• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Sonic Wall Email Security End User
 

Sonic Wall Email Security End User

on

  • 1,181 views

 

Statistics

Views

Total Views
1,181
Views on SlideShare
1,178
Embed Views
3

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 3

http://www.slideshare.net 3

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Sonic Wall Email Security End User Sonic Wall Email Security End User Presentation Transcript

    • SonicWALL Email Security
    • Agenda
      • SonicWALL Overview
      • Email Threat Landscape
      • Protecting Against Email Threats
      • SonicWALL Email Security Product Line
    • SonicWALL Market Leadership *Appliances Selling for $490 - $1,499 and $1,500 - $5,000 Sources: IDC 2004, IDC 2005, Infonetics, Q3’05 2005 in Units and Revenue in Unified Threat Management #1 in Security Appliances in Revenue and Units* #2 Web Filtering Appliance Provider #3 Secure Content Management Provider #4
    • SonicWALL Solution Suite Policy and Management Business Continuity Secure Content Management Network Security
    • SonicWALL Solution Suite Global Management Secure Wireless SonicPoint GMS Content Security Network Security TZ & PRO Email Security & CSM Business Continuity CDP Remote Access SSL-VPN
    • Agenda
      • SonicWALL Overview
      • Email Threat Landscape
      • Protecting Against Email Threats
      • SonicWALL Email Security Product Line
    • IT Security Concerns Top 5: Virus, Spyware, SPAM, Intrusion & Theft
    • Threats: More, and More Malicious …and Now Compliance Requirements That 3 year old spam box just isn’t cutting it anymore!
      • U.S. Email volume 2.4Bn/day in 2006(1 )
      • Email is the perimeter application that reaches all users
      • Cost of email threats is over $20Bn(2 )
        • Volume is exploding
        • Threats spreading faster, more malicious
        • Hybrids more like viruses in their approach
      • Enterprise’s infrastructure is at stake
      Notes: (1) eMarketer, 2004 (2) National Technology Readiness Survey, Rockbridge Associates, Inc. & Maryland Business School, 11/2004
    • Spam Many messages are obviously spam
    • Is it Spam? Other messages will be disagreed upon
    • Phishing Some emails are easy to determine as phish
    • Phishing? Sometimes it is hard to tell
    • Viruses Spread Rapidly Virus outbreaks continue to happen
    • Virus Signatures Take Time
      • Stop gap reactions
      • Disconnect from Internet
      • Send multiple “do not open” warnings
      • Panic
      Virus signatures take hours to become available
    • Outbound Risks and Compliance
      • U.S. Federal: HIPAA, GLBA, SOX, Sec 17a-4, NASD3010, PATRIOT Act Section 326
      • European: Safe Harbor, EU Data Protection Directive 95/46
      • Organization: VISA CISP, MasterCard Site Data Protection Program, FERPA
      • State: CA SB 1386 & AB 1950 / NY Bill A04254 / IL H.B. 1633
      • Corporate : Prevent offensive language, add disclaimers, block files
      • Many more…
      All organizations need to be address compliance requirements
    • Inbound and Outbound Threats Threats Require Inbound and Outbound Protection
    • Proliferation of Systems Typical Mail Data Center Management of Multiple Systems Becomes Complex
    • Agenda
      • SonicWALL Overview
      • Email Threat Landscape
      • Protecting Against Email Threats
      • SonicWALL Email Security Product Line
    • Collect Worldwide Threat Data
    • Analyze for Bad/Good Email Patterns Likely Virus Good Email SonicWALL Analyzes Patterns Good Pattern Bad Pattern 40 million emails … sent by newsletter@microsoft.com … from 3 IP addresses … in Seattle … and never junked 50 people … in 6 different countries … receive a new attachment … that has never been seen before … within 30 minutes
    • Cross Analyze Patterns with Content Evaluation and Reputation SonicWALL Determines a Definitive Judgment – Not Just a Score
    • SonicWALL Email Security Stops Today’s and Tomorrow’s Threats Threats Evolve – SonicWALL Protects
    • Agenda
      • SonicWALL Overview
      • Email Threat Landscape
      • Protecting Against Email Threats
      • SonicWALL Email Security Product Line
    • Best-of-Breed Product 2,000+ Customers & 96% Retention Healthcare Transportation Nonprofit Retail Consumer Goods Automotive Entertainment Financial Services Technology Media/Publishing Pharmaceutical Aerospace/Defense Manufacturing Technology Government Hospitality Education Retail Media/Publishing Consumer Goods
    • Award Winning Email Security
      • FINALISTS:
      • Barracuda Networks, Inc. for Barracuda Spam Firewall
      • BorderWare Technologies for MXTreme Mail Firewall
      • Clearswift for Clearswift/MIMEsweeper for SMTP
      • CipherTrust, Inc. for CipherTrust IronMail Gateway
      • eSoft, Inc. for eSoft ThreatWall 300
      • GFI Software Ltd for GFI MailSecurity for Exchange/SMTP
      Best Content Security Solution Overall Category Winner and Winner for Best Anti-Spam
      • AND MORE FINALISTS:
      • MailFrontier, Inc. for MailFrontier Gateway
      • MailShell for MailShell SDK
      • Solinus, Inc. for MailFoundry Email Filtering Appliance
      • Sunbelt Software for iHateSpam for Exchange
      • Symantec Corporation for Symantec Brightmail AntiSpam
      • Tumbleweed Communications for MailGate Email Firewall
      http://scmagazine.com/us/news/article/546173/best+content+security+solution/
    • SonicWALL Email Security
      • Anti-Spam , Anti-Phishing , Anti-Virus
      • Compliance and Policy Management
      • Appliance and Software options
      • Works with any email system (SMTP)
      • Unified inbound and outbound protection
      • Installs in < 1 Hour…managed in < 10 minutes/week
      • For businesses from Less than 50 users to Over 5000 Users
    • Product Overview
      • Quick Installation
      • Anti-Spam, Anti-Phishing, Anti-Virus
      • Administrative and End-User Junk Box
      • Junk Box Summaries
      • Policy & Compliance Management
      • Email Auditing
      • Reporting & Monitoring
    • Quick Configuration
      • 5 Steps to Configure
      • Full install in < 1 hour
      • High availability options
    • Anti-Spam, Anti-Phishing, Anti-Virus
      • Complete protection
        • Inbound/Outbound
        • Spam, Virus, Phishing
        • Zombies, DHA, DoS
      • Automatic updates
        • No rules to write
      • Complete flexibility
        • Per-user and per-group
    • Administrative and End-User Junk Box
      • Web-based Junk Box
        • Search, sort, preview
        • View all threats
      • 1-click UnJunk
        • Retrieves
        • Adds to allowed list
        • Provides feedback
      • Administrative, End-User
    • Junk Box Summary
      • Easy quarantine view
        • Email summary
      • Configurable
        • Frequency
        • Specific time and day
        • 11 languages
        • All or just questionable
      • Preview and UnJunk
        • 1-click
    • Email Policy & Compliance Approach Robust tools to Identify, Monitor, and Enforce
    • Policy and Compliance Management
      • Powerful filters
        • Search any message part
        • Scan within attachments
        • Check for disguised text
        • Match against dictionaries
        • Judgment-based policies
      • 15 action options
        • Bounce, quarantine, log
        • Add disclaimers
        • Strip attachments
        • Etc.
      • Apply to specific groups
        • LDAP-based
    • Email Auditing
      • Full email audit
        • All good mail
        • All bad mail
        • Inbound
        • Outbound
      • Searchable
        • From, To, Subject
        • Today or multi-day
      • Detailed information
        • Per-recipient data
        • Full audit trail
    • Reporting and Monitoring
      • 25+ Web-based reports
        • Dashboard, System Status
        • Spam, Phishing, Virus
        • Policy and Compliance
        • Return-on-Investment
      • Custom reports
      • Emailed reports
      • Schedulable reports
    • Instant Deployment
    • High Availability Deployment
    • Products & Subscriptions
    • Thank you. www.sonicwall.com