+ All Categories
Home > Technology > Presentacion Productos Marshal Sept 2008

Presentacion Productos Marshal Sept 2008

Date post: 12-Apr-2017
Category:
Upload: ggarciaggarcia
View: 754 times
Download: 0 times
Share this document with a friend
39
Secure. Protect. Comply. Marshal Your preferred and trusted partner for email and internet content security.
Transcript
Page 1: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Marshal

Your preferred and trusted partner for email and internet content security.

Page 2: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Agenda

• The Marshal Story• MailMarshal

– Inbound/Outbound Content Filtering• WebMarshal

– Inbound/Outbound Internet Filtering• Marshal Endpoint Security

– Control User Access Points• Security Reporting Center

Page 3: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

What Does Marshal Do?

Marshal provides comprehensive security solutions that include:

– Email Security – Web Security – EndPoint Security– Security Reporting

Page 4: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Who is Marshal?

• First MailMarshal Customer in 1997• 40% of Fortune 500 Use Marshal Products• Customers in 97 Countries• 19,000+ Companies Utilizing Marshal World Wide with 8,500 in the US• Offices in Atlanta (HQ), Houston (Support), UK (HQ), New Zealand (Development)• WebMarshal finalist in the "Best Web Filtering Solution" category in the SC

Magazine's 2007 and 2008 U.S Reader Trust Awards (at RSA)• Gartner Email Security Boundary Magic Quadrant 2007• Key Product points – Easy to eval, install, deploy and use. High performance

(fast), functionally, superior content engine with lexical analysis and very good price point.

Page 5: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Representative Customers GOVERNMENTEDUCATION

HEALTHCAREBANKING / INSURANCE

PROFESSIONAL SERVICESMANUFACTURING

OTHERS

Page 6: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Secure Email Gateway• Where Does Marshal software run

Internet

Normal Email

S/Mime Encryption

SMTP ServerEmail Gateway

Internal Email Server

Secure Email Gateway

Firewall

DMZ PerimeterSecurity Zone

InternalNetwork

End User Workstations

Page 7: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Common Policy Engine Components

• AV Scanners• Spyware Scanners• Urlcensor• Textcensor & Textcensor Scripts• File Un-packer• File Type Identifier• Policy Definition Wizard (Customized To Suit Product)

Page 8: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Marshal Products work for InBound and Outbound Traffic

They Want In…

WebMarshal Web Content Security Secure Web Gateway - HTTP Proxy

C O M M O N P O L I C Y E N G I N E

MailMarshal for ExchangeInternal Email

MailMarshal Email Content SecuritySMTP Gateway

Email Content & Compliance • File Attachment Control and Filtering• Lexical Text Analysis of Email & Files• Email Header Re-writing• Deep Image Analysis (Anti-Porn)*• Policy driven Message Stamping• Compliance Templates

Edge Protection• DOS & DHA Attack Sending

Host Connection Policies• Anti-Phishing• Anti-Virus* & Anti-Spyware*• Data Loss Prevention

TLS&

S / MIMEENCRYPTION

Data LossPrevention• Full Content

Scanning• File finger-printing

Web Threat Security• Anti-Phishing• Anti-Virus & Anti-

Spyware*• File-type Identification• File & Content upload

control

Employee Internet Management• URL Filtering Lists*• Real-time Categorization engine• Quota Management by Size & Time• File download controls• Lexical Text Analysis of files/content

1.

2.

Email

Web

Page 9: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

MailMarshal SMTPv6.4

Email Content Security

Page 10: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

MailMarshal SMTP• Gateway Solution: Secure-Protect-Comply • Anti-Spam: Controls spam based on extensive array architecture• Prevents Directory Harvesting Attack (DHA): Secures data to prevent DHA • Prevents Denial of Service Attacks (DoS): Stops flood of spam from bringing

email servers down • Anti-Virus: Scans messages in real-time • Anti-Spyware: Isolates suspicious email attachments

at the gateway• Manage Email Attachments: Strips attachments or

blocks file types per user• Deep Message Analysis: All layers of email dissected

into basic components for comprehensive security• Image Analyzer: Scans and sorts images to comply

with acceptable use policiesCHRISTINA NEUSTADT,

Director of Customer Service,The Weather Channel

Page 11: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

SPAM

Reputation Lists

80.0%

SpamProfiler

95.0%

SpamCensor

99.5%

RBL/URL Censor

99.9%

Custom(Whitelists, etc.)

99.95%

Defense-in-Depth

• Marshal's Anti-Spam & Anti-Phishing System

Page 12: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

MailMarshal SMTP v6.4• SpamProfiler - Spam Signature Service, Deployed at the MMReceiver• Marshal IP Reputation Service – Mixture Of White & Black Data

– Auto white-listing for Reputation/RBL lists based on number of successfully delivered email and % of Spam received

• Enhanced Email Routing Options• Marshal Notification Service – RSS feeds from Marshal, 4 feeds: Product

Updates & Notifications, TRACE Alerts, TRACE News and Offers & Promotions• Image Analyzer Update – More Accurate, Faster• Full Office 2007 File Support• McAfee Engine Update• Dead-letter updates – Expanded Support for Bulk E-mailers• SQM Update• Extending SpamCensor Scans Complete Message Body and Attachments

Page 13: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Anti-Spam Arsenal

• Reputation Lists - Automatic Adaptive Whitelisting• SpamProfiler - Regularly updated list of intelligent profiles for Spam

Messages, run at receiver• SpamCensor - Heuristic detection engine with more than 1800

checks on Email header alone• URLCensor - Looks for URL links inside email messages – Phishing

Detection, de-obfuscates mined URL’s• Custom – CountryCensor, Whitelists, etc.

Page 14: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

SpamCensor

• Heuristic detection engine with more than 1800 checks on Email header alone – Most Configurable

• Works on a scoring system, by default over 60 pts is considered a Spam message

• Has series of Spam categories to identify Spam makeup• Automatically updated weekly• Framework for delivering Zero day Spam & Virus updates• Can be used for many other functions in MailMarshal

Page 15: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

URLCensor

• Looks for URL links inside email messages – Phishing Detection• De-obviouscates mined URL’s• Performs DNS check against external suRBL lists to see if URL is

listed

Page 16: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

DNS Blacklists

• One of the traditional methods of Spam detection• Looks up IP addresses or Sender names in remote DNS lists• Examples of DNS Blacklists are:-

– SpamHaus– SpamCop

Page 17: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

CountryCensor

• Identifies the IP address of the original sender• Looks up this IP address against a database of the IP address

ranges allocated to different countries• Can allow, Block or just log in the instance of an Email coming in from

a region or a particular country – Detects country of origin

Page 18: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

TRACE Team

Marshal TRACE: Threat Research and Content Engineering

MailMarshalServer

Global Spam Honeypots and

Submitters

Research by Security Experts

Threat Database Automatic Machine Learning Analysis

TRACEThreat Research and Content Engineering

Spam, Threat andZero Day Updates

Page 19: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

TRACE Website

• Currently covering Email, Web and malware threats• Full range of emerging threats and advice• Detailed statistics and reports• Blogs & RSS feeds• Future is for greater automatic protection directly into products and

correlation of threat data from customer base

www.marshal.com/trace

Page 20: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.05/03/2023

Summary

• Marshal’s Defense-in-Depth Anti-Spam & Anti-Phishing engine is the most advanced available, with multiple facets and layers to cover the ever evolving Spam & Phishing threat

• Combination of technologies providing consistent results, Zero False Positives and a 99.5% detection rate

• Designed and tuned for speed without compromising performance• Marshal’s Trace team of experts providing the vigilance and

protection for your ease of mind

Free 30 Day Trial Software atwww.marshal.com

Page 21: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

MailMarshal For Exchange

• Monitor Internal Microsoft Exchange Email• Addresses Acceptable Use Policy (AUP) of Inter-office Communications • Pre-Configured Rule Sets• Anti-Virus for Internal Email• Same Attachment & Message Scanning Engine as MailMarshal• Reporting Includes ALL Internal Email

On average, 70% of corporate email,

excluding spam, is internal, 30% external

Internet

Exchange ServerFirewall

Page 22: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.05/03/2023

Marshal e10000 Security Appliance

• Provides ‘the best of both worlds’ – appliance hardware and software– Easy to deploy - hardened platform - low administration overhead– Flexible – upgradeable - scalable – multi-function security

• ‘MailMarshal software solution in a box’– Full functionality of MailMarshal software – packaged in a box!

• Hardened Email Security Appliance– Standard 1U 19” rack mountable chassis

• Unified solution for anti-virus, anti-spam and email security

Page 23: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

WebMarshalv6.0

Beyond URL Filtering

Page 24: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

The Wild, Wild Web

• “To date, most large enterprises already have some combination of network firewall, URL filter and proxy server to protect and manage Web traffic. However, most organizations do not effectively filter malware from Web traffic. Gartner estimates that fewer than 15% of enterprises scan Web traffic for viruses.” (Gartner March 2007)

• “Marshal’s TRACE Team last year predicted that social networking sites such as MySpace would be increasingly used as vehicles for spreading malware in 2008. Their popularity and rapid growth with Internet savvy users makes them an ideal vehicle for this kind of activity. People’s guards are lower and they are more accepting of familiar looking messages coming from seemingly trusted and frequently used websites.”

Page 25: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Web 2.0, Employee 2.0

• Web 2.0 is the term that refers to a second generation of hosting and online communities, social-networking sites (personal and business), content sharing (videos and photos), wikis (user created content) that facilitates sharing, creativity and collaboration between users.

• The next generation Employee 2.0 has grown accustomed to these services and stopping all access could cause hiring issues and corporate culture stigmas.

• What are your choices?

Page 26: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

What Are Your Choices?

• Stop all access to these websites, or…• Create an Acceptable Use Policy and institute some simple, yet

thorough protections against the malware and malicious content that grows each day on the web.

Page 27: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.05/03/2023

Market Future - Web

• The rise of Web 2.0 and lack of protection is causing a rapid rise in the attacks using Internet browsing. Organizations need to protect this widely used communication path in and out of their networks.

• Companies need to look for products delivering a Secure Web Gateway vision, moving beyond only URL Filtering to provide real ‘web access control’ for the content users are actually visiting

• Advanced multi-layered threat protection in real-time on the content being accessed and Data Leakage protection across this popular outbound path of data.– Web Access Control– Web Threat Protection– Data Loss Prevention

Page 28: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Securing the Web Gateway

“The Internet has become a major source of infection for PCs, and the massive adoption of Web applications, in addition to the popularity of blogs and social-networking sites, has made this vector much harder to control. The Internet and Internet applications will be the primary sources of malware infections in the enterprise in 2008 and beyond. Most companies have focused on the desktop or e-mail gateway to block malicious content. The enterprise Web gateway is another tier in need of additional protection from malicious code and inappropriate use.” (Gartner March 2007)

Page 29: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.05/03/2023

WebMarshal-Beyond URL Filtering

• WebMarshal 6.0 is a Secure Web Gateway• It Goes Beyond URL Filtering

– Provides real-time content analysis of incoming and outgoing Web traffic

• Webmarshal Is Designed To Meet The Needs Of All Organizations – Large And Small– Array Manager architecture allows management of distributed

multi-server environments

Page 30: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Key Functionalities

WebMarshal combines 3 key functions into one Secure Web Gateway: • Web Access Control – management of employee Internet use • Web Threat Security – protection against Web-based security threats • Data Leakage Prevention – security of confidential or sensitive

information

Free 30 Day Trial Software atwww.marshal.com

Page 31: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Common Policy Engine Components

• AV Scanners• Spyware Scanners• URLCensor• TextCensor & TextCensor Scripts• File Un-packer• File type identifier• Policy definition wizard (Customized to suit product)

Page 32: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Secure Web Gateway Appliance

• All in one combined Email & Web Security Appliance• Unified Administration, Management & Reporting• Suited for sub 2500 user companies that are looking for a single all in

one appliance, a hardened solution for MailMarshal & WebMarshal products

05/03/2023

Page 33: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Marshal EndPoint Security

Email Content Security

Page 34: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Where Does The Threat Originate?

• 74% of survey respondents said threats to corporate security are now coming from inside the organization.– IBM Security Survey 2006

• Up to 70% of identity theft starts with the deliberate removal of personal data from a company by an employee– Professor Judith Collins, Michigan State University

• Human Error was responsible for nearly 60% of security breaches in 2005– 4th Annual CompTIA Study on Information security and the Workforce

• 70% of threats come from inside the organization– Analyst Firm

Page 35: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Marshal EndPoint Security

Helps protect your data, both on and off the network:

• Prevention - Prevents the transfer of files to or from unauthorized portable devices

• Protection - Automatically encrypts data copied to approved devices • Visibility - Provides complete visibility of device and file accesses on

the network • Flexibility - Provides granular control over who has access to what

devices and for how long

Page 36: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Security Reporting Center

v2.5

Reporting Tool

Page 37: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Highlights:

URL filtering list integration

ISA Security log support

Updated Borderware support

Updated Netscreen support

Updated Juniper support

MailMarshalEmail Content Security

WebMarshalInternet Browsing Content Security

Security Reporting CenterFirewall Reporting

Security Reporting Center v2.5• Integration with new Marshal URL Filtering List• New Device Support

– Microsoft ISA Security Logs in addition to current proxy support

– Borderware update to latest OS– NetScreen update to latest OS– Juniper update to latest OS

Page 38: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

When Selecting a Security Partner…

• Consistent Policy Engine• Does Spam Filtering Occur Inside the Firewall• Zero Day Protection• Allow Custom File Type Definitions• Is There a 24-hour Protection Team• Actively Scan all Web Content in Real Time

Page 39: Presentacion Productos Marshal Sept 2008

Secure. Protect. Comply.

Marshal

Your preferred and trusted partner for email and internet content security.


Recommended