Simplifying Email, Web & Network Protection
Topics <ul><li>Astaro Company Profile </li></ul><ul><li>The Security Struggle </li></ul><ul><li>Overview of Astaro Securit...
Astaro Company Profile <ul><li>Founded in 2000 </li></ul><ul><li>Pioneered what is called Unified Threat Management market...
Customers © Astaro 2007
Recognition © Astaro 2007 Best of the year 2004 Best of the year 2005 Best of the year 2006 Editor's choice (2x) 5/5 Star ...
The Security Struggle © Astaro 2007 MULTIPLYING  THREATS DEMAND MULTIPLE DEFENSES THAT ARE DIFFICULT TO INTEGRATE  AND MAN...
<ul><li>Firewall </li></ul><ul><li>1995 </li></ul>The growing demand  for Internet Security  © Astaro 2007 VPN URL Filter ...
Astaro Security Gateway <ul><li>Complete Perimeter Security </li></ul>© Astaro 2007 Network Security Web Security Email Se...
Integrated Email, Web and  Network Protection © Astaro 2007 Content Filter Anti Virus & Spyware IM & P2P Control Web Filte...
Layered Security © Astaro 2007 Astaro Security Gateway  V7 External users Internet Firewall and VPN Intrusion Protection C...
Integrated Management © Astaro 2007 Installation Update Logging and  Reporting Network Security Web Security Email Securit...
Web Security © Astaro 2007 Network Security Email Security Content Filtering  Virus Protection  IM and P2P Control  Web Se...
Spyware Protection <ul><li>Blocks downloads of spyware, adware, and other malicious software </li></ul><ul><li>Prevents in...
Virus Protection for the Web <ul><li>Block viruses, worms, trojans, and other “malware” before they reach desktops </li></...
Content Filtering (URL Blocking) <ul><li>Enforces policies on appropriate use of the web </li></ul><ul><li>Administrators ...
IM & P2P Control <ul><li>Manage the use of Instant Messaging Clients </li></ul><ul><ul><li>AOL IM, ICQ, MSN Messenger, Yah...
Email Security © Astaro 2007 Network Security Web Security Email Security Virus Protection Spam Protection Phishing Protec...
Virus Protection for Email <ul><li>Block viruses, worms, trojans, and other “malware” before they reach email servers of d...
Spam Protection <ul><li>Identifies and disposes unsolicited emails (spam) </li></ul><ul><li>Scans SMTP and POP emails </li...
Protection Against “Phishing” <ul><li>“ Phishing” –  </li></ul><ul><ul><li>Criminals imitate emails from banks, credit car...
Email Security © Astaro 2007 Network Security Web Security Email Security Email Encryption
Email Encryption <ul><li>En-/Decryption and Digital Signatures for Emails  </li></ul><ul><ul><li>supports OpenPGP and S/MI...
Network Security © Astaro 2007 Network Security Web Security Email Security VPN Gateway Firewall Intrusion Protection Netw...
Firewall <ul><li>Stateful Packet Inspection </li></ul><ul><ul><li>Packet filtering – inspects packet headers </li></ul></u...
Virtual Private Network (VPN) Gateway <ul><li>Encrypts data to create a secure private communications “tunnel” over the pu...
Intrusion Protection <ul><li>Identifies and blocks application- and protocol- related probes and attacks </li></ul><ul><li...
Astaro Security Gateway Appliances © Astaro 2007 1) hot-swappable Astaro Security Gateway 110/120 Astaro Security Gateway ...
Other Astaro Products © Astaro 2007 Centralized management and real-time monitoring of installations with multiple ASG app...
Business Value <ul><li>Enhance Security </li></ul><ul><ul><li>Block threats with complete  perimeter security </li></ul></...
SC Magazine Awards 2007   ‘Best Network Security’ Solution <ul><ul><li>Voted as finalist by Astaro’s  loyal user base </li...
Upcoming SlideShare
Loading in …5
×

Is Astaro's security solution the right fit for my business?

823
-1

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
823
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
27
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page in 1995 we used firewalls in 2000 we added xyz in 2005 we used all the prior - plus xyz… now we even need tools to centrally manage for any customer this is slow and complex, and therefore insecure expensive, and therefore prohibitive Therefore we predict for 2010 Service providers will provide clean(er) pipes (use example of electricity and water provider…) UTM gateways and switches Special apps Transition: …and this is the business Astaro is in
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • © Astaro 2004 Astaro Security Linux – Page
  • Is Astaro's security solution the right fit for my business?

    1. 1. Simplifying Email, Web & Network Protection
    2. 2. Topics <ul><li>Astaro Company Profile </li></ul><ul><li>The Security Struggle </li></ul><ul><li>Overview of Astaro Security Gateway </li></ul><ul><li>Security Applications </li></ul><ul><ul><li>Web Security </li></ul></ul><ul><ul><li>Email Security </li></ul></ul><ul><ul><li>Network Security </li></ul></ul><ul><li>Appliances and Software </li></ul><ul><li>Additional Astaro Products </li></ul><ul><li>Business Value </li></ul>© Astaro 2007 Network Security Web Security Email Security
    3. 3. Astaro Company Profile <ul><li>Founded in 2000 </li></ul><ul><li>Pioneered what is called Unified Threat Management market </li></ul><ul><li>Profitable, growing 60% </li></ul><ul><li>Award-Winning Products </li></ul><ul><ul><li>Astaro Security Gateway – the most flexible solution for integrated email, web, and network protection </li></ul></ul><ul><ul><li>protects 40.000+ networks in over 60 countries </li></ul></ul><ul><ul><li>Easy to deploy and manage </li></ul></ul><ul><li>Global Presence </li></ul><ul><ul><li>Headquarters in Karlsruhe, Germany and Boston, USA </li></ul></ul><ul><ul><li>100+ employees in EMEA, Americas and APAC </li></ul></ul><ul><ul><li>24x7 technical support </li></ul></ul><ul><ul><li>1000+ partners & reseller worldwidet (700+ in EMEA) </li></ul></ul>© Astaro 2007
    4. 4. Customers © Astaro 2007
    5. 5. Recognition © Astaro 2007 Best of the year 2004 Best of the year 2005 Best of the year 2006 Editor's choice (2x) 5/5 Star Review (2x) Best of the year 2004 Best of the year 2005 Editor's choice Recommended product Product of the year 2005 Product of the year 2006
    6. 6. The Security Struggle © Astaro 2007 MULTIPLYING THREATS DEMAND MULTIPLE DEFENSES THAT ARE DIFFICULT TO INTEGRATE AND MANAGE <ul><li>Evaluate </li></ul><ul><li>Purchase </li></ul><ul><li>Train </li></ul><ul><li>Install </li></ul><ul><li>Integrate </li></ul><ul><li>Configure </li></ul><ul><li>Manage </li></ul><ul><li>Update </li></ul>Firewall VPN Spam Blocking Anti- Virus Intrusion Detection URL Filtering Anti- Spyware
    7. 7. <ul><li>Firewall </li></ul><ul><li>1995 </li></ul>The growing demand for Internet Security © Astaro 2007 VPN URL Filter IDS Email Anti Virus Firewall 2000 Central report tool Central config tool Central mgmt tool Signing/encryption VoIP Security VPN Remote access NAC Wireless security P2P filter IM filter Anti Spyware Multi protocol AV IPS VPN URL Filter IDS Email Anti Virus Firewall 2005 App 3 App 2 App 1 UTM Gateways Clean pipe 2010
    8. 8. Astaro Security Gateway <ul><li>Complete Perimeter Security </li></ul>© Astaro 2007 Network Security Web Security Email Security
    9. 9. Integrated Email, Web and Network Protection © Astaro 2007 Content Filter Anti Virus & Spyware IM & P2P Control Web Filtering Firewall IPS VPN Network Protection Email Security Spam Filter Anti Virus & Phishing Encryption
    10. 10. Layered Security © Astaro 2007 Astaro Security Gateway V7 External users Internet Firewall and VPN Intrusion Protection Content Filtering– Virus/Spam/URL/ Spyware/Phishing Internal users LANs Email Database Web Internal Resources
    11. 11. Integrated Management © Astaro 2007 Installation Update Logging and Reporting Network Security Web Security Email Security Management Interface
    12. 12. Web Security © Astaro 2007 Network Security Email Security Content Filtering Virus Protection IM and P2P Control Web Security Spyware Protection
    13. 13. Spyware Protection <ul><li>Blocks downloads of spyware, adware, and other malicious software </li></ul><ul><li>Prevents infected systems from sending information back to the spyware server </li></ul><ul><li>Checks against a database of known spyware URLs </li></ul><ul><li>Gateway spyware blocking complements desktop anti-spyware tools </li></ul>© Astaro 2007
    14. 14. Virus Protection for the Web <ul><li>Block viruses, worms, trojans, and other “malware” before they reach desktops </li></ul><ul><li>Scans HTTP and FTP traffic </li></ul><ul><ul><li>Web & ftp downloads </li></ul></ul><ul><ul><li>Web-based email (MSN Hotmail, Yahoo! Mail) </li></ul></ul><ul><li>Dual virus scanners with multiple detection methods </li></ul><ul><ul><li>Virus signatures, heuristic analysis </li></ul></ul><ul><li>Database of more than 300,000 virus signatures </li></ul><ul><ul><li>Frequent automatic updates </li></ul></ul><ul><li>Flexible management </li></ul><ul><ul><li>Can specify file formats and text strings to block </li></ul></ul>© Astaro 2007
    15. 15. Content Filtering (URL Blocking) <ul><li>Enforces policies on appropriate use of the web </li></ul><ul><li>Administrators can define web use policies based on pre-defined categories of web sites </li></ul><ul><ul><li>Nudity, gambling, criminal activities, shopping, drugs, job search, sports, entertainment, etc. </li></ul></ul><ul><li>Sophisticated classification techniques </li></ul><ul><ul><li>text classification, recognition of symbols and logos </li></ul></ul><ul><li>Whitelists and blacklists to tailor access for groups of users </li></ul><ul><li>Measure and report on activities </li></ul>© Astaro 2007
    16. 16. IM & P2P Control <ul><li>Manage the use of Instant Messaging Clients </li></ul><ul><ul><li>AOL IM, ICQ, MSN Messenger, Yahoo! Messenger, IRC, Google Talk/Jabber, Skype </li></ul></ul><ul><li>Manage the use of Peer-to-Peer applications </li></ul><ul><ul><li>Bittorrent, Edonkey, Gnutella,WinMX, Winny, Manolito, Ares, Direct Connect </li></ul></ul><ul><li>Flexible control </li></ul><ul><ul><li>For each application administrator can define, if it should be allowed or blocked and if he should receive a notice about its usage. </li></ul></ul>© Astaro 2007
    17. 17. Email Security © Astaro 2007 Network Security Web Security Email Security Virus Protection Spam Protection Phishing Protection Email Security
    18. 18. Virus Protection for Email <ul><li>Block viruses, worms, trojans, and other “malware” before they reach email servers of desktops </li></ul><ul><li>Scans SMTP and POP3 traffic </li></ul><ul><li>Dual virus scanners with multiple detection methods </li></ul><ul><ul><li>Virus signatures, heuristic analysis </li></ul></ul><ul><li>Database of more than 300,000 virus signatures </li></ul><ul><ul><li>Frequent automatic updates </li></ul></ul><ul><li>Flexible management </li></ul><ul><ul><li>Can specify file formats and text strings to block </li></ul></ul><ul><ul><li>Emails and attachments can be dropped, rejected with message to sender, passed with a warning, quarantined </li></ul></ul><ul><li>Gateway virus protection supplements desktop virus scanning. </li></ul>© Astaro 2007
    19. 19. Spam Protection <ul><li>Identifies and disposes unsolicited emails (spam) </li></ul><ul><li>Scans SMTP and POP emails </li></ul><ul><li>Multiple methods to identify spam </li></ul><ul><ul><li>Reputation service with spam outbreak detection using patented Recurrent-Pattern Detection TM technology </li></ul></ul><ul><ul><li>Realtime Blackhole Lists, Whitelists/Blacklists, Greylisting, URL scanning, BATV, SPF record checking… </li></ul></ul><ul><li>Detects spam in every language and format </li></ul><ul><li>Flexible management </li></ul><ul><ul><li>Emails and attachments can be rejected with message to sender, passed with a warning or quarantined </li></ul></ul><ul><ul><li>User can individually release blocked messages via daily spam report or end user portal </li></ul></ul>© Astaro 2007
    20. 20. Protection Against “Phishing” <ul><li>“ Phishing” – </li></ul><ul><ul><li>Criminals imitate emails from banks, credit card companies, eBay and other sources to obtain confidential user information </li></ul></ul><ul><li>Astaro identifies and blocks phishing emails through several techniques: </li></ul><ul><ul><li>Virus scanner identifies phishing signatures </li></ul></ul><ul><ul><li>URL filtering database captures phishing servers in the “suspicious” category </li></ul></ul><ul><ul><li>Content downloaded from web sites will be blocked if it matches patterns of phishing content </li></ul></ul>© Astaro 2007 Internet Email Server Web Server Email Databases of Phishing Sites Scans for phishing signatures
    21. 21. Email Security © Astaro 2007 Network Security Web Security Email Security Email Encryption
    22. 22. Email Encryption <ul><li>En-/Decryption and Digital Signatures for Emails </li></ul><ul><ul><li>supports OpenPGP and S/MIME </li></ul></ul><ul><li>Completely transparent </li></ul><ul><ul><li>No additional Software on Client required </li></ul></ul><ul><li>Easy Setup </li></ul><ul><ul><li>Only three configuration steps to start </li></ul></ul><ul><li>Central Management of all keys and certificates </li></ul><ul><ul><li>No key or certificate distribution required </li></ul></ul><ul><li>Allows Content/Virus scanning even for encrypted SMTP emails </li></ul>© Astaro 2007 SMTP Email in clear text Email Server Encrypted Email ‘ snmffdsa g Dsfg sdfgdsfgfdg Fdsg fgsdfgsdfgdsf Sfdgsdfdsfgsdf Fg fdsgdsfgsdfg Dfgdfsgfdsgfdsg dslsgdsfg External User Internal User
    23. 23. Network Security © Astaro 2007 Network Security Web Security Email Security VPN Gateway Firewall Intrusion Protection Network Security
    24. 24. Firewall <ul><li>Stateful Packet Inspection </li></ul><ul><ul><li>Packet filtering – inspects packet headers </li></ul></ul><ul><ul><li>Stateful packet inspection – tracks events across a session to detect violations of normal processes </li></ul></ul><ul><ul><li>Time-based rules and Policy-based routing </li></ul></ul><ul><li>Application-Level Deep Packet Filtering </li></ul><ul><ul><li>Scans packet payloads to enforce protocol-specific rules </li></ul></ul><ul><li>Security proxies to simplify management </li></ul><ul><ul><li>HTTP, FTP, POP3, SMTP, DNS, Socks, Ident </li></ul></ul><ul><li>NAT (Network Address Translation) and masquerading </li></ul><ul><li>DoS (Denial of Service Attack) protection </li></ul><ul><li>Transparent mode eases administration </li></ul>© Astaro 2007
    25. 25. Virtual Private Network (VPN) Gateway <ul><li>Encrypts data to create a secure private communications “tunnel” over the public Internet </li></ul><ul><li>Supports IPSec, SSL, L2TP, and PPTP VPNs </li></ul><ul><ul><li>Windows, Linux, Unix and MacOS x clients </li></ul></ul><ul><li>Advanced encryption </li></ul><ul><ul><li>Supports all major encryption methods </li></ul></ul><ul><li>Many authentication methods </li></ul><ul><li>Internal certificate authority </li></ul><ul><ul><li>Full Public Key Infrastructure (PKI) support </li></ul></ul><ul><li>Supports VPN tunnels based on dynamic IP interface addresses (DynDNS) </li></ul>© Astaro 2007
    26. 26. Intrusion Protection <ul><li>Identifies and blocks application- and protocol- related probes and attacks </li></ul><ul><li>Database of over 6,000 patterns and rules </li></ul><ul><ul><li>Probing, port scans, interrogations, host sweeps </li></ul></ul><ul><ul><li>Attacks on application vulnerabilities </li></ul></ul><ul><ul><li>Protocol exploitations </li></ul></ul><ul><li>Intrusion detection and prevention </li></ul><ul><ul><li>Notify administrator, or block traffic immediately </li></ul></ul><ul><li>Powerful management interface </li></ul><ul><ul><li>One click to enable or disable complete rule sets e.g. for email- or webservers </li></ul></ul>© Astaro 2007
    27. 27. Astaro Security Gateway Appliances © Astaro 2007 1) hot-swappable Astaro Security Gateway 110/120 Astaro Security Gateway 220 Astaro Security Gateway 320 Astaro Security Gateway 425 Astaro Security Gateway 525/525F Environment Small office/ branch office Small to Medium business Medium business Medium business, enterprise division enterprise division Hardware specs 3 x 10/100 Base-TX ports integrated HD 8 x 10/100 Base-TX ports integrated HD 4 x 10/100 Base-TX ports 4 x Gigabit Base-TX port integrated HD 4 x Gigabit ports – PCI bus 4 x Gigabit ports – PCI Express bus Hardware acceleration card integrated HD Dual Intel Xeon CPU 10 x Gigabit ports – PCI Express bus - 525: 10 x Copper - 525F: 4 x Copper/6 x SFP Hardware acceleration card 2 integrated HD (RAID1) 1) 2 redundant Power supplies ) Performance Firewall VPN IPS 100 Mbps 30 Mbps 55 Mbps 260 Mbps 150 Mbps 110 Mbps 420 Mbps 200 Mbps 180 Mbps 1,200 Mbps 265 Mbps 450 Mbps 3,000 Mbps 400 Mbps 750 Mbps Astaro Security Gateway Software Runs on Intel-compatible PCs and servers
    28. 28. Other Astaro Products © Astaro 2007 Centralized management and real-time monitoring of installations with multiple ASG appliances Astaro Command Center Advanced IPSec VPN client with personal firewall and integrated dialer Astaro Secure Client Centralized security reporting engine that collects, correlates and analyzes security data and provides a huge portfolio of grafical reports Astaro Report Manager
    29. 29. Business Value <ul><li>Enhance Security </li></ul><ul><ul><li>Block threats with complete perimeter security </li></ul></ul><ul><ul><li>Integrated management reduces human error and increases speed of response </li></ul></ul><ul><li>Increase productivity </li></ul><ul><ul><li>Keep systems, networks and web sites up and running </li></ul></ul><ul><ul><li>Increase productivity by blocking spam and inappropriate web surfing </li></ul></ul><ul><li>Simplify management </li></ul><ul><ul><li>A complete perimeter security solution that is easy to deploy, manage and update, and that scales seamlessly from small offices to large headquarters installations. </li></ul></ul>© Astaro 2007 Network Security Web Security Email Security
    30. 30. SC Magazine Awards 2007 ‘Best Network Security’ Solution <ul><ul><li>Voted as finalist by Astaro’s loyal user base </li></ul></ul><ul><ul><li>Selected as winner by jury of independent industry experts </li></ul></ul><ul><ul><li>Ceremony organized by the UK’s industry leading security publication </li></ul></ul>© Astaro 2007 <ul><ul><li>Winner of ‘Best Network Security’ Solution category in the 2007 SC Magazine European Awards </li></ul></ul>

    ×