Your SlideShare is downloading. ×

Web Security and Network Security

5,470

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
5,470
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
71
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Common Web Security challenges that organizations are facing today include: Malware – malicious software designed to steal information or system resources. Without proper defense measures, web-borne malware can cause system downtime, cause data loss, or reduce productivity. Web Misuse – can reduce employee productivity, consume valuable bandwidth resources, and introduce legal risks to organizations in cases where inappropriate material is being viewed by users in view of peers. Enforcing a Web Acceptable Use Policy – implementing a Web Acceptable Use Policy is critical for controlling web misuse. However, without the proper tools, policies are difficult to monitor and enforce. An Increasingly Mobile Workforce – Remote workers and the need to travel for business have made protection for users who access the Web away from the corporate LAN a necessity for many businesses.
  • (Note: Please update this slide with the current month ’ s statistics from MessageLabs Intelligence) This slide demonstrates the trends so far in 2010 reported by MessageLabs Intelligence. What you ’ ll notice is that: The volume of blocks has increased 20 % since 2009 The volume of sites with spyware and web-borne viruses is significant 90% of the domains blocked by our service are from legitimate domains that have been compromised. It is important to note that certain Symantec.cloud competitors do not address the remaining 10% due to a dependence on URL filtering alone. Because our service is able to scan all Web content for threats, we are able to provide a more effective defense.
  • Workplace Web misuse is another issue organizations must manage to minimize risk and maximize productivity. The analyst community agrees: Web misuse can be expensive impacting both bandwidth and productivity MessageLabs Intelligence has found that many of the blocks that are enforced by our service prevent Web misuse in several forms (reference above information) What is the answer to this problem? Comprehensive URL Filtering that can control Web traffic, prevent bandwidth waste and enforce your policies to protect productivity
  • The growing adoption of Web 2.0 and Social media is another area to consider when determining your Web policies. (reference the above statistics) These sites can be addressed using the URL Filtering components of our service by creating rules which block or restrict their use during lunch hours or by placing quota limits upon their browse time and bandwidth consumption.
  • Web Security.cloud helps protect your organization from Web-borne threats and enables the control, monitoring and enforcement of Web Acceptable Use Policies with minimal latency. Automatically updated anti-malware layers block threats safely away from your network while URL filtering policies and Web traffic quota limits reduce Web misuse and help you protect your bandwidth. Key features include: Multi-layered anti-virus and anti-spyware defenses – we use multiple commercial scanners and our own patented Skeptic heuristic technologies to detect known and unknown malware threats. We can also detect bots trying to ‘phone home’ for instructions. Skeptic and converged threats - also gathers and shares threat intelligence across our email, Web, and IM security services. Distributed architecture – Our architecture uses globally distributed load balanced servers and caching techniques to maximize availability and deliver service with minimal latency URL Filtering - A highly configurable URL filtering policy engine is included with the service to aid in quickly establishing policies and rules for productive Web use. Enables you to create and enforce a Web Acceptable Use policy with rules based on Website categories, content types, and overall usage levels for Web traffic requests to adhere to when submitted by a user. Helps protect corporate bandwidth and productivity by blocking or restricting downloads of certain file types and placing time and volume limits on Internet consumption Roaming user support options – allows protection and policy enforcement to be applied to users when they are outside the corporate network Dashboard, summary and detailed reporting - is available to provide insight into Web usage and service effectiveness.
  • This slide will help you understand how Web Security.cloud works. Web Security.cloud examines the web traffic requests your users initiate and checks them against the policies you create. If a policy rule is triggered, the web request is either logged and allowed to pass or is denied. If no policy rules are triggered the web request is allowed to pass Web page requests are retrieved and scanned by Symantec.cloud using multi-layer malware scanning technologies. If a threat is detected, the web page request is denied and the user is notified with a message in their web browser (which you may choose to customize) If no threats are found, page content is delivered with no noticeable delay
  • Do you have “road-warrior” workers? Frequent travelers? Are you worried about security for these users when they are outside of your network? Today’s workforce is increasingly mobile and almost anywhere can be a workplace. Smart Connect for Web Security.cloud helps you protect these users in a variety of environments and aids in enforcing your Acceptable Use Policies for users who are located away from your corporate LAN.
  • Smart Connect provides several distinct values to customers with highly mobile workers
  • This slide lists a few of the benefits that can be seen from using the Web Security.cloud Service (follow the content above)
  • With several choices in a hosted security service for your Web users, what makes the Symantec.cloud solution unique? (Follow above content)
  • Web Security.cloud is delivered using a global infrastructure which is designed to provide highly secure, available and reliable delivery of your service.
  • One of the benefits of selecting Symantec.cloud as your hosted services provider for Web Security is the fact that we also provide a broad portfolio of other integrated services which can be paired with your service. The result is a comprehensive and unified approach that saves you time, is scalable to your needs and is provided from an industry leader in hosted services.
  • Web Security.cloud stands out against the competition for a variety of reasons including: Our service delivers multi-layered protection without noticeable delay to your users Our URL filtering is highly accurate and posesses over 80 categories to select from, resulting in a low volumes of unclassified sites. Our service is delivered using a truly global, highly available infrastructure. Our infrastructure allows us to provide the service to you with minimal latency – something we also back up with our industry leading SLA. Web Security.cloud provides a means to make web use in your organization productive and compliant with the company Web Acceptable Use Policy. A hosted service, Web Security.cloud leverages multiple commercial scanning engines, blocks threats away from your network, can be deployed rapidly, requires no on-premise hardware or software, is updated automatically, is highly available, and offers a the advantage of predictable costs that can be covered through an OPEX budget. Support for roaming and remote users is available to help you protect and enforce policies for your users when they are located away from your corporate LAN. Our industry leading Service Level Agreement provides money back remedies if performance levels are not met.
  • An important Symantec.cloud differentiator is our ability to provide converging threat analysis. Here we see a few examples of threats that were delivered using various protocols. It’s important to note that these work in conjunction with one another to attack customers from multiple points of entry and achieve the same goal of exposing them to dangerous malware In the first example, an email that is meant to appear legitimate and is intended to appear as having been sent from a trusted sender contains a Web link which will direct the recipient to a malicious website. In the second example, an instant message has been sent from another user’s messaging client to someone on their contact list in order to make the attack appear as having been sent by the friend, colleague or acquaintance. The final example is a website that while appearing legitimate, is in fact, compromised and contains/ is hosting malware
  • Workplace Web misuse is another issue organizations must manage to minimize risk and maximize productivity. The analyst community agrees: 1.the browser is a prime gateway for attackers to leverage and 2. Web misuse can be expensive impacting both bandwidth and productivity MessageLabs Intelligence has found that many of the blocks that are enforced by our service prevent Web misuse in several forms (reference above information) What is the answer to this problem? Comprehensive URL Filtering that can control Web traffic, prevent bandwidth waste and enforce your policies to protect productivity
  • Gartner Magic Quadrant for Secure Email Gateway, Peter Firstbrook, Eric Ouellet, April 2010 Gartner Magic Quadrant for Secure Web Gateway, Peter Firstbrook, Lawrence Orans, January 2010 Ranked #1 by IDC for Worldwide Messaging Security Hosted Services with revenue nearly 2x that of the next closest provider. (Burke, Brian. IDC Market Analysis, “Worldwide Messaging Security 2009 – 2013 Forecast Update and 2008 Vendor Shares: Is Virtual a Reality?” July 2009, IDC #219270)
  • Hackers and Cyber-criminals often execute converged attacks, which leverage multiple communication protocols. A common approach is to use an email or instant message to convince a user to click on a URL, which takes a user to a spoofed or compromised web site. In fact, according to Symantec and MessageLabs research, more than 90% of email is spam, and more than 90% of spam emails contain a URL.
  • A hosted approach to Web security enables customers to receive the benefits of an appliance based solution but a more affordable option that includes unlimited scalability and an easier means of controlling risk and cost. Let’s compare Web security deployment options:   Blocking threats outside the network – On premise/appliance solutions look at content locally while Symantec.cloud services block threats at the Internet level, away from your network. Automatic URL, virus signature, and product updates – On premise/appliance solutions require regular signature and URL categorization updates, which need to be monitored by your staff. In addition, to access new features and fix bugs, administrators need to apply patches or manually deploy upgrades. Symantec.cloud services handle these activities automatically, leaving your resources free to focus on more critical business operations. Roaming User traffic not routed through corporate network – On premise/appliance solutions typically require roaming user traffic to be routed through the corporate network in order to flow through a gateway device before reaching a target web server. Web Security.cloud allows roaming users to send web requests directly through our service. Predictable costs – On premise/appliance solutions have significant upfront costs and require staff time to perform support and maintenance. Symantec.cloud services have a regular and recurring monthly cost which covers maintenance and support providing a means to budget and anticipate costs. Rapid deployment – Implementing on premise/appliance solutions can require IT resources to manage hardware purchasing, shipping, software downloads, configuration, and testing. Often this work needs to be performed in multiple physical locations. Web Security.cloud service can be deployed in hours. Service level agreements - On premise/appliance solutions typically lack service level commitments for performance. Our SLA provides money back remedies if performance levels are not met. Unlimited scalability- On premise/appliance solutions require additional equipment, software licenses and deployment costs to scale as user populations and coverage needs increase. MessageLabs hosted services are easily and quickly scaled to growing needs and new users can be quickly added regardless of site location. Built-in high availability- On premise/appliance solutions can experience failures and downtime, which expose your business to periods of risk until repairs are made. Symantec.cloud services are delivered through our global network of data centers to ensure high availability and minimal latency. Complimentary 24 / 7 support- On premise/ appliance solutions often require an additional contract or per incident fees for support while Symantec.cloud services include support as part of your subscription.
  • Do you have users who are small, or home office users? Remote Connect for Web Security.cloud helps you to protect these users who are less mobile, yet not located on your corporate LAN. Remote Connect helps you to extend protection and policy enforcement to these workers as if they were inside your corporate LAN
  • Threats are converging across many protocols making one form of defense not always enough. Symantec.cloud combines a single management console with a common threat detection architecture that integrates across hosted Web, email and Instant Messaging services. Detecting threats across these protocols and through our global infrastructure allows Symantec.cloud to rapidly detect new dangers. Using Symantec.cloud as your one-stop source for all of your security needs also delivers the benefits of having one trusted supplier, and uniting your service management under one intuitive interface saving you time and money.
  • Web Security.cloud is managed through an online portal known as ClientNet. The portal can be used to manage multiple Symantec.cloud services and provides you with reporting, policy management, user administration and online help functionality.
  • The portal features comprehensive reporting options for your service. Dashboard, Summary and Audit reports are available to help you monitor user activities and the performance of the service. (Summary and Audit reports may be performed with fixed or custom date ranges)
  • Detailed Reports are available and include several options to help you monitor the activity of the service
  • The dashboard is a quick at-a-glance view of your service ’ s activities and helps you to see recent trends.
  • Our URL filtering policy engine features over 80 categories to select from, and supports multiple categories for a single URL. This means you are able to create comprehensive and granular policies for your users to support the enforcement of your Acceptable Use Policies
  • Our URL Filtering is also flexible and configurable to help you address the needs of different users and groups
  • A URL lookup tool is also provided that aids in creating custom policies quickly and easily
  • Another helpful capability is the option to configure policies for users and groups that restrict access based on categories, specific sites, time of day, browse time and bandwidth consumption. This can be a particularly helpful way of protecting bandwidth and preserving user productivity.
  • So what do we do? We operate in the email and web security markets protecting our customers from threats such as viruses, spam and inappropriate content Essentially there are 3 main models to provide security in this area. - Software, the traditional solution which sits at the desktop or server on the right had side of this visual - and remains the principle focus of the likes of Symantec and McAfee. - Appliances which combine software and hardware and have some advantages in terms of ease of configuration and use. And - Managed services, which in the case of Symantec.cloud and some others, sit ‘ in the cloud ’ closer to the source of the threats. It is important to state that we do not advocate getting rid of desktop software, which still has part to play in an overall security solution Symantec.cloud focuses exclusively on services because we believe it has a number of inherent advantages as outlined on the slide:- - Fundamentally services and esp ML do a better job of protecting the customer because sitting where do we are closer to the threats and there are clever things we can do around identifying them. We back this up with the strongest SLAs in the industry. - Services are quick and easy to set up have a totally predictable cost and a lower TCO because you are essentially outsourcing your security to experts who can benefits from economies of scale. - Our service works independent of your OS or technology platform and you can have better load balancing of traffic and redundancy across our global network shown on the right there. - And lastly because we filter out all the rubbish before it gets to you, you use less bandwidth and put less strain on your systems (mail servers etc).
  • Email (7 slas), Web (3 slas), Archiving (2 slas), and Support (1 sla).
  • Hosted Services are particularly well-suited for the challenges and needs of businesses trying to address messaging security.
  • Note: not to be shared without an agreement in place.
  • Transcript

    • 1. Symantec MessageLabs Web Security.cloud Chris Russell
      • Cloud Security Specialist
      Web Security .cloud – January 2011
    • 2. Web Security Challenges Web Misuse
      • Reduces productivity, consumes bandwidth, and creates exposure to security and legal risk
      Web Security .cloud – January 2011 Defending Against Malware
      • Attackers use the Web to deliver viruses, spyware, and other malware
      Enforcing a Web Acceptable Use Policy
      • Often difficult and time consuming
      An Increasingly Mobile Workforce
      • Extending security and policy enforcement can be difficult when workers are located away from the corporate LAN
    • 3. Web Threat Landscape +20% Vs. 2009 on a per client per month basis. Average amount of Website requests blocked by our Service: Attackers are increasing their volume and frequently use legitimate Websites… Source: MessageLabs Intelligence, July 2010 Web Security .cloud – January 2011 10% 90% Legitimate Websites compromised by malware without the owners knowledge Analysis of Blocked Domains:
      • New Malware Sites per Day
        • Sites with spyware = 200+ per day
        • Sites with Web viruses: 4000+ per day
    • 4. Dangers of Web Misuse The Case for URL Filtering and Policy Enforcement InformationWeek :The Browser As Attack Vector, August 7, 2010 (From the August 9, 2010 issue; eWeek: How to Protect Your Business from Web 2.0 Risks , Bob Walters, 2010-02-01 MessageLabs Intelligence: 2009 Annual Security Report December, 2009 Comprehensive URL Filtering is needed to control Web traffic, protect bandwidth and enforce your Acceptable Use Policies “ ..the misuse of company resources through excessive bandwidth use is crippling some networks, as employees are increasingly storing large amounts of personal downloads. This can be expensive and slow down the entire network.” Web Security .cloud – January 2011
      • MessageLabs Intelligence Findings:
      • 87.4% of all blocks occur between 8am-6pm;
      • 32.6% of all blocks occur from 12-2pm;
      • Adult & Sexually Explicit:
        • 68% of blocks within working hours
        • 32% outside of working hours.
      • Streaming Media: 12.5% of all blocks
      • 44% of Phishing/Fraud website blocks occur during lunchtime
    • 5. Dangers of Web Misuse Social Media and Web 2.0 -MyJobGroup.co.uk - Social Media Costing UK Economy up to £14billion in Lost Work Time - 4th August 2010 http://www.symantec.com/connect/blogs/fraudsters-provide-false-security-facebook-users
      • How do Attacks Happen?
      • Compromised accounts send malicious links
      • Links direct users to:
      • a. site resembling a Facebook login b. a page with malware downloads
      • Criminals harvest the victim’s login. and password information for future attacks
      Nearly 2 million workers spend over an hour per day 'Facebooking' at work 13% of employees aged 18-29, and 13% of employees aged 30-43 now use social networking sites for work purposes Web Security .cloud – January 2011
    • 6. Web Security.cloud Overview Web Security .cloud – January 2011
    • 7. Web Security.cloud How it works Clean content is delivered without noticeable delay 3 Web content is retrieved by Symantec.cloud Multi-layer scanning detects Web-borne threats Web Security .cloud – January 2011 A user initiates a Web request which is checked against the customer policies 1 Firewall Firewall Policies determine whether traffic is sent on, flagged or denied. Each request is logged. Internet 2
    • 8. Roaming Support Options Smart Connect for Web Security.cloud Web protection and policy management for Mobile Users Seamlessly connects users from:
      • Seamlessly logs in users in a variety of network environments
      • Ideal for “road-warrior” users and frequent travelers
      • Enforces policies and protects users as if they were inside your corporate LAN
      Web Security .cloud – January 2011 Public Wi-Fi Hotspots; Pay-for-use portals Home Offices Corporate LAN & Regional Offices Data center
    • 9. Smart Connect Roaming Agent Customer Benefits
        • Automatically adjusts to differences in networking environments
        • Location awareness connects user to optimal infrastructure point
      Flexible
        • No ‘sign-on’ with compliant Web usage and transparent to user
        • Same protection and usage policies whether on or off LAN
      Seamless
        • Simple add-on to existing ClientNet policies and user groups
        • Standard agent install package for easy distribution
      Easy to Manage
        • Interoperable with captive portals/pay for use hotspots
        • Tested with leading endpoint security products to avoid conflicts
      Compatible
        • Protected with SSL encryption
        • System authenticated for roaming usage
        • Users are authorized for individual Web usage policies
      Secure Web Security .cloud – January 2011
    • 10. Benefits of Using Web Security.cloud
      • Average scanning of Web content within 100 ms
      • Response times for critical, major, and minor support calls
      Web Security .cloud – January 2011
      • Internet-level, multi-layer scanning uses multiple commercial engines and proprietary heuristics
      • Global threat intelligence helps protect against new and converged threats
      • URL filtering draws from 67 million URLs and over 80 categories
      Accurate Defenses
      • Global Infrastructure of 14 data centers in 4 continents processes billions of Web requests each month
      • Load-balanced servers help maintain minimal Web latency
      • Rapid deployment and automatic updates
      Strong Coverage
          • Dashboard, summary, detailed and scheduled reporting options for insight into service activities
          • Detailed reporting options include: browse time by category, individual URL and bandwidth consumption by users and groups
      Comprehensive Reporting Our Aggressive Service Level Agreement:
      • 100% protection against known web viruses
      • 100% service uptime
    • 11. What Makes Our Approach Unique? Web Security .cloud – January 2011
      • Security that exceeds point solutions
      • All Web content is scanned by our service, promoting enhanced accuracy above services that rely solely on URL filtering for threat detection
      • Our services share threat intelligence across email Web and IM for enhanced accuracy
      • Strong URL categorization
      • Large amount of categories available allowing you to create more granular policies
      • More categories means: less unclassified content, greater accuracy and stronger policy enforcement
      • Comprehensive options to enforce your Web Policy
      • Flexible quota management allows administrators to set limits for browse time and
      • bandwidth consumption
      • Create custom rules based on time of day, user, group and location to suit your organization
      • Roaming and remote worker support options
      • Options for both remote and roaming workers are available to suit your needs
      • Our roaming agent possesses location and network intelligence capabilities to provide the best browsing experience  
    • 12. Delivered Using a Global Infrastructure
      • Incorporating 14 data centers spanning four continents
      • Every data center is scalable and secured to the highest standards
      • Clustered high performance servers, each cluster has full redundancy within itself and all other hardware is duplicated
      Web Security .cloud – January 2011
    • 13. Part of a Portfolio of Integrated Cloud-based Services Web IM Email Content Control Image Control URL Filtering Boundary Encryption Policy Based Encryption Archiving Continuity Content Control Recover Secure Control Protect AntiVirus AntiSpam AntiVirus AntiSpam AntiVirus AntiSpyware Skeptic TM EndPoint.cloud Web Security .cloud – January 2011 EndPoint
    • 14. Summary
      • Advanced multi-layered protection from Web threats
      • Comprehensive URL Filtering with over 80 categories to promote service accuracy
      • Delivered through a highly available global infrastructure
      • Low latency service - Scanning performed in under 100 ms
      • Helps you make Web use more productive and compliant
      • Provides SaaS Advantages
      • Support for mobile workforce
      • Backed by an industry leading Service Level Agreement
      Web Security .cloud – January 2011
    • 15. Next Steps
      • Begin a free trial of Web Security.cloud
      • See a demo
      • Request a quote
      • Visit www.messagelabs.com for additional information
      Web Security .cloud – January 2011
    • 16. Chris Russell [email_address] +61 (0) 2 9086 8285 Web Security .cloud – January 2011
    • 17. Web Security .cloud – January 2011
    • 18. Web Threat Landscape Common entry points Comprehensive Protection Needed Across Email, Web, and IM Attackers frequently use multiple protocols to evade point solutions
      • When threats are found in our other services, this information is shared with the Web Security service for increased accuracy in detecting new and converging threats
      Web Security .cloud – January 2011 ‘ Spoofed’ Email with Web Link Fraudulent IM with Web Link Compromised Website Hosting Malware
    • 19. Dangers of Web Misuse (v2) The Case for URL Filtering and Policy Enforcement “ the browser is now your employees' gateway out-and an attacker's gateway in…new attack techniques are exploiting browser flaws and leading to the compromise of data. ”
      • MessageLabs Intelligence Findings:
      • 87.4% of all blocks occur between 8am-6pm;
      • 32.6% of all blocks occur from 12-2pm;
      • Adult & Sexually Explicit:
        • 68% of blocks within working hours
        • 32% outside of working hours.
      • Streaming Media: 12.5% of all blocks
      • 44% of Phishing/Fraud website blocks occur during lunchtime
      InformationWeek :The Browser As Attack Vector, August 7, 2010 (From the August 9, 2010 issue; eWeek: How to Protect Your Business from Web 2.0 Risks , Bob Walters, 2010-02-01 MessageLabs Intelligence: 2009 Annual Security Report December, 2009 Comprehensive URL Filtering is needed to control Web traffic, protect bandwidth and enforce your Acceptable Use Policies Web Security .cloud – January 2011
    • 20. Market Leadership Web Security .cloud – January 2011
    • 21. Email and Web Converged Threats Example Phishing Attack Malicious URLs appear in emails designed to appear legitimate Spoofed or compromised website is used to capture account information or install malware Web Security .cloud – January 2011
    • 22. Web Security Deployment Options Web Security .cloud – January 2011 Business Need On Premise Software or Appliance Symantec.cloud Service Block Threats Outside the Network Automatic URL, Virus Signature, and Product Updates Roaming User Traffic Not Routed Through Corporate Network Predictable Costs Managed as OPEX Rapid Deployment Service Level Agreements Unlimited Scalability Built-in High Availability Complimentary 24 / 7 Support
    • 23. Roaming Support Options Remote Connect Web protection & policy management for Small & Home Office Users For your remote workers connecting from:
      • Easily activated within ClientNet administrative interface
      • Ideal for less mobile users located in remote offices or home offices
      • Enforces policies and protects users as if they were inside your corporate LAN
      Web Security .cloud – January 2011 VPN Home Offices Regional Offices
    • 24. Defense against Converging Threats Web Security.cloud and Email Security.cloud Services
      • Convergence of Web and email threats call for a hosted services expert in both protocols
      • Symantec .cloud provides integrated Web, email and IM hosted security services
      • One trusted supplier and management interface
      • Saves time and money, while increasing visibility and control
      Web Security .cloud – January 2011
    • 25. Management Interface Portal dashboard
      • Reporting
      • Policy Management
      • User Administration
      • Online Help
      Web Security .cloud – January 2011
    • 26. Web Security.cloud Reporting Dashboard, Summary, Detailed and Audit reports
        • Dashboard – snapshot view of service statistics
        • Summary – graphs, tables and key statistics
        • Audit – information on individual user activities
      Web Security .cloud – January 2011
    • 27. Web Security.cloud Reporting Detailed reports
        • Options include:
          • AntiVirus & AntiSpyware Activities
          • URL Filtering Activity
          • Bandwidth by User
          • Browse time by URL category, individual URL
          • Bandwidth by Individual URL , URL Category
          • Web Audit
      Web Security .cloud – January 2011
    • 28. Web Security.cloud Dashboard
      • The Dashboard provides a quick view of recent trends and activity of the service:
      • URL Filtering intercepts
      • Top 5 URL Categories
      • Top 5 Content Types
      Web Security .cloud – January 2011
    • 29. Web Security.cloud - URL Filtering Policy building for categories & content
      • Over 80 Categories to Select from
      • Multiple category support for a single website URL
      Web Security .cloud – January 2011
    • 30. Web Security.cloud - URL Filtering Policy building for users & groups
      • Policies may be configured to block access by users and groups:
      Web Security .cloud – January 2011
    • 31. Web Security.cloud - URL Filtering URL Lookup Tool
      • Aids in the creation of custom policies
      Web Security .cloud – January 2011
    • 32. Web Security.cloud - URL Filtering Quota based policies
      • Policies may be configured to restrict access for users and groups to specific websites or site categories by:
        • time of day
        • browse time
        • bandwidth consumption
      Web Security .cloud – January 2011
    • 33. What Makes Us Different
      • The ‘In the cloud’ SaaS pioneer
      • Skeptic AntiVirus ‘zero hour’ protection unsurpassed: Each day, Skeptic stops 200 unique strains of malware that traditional, signature based antivirus engines miss
      • Continued investment in our technology and infrastructure
      • Unbeatable Service Level Agreements
      • 24/7 global client support team
      • Global infrastructure, global presence
      Web Security .cloud – January 2011
    • 34. Industry Leading Service Level Agreement Support Email Web AntiVirus Protection  100% protection from known and unknown email viruses Credit is offered if a client infected by a virus Virus False Positives  0.0001% FP capture rate Credit is offered if we do not meet this commitment Spam Capture Rate  99% capture rate (95% for emails containing Asian characters) Credit is offered if we do not meet this commitment Spam False Positives  0.0003% FP capture rate Credit is offered if we do not meet this commitment Latency  Average roundtrip time of 100% of email delivered in less than 60 seconds Credit is offered if latency exceeds 1 minute Delivery  100% delivery guarantee Client may terminate if we do not meet this Service Availability  100% uptime Credit is offered if availability falls below 100% Client may terminate if availability falls below 95% Archiving Service Availability Guarantee  99.9% uptime for archiving network Client may terminate if availability falls below 90% Appliance Replacement Guarantee  If appliance fails during the warranty period, MessageLabs will repair or replace the appliance within 3 business days at no cost Technical support / Fault Response  critical - 95% calls within 2hrs; major - 85% calls within 4hrs; minor - 75% calls within 8hrs Credit is offered if we do not meet this commitment Web Security .cloud – January 2011 AntiVirus Protection  100% protection against known viruses Credit is offered if a client infected by a virus Latency  Average scanning time of 100% of web content is within 100 milliseconds Credit is offered if latency exceeds 100 milliseconds Service Availability  100% uptime Credit is offered if availability falls below 100% Client may terminate if availability falls below 95%
    • 35. SaaS is Strong in Messaging Security Web Security .cloud – January 2011
      • SaaS in General
      • Quick and easy set up
      • Predictable, low cost
      • Redundancy
      • Platform independent
      • No maintenance or version control
      • Messaging Security
      • Preserves bandwidth (removes up to 80% of emails in cloud)
      • Better protection
      SaaS BENEFITS BARRIERS to SaaS
      • Concerns over security
      • Concerns over network reliability / availability
      • Configurability of services
    • 36. Web Security.cloud Roaming Use Cases VPN User Payment authorization traffic VPN Traffic Hotel/ Hotspot Internet Data center Web Security .cloud – January 2010 Corporate LAN Non-Corporate LAN Roaming Web User
    • 37. Smart Connect Flow Diagram Symantec .cloud Confidential 4 2 5 3 Agent state is Off LAN Protected
      • System Authentication
      • Network Discovery
      • Logged On User Info
      • User/Group filters
      • URL filters
      • Content Scanning
      • Logging/Reporting
      ‘ Trip ’ Infrastructure RAS Proxies
      • Session authentication
      NED Servers Geo-location and NED DB
      • Source IP lookup
      • Country of origin
      • Trip assignment
      • Initial Authentication
      • Connection details
      • Session certificate
      1

    ×