SlideShare a Scribd company logo
1 of 26
Clearswift SECURE Email Gateway 3.2

               VFM Systems & Services (P) Ltd.
Unifying information security

   Clearswift is a security
    Software company that
    aims to simplify
    companies’ IT security to
    better protect businesses’
    intellectual property and
    data. This in turn gives
    businesses the
    confidence to adopt web,
    email and collaboration
    technologies to ultimately
    allow the business to
    innovate and grow.
 Clearswift’s security solutions are
  built around a core content
  inspection engine.

 Policy and reporting on content,
  threats and user activity are then
  applied to the communication
  channels.

 Today Clearswift SECURE
  solutions are available for web and
  email ensuring compliance across
  all digital communication
  channels.
Clearswift SECURE Mail Gateway

  Secure and resilient platform
      Packed Dell server, own hardware
        or on VMware/Hyper-V
       Optimisation of Linux OS tuned for
        Email gateway.
  Easy to install
      Up and running in under an hour.
       Pre-configured with Default
         ‘Standard’ Policy.
  Easy to use & manage
         100% web-based GUI.
         Graphical ‘drill-down’ reporting.
         Automatic security software
         updates
Complete Email Gateway Protection

  MIMEsweeper content-aware policy engine
     True binary signature file identification.
     Lexical analysis/templates.
     Comprehensive data leakage controls.
  Kaspersky Anti-virus/malware
     Viruses, worms, Trojans and malicious
        code
     Zero-hour malware detection
  Comprehensive Anti-spam defences
     Network based filters
     Content based filters
  On-Box Email Encryption
     By direction or by content, using industry
     standard technologies
Fully conjoined policy updating




                         Policy
       Web Gateway                Email Gateway
World class spam protection

  •   TRUSTmanager
       – global reputation network
       – Rejects 80-90% of all traffic
         before it
         reaches your gateway
  •   SpamLogic
       – delivers in total 99.6%
         accuracy rate
       – Multi-engine layered
         defence
Multi-layered spam defences



        Connection/Network Level
                Checks




         80-90%+ of spam rejected
                                    Content Level
             using these filters      Checks
End user message release mechanism

  • Web interface to permit users to releases own messages
  • Allows user to build up “Trusted Senders” for automated release of
    messages
  • Administrators can monitor what email senders are being Trusted
  • Administrators can maintain an end users Trusted Senders List
Multi-layered Malware protection system

  • Email still remains a vector for viruses to propagate
  • Many thousands of new viruses and variants are created
    daily
Deep inspection, intuitive scanning options


   •Banned file types can be blocked or stripped from messages
   •Oversized messages can be rejected or parked and delivered at
   a more convenient time
   •Selective scanning enables searches of areas of interest
       –Headers
       –Messages
       –Attachments (MS Office, Open Office, PDF, HTML)
   •Powerful search criteria
       –Dictionaries for PCI, PII, Profanity, etc.
       –Expressions, Regular expressions and Operators
   •Multiple disclaimer support including HTML and hyperlinks
ImageLogic – Detection of unacceptable images


  Multiple algorithms
  Extensive usage of machine learning
Data loss templates


   •Predefined regular expressions for PII (Personally
   Identifiable Information) and PCl (Personal Credit
   Information)
       –National insurance number
       –Credit card numbers
       –Social security number

   •Editable Compliance dictionaries
      –GLBA, SOX, HIPAA, SEC
Email Encryption

  •   Supports PGP, S/MIME and Password Protected messages
  •   Allows signing, encryption and decryption of messages
  •   Policy based encryption, i.e. by route or by content
  •   Opportunistic TLS for server to server communications
Encryption by direction or content


                                     On a policy route




     On a content rule
Flexible encryption options
Easy policy model


• Contents Rules to inspect the data applied to Policy Routes that
  define what is allowed over that email communication channel
Headers, footers and meta-data


                 Received: from eric ([192.168.201.1]) by prodman11.europe.clearswift.com (8.14.1/8.14.1)
                                with SMTP id nB2MGP3d006083 for
                 alynh@prodman.europe.clearswift.com;
                                Wed, 2 Dec 2009 22:16:27 GMT
                 Date: Wed, 2 Dec 2009 22:16:25 GMT
                 Message-Id: <200912022216.nB2MGP3d006083@prodman11.europe.clearswift.com>
                 From: <alynh@prodman.europe.clearswift.com>
                 To: <eric@outside.com>



                 Subject: Here is a great document




                 Hi Eric

                 This is a really document , call me on 01189 038503

                 Regards Alyn

                 Here is my site http://www.clearswift.com
Message Tracking across peers
                           Track messages using
                           extensive criteria




Works across peer
group
Built-in Reporting


                     Over 70 different
                     reports available




    Scheduled or
    on-demand
System Health
System Alerting

                     Over 60 different
                     alarms available




SMTP and SNMP as
standard
User activity monitoring


     • Display a log of last login time and source
     • Show where administrator activity
     • Display any break-in attempts




2009-10-27 11:22:28,223 [0] [FAFA..F2C] [LOGIN] [192.168.15.2] [admin]
2009-10-27 11:22:29,7 [0] [FAFA..F2C] [NAVIGATE] [192.168.15.2] [admin] [Clearswift Email Gateway] [/Appliance/HomePage/index.jsp]
2009-10-27 11:22:35,296 [0] [FAFA..F2C] [NAVIGATE] [192.168.15.2] [admin] [SSH Access] [/Appliance/SystemsCenter/SSH/index.jsp]

2009-10-27 14:19:01,34 [0] [93C...715] [LOGINFAILURE] [192.168.15.2] [mjuyhn]
2009-10-27 14:19:07,237 [0] [93C...715] [LOGINFAILURE] [192.168.15.2] [mjuyhn]
2009-10-27 14:19:11,532 [0] [93C...715] [LOGINFAILURE] [192.168.15.2] [mjuyhn]
Deployment options


1. Pre-built on a Dell server platform
2. Virtual Gateway versions on other supported hardware
3. Virtualization within a VMware ESX and ESXi environment
Platform information

  •    CSE range                        • ENE range
        – Under <500 users                 – Designed to handle 80,000
        – Designed to handle up to           messages per hour
          20k messages per hour              throughput
          throughput                       – Resilient system with Dual
                                             power and Raid disks



                    `



Model      Size         CPU      Memory    Disk      Raid       Power
R210       1U           Dual Core 4Gb      250Gb     No         101 watts
R610       1U           Quad     4Gb       2x146Gb   Yes        183 watts
                        Core
24x7 Technical Support


•   Clearswift provides professional, intelligent and adaptable support and training
    services to meet the exacting needs of our enterprise customers

•   Technical information is available at anytime for our supported Customers from the
    Clearswift Knowledge Base

•   We pride ourselves on exceeding Customers’ expectations. Results of the Mar 2010
    global support survey are:

     –   Met or exceeded expectation of initial response time – 93.98%
     –   Met or exceeded expectation of ability to solve problem – 92.37%
     –   Met or exceeded expectation of overall response time – 90.77%
     –   Met or exceeded expectation of technical competency – 93.89%

More Related Content

What's hot

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionAndy Ellis
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolJisc
 
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+AyehuDefeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+AyehuAyehu Software Technologies Ltd.
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistMyNOG
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
DDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShieldDDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShieldSam Pickles
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSectricity
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...Ziv Ichilov
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingCloudflare
 
karsof systems ips technical brochure
karsof systems ips technical brochurekarsof systems ips technical brochure
karsof systems ips technical brochureColin Valencia
 

What's hot (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
Infoblox Secure DNS Solution
Infoblox Secure DNS SolutionInfoblox Secure DNS Solution
Infoblox Secure DNS Solution
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
 
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+AyehuDefeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Attacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise NetworksAttacking and Securing WPA Enterprise Networks
Attacking and Securing WPA Enterprise Networks
 
DDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShieldDDoS Mitigation on the Front Line with RedShield
DDoS Mitigation on the Front Line with RedShield
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
 
Advanced DNS Protection
Advanced DNS ProtectionAdvanced DNS Protection
Advanced DNS Protection
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
 
OMG Data-Distribution Service Security
OMG Data-Distribution Service SecurityOMG Data-Distribution Service Security
OMG Data-Distribution Service Security
 
How to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart RoutingHow to Reduce Latency with Cloudflare Argo Smart Routing
How to Reduce Latency with Cloudflare Argo Smart Routing
 
karsof systems ips technical brochure
karsof systems ips technical brochurekarsof systems ips technical brochure
karsof systems ips technical brochure
 

Viewers also liked

Services @ vfm
Services @ vfmServices @ vfm
Services @ vfmvfmindia
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate wayvfmindia
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkvfmindia
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wirelessvfmindia
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from cachingvfmindia
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1vfmindia
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should Have7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should HaveSirius
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityDImension Data
 
Vfm packetshaper presentation
Vfm packetshaper presentationVfm packetshaper presentation
Vfm packetshaper presentationvfmindia
 

Viewers also liked (11)

Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
 
Vfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi frameworkVfm v mware vdi tco and roi framework
Vfm v mware vdi tco and roi framework
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
Vfm strategic benefits from caching
Vfm strategic benefits from cachingVfm strategic benefits from caching
Vfm strategic benefits from caching
 
Vfm corporate presentation v1
Vfm corporate presentation v1Vfm corporate presentation v1
Vfm corporate presentation v1
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should Have7 Essential Services Every Data Center Solutions Provider Should Have
7 Essential Services Every Data Center Solutions Provider Should Have
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Vfm packetshaper presentation
Vfm packetshaper presentationVfm packetshaper presentation
Vfm packetshaper presentation
 

Similar to Clearswift SECURE Email Gateway 3.2 Solution Overview

Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics NetworkCollaborators
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityBrian Kesecker
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaperrun_frictionless
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology Austin Ross
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from SymantecArrow ECS UK
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Private Cloud
 
Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotServicePilot
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...Mithi SkyConnect
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 

Similar to Clearswift SECURE Email Gateway 3.2 Solution Overview (20)

More than hosting
More than hostingMore than hosting
More than hosting
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
 
Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilot
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 

Clearswift SECURE Email Gateway 3.2 Solution Overview

  • 1. Clearswift SECURE Email Gateway 3.2 VFM Systems & Services (P) Ltd.
  • 2. Unifying information security  Clearswift is a security Software company that aims to simplify companies’ IT security to better protect businesses’ intellectual property and data. This in turn gives businesses the confidence to adopt web, email and collaboration technologies to ultimately allow the business to innovate and grow.
  • 3.  Clearswift’s security solutions are built around a core content inspection engine.  Policy and reporting on content, threats and user activity are then applied to the communication channels.  Today Clearswift SECURE solutions are available for web and email ensuring compliance across all digital communication channels.
  • 4. Clearswift SECURE Mail Gateway Secure and resilient platform Packed Dell server, own hardware or on VMware/Hyper-V Optimisation of Linux OS tuned for Email gateway. Easy to install Up and running in under an hour. Pre-configured with Default ‘Standard’ Policy. Easy to use & manage 100% web-based GUI. Graphical ‘drill-down’ reporting. Automatic security software updates
  • 5. Complete Email Gateway Protection MIMEsweeper content-aware policy engine True binary signature file identification. Lexical analysis/templates. Comprehensive data leakage controls. Kaspersky Anti-virus/malware Viruses, worms, Trojans and malicious code Zero-hour malware detection Comprehensive Anti-spam defences Network based filters Content based filters On-Box Email Encryption By direction or by content, using industry standard technologies
  • 6. Fully conjoined policy updating Policy Web Gateway Email Gateway
  • 7. World class spam protection • TRUSTmanager – global reputation network – Rejects 80-90% of all traffic before it reaches your gateway • SpamLogic – delivers in total 99.6% accuracy rate – Multi-engine layered defence
  • 8. Multi-layered spam defences Connection/Network Level Checks 80-90%+ of spam rejected Content Level using these filters Checks
  • 9. End user message release mechanism • Web interface to permit users to releases own messages • Allows user to build up “Trusted Senders” for automated release of messages • Administrators can monitor what email senders are being Trusted • Administrators can maintain an end users Trusted Senders List
  • 10. Multi-layered Malware protection system • Email still remains a vector for viruses to propagate • Many thousands of new viruses and variants are created daily
  • 11. Deep inspection, intuitive scanning options •Banned file types can be blocked or stripped from messages •Oversized messages can be rejected or parked and delivered at a more convenient time •Selective scanning enables searches of areas of interest –Headers –Messages –Attachments (MS Office, Open Office, PDF, HTML) •Powerful search criteria –Dictionaries for PCI, PII, Profanity, etc. –Expressions, Regular expressions and Operators •Multiple disclaimer support including HTML and hyperlinks
  • 12. ImageLogic – Detection of unacceptable images Multiple algorithms Extensive usage of machine learning
  • 13. Data loss templates •Predefined regular expressions for PII (Personally Identifiable Information) and PCl (Personal Credit Information) –National insurance number –Credit card numbers –Social security number •Editable Compliance dictionaries –GLBA, SOX, HIPAA, SEC
  • 14. Email Encryption • Supports PGP, S/MIME and Password Protected messages • Allows signing, encryption and decryption of messages • Policy based encryption, i.e. by route or by content • Opportunistic TLS for server to server communications
  • 15. Encryption by direction or content On a policy route On a content rule
  • 17. Easy policy model • Contents Rules to inspect the data applied to Policy Routes that define what is allowed over that email communication channel
  • 18. Headers, footers and meta-data Received: from eric ([192.168.201.1]) by prodman11.europe.clearswift.com (8.14.1/8.14.1) with SMTP id nB2MGP3d006083 for alynh@prodman.europe.clearswift.com; Wed, 2 Dec 2009 22:16:27 GMT Date: Wed, 2 Dec 2009 22:16:25 GMT Message-Id: <200912022216.nB2MGP3d006083@prodman11.europe.clearswift.com> From: <alynh@prodman.europe.clearswift.com> To: <eric@outside.com> Subject: Here is a great document Hi Eric This is a really document , call me on 01189 038503 Regards Alyn Here is my site http://www.clearswift.com
  • 19. Message Tracking across peers Track messages using extensive criteria Works across peer group
  • 20. Built-in Reporting Over 70 different reports available Scheduled or on-demand
  • 22. System Alerting Over 60 different alarms available SMTP and SNMP as standard
  • 23. User activity monitoring • Display a log of last login time and source • Show where administrator activity • Display any break-in attempts 2009-10-27 11:22:28,223 [0] [FAFA..F2C] [LOGIN] [192.168.15.2] [admin] 2009-10-27 11:22:29,7 [0] [FAFA..F2C] [NAVIGATE] [192.168.15.2] [admin] [Clearswift Email Gateway] [/Appliance/HomePage/index.jsp] 2009-10-27 11:22:35,296 [0] [FAFA..F2C] [NAVIGATE] [192.168.15.2] [admin] [SSH Access] [/Appliance/SystemsCenter/SSH/index.jsp] 2009-10-27 14:19:01,34 [0] [93C...715] [LOGINFAILURE] [192.168.15.2] [mjuyhn] 2009-10-27 14:19:07,237 [0] [93C...715] [LOGINFAILURE] [192.168.15.2] [mjuyhn] 2009-10-27 14:19:11,532 [0] [93C...715] [LOGINFAILURE] [192.168.15.2] [mjuyhn]
  • 24. Deployment options 1. Pre-built on a Dell server platform 2. Virtual Gateway versions on other supported hardware 3. Virtualization within a VMware ESX and ESXi environment
  • 25. Platform information • CSE range • ENE range – Under <500 users – Designed to handle 80,000 – Designed to handle up to messages per hour 20k messages per hour throughput throughput – Resilient system with Dual power and Raid disks ` Model Size CPU Memory Disk Raid Power R210 1U Dual Core 4Gb 250Gb No 101 watts R610 1U Quad 4Gb 2x146Gb Yes 183 watts Core
  • 26. 24x7 Technical Support • Clearswift provides professional, intelligent and adaptable support and training services to meet the exacting needs of our enterprise customers • Technical information is available at anytime for our supported Customers from the Clearswift Knowledge Base • We pride ourselves on exceeding Customers’ expectations. Results of the Mar 2010 global support survey are: – Met or exceeded expectation of initial response time – 93.98% – Met or exceeded expectation of ability to solve problem – 92.37% – Met or exceeded expectation of overall response time – 90.77% – Met or exceeded expectation of technical competency – 93.89%

Editor's Notes

  1. In this example The sender could send a plaintext message to Mr Pink, Mr Red and Mr Yellow. The Gateway will be responsible for content scanning the message and then arranging encryption using the right method for each recipient. Mr Pink might be S/MIME, whereas Mr Red might prefer PGP and Mr Yellow might use password protected zip files. Not only can content be scanned as it leaves, but it can also be decrypted (when sent by Mr Purple) and delivered into Mr Blue in its original secured manner.
  2. The Clearswift Gateway policies are created and managed in the “Policy” centre. There are a number of default Content Rules which have been created to perform a specific part of the policy, such as “Delete Virus”. These Content Rules can be amended or new ones created based on customer requirements. Content Rules are constructed using elements taken from Policy references, such as Lexical lists which contain lists of words to check for. These references can then be re-used in multiple separate Content Rules to save recreating them If you have the CLEARSWIFT SECURE Email Gateway and the CLEARSWIFT SECURE Web Gateway you can peer them together and share the Content Rules across both products. This allows you to define rules once that can apply to both of the Clearswift Gateway protocols. Content Rules are applied to Policy Routes which define the direction of communication. For example, in the CLEARSWIFT SECURE Email Gateway: “ *@mycompany.com” TO “Everyone”, or in the CLEARSWIFT SECURE Web Gateway it could be “Everyone” TO “Social Networking Sites” A company will define multiple Policy Routes to describe their communication rules. The ordering of routes is important as the list is evaluated from top to bottom to find the route that has the best match for the source and destination of the communication.
  3. This slide demonstrates how we take a message and break it down into it’s constituent parts, to be able to provide target scans of the appropriate data.
  4. Being able to track messages is vital for any SysAdmin. Even in customer configurations that deploys multiple systems, being to run a single command from 1 console that searches across all nodes is key in identifying what happened to email
  5. Reports are now fundamental as organisations have to be able to justify their actions and also their efficiency. Reports can be generated immediately or scheduled. For customers who have multiple gateways the reports can be consolidated. Over 60 basic report templates exist and customers can modify these to create new views on the data stored on the system
  6. RSS feed allows Clearswift to communicate information to customers without excessive emailing them Various counters and graphs give the SysAdmins a view of the current behaviour of the system. Indicators provide customers with a status of recent updates and service status
  7. Over 60 different system alarms can be generated. Each alarm goes to the UI, but can also be sent to a specific Email address or SNMP server
  8. A log maintains a history of where the SysAdmins have been on the product, but also records if someone is trying to breakin to the system.
  9. Customers can choose how they deploy the product. At present 66% of customers are buying a “soft” option meaning that customers are deploying on either their own platforms or a virtual platform.
  10. Clearswift can sell a choice of 2 servers, one being a low-end unit based on the Dell r200 (soon to be the r210) . This unit can process around 20k messages per hour. The high end server is a Dell r610, with much faster processors and resilient disks to generate a throughput of around 90k messages per hour