SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Marshal Your preferred and trusted partner for email and internet content security.
Agenda The Marshal Story MailMarshal Inbound/Outbound Content Filtering WebMarshal Inbound/Outbound Internet Filtering Marshal Endpoint Security Control User Access Points Security Reporting Center
What Does Marshal Do? Marshal provides comprehensive security solutions that include: Email Security  Web Security  EndPoint Security Security Reporting
Who is Marshal? First MailMarshal Customer in 1997 40% of Fortune 500 Use Marshal Products Customers in 97 Countries 19,000+ Companies Utilizing Marshal World Wide with 8,500 in the US Offices in Atlanta (HQ), Houston (Support), UK (HQ), New Zealand (Development) WebMarshal finalist in the "Best Web Filtering Solution" category in the SC Magazine's 2007 and 2008 U.S Reader Trust Awards (at RSA) Gartner Email Security Boundary Magic Quadrant 2007 Key Product points – Easy to eval, install, deploy and use.  High performance (fast), functionally, superior content engine with lexical analysis and very good price point.
Representative Customers  GOVERNMENT EDUCATION HEALTHCARE BANKING / INSURANCE PROFESSIONAL SERVICES MANUFACTURING OTHERS
Internet Secure Email Gateway Where Does Marshal software run End User Workstations Secure Email Gateway Internal Email Server SMTP Server Email Gateway Firewall Internal Network DMZ Perimeter Security Zone Normal Email S/Mime Encryption
Common Policy Engine Components AV Scanners Spyware Scanners Urlcensor Textcensor  & Textcensor Scripts File Un-packer File Type Identifier Policy Definition Wizard (Customized To Suit Product)
Email Content & Compliance  ,[object Object]
Lexical Text Analysis of Email & Files
Email Header Re-writing
Deep Image Analysis (Anti-Porn)*
Policy driven Message Stamping
Compliance TemplatesEdge Protection ,[object Object]
Anti-Phishing
Anti-Virus* & Anti-Spyware*
Data Loss PreventionTLS & S / MIME ENCRYPTION MailMarshal for Exchange Internal Email MailMarshal Email Content Security SMTP Gateway C O M M O N    P O L I C Y    E N G I N E WebMarshal  Web Content Security      Secure Web Gateway - HTTP Proxy Data Loss Prevention ,[object Object]
File finger-printing Web Threat Security ,[object Object]
Anti-Virus & Anti-Spyware*
File-type Identification
File & Content upload control Employee Internet Management ,[object Object]
Real-time Categorization engine
Quota Management by Size & Time
File download controls
Lexical Text Analysis of files/contentThey Want In… 1. Email 2. Web Marshal Products work for InBound and Outbound Traffic
MailMarshal SMTPv6.4 Email Content Security
MailMarshal SMTP Gateway Solution: Secure-Protect-Comply  Anti-Spam: Controls spam based on extensive array architecture Prevents Directory Harvesting Attack (DHA): Secures data to prevent DHA  Prevents Denial of Service Attacks (DoS): Stops flood of spam from bringing email servers down  Anti-Virus: Scans messages in real-time  Anti-Spyware: Isolates suspicious email attachments  at the gateway Manage Email Attachments: Strips attachments or  blocks file types per user Deep Message Analysis: All  layers of email dissected  into basic components for comprehensive security Image Analyzer: Scans and sorts images to comply    with acceptable use policies CHRISTINA NEUSTADT,  Director of Customer Service, The Weather Channel
Reputation Lists RBL/ URL Censor Custom (Whitelists, etc.) SpamProfiler SpamCensor SPAM 80.0% 95.0% 99.5% 99.9% 99.95% Defense-in-Depth Marshal's Anti-Spam & Anti-Phishing System
MailMarshal SMTP v6.4 SpamProfiler - Spam Signature Service, Deployed at the MMReceiver Marshal IP Reputation Service – Mixture Of White & Black Data Auto white-listing for Reputation/RBL lists based on number of successfully delivered email and % of Spam received Enhanced Email Routing Options Marshal Notification Service – RSS feeds from Marshal, 4 feeds: Product Updates & Notifications, TRACE Alerts, TRACE News and Offers & Promotions Image Analyzer Update – More Accurate, Faster Full Office 2007 File Support McAfee Engine Update Dead-letter updates – Expanded Support for Bulk E-mailers SQM Update Extending SpamCensor Scans Complete Message Body and Attachments
Anti-Spam Arsenal Reputation Lists - Automatic Adaptive Whitelisting SpamProfiler  - Regularly updated list of intelligent profiles for Spam Messages, run at receiver SpamCensor - Heuristic detection engine with more than 1800 checks on Email header alone URLCensor - Looks for URL links inside email messages – Phishing Detection, de-obfuscates mined URL’s Custom – CountryCensor, Whitelists, etc.
SpamCensor Heuristic detection engine with more than 1800 checks on Email header alone – Most Configurable Works on a scoring system, by default over 60 pts is considered a Spam message Has series of Spam categories to identify Spam makeup Automatically updated weekly Framework for delivering Zero day Spam & Virus updates Can be used for many other functions in MailMarshal
URLCensor Looks for URL links inside email messages – Phishing Detection De-obviouscates mined URL’s Performs DNS check against external suRBL lists to see if URL is listed
DNS Blacklists One of the traditional methods of Spam detection Looks up IP addresses or Sender names in remote DNS lists Examples of DNS Blacklists are:- SpamHaus SpamCop
CountryCensor Identifies the IP address of the original sender Looks up this IP address against a database of the IP address ranges allocated to different countries Can allow, Block or just log in the instance of an Email coming in from a region or a particular country – Detects country of origin
TRACE Team Marshal TRACE:   Threat Research and Content Engineering Global Spam Honeypots and Submitters Research by Security Experts Spam, Threat and Zero Day Updates TRACE Threat Research and Content Engineering MailMarshal Server Automatic Machine Learning Analysis Threat Database
TRACE Website  Currently covering Email, Web and malware threats Full range of emerging threats and advice Detailed statistics and reports Blogs & RSS feeds Future is for greater automatic protection directly into products and correlation of threat data from customer base www.marshal.com/trace
9/23/2008 Summary Marshal’s Defense-in-Depth Anti-Spam & Anti-Phishing engine is the most advanced available, with multiple facets and layers to cover the ever evolving Spam & Phishing threat Combination of technologies providing consistent results, Zero False Positives and a 99.5% detection rate Designed and tuned for speed without compromising performance Marshal’s Trace team of experts providing the vigilance and protection for your ease of mind Free 30 Day Trial Software at www.marshal.com
MailMarshal For Exchange Internet Monitor Internal Microsoft Exchange Email Addresses Acceptable Use Policy (AUP) of  Inter-office Communications  Pre-Configured Rule Sets Anti-Virus for Internal Email Same Attachment & Message Scanning Engine as MailMarshal Reporting Includes ALL Internal Email On average, 70% of corporate email, excluding spam, is internal, 30% external Exchange Server Firewall
Provides ‘the best of both worlds’ – appliance hardware and software Easy to deploy - hardened platform - low administration overhead Flexible – upgradeable - scalable – multi-function security ‘MailMarshal software solution in a box’ Full functionality of MailMarshal software – packaged in a box! Hardened Email Security Appliance Standard 1U 19” rack mountable chassis Unified solution for anti-virus, anti-spam and email security  9/23/2008 Marshal e10000 Security Appliance
WebMarshalv6.0 Beyond URL Filtering

Weitere ähnliche Inhalte

Kürzlich hochgeladen

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Presentacion Productos Marshal Sept 2008

  • 1. Marshal Your preferred and trusted partner for email and internet content security.
  • 2. Agenda The Marshal Story MailMarshal Inbound/Outbound Content Filtering WebMarshal Inbound/Outbound Internet Filtering Marshal Endpoint Security Control User Access Points Security Reporting Center
  • 3. What Does Marshal Do? Marshal provides comprehensive security solutions that include: Email Security Web Security EndPoint Security Security Reporting
  • 4. Who is Marshal? First MailMarshal Customer in 1997 40% of Fortune 500 Use Marshal Products Customers in 97 Countries 19,000+ Companies Utilizing Marshal World Wide with 8,500 in the US Offices in Atlanta (HQ), Houston (Support), UK (HQ), New Zealand (Development) WebMarshal finalist in the "Best Web Filtering Solution" category in the SC Magazine's 2007 and 2008 U.S Reader Trust Awards (at RSA) Gartner Email Security Boundary Magic Quadrant 2007 Key Product points – Easy to eval, install, deploy and use. High performance (fast), functionally, superior content engine with lexical analysis and very good price point.
  • 5. Representative Customers GOVERNMENT EDUCATION HEALTHCARE BANKING / INSURANCE PROFESSIONAL SERVICES MANUFACTURING OTHERS
  • 6. Internet Secure Email Gateway Where Does Marshal software run End User Workstations Secure Email Gateway Internal Email Server SMTP Server Email Gateway Firewall Internal Network DMZ Perimeter Security Zone Normal Email S/Mime Encryption
  • 7. Common Policy Engine Components AV Scanners Spyware Scanners Urlcensor Textcensor & Textcensor Scripts File Un-packer File Type Identifier Policy Definition Wizard (Customized To Suit Product)
  • 8.
  • 9. Lexical Text Analysis of Email & Files
  • 11. Deep Image Analysis (Anti-Porn)*
  • 13.
  • 16.
  • 17.
  • 20.
  • 22. Quota Management by Size & Time
  • 24. Lexical Text Analysis of files/contentThey Want In… 1. Email 2. Web Marshal Products work for InBound and Outbound Traffic
  • 25. MailMarshal SMTPv6.4 Email Content Security
  • 26. MailMarshal SMTP Gateway Solution: Secure-Protect-Comply Anti-Spam: Controls spam based on extensive array architecture Prevents Directory Harvesting Attack (DHA): Secures data to prevent DHA Prevents Denial of Service Attacks (DoS): Stops flood of spam from bringing email servers down Anti-Virus: Scans messages in real-time Anti-Spyware: Isolates suspicious email attachments at the gateway Manage Email Attachments: Strips attachments or blocks file types per user Deep Message Analysis: All layers of email dissected into basic components for comprehensive security Image Analyzer: Scans and sorts images to comply with acceptable use policies CHRISTINA NEUSTADT, Director of Customer Service, The Weather Channel
  • 27. Reputation Lists RBL/ URL Censor Custom (Whitelists, etc.) SpamProfiler SpamCensor SPAM 80.0% 95.0% 99.5% 99.9% 99.95% Defense-in-Depth Marshal's Anti-Spam & Anti-Phishing System
  • 28. MailMarshal SMTP v6.4 SpamProfiler - Spam Signature Service, Deployed at the MMReceiver Marshal IP Reputation Service – Mixture Of White & Black Data Auto white-listing for Reputation/RBL lists based on number of successfully delivered email and % of Spam received Enhanced Email Routing Options Marshal Notification Service – RSS feeds from Marshal, 4 feeds: Product Updates & Notifications, TRACE Alerts, TRACE News and Offers & Promotions Image Analyzer Update – More Accurate, Faster Full Office 2007 File Support McAfee Engine Update Dead-letter updates – Expanded Support for Bulk E-mailers SQM Update Extending SpamCensor Scans Complete Message Body and Attachments
  • 29. Anti-Spam Arsenal Reputation Lists - Automatic Adaptive Whitelisting SpamProfiler - Regularly updated list of intelligent profiles for Spam Messages, run at receiver SpamCensor - Heuristic detection engine with more than 1800 checks on Email header alone URLCensor - Looks for URL links inside email messages – Phishing Detection, de-obfuscates mined URL’s Custom – CountryCensor, Whitelists, etc.
  • 30. SpamCensor Heuristic detection engine with more than 1800 checks on Email header alone – Most Configurable Works on a scoring system, by default over 60 pts is considered a Spam message Has series of Spam categories to identify Spam makeup Automatically updated weekly Framework for delivering Zero day Spam & Virus updates Can be used for many other functions in MailMarshal
  • 31. URLCensor Looks for URL links inside email messages – Phishing Detection De-obviouscates mined URL’s Performs DNS check against external suRBL lists to see if URL is listed
  • 32. DNS Blacklists One of the traditional methods of Spam detection Looks up IP addresses or Sender names in remote DNS lists Examples of DNS Blacklists are:- SpamHaus SpamCop
  • 33. CountryCensor Identifies the IP address of the original sender Looks up this IP address against a database of the IP address ranges allocated to different countries Can allow, Block or just log in the instance of an Email coming in from a region or a particular country – Detects country of origin
  • 34. TRACE Team Marshal TRACE: Threat Research and Content Engineering Global Spam Honeypots and Submitters Research by Security Experts Spam, Threat and Zero Day Updates TRACE Threat Research and Content Engineering MailMarshal Server Automatic Machine Learning Analysis Threat Database
  • 35. TRACE Website Currently covering Email, Web and malware threats Full range of emerging threats and advice Detailed statistics and reports Blogs & RSS feeds Future is for greater automatic protection directly into products and correlation of threat data from customer base www.marshal.com/trace
  • 36. 9/23/2008 Summary Marshal’s Defense-in-Depth Anti-Spam & Anti-Phishing engine is the most advanced available, with multiple facets and layers to cover the ever evolving Spam & Phishing threat Combination of technologies providing consistent results, Zero False Positives and a 99.5% detection rate Designed and tuned for speed without compromising performance Marshal’s Trace team of experts providing the vigilance and protection for your ease of mind Free 30 Day Trial Software at www.marshal.com
  • 37. MailMarshal For Exchange Internet Monitor Internal Microsoft Exchange Email Addresses Acceptable Use Policy (AUP) of Inter-office Communications Pre-Configured Rule Sets Anti-Virus for Internal Email Same Attachment & Message Scanning Engine as MailMarshal Reporting Includes ALL Internal Email On average, 70% of corporate email, excluding spam, is internal, 30% external Exchange Server Firewall
  • 38. Provides ‘the best of both worlds’ – appliance hardware and software Easy to deploy - hardened platform - low administration overhead Flexible – upgradeable - scalable – multi-function security ‘MailMarshal software solution in a box’ Full functionality of MailMarshal software – packaged in a box! Hardened Email Security Appliance Standard 1U 19” rack mountable chassis Unified solution for anti-virus, anti-spam and email security 9/23/2008 Marshal e10000 Security Appliance
  • 40. The Wild, Wild Web “To date, most large enterprises already have some combination of network firewall, URL filter and proxy server to protect and manage Web traffic. However, most organizations do not effectively filter malware from Web traffic. Gartner estimates that fewer than 15% of enterprises scan Web traffic for viruses.” (Gartner March 2007) “Marshal’s TRACE Team last year predicted that social networking sites such as MySpace would be increasingly used as vehicles for spreading malware in 2008. Their popularity and rapid growth with Internet savvy users makes them an ideal vehicle for this kind of activity. People’s guards are lower and they are more accepting of familiar looking messages coming from seemingly trusted and frequently used websites.”
  • 41. Web 2.0, Employee 2.0 Web 2.0 is the term that refers to a second generation of hosting and online communities, social-networking sites (personal and business), content sharing (videos and photos), wikis (user created content) that facilitates sharing, creativity and collaboration between users. The next generation Employee 2.0 has grown accustomed to these services and stopping all access could cause hiring issues and corporate culture stigmas. What are your choices?
  • 42. What Are Your Choices? Stop all access to these websites, or… Create an Acceptable Use Policy and institute some simple, yet thorough protections against the malware and malicious content that grows each day on the web.
  • 43. 9/23/2008 Market Future - Web The rise of Web 2.0 and lack of protection is causing a rapid rise in the attacks using Internet browsing. Organizations need to protect this widely used communication path in and out of their networks. Companies need to look for products delivering a Secure Web Gateway vision, moving beyond only URL Filtering to provide real ‘web access control’ for the content users are actually visiting Advanced multi-layered threat protection in real-time on the content being accessed and Data Leakage protection across this popular outbound path of data. Web Access Control Web Threat Protection Data Loss Prevention
  • 44. Securing the Web Gateway “The Internet has become a major source of infection for PCs, and the massive adoption of Web applications, in addition to the popularity of blogs and social-networking sites, has made this vector much harder to control. The Internet and Internet applications will be the primary sources of malware infections in the enterprise in 2008 and beyond.  Most companies have focused on the desktop or e-mail gateway to block malicious content. The enterprise Web gateway is another tier in need of additional protection from malicious code and inappropriate use.” (Gartner March 2007)
  • 45. 9/23/2008 WebMarshal-Beyond URL Filtering WebMarshal 6.0 is a Secure Web Gateway It Goes Beyond URL Filtering Provides real-time content analysis of incoming and outgoing Web traffic Webmarshal Is Designed To Meet The Needs Of All Organizations – Large And Small Array Manager architecture allows management of distributed multi-server environments
  • 46. Key Functionalities WebMarshal combines 3 key functions into one Secure Web Gateway: Web Access Control – management of employee Internet use Web Threat Security – protection against Web-based security threats Data Leakage Prevention – security of confidential or sensitive information Free 30 Day Trial Software at www.marshal.com
  • 47. Common Policy Engine Components AV Scanners Spyware Scanners URLCensor TextCensor & TextCensor Scripts File Un-packer File type identifier Policy definition wizard (Customized to suit product)
  • 48. Secure Web Gateway Appliance All in one combined Email & Web Security Appliance Unified Administration, Management & Reporting Suited for sub 2500 user companies that are looking for a single all in one appliance, a hardened solution for MailMarshal & WebMarshal products 9/23/2008
  • 49. Marshal EndPoint Security Email Content Security
  • 50. Where Does The Threat Originate? 74% of survey respondents said threats to corporate security are now coming from inside the organization. IBM Security Survey 2006 Up to 70% of identity theft starts with the deliberate removal of personal data from a company by an employee Professor Judith Collins, Michigan State University Human Error was responsible for nearly 60% of security breaches in 2005 4th Annual CompTIA Study on Information security and the Workforce 70% of threats come from inside the organization Analyst Firm
  • 51. Marshal EndPoint Security Helps protect your data, both on and off the network: Prevention - Prevents the transfer of files to or from unauthorized portable devices Protection - Automatically encrypts data copied to approved devices Visibility - Provides complete visibility of device and file accesses on the network Flexibility - Provides granular control over who has access to what devices and for how long
  • 53. Integration with new Marshal URL Filtering List New Device Support Microsoft ISA Security Logs in addition to current proxy support Borderware update to latest OS NetScreen update to latest OS Juniper update to latest OS Highlights: URL filtering list integration ISA Security log support Updated Borderware support Updated Netscreen support Updated Juniper support Security Reporting CenterFirewall Reporting WebMarshalInternet Browsing Content Security MailMarshalEmail Content Security Security Reporting Center v2.5
  • 54. When Selecting a Security Partner… Consistent Policy Engine Does Spam Filtering Occur Inside the Firewall Zero Day Protection Allow Custom File Type Definitions Is There a 24-hour Protection Team Actively Scan all Web Content in Real Time
  • 55. Marshal Your preferred and trusted partner for email and internet content security.