Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Borderware Security Platform


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Borderware Security Platform

  1. 1. BorderWare Security Platform
  2. 2. It’s Not Just Email Anymore…. <ul><li>Email continues to be mission critical…300M in 2000; 800M in 2006 </li></ul><ul><li>Web Mail on the rise…150M in 2000; 850M in 2006 </li></ul><ul><li>Instant Messaging…175M+ business users in 2006 </li></ul><ul><li>Blogs and Wikis…0 to 50M in 3 years </li></ul><ul><li>VoIP…enterprise adoption on the rise </li></ul>It’s about securing all messaging applications….
  3. 3. Key Security Problems Facing Customers <ul><li>Protecting Infrastructure against Threats </li></ul><ul><ul><li>Stop viruses and other malicious attacks that can bring down your infrastructure </li></ul></ul><ul><ul><li>Stop unwanted content which lowers user productivity, consumes your network resources, and creates risk – Spam, Porn, etc. </li></ul></ul><ul><li>Inbound and Outbound Control of Content </li></ul><ul><ul><li>Meet compliance requirements </li></ul></ul><ul><ul><li>Maintain customer relationships & their privacy </li></ul></ul><ul><ul><li>Protect intellectual property </li></ul></ul><ul><ul><li>Enforce corporate policies </li></ul></ul><ul><li>Manageability and TCO of Security Solutions </li></ul><ul><ul><li>Business Continuity </li></ul></ul><ul><ul><li>Centralized reporting, monitoring and management </li></ul></ul><ul><ul><li>Scalability to meet future needs </li></ul></ul>Diverse Threat Landscape $4 Billion Market by 2010
  4. 4. Today - Perimeter Security Infrastructure <ul><li>Email Security </li></ul>IM Security Web Security <ul><li>Lack of comprehensive security </li></ul><ul><li>Complexity in management </li></ul><ul><li>Limited scalability & redundancy </li></ul><ul><li>Expensive to own & operate </li></ul>
  5. 5. BorderWare Security Platform <ul><li>Protect </li></ul><ul><li>Virus, spam, malware, spyware, bots, zombies, image spam, … </li></ul><ul><li>Integrated - Email, Web, IM </li></ul><ul><li>Detect, correlate and block blended threats </li></ul><ul><li>Control </li></ul><ul><li>Content Management </li></ul><ul><li>Meet compliance requirements </li></ul><ul><li>Enforce corporate policies </li></ul><ul><li>Manage </li></ul><ul><li>Centralized Policy </li></ul><ul><li>Centralized Management </li></ul><ul><li>Scalable </li></ul><ul><li>High Availability </li></ul>
  6. 6. BorderWare Security Platform Security for Email, IM and Web Web Drive by Downloads Malware, Spyware DoS, DHA, Protocol attacks Spam & phishing Blended Threats Multi-application Viruses, worms, Trojans <ul><li>Acceptable Use Policy </li></ul><ul><li>Real time monitor & block </li></ul><ul><li>Policy enforcement </li></ul><ul><li>Web reputation filtering </li></ul><ul><li>Data Leakage Protection </li></ul><ul><li>IP protection </li></ul><ul><li>Accidental disclosure </li></ul><ul><li>Anomaly detection </li></ul><ul><li>Compliance </li></ul><ul><li>Government regulations </li></ul><ul><li>Industry compliance </li></ul><ul><li>Email encryption </li></ul>
  7. 7. <ul><li>Reputation scoring for Web, email, IM, and VoIP </li></ul><ul><li>Half billion sources of threat information from email, IM, Web, VoIP </li></ul><ul><li>Proactive defense to block unwanted and malicious content at perimeter </li></ul><ul><li>Seamless integration with BorderWare Security Platform </li></ul><ul><li>Pinpoint accuracy with domain and user reputations </li></ul>Real-time, multi-application reputation services BorderWare Security Network Over Half Billion Sources Good Reject Comprehensive Security
  8. 8. Comprehensive Security: Real-Time, Proactive Threat Protection <ul><li>Global Reputation Service </li></ul><ul><li>Zero hour protection </li></ul><ul><li>Localized and adaptive </li></ul><ul><li>Integrated protection </li></ul><ul><ul><li>Anti-Virus </li></ul></ul><ul><ul><li>Anti-Spam </li></ul></ul><ul><ul><li>Anti-Phishing </li></ul></ul><ul><ul><li>Zero Hour Virus Protection </li></ul></ul><ul><ul><li>Malware Protection </li></ul></ul><ul><li>Web, IM and Email </li></ul>Intercept Engine Anti-Virus Anti-Spam Anti-Phishing DoS & DHA Threat Prevention Anti-Malware
  9. 9. Data Loss Prevention Powerful outbound content inspection <ul><li>Policy driven filter rules </li></ul><ul><ul><li>User, group and domain-based </li></ul></ul><ul><ul><li>Protocol independent </li></ul></ul><ul><li>Deep content inspection </li></ul><ul><ul><li>Scan incoming and outgoing messages </li></ul></ul><ul><ul><li>Attachment control </li></ul></ul><ul><li>Compliance dictionaries </li></ul><ul><ul><li>Multiple dictionary (OCF) support </li></ul></ul><ul><ul><li>HIPAA, GLBA, SOX </li></ul></ul><ul><ul><li>Weighted for accuracy </li></ul></ul>
  10. 10. Centralized Security Management <ul><li>Comprehensive policy management </li></ul><ul><li>Consistent and automated infrastructure updates </li></ul><ul><li>Dynamic integrated clustering </li></ul><ul><li>Zero Message loss </li></ul><ul><li>Centralized auditing, logging & reporting </li></ul>
  11. 11. Security Concerns Going Forward Mobile clients Increasing volume and complexity of network traffic Increasing complexity of security solutions Security Budget too small Business executives following security policy Increasing sophistication of attacks Employees following security policy 2006 2005 How would you rate the items below on the threat each poses to your company’s enterprise network security? (Scale: 5=Significant threat; 1= no threat) Top 2 boxes (rating of 4 or 5) IDC 2007 37% 39% 39% 40% 44% 51% 52% 27% 33% 36% 38% 33% 49% 44%
  12. 12. BorderWare Security Platform Benefits Enhanced messaging security made simple, scalable, and affordable High Performance Investment protection Reduced complexity Comprehensive security Low TCO Benefits On-demand scalability through intelligent clustering Modular architecture Integrated by design, single software platform 360 o security protection, control and management Integrated, appliance delivery, easy management Capabilities