sonic wall email security end user
DESCRIPTION
TRANSCRIPT
SonicWALL Email Security
CONFIDENTIAL All Rights Reserved2
Agenda
SonicWALL Overview
Email Threat Landscape
Protecting Against Email Threats
SonicWALL Email Security Product Line
CONFIDENTIAL All Rights Reserved3
SonicWALL Market Leadership
*Appliances Selling for $490 - $1,499 and $1,500 - $5,000Sources: IDC 2004, IDC 2005, Infonetics, Q3’05 2005
in Units and Revenuein Units and Revenue inin Unified Threat Unified Threat ManagementManagement
#1
in in Security AppliancesSecurity Appliances in Revenue and Units* in Revenue and Units*
#2Web Filtering Web Filtering
Appliance Appliance ProviderProvider
#3
Secure Content Secure Content Management Management
ProviderProvider
#4
CONFIDENTIAL All Rights Reserved4
Policy and Management
Business ContinuityBusiness Continuity
SecureContent
Management
SecureContent
Management
NetworkSecurityNetworkSecurity
SonicWALL Solution Suite
CONFIDENTIAL All Rights Reserved5
Global ManagementSecure Wireless
SonicPoint GMS
Content SecurityNetwork Security
TZ & PRO Email Security & CSM
Business Continuity
CDP
Remote Access
SSL-VPN
SonicWALL Solution Suite
CONFIDENTIAL All Rights Reserved6
Agenda
SonicWALL Overview
Email Threat Landscape
Protecting Against Email Threats
SonicWALL Email Security Product Line
CONFIDENTIAL All Rights Reserved7
IT Security Concerns
Top 5: Virus, Spyware, SPAM, Intrusion & TheftTop 5: Virus, Spyware, SPAM, Intrusion & Theft
CONFIDENTIAL All Rights Reserved8
Threats: More, and More Malicious…and Now Compliance Requirements
That 3 year old spam box just isn’t cutting it anymore!That 3 year old spam box just isn’t cutting it anymore!
U.S. Email volume 2.4Bn/day in 2006(1)
Email is the perimeter application that reaches all users
Cost of email threats is over $20Bn(2)•Volume is exploding •Threats spreading faster, more malicious•Hybrids more like viruses in their approach
Enterprise’s infrastructure is at stake
Notes:(1) eMarketer, 2004(2) National Technology Readiness Survey, Rockbridge Associates, Inc. & Maryland Business School, 11/2004
CONFIDENTIAL All Rights Reserved9
Spam
Many messages are obviously spamMany messages are obviously spam
CONFIDENTIAL All Rights Reserved10
Is it Spam?
Other messages will be disagreed uponOther messages will be disagreed upon
CONFIDENTIAL All Rights Reserved11
Phishing
Some emails are easy to determine as phishSome emails are easy to determine as phish
CONFIDENTIAL All Rights Reserved12
Phishing?
Sometimes it is hard to tellSometimes it is hard to tell
CONFIDENTIAL All Rights Reserved13
Viruses Spread Rapidly
Virus outbreaks continue to happenVirus outbreaks continue to happen
CONFIDENTIAL All Rights Reserved14
Virus Signatures Take Time
Stop gap reactions•Disconnect from Internet•Send multiple “do not open” warnings•Panic
Virus signatures take hours to become availableVirus signatures take hours to become available
CONFIDENTIAL All Rights Reserved15
Outbound Risks and Compliance
•U.S. Federal: HIPAA, GLBA, SOX, Sec 17a-4, NASD3010, PATRIOT Act Section 326•European: Safe Harbor, EU Data Protection Directive 95/46 •Organization: VISA CISP, MasterCard Site Data Protection Program, FERPA•State: CA SB 1386 & AB 1950 / NY Bill A04254 / IL H.B. 1633•Corporate: Prevent offensive language, add disclaimers, block files•Many more…
All organizations need to be address compliance requirementsAll organizations need to be address compliance requirements
CONFIDENTIAL All Rights Reserved16
Inbound and Outbound Threats
Threats Require Inbound and Outbound ProtectionThreats Require Inbound and Outbound Protection
CONFIDENTIAL All Rights Reserved17
Proliferation of Systems
Typical Mail Data Center
Management of Multiple Systems Becomes ComplexManagement of Multiple Systems Becomes Complex
CONFIDENTIAL All Rights Reserved18
Agenda
SonicWALL Overview
Email Threat Landscape
Protecting Against Email Threats
SonicWALL Email Security Product Line
CONFIDENTIAL All Rights Reserved19
Collect Worldwide Threat Data
CONFIDENTIAL All Rights Reserved20
Analyze for Bad/Good Email Patterns
Likely Virus
Bad Pattern Good Pattern50 people
… in 6 different countries
… receive a new attachment
…that has never been seen before
… within 30 minutes
40 million emails
… sent by [email protected]
… from 3 IP addresses
… in Seattle
… and never junked
Good Email
SonicWALL Analyzes Patterns
CONFIDENTIAL All Rights Reserved21
Cross Analyze Patterns with Content Evaluation and Reputation
SonicWALL Determines a Definitive Judgment – Not Just a ScoreSonicWALL Determines a Definitive Judgment – Not Just a Score
CONFIDENTIAL All Rights Reserved22
SonicWALL Email Security Stops Today’s and Tomorrow’s Threats
Threats Evolve – SonicWALL ProtectsThreats Evolve – SonicWALL Protects
CONFIDENTIAL All Rights Reserved23
Agenda
SonicWALL Overview
Email Threat Landscape
Protecting Against Email Threats
SonicWALL Email Security Product Line
CONFIDENTIAL All Rights Reserved24
Best-of-Breed Product
Healthcare Transportation
Nonprofit
Retail
Consumer Goods
Automotive
Entertainment
Financial Services
Technology
Media/Publishing
Pharmaceutical
Aerospace/Defense Manufacturing
Technology
Government
Hospitality
EducationRetail
Media/Publishing
Consumer Goods
2,000+ Customers & 96% Retention2,000+ Customers & 96% Retention
CONFIDENTIAL All Rights Reserved25
Award Winning Email Security
FINALISTS: Barracuda Networks, Inc. for Barracuda Spam Firewall BorderWare Technologies for MXTreme Mail Firewall Clearswift for Clearswift/MIMEsweeper for SMTP CipherTrust, Inc. for CipherTrust IronMail Gateway eSoft, Inc. for eSoft ThreatWall 300 GFI Software Ltd for GFI MailSecurity for Exchange/SMTP
Best Content Security SolutionOverall Category Winner and Winner for Best Anti-Spam
AND MORE FINALISTS: MailFrontier, Inc. for MailFrontier Gateway MailShell for MailShell SDK Solinus, Inc. for MailFoundry Email Filtering Appliance Sunbelt Software for iHateSpam for Exchange Symantec Corporation for Symantec Brightmail AntiSpam Tumbleweed Communications for MailGate Email Firewall
http://scmagazine.com/us/news/article/546173/best+content+security+solution/
CONFIDENTIAL All Rights Reserved26
SonicWALL Email Security Anti-Spam, Anti-Phishing, Anti-Virus Compliance and Policy Management Appliance and Software options Works with any email system (SMTP) Unified inbound and outbound protection Installs in < 1 Hour…managed in < 10 minutes/week For businesses from Less than 50 users to Over 5000 Users
CONFIDENTIAL All Rights Reserved27
Product Overview
Quick Installation
Anti-Spam, Anti-Phishing, Anti-Virus
Administrative and End-User Junk Box
Junk Box Summaries
Policy & Compliance Management
Email Auditing
Reporting & Monitoring
CONFIDENTIAL All Rights Reserved28
Quick Configuration
5 Steps to Configure
Full install in < 1 hour
High availability options
CONFIDENTIAL All Rights Reserved29
Anti-Spam, Anti-Phishing, Anti-Virus
Complete protection Inbound/Outbound Spam, Virus, Phishing Zombies, DHA, DoS
Automatic updates No rules to write
Complete flexibility Per-user and per-group
CONFIDENTIAL All Rights Reserved30
Administrative and End-User Junk Box
Web-based Junk Box Search, sort, preview View all threats
1-click UnJunk Retrieves Adds to allowed list Provides feedback
Administrative, End-User
CONFIDENTIAL All Rights Reserved31
Junk Box Summary
Easy quarantine view Email summary
Configurable Frequency Specific time and day 11 languages All or just questionable
Preview and UnJunk 1-click
CONFIDENTIAL All Rights Reserved32
Email Policy & Compliance Approach
Robust tools to Identify, Monitor, and EnforceRobust tools to Identify, Monitor, and Enforce
CONFIDENTIAL All Rights Reserved33
Policy and Compliance Management
Powerful filters Search any message part Scan within attachments Check for disguised text Match against dictionaries Judgment-based policies
15 action options Bounce, quarantine, log Add disclaimers Strip attachments Etc.
Apply to specific groups LDAP-based
CONFIDENTIAL All Rights Reserved34
Email Auditing
Full email audit All good mail All bad mail Inbound Outbound
Searchable From, To, Subject Today or multi-day
Detailed information Per-recipient data Full audit trail
CONFIDENTIAL All Rights Reserved35
Reporting and Monitoring
25+ Web-based reports Dashboard, System Status Spam, Phishing, Virus Policy and Compliance Return-on-Investment
Custom reports
Emailed reports
Schedulable reports
CONFIDENTIAL All Rights Reserved36
Instant Deployment
CONFIDENTIAL All Rights Reserved37
High Availability Deployment
CONFIDENTIAL All Rights Reserved38
Products & Subscriptions
Thank you.
www.sonicwall.com