Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Combatiendo Amenazas de Seguridad en la Nube - WatchGuard

1,155 views

Published on

Presentación de Juan Muñoz de WatchGuard en Technology Day 2010 el 16 de marzo de 2010. San José, Costa Rica.

Published in: Technology
  • Your opinions matter! get paid BIG $$$ for them! START NOW!!.. ●●● https://tinyurl.com/realmoneystreams2019
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Like to know how to take easy surveys and get huge checks - then you need to visit us now! Having so many paid surveys available to you all the time let you live the kind of life you want. learn more...♥♥♥ https://tinyurl.com/realmoneystreams2019
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Combatiendo Amenazas de Seguridad en la Nube - WatchGuard

  1. 1. <ul><li>Combating email threats </li></ul><ul><li>in the cloud </li></ul><ul><li>Juan Munoz – Sales Director, Latin America </li></ul><ul><li>[email_address] </li></ul>
  2. 2. <ul><li>Combating Email threats in the Cloud </li></ul><ul><ul><li>Email importance </li></ul></ul><ul><ul><li>How does email work? </li></ul></ul><ul><ul><li>Most common Email threats </li></ul></ul><ul><ul><li>Current defense methodologies </li></ul></ul><ul><ul><li>Using the cloud to protect email </li></ul></ul>
  3. 3. <ul><li>Why is Email important? </li></ul>
  4. 4. <ul><li>How does Email work? </li></ul>
  5. 5. Anatomy of a Mail Transport System port 25 Forward port 25 traffic to internal mail server To: user@example.com Lookup MX record for example.com example.com MX record = 50.50.50.25 50.50.50.25
  6. 6. <ul><li>Most common email threats </li></ul>
  7. 7. <ul><li>Most common email threats </li></ul><ul><li>Spam: more than 85% of all email is unsolicited </li></ul><ul><li>Viruses </li></ul><ul><li>Phishing </li></ul><ul><li>Code execution: HTML </li></ul><ul><li>Dangerous attachments </li></ul><ul><li>Also: </li></ul><ul><li>Data leakage </li></ul>
  8. 8. Why Doesn’t Someone Stop Them? Legal: convictions require time and money <ul><li>Example of the resources it takes to catch one spammer: </li></ul><ul><ul><li>2003, first Microsoft suit against spam email Five million accounts sent 18 million spam emails </li></ul></ul><ul><ul><li>Kornblum subpoenas “John Doe” times 150 </li></ul></ul><ul><ul><li>Custom “link analysis” tool shows where source addresses converge </li></ul></ul><ul><ul><li>MS forms a coalition: AOL, Yahoo, Earthlink, Amazon, Pfizer, various Attorneys General in US, Interpol </li></ul></ul><ul><ul><li>Leads to Robert Soloway, convicted December 2003 </li></ul></ul><ul><ul><li>Took nine months and all this effort to catch and convict one spammer. </li></ul></ul>
  9. 9. Why Doesn’t Someone Stop Them? Financial: convictions require MORE time and money <ul><li>Arrest and conviction did not stop Soloway: </li></ul><ul><ul><li>June 2004 – April 2005, Soloway’s company sends millions of emails Uses legal dodge to claim recipients had “opted in” </li></ul></ul><ul><ul><li>2005, appeals end and Soloway must pay Microsoft $7.8 million Never does: his bank accounts remain elusive </li></ul></ul><ul><ul><li>2006, Soloway moves his email server to China </li></ul></ul><ul><ul><li>May 2007, arrested, indicted on 35 charges Mail fraud, email fraud, identity theft, money laundering… </li></ul></ul><ul><ul><li>July 2008, sentenced to 47 months in federal prison </li></ul></ul><ul><ul><li>It took five years of legal process to stop this spammer. </li></ul></ul>
  10. 10. <ul><li>Current defense methodologies </li></ul>
  11. 11. <ul><li>Current defense methodologies </li></ul><ul><li>Anti-spam: </li></ul><ul><ul><li>Blacklists </li></ul></ul><ul><ul><li>Heuristics </li></ul></ul><ul><ul><li>IP Reputation </li></ul></ul><ul><li>Anti-virus: </li></ul><ul><ul><li>Signature-based </li></ul></ul><ul><ul><li>Some heuristics </li></ul></ul>
  12. 12. What happens if email is SPAM? Antispam solution
  13. 13. Let’s zoom in… WatchGuard Training Internet Internet link Firewall Anti-spam Quarantine Email Server
  14. 14. <ul><li>Using the cloud to protect email </li></ul>
  15. 15. How can we improve the current model? Using the cloud!!! WatchGuard Training Internet Internet link Firewall Anti-spam Quarantine Email Server
  16. 16. Some ReputationAuthority.org Statistics WatchGuard Training <ul><li>Only 6.6% of email and web traffic is legitimate </li></ul><ul><li>“ In-the-cloud” defenses can reject up to 98% of such traffic at the perimeter </li></ul>
  17. 17. Questions? [email_address] [email_address]
  18. 18. Visítenos en el stand de AEC Electrónica y regístrese para la rifa de un iPod Shuffle.

×