Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Email Security Appliance from IBM

An appliance, vmware image for email security form IBM. This product is called Lotus Protector.

  • Login to see the comments

  • Be the first to like this

Email Security Appliance from IBM

  1. 1. V 1.53P
  2. 2. Notes/Domino: The Gold Standard for e-mail Security <ul><li>World's largest deployed public key infrastructure </li></ul><ul><ul><li>Every user operate with an RSA-based certificate </li></ul></ul><ul><li>Application level security guards against Internet-style attacks </li></ul><ul><ul><li>Resists address book harvesting, worms, executables </li></ul></ul><ul><ul><li>Execution control lists (ECLs) that “mistrust by default” </li></ul></ul><ul><li>Security foundation – In the DNA </li></ul><ul><ul><li>Certificates, strong passwords, file/protocol encryption… </li></ul></ul><ul><ul><li>Object level access control, roles-based security, revocation… </li></ul></ul>
  3. 3. E-mail security is harder, more important than ever <ul><li>Spam, Phishing, and Malware comprise up to 90% of all SMTP traffic </li></ul><ul><ul><li>Costly in bandwidth and CPU </li></ul></ul><ul><ul><li>Company image and employee satisfaction </li></ul></ul><ul><li>Attacks now a sophisticated, specialized, for-profit business </li></ul><ul><ul><li>Organized crime and terrorist funding </li></ul></ul><ul><ul><li>Targeted industrial espionage and financial fraud </li></ul></ul><ul><li>Sensitive information – and risk – proliferates </li></ul><ul><ul><li>Intentional and inadvertent loss of confidential content </li></ul></ul><ul><ul><li>Theft of data and interception of data in motion </li></ul></ul>
  4. 4. E-mail-borne attacks change rapidly Source: IBM X-Force Research 2008
  5. 5. Dynamics of Security Integration Effort / Complexity Effectiveness “ Silo” Security Integrated Security
  6. 6. VPN server_32b256px.png Security in a Domino network notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png SMTP empty-red-rectangle red-top-faded Edge Components Antispam/Antivirus E-mail Encryption DLP VPN empty-red-rectangle red-top-faded Client Components E-mail Encryption DLP VPN E-mail / Calendar notesminder32b256px.png empty-red-rectangle red-top-faded Server Components E-mail Encryption DLP Antispam/Antivirus
  7. 7. GEL Rounded Rectangle cobalt GEL Rounded Rectangle msyellow notesminder32b256px.png server_32b256px.png IBM LOTUS DOMINO Lotus Protector capabilities, packaging, and release sequence subject to change GEL Rounded Rectangle cobalt GEL Rounded Rectangle cobalt GEL Rounded Rectangle cobalt IBM Lotus Protector Offering Family <ul><li>Extends Domino e-mail with new security and data protection capabilities </li></ul><ul><ul><li>Protects/secures against Internet threats </li></ul></ul><ul><ul><li>Delivers enhanced content protection tools </li></ul></ul><ul><li>Integrates with Notes and Domino UI & security model </li></ul>Antispam & Antivirus Encryption Data Loss Prevention … Security Products
  8. 9. Optimized SMTP Protection For Lotus Domino <ul><li>Enterprise grade spam filtering software </li></ul><ul><ul><li>Featuring IBM Proventia Spam/Malware blocking technology </li></ul></ul><ul><ul><ul><li>Dynamic Host Reputation (IP Filtering) </li></ul></ul></ul><ul><ul><ul><li>Multi-layered message analysis </li></ul></ul></ul><ul><ul><ul><li>Signature and Behavioral Antivirus </li></ul></ul></ul><ul><ul><ul><li>URL matching for phishing and spyware </li></ul></ul></ul><ul><ul><ul><li>End user quarantines, block/allow lists </li></ul></ul></ul><ul><ul><li>Optimized for Lotus Domino customers </li></ul></ul><ul><ul><ul><li>Easy to acquire, deploy, administer and support </li></ul></ul></ul><ul><ul><ul><li>Aggressive integration roadmap (vertical/horizontal) </li></ul></ul></ul><ul><li>Preemptive protection against threats </li></ul><ul><ul><li>Rules/Policy engine for content protection (incoming/outgoing) </li></ul></ul><ul><ul><li>Integrated IBM Proventia intrusion prevention system </li></ul></ul>
  9. 10. Software Appliance Hardware Appliance Proventia notes32b256p.png server_32b256px.png
  10. 12. Popular Filter Deployment Options server_32b256px.png Clean <ul><li>There are multiple approaches to spam and virus filtering, often with redundancy </li></ul><ul><li>Edge appliances and cloud services filter SMTP, but don’t see internal mail </li></ul><ul><li>Cloud services allow less control by the customer and tends to have less filter efficacy </li></ul><ul><li>Server tasks clean all mail, but impose cost to server CPU </li></ul>notes32b256p.png Clean INTERNET Edge Appliances Server Tasks
  11. 13. Filter Process
  12. 15. IBM X-Force Research <ul><li>Proprietary Research </li></ul><ul><ul><li>Bayesian Filter, URL Checker, Meta Heuristics, Flow Control, Structure Analysis, Phishing detection, Fuzzy Fingerprints, Behavioral Antivirus... </li></ul></ul><ul><li>Spam/Phishing Database </li></ul><ul><ul><li>80 million spam signatures in the database </li></ul></ul><ul><ul><ul><li>2 million new signatures per day </li></ul></ul></ul><ul><ul><li>> 98% effective against spam </li></ul></ul><ul><ul><li>< 0.001% false-positives </li></ul></ul><ul><ul><li>62 categories of spam URLs </li></ul></ul><ul><li>URL Database </li></ul><ul><ul><li>9.3 billion evaluated web pages and images </li></ul></ul><ul><ul><ul><li>150 million new pages each month </li></ul></ul></ul><ul><ul><ul><li>150,000 new categorized sites each day </li></ul></ul></ul><ul><ul><li>100 million URL filter entries </li></ul></ul><ul><ul><li>68 categories of spam URLs </li></ul></ul>
  13. 16. Phishing Protection
  14. 17. Policy Editor Granular Policy Control
  15. 18. Protector for Mail Security Price Promotion 2009 <ul><li>Special value to help create awareness, momentum </li></ul><ul><ul><li>Limited time offer for new customer acquisition </li></ul></ul><ul><ul><li>IBM quality and performance for price equivalent to lesser solutions </li></ul></ul><ul><li>25% off entitled pricing on all new licenses </li></ul><ul><ul><li>Valid February-July 2009 worldwide </li></ul></ul><ul><ul><ul><li>Lotus Protector for Mail Security Authorized User(s) License + SW S&S 12 Months D04QYLL </li></ul></ul></ul><ul><ul><ul><li>Lotus Protector for Mail Security Authorized User(s) from Competitor Trade-up License + SW S&S 12 Months D04R0LL </li></ul></ul></ul><ul><ul><li>Prices valid in Passport Advantage – No special processing needed </li></ul></ul><ul><ul><li>Not valid for renewals, reinstatements, or hardware </li></ul></ul><ul><ul><li>IBM Promotion #PRO1534, Letter number 509-434 </li></ul></ul>
  16. 19. Three deployment options <ul><ul><li>Minimum hardware: </li></ul></ul><ul><ul><li>2GB RAM (512MB min for each virtual instance, 1MB recommended) </li></ul></ul><ul><ul><li>100GB drive (30GB for each virtual instance) </li></ul></ul><ul><ul><li>Two network interfaces: </li></ul></ul><ul><ul><ul><li>One host-only interface </li></ul></ul></ul><ul><ul><ul><li>One bridged network interface </li></ul></ul></ul><ul><ul><li>VMware versions: </li></ul></ul><ul><ul><li>VMware Server 1.0.2 or later </li></ul></ul><ul><ul><li>VMware Workstation 5.5 or later </li></ul></ul><ul><ul><li>VMware Player 1.0.3 or later </li></ul></ul><ul><ul><li>VMware ESX 3.x or later </li></ul></ul><ul><li>Dedicated Appliance </li></ul><ul><li>Virtual Bundle </li></ul>IBM off-the-shelf hardware Customer provides hardware Specialized hardware x3350 from IBM STG MS3004LP Appliance from IBM ISS <ul><li>Virtual Appliance </li></ul>VMware throughput: 12,000 mails/hr Appliance throughput: 36,000 mails/hr 1 1 2 2 3 3
  17. 20. Resources <ul><li> </li></ul><ul><li>Feature Description </li></ul><ul><li>Brochure </li></ul><ul><li>Specifications </li></ul><ul><li>White Papers </li></ul><ul><li>Demo, Video </li></ul><ul><li>ICSA Certification </li></ul><ul><li>X-Force Statistics Graphs </li></ul><ul><li>Support </li></ul><ul><li>How to buy </li></ul><ul><li>Product Documentation… </li></ul>
  18. 21. Questions?