email security version 6.1 | august 2014. need for complete email security stop email threats at the...
TRANSCRIPT
![Page 1: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/1.jpg)
Email Security
Version 6.1 | August 2014
![Page 2: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/2.jpg)
Need for Complete Email Security Stop email threats at the perimeter• High volume spam, phishing, viruses and malware
Email policy enforcement• Organization’s security policy
Protect confidential information• Intellectual property, privacy regulatory compliance
Internal threats• Infected users spreading malware• Prevent becoming blacklisted
![Page 3: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/3.jpg)
Comprehensive Email Content Security Solution
Inbound Filtering• Connection Management and Content Scanning
Outbound Filtering• Data Loss Prevention (DLP) Policies• Email Encryption
Barracuda Real-Time Protection
Cloud Protection Layer (CPL)• Email Continuity
![Page 4: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/4.jpg)
Connection Management
Network DoS
Protection
Rate Control
IP Analysis
Sender Authen-tication
Recipient Verificatio
n
Incoming Email
![Page 5: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/5.jpg)
Mail Scanning
Good Email
Virus Scanning
Custom Policy
Fingerprint Analysis
Intent Analysis
Image Analysis
Bayesian Analysis
Spam Scoring
![Page 6: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/6.jpg)
12 Layers of Defense
Custom Policy
Fingerprint Analysis
Intent Analysis
Image Analysis
Bayesian Analysis
Spam Scoring
![Page 7: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/7.jpg)
Manage Email Content
![Page 8: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/8.jpg)
Content Filtering
Pattern CommentInboundOutbound Subject Header Body Bulk Edit
Confidential
EncryptEncryptSubject
Off Encrypt
Block Some
ContentBlock Block
![Page 9: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/9.jpg)
Bulk Email Categorization
Administrators can provide greater control over bulk email• Example: Amazon, Macy’s, Major retailers…
![Page 10: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/10.jpg)
DLP
![Page 11: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/11.jpg)
Data Loss Prevention
Data Loss Prevention Subject Body Attachment
Credit Cards Block Block Block
Social Security Numbers Block Block Block
Privacy Block Block Block
HIPAA Block Block Block
Encrypt EncryptCredit Cards Encrypt
Social Security Numbers
Privacy
HIPAA
Block Block Block
Quarantine
Encrypt
Quarantine
Encrypt
Quarantine
Encrypt
![Page 12: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/12.jpg)
Email Encryption
![Page 13: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/13.jpg)
![Page 14: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/14.jpg)
Extended Malware Protection
Additional layer of virus protection provided by 3rd party
Available for Barracuda Spam Firewall 600 and higher
Additional subscription required
![Page 15: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/15.jpg)
Cloud Protection Layer
![Page 16: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/16.jpg)
Flexible Deployment for Email Security
HardwareAppliance
Spam Firewall
VirtualAppliance
Spam Firewall Vx
Public CloudPlatforms
Spam Firewall AWSSpam Firewall Azure
Public CloudPlatforms
Email Security Service
![Page 17: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/17.jpg)
Centralized ManagementBarracuda Cloud Control • Manage multiple Barracuda products from
one portal• Central global policy management• Consolidated reports• Mobile Application for remote control• Free !
![Page 18: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/18.jpg)
Barracuda Spam Firewall Sizing
![Page 19: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/19.jpg)
Barracuda AdvantageLow TCO• All-inclusive pricing• No per-user/per-feature fees
Award-winning support• No phone trees• Region-based support
Instant Replacement Program• Next business day replacement• Free hardware refresh every 4 years
![Page 20: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/20.jpg)
Barracuda Federated Security
Mobile Device
Computer
Servers
Cloud-Scaled Central Management
Web Filter
Spam Firewall
WAF
SSL VPN
Appliance
Cloud
Virtual
Deployment Options:
NG Firewall
![Page 21: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/21.jpg)
Customers
![Page 22: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/22.jpg)
Comprehensive PortfolioStorageSecurity
Barracuda NG Firewall
Barracuda Email Security
Barracuda Web Security
Barracuda Firewall
BarracudaWeb Application Firewall
Barracuda Load Balancer ADC
Barracuda SSL VPN
Barracuda Link Balancer
Barracuda Backup
Barracuda Copy
BarracudaMessage Archiver
Barracuda SignNow
![Page 23: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/23.jpg)
Next Steps
![Page 24: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/24.jpg)
Moving ForwardTalk to us
Ask for a demo
Free 30-day evaluation
Complete Email Security
![Page 25: Email Security Version 6.1 | August 2014. Need for Complete Email Security Stop email threats at the perimeter High volume spam, phishing, viruses and](https://reader035.vdocuments.us/reader035/viewer/2022081419/5697bf9e1a28abf838c947af/html5/thumbnails/25.jpg)
Thank You