  5. Let’s compare the effectiveness of the reputation services as outlined in the previous slide Imagine you have 1M email messages entering your network for a given time period.   Other reputation-based services using only DNSBL or a combination of DNSBL and IP volume information would allow upwards of 200,000 messages to enter the network, since they are only 80% effective. A next generation service,  such as WatchGuard ReputationAuthority is up to 98% effective, allowing only 20,000 messages to enter the network. This is a significant improvement in threat protection and cost savings. KEY POINT: THE REMAINING UNWANTED TRAFFIC IS CAUGHT BY WATCHGUARD SPAM PREVENTION (DEFENSE IN DEPTH) BUT the key differentiation of ReputationAuthority  is its powerful 98% catch rate. ReputationAuthority provides significant value to your business and your email security by: Eliminates burdens associated with processing resource-intensive, unfiltered traffic, freeing your networks for legitimate traffic. By stopping and eliminating unsolicited spam messages before they reach the network, it helps reduce the size of compliance-mandated email archives. Results in decreased processing, bandwidth, storage and backup costs throughout your network.
  6. The second layer of defense of WatchGuard XCS appliances is its highly effective Spam Prevention. The remaining email traffic that is not rejected by the ReputationAuthority undergoes deep content inspection at the second layer of defense with the WatchGuard Anti-Spam engine. Content Inspection It is here that further examination of the content, images and sender information of the message traffic occurs. Contextual Analysis The system provides a context-based weighted score on the spam suspect level of the message, with a remarkably low ratio of false positives. Three Layers of Filtering WatchGuard Spam Prevention has three layers of filtering to achieve a catch rate of over 99% with an accuracy rate of 99.999%. By examining the content, sender information, and conducting contextual analysis of incoming traffic across multiple protocols, the system assigns a categorized and weighted score that enables you to throttle and tune your spam. Patented Learning Filters The system uses patented learning filters that learns from your messaging environment to better determine what is really spam and what you consider business-critical communications for more intelligent and informed spam prevention and message delivery. Off-Box Quarantine Off-box quarantine is a dedicated temporary storage solution for quarantining spam and suspect emails. Pre-determined policies determine the length of time stored, by individual controls, what to quarantine and integration with third party applications and systems. Quarantine is user-controlled to allow individuals to determine spam violations and to free administrators from having to manage individual spam policies, hence further eliminating false-positives. Flexible Spam Management With flexible spam management capabilities and automated filter updates, WatchGuard spam prevention enables XCS to meet email security needs without imposing a significant administrative burdens
  7. The XCS third layer of defense is its malware prevention engine. WatchGuard XCS uses a unified approach to prevent viruses and malicious code infections to reduce the costs and complexity of managing multiple virus, spyware and malware engines. Blended Threat Protection: Effective virus and malware protection scans email, searching for potentially malicious content being delivered via a blended threat. Automated Handling of Identified Malware: Out-of-the-box and custom defined options determines how identified messages should be handled. Zero-Hour Threat Outbreak Response: During any malware or spam outbreak, there is invariably a period of time between when the outbreak is detected and when the actual update to prevent future attacks is distributed. WatchGuard XCS’s Threat Outbreak Response closes the window of vulnerability that occurs between when an attack first emerges and when the scanning filters are updated for the most rapid response to new malware threats.
  8. WatchGuard XCS provides an easy-to-use administrative console. The interface is intuitive and is simple to configure. The system comes with pre-defined policies so you can plug-and-play…OR You have the flexibility to create custom policies specific to your business requirements.
  9. With WatchGuard XCS integrated reporting, you have information at your fingertips. XCS reports provide a snapshot of: system overview and status messages blocked email traffic trends mail queue and quarantine information and much more… Customizable reports are available in varying file formats. Easily export or locally save time-, feature-, and group-based reports.
  10. WatchGuard XCS appliances are designed to ensure continuity of communications. With email having become the primary utility of business communications, it is critical to ensure that your email system and its security avoids downtimes. You can’t afford lost messages and your email can’t move at a snail’s pace. Zero Lost Messages With Patented Queue Replication Technology WatchGuard XCS solves this critical risk with automated and native redundancy to ensure ZERO lost messages. Message Redundancy is a key component for designing a totally redundant solution, ensuring no messages are ever lost or delayed due to a failure of a system which have queued messages that have not been processed or delivered at the time of failure. Clustering and queue replication becomes extremely important when deploying products that rely heavily on multiple delivery queues for processing their messages. On-Demand Clustering You also have the ability to cluster multiple systems together, allowing you to manage the multiple systems acting as one logical unit easily and efficiently. Clustering multiple units together removes a single point of failure and ensures that a network infrastructure is always up and running. When configured in a cluster, all configuration settings and message queues are replicated across the entire cluster. XCS delivers an unbeatable return-on-investment by reducing operational costs and guaranteeing the delivery of business-critical messages and communications. Centralized Management With Geographical Redundancy Geographical redundancy through centralized management allows ease of management of multiple XCS platforms without the need of an external management system. XCS provides the ability to allow Administrators to easily and centrally manage systems that are deployed globally, and to apply a single set of policies across the entire system.
  11. Sensitive information enters and exits company networks every day. As email has become the most significant medium for business communications, it has also become the largest violation medium for data loss. Data loss or leakage occurs in every organization either unintentionally or maliciously. All it takes is for a recipient’s email address to be misspelled or an incorrect key to be pressed by an employee on a keyboard, and a message containing confidential information ends up in the wrong person’s hands, resulting in leakage of sensitive information. The consequences could be detrimental, including brand erosion, loss of customer confidence, financial repercussions, and public embarrassment if it makes the headlines.
  12. This becomes a significant problem and risk as organizations are trying to meet and manage regulatory and internal compliance and control requirements, including: Government & Industry Compliance Regulations: e.g. HIPAA, PCI, GLB, etc. Internal Policies: C-level rules, sensitive and confidential information Acceptable Use: HR policies, sexual harassment and legal violations that can occur in messaging Intellectual Property: Trade secrets, sales reports, financial statements, sales or business plans, etc. As a result, data leakage has now become a critical issue that can only be addressed by comprehensive data loss prevention tools that are used to accelerate business, protect your organization, and ensure privacy.
  13. WatchGuard Data Loss Prevention is integrated into all XCS appliance models to enable you to seamlessly prevent the loss, leakage or exposure of sensitive, restricted and inappropriate content across multiple protocols. Links deep inspection of email traffic content with context of the message being sent to assess whether it is in violation of policies. Instant-on remediation is built right into WatchGuard XCS appliances and is used to successfully secure, monitor, record, quarantine, and block data-in-motion over email, providing an extensive risk management and policy enforcement boundary. Consolidated policy management provides a single view for managing policies, securing content across email, and providing policy violation reporting. Knowledge-based structuring of content allows XCS to dynamically learn from the content passed through the data loss prevention engine to make more accurate decisions, faster for enhanced protection from data leakage.
  14. WatchGuard XCS makes decisions based on content and context: The system uses a seamlessly integrated process for securing content from data loss. Examine: XCS examines the entire content, including message headers, message body, and attachments. Content inspection determines what is being delivered, including files and attachments, and compares it to policies in an effort to discover policy violations. XCS data loss prevention functionality goes one step further by also inspecting the context of the traffic Determine: In this next step, contextual analysis applies intelligence to determine, based on policies, whether the discovered/identified confidential content that has passed through the content inspection engine is allowable. The system inspects who is sending the content and where or whom the content is being sent to, which is vital in determining if the content is a violation or note, and the proper remediation tactic to employ. Without context, a typical data loss prevention system would easily block or quarantine an important communication with the potential to impede business processes. For example, the CFO may be able to send financial statements to the auditor of the company – this communication is allowed. A customer service employee, however, who does not have permissions to send financial statements will have the communication blocked. Deliver: Based on pre-defined policies, the system conducts instant remediation of the message including block, allow, quarantine, blind copy, encrypt, or reroute content. Report: XCS monitors traffic and provides granular reports to demonstrate policy violations for compliance audit requirements, identifying security gaps, and enabling you to make informed security decisions.
  15. WatchGuard Email Encryption technology is an optional subscription, available with all XCS appliance models, for companies that want or require an encryption solution that is tightly integrated with their email security. It provides easy-to-use, business-class encryption to securely transmit and receive private and sensitive information. The transparent nature of the WatchGuard Email Encryption solution lends to its ease of use. Tightly integrated within the WatchGuard XCS appliances, all email sent from the organization passes through the XCS data loss prevention engine. The system identifies outgoing messages that meet pre-defined policies for confidentiality and automatically encrypt identified messages which contain sensitive or confidential information with no special action required by the sender. Messages can also be manually set for encryption by typing a simple command in the subject header of a message. The email is then processed and encrypted locally, retrieving the session key for the registered envelope service. Encrypted messages are sent as HTML attachments to ordinary email messages and are directly delivered to the recipient who can decode and view the encrypted messages using any Web browser. Encrypted messages can be opened with any email program and any web browser running on any operating system. The process is quite simple: recipients open an HTML email attachment, enter a password and view the secure message. The recipient enters credentials and is verified by the registered envelope service, generating the key to decrypt the email.
  16. Centralized Policy Management: Includes pre-defined compliance dictionaries that can be used for privacy and compliance to industry regulations Allows you to set policies by domain, group, or individual users Reduces complexity Ensures consistent application of security policies across email
  17. XCS provides reporting alerts of email policy violations for compliance audits, with granular reporting of the violation incident.
  18. WatchGuard XCS provides many advantages to small businesses. Highly Effective Perimeter Security With the most effective next-generation reputation service technology available, your system processes only clean, wanted traffic, blocking threats from ever entering your network. Multi-Layer Approach Our defense-in-depth approach and sophisticated anti-spam and anti-malware engines ensure your email security is never compromised. Easy-to-Use You don’t need a PhD in email security and administration to use WatchGuard XCS. With its intuitive Web GUI, configuration and management are made simple – all you have to do is set-it-and-forget-it. XCS will do the rest! Instant-On Data Loss Prevention Protect your most business-critical assets with comprehensive content controls and instant remediation based on your policies to safeguard sensitive outgoing information. Always On Security Multiple layers of redundancy so you never lose a message and ensures service levels with infinite scalability. Strong Security at an Affordable Price WatchGuard XCS delivers the best value with the strongest, defense-in-depth security to prevent email threats.