Marshal<br />Your preferred and trusted partner for email and internet content security.<br />
Agenda<br />The Marshal Story<br />MailMarshal<br />Inbound/Outbound Content Filtering<br />WebMarshal<br />Inbound/Outbou...
What Does Marshal Do?<br />Marshal provides comprehensive security solutions that include:<br />Email Security <br />Web S...
Who is Marshal?<br />First MailMarshal Customer in 1997<br />40% of Fortune 500 Use Marshal Products<br />Customers in 97 ...
Representative Customers <br />GOVERNMENT<br />EDUCATION<br />HEALTHCARE<br />BANKING / INSURANCE<br />PROFESSIONAL SERVIC...
Internet<br />Secure Email Gateway<br />Where Does Marshal software run<br />End User Workstations<br />Secure Email Gatew...
Common Policy Engine Components<br />AV Scanners<br />Spyware Scanners<br />Urlcensor<br />Textcensor  & Textcensor Script...
Email Content & Compliance <br /><ul><li>File Attachment Control and Filtering
Lexical Text Analysis of Email & Files
Email Header Re-writing
Deep Image Analysis (Anti-Porn)*
Policy driven Message Stamping
Compliance Templates</li></ul>Edge Protection<br /><ul><li>DOS & DHA Attack Sending     Host Connection Policies
Anti-Phishing
Anti-Virus* & Anti-Spyware*
Data Loss Prevention</li></ul>TLS<br />&<br />S / MIME<br />ENCRYPTION<br />MailMarshal for Exchange<br />Internal Email<b...
File finger-</li></ul>printing<br />Web Threat Security<br /><ul><li>Anti-Phishing
Anti-Virus & Anti-Spyware*
File-type Identification
File & Content upload control </li></ul>Employee Internet Management<br /><ul><li>URL Filtering Lists*
Real-time Categorization engine
Quota Management by Size & Time
File download controls
Lexical Text Analysis of files/content</li></ul>They Want In…<br />1.<br />Email<br />2.<br />Web<br />Marshal Products wo...
MailMarshal SMTPv6.4<br />Email Content Security<br />
MailMarshal SMTP<br />Gateway Solution: Secure-Protect-Comply <br />Anti-Spam: Controls spam based on extensive array arch...
Reputation Lists<br />RBL/<br />URL Censor<br />Custom<br />(Whitelists, etc.)<br />SpamProfiler<br />SpamCensor<br />SPAM...
MailMarshal SMTP v6.4<br />SpamProfiler - Spam Signature Service, Deployed at the MMReceiver<br />Marshal IP Reputation Se...
Anti-Spam Arsenal<br />Reputation Lists - Automatic Adaptive Whitelisting<br />SpamProfiler  - Regularly updated list of i...
SpamCensor<br />Heuristic detection engine with more than 1800 checks on Email header alone – Most Configurable<br />Works...
URLCensor<br />Looks for URL links inside email messages – Phishing Detection<br />De-obviouscates mined URL’s<br />Perfor...
DNS Blacklists<br />One of the traditional methods of Spam detection<br />Looks up IP addresses or Sender names in remote ...
CountryCensor<br />Identifies the IP address of the original sender<br />Looks up this IP address against a database of th...
TRACE Team<br />Marshal TRACE:   Threat Research and Content Engineering<br />Global Spam Honeypots and Submitters<br />Re...
TRACE Website <br />Currently covering Email, Web and malware threats<br />Full range of emerging threats and advice<br />...
9/23/2008<br />Summary<br />Marshal’s Defense-in-Depth Anti-Spam & Anti-Phishing engine is the most advanced available, wi...
MailMarshal For Exchange<br />Internet<br />Monitor Internal Microsoft Exchange Email<br />Addresses Acceptable Use Policy...
Provides ‘the best of both worlds’ – appliance hardware and software<br />Easy to deploy - hardened platform - low adminis...
WebMarshalv6.0<br />Beyond URL Filtering<br />
Upcoming SlideShare
Loading in …5
×

Presentacion Productos Marshal Sept 2008

764 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
764
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Presentacion Productos Marshal Sept 2008

  1. 1. Marshal<br />Your preferred and trusted partner for email and internet content security.<br />
  2. 2. Agenda<br />The Marshal Story<br />MailMarshal<br />Inbound/Outbound Content Filtering<br />WebMarshal<br />Inbound/Outbound Internet Filtering<br />Marshal Endpoint Security<br />Control User Access Points<br />Security Reporting Center<br />
  3. 3. What Does Marshal Do?<br />Marshal provides comprehensive security solutions that include:<br />Email Security <br />Web Security <br />EndPoint Security<br />Security Reporting<br />
  4. 4. Who is Marshal?<br />First MailMarshal Customer in 1997<br />40% of Fortune 500 Use Marshal Products<br />Customers in 97 Countries<br />19,000+ Companies Utilizing Marshal World Wide with 8,500 in the US<br />Offices in Atlanta (HQ), Houston (Support), UK (HQ), New Zealand (Development)<br />WebMarshal finalist in the &quot;Best Web Filtering Solution&quot; category in the SC Magazine&apos;s 2007 and 2008 U.S Reader Trust Awards (at RSA)<br />Gartner Email Security Boundary Magic Quadrant 2007<br />Key Product points – Easy to eval, install, deploy and use. High performance (fast), functionally, superior content engine with lexical analysis and very good price point.<br />
  5. 5. Representative Customers <br />GOVERNMENT<br />EDUCATION<br />HEALTHCARE<br />BANKING / INSURANCE<br />PROFESSIONAL SERVICES<br />MANUFACTURING<br />OTHERS<br />
  6. 6. Internet<br />Secure Email Gateway<br />Where Does Marshal software run<br />End User Workstations<br />Secure Email Gateway<br />Internal Email Server<br />SMTP Server<br />Email Gateway<br />Firewall<br />Internal<br />Network<br />DMZ Perimeter<br />Security Zone<br />Normal Email<br />S/Mime Encryption<br />
  7. 7. Common Policy Engine Components<br />AV Scanners<br />Spyware Scanners<br />Urlcensor<br />Textcensor & Textcensor Scripts<br />File Un-packer<br />File Type Identifier<br />Policy Definition Wizard (Customized To Suit Product)<br />
  8. 8. Email Content & Compliance <br /><ul><li>File Attachment Control and Filtering
  9. 9. Lexical Text Analysis of Email & Files
  10. 10. Email Header Re-writing
  11. 11. Deep Image Analysis (Anti-Porn)*
  12. 12. Policy driven Message Stamping
  13. 13. Compliance Templates</li></ul>Edge Protection<br /><ul><li>DOS & DHA Attack Sending Host Connection Policies
  14. 14. Anti-Phishing
  15. 15. Anti-Virus* & Anti-Spyware*
  16. 16. Data Loss Prevention</li></ul>TLS<br />&<br />S / MIME<br />ENCRYPTION<br />MailMarshal for Exchange<br />Internal Email<br />MailMarshal Email Content Security<br />SMTP Gateway<br />C O M M O N P O L I C Y E N G I N E<br />WebMarshal Web Content Security Secure Web Gateway - HTTP Proxy<br />Data Loss<br />Prevention<br /><ul><li>Full Content Scanning
  17. 17. File finger-</li></ul>printing<br />Web Threat Security<br /><ul><li>Anti-Phishing
  18. 18. Anti-Virus & Anti-Spyware*
  19. 19. File-type Identification
  20. 20. File & Content upload control </li></ul>Employee Internet Management<br /><ul><li>URL Filtering Lists*
  21. 21. Real-time Categorization engine
  22. 22. Quota Management by Size & Time
  23. 23. File download controls
  24. 24. Lexical Text Analysis of files/content</li></ul>They Want In…<br />1.<br />Email<br />2.<br />Web<br />Marshal Products work for InBound and Outbound Traffic<br />
  25. 25. MailMarshal SMTPv6.4<br />Email Content Security<br />
  26. 26. MailMarshal SMTP<br />Gateway Solution: Secure-Protect-Comply <br />Anti-Spam: Controls spam based on extensive array architecture<br />Prevents Directory Harvesting Attack (DHA): Secures data to prevent DHA <br />Prevents Denial of Service Attacks (DoS): Stops flood of spam from bringing email servers down <br />Anti-Virus: Scans messages in real-time <br />Anti-Spyware: Isolates suspicious email attachments at the gateway<br />Manage Email Attachments: Strips attachments or blocks file types per user<br />Deep Message Analysis: All layers of email dissected into basic components for comprehensive security<br />Image Analyzer: Scans and sorts images to comply with acceptable use policies<br />CHRISTINA NEUSTADT, <br />Director of Customer Service,<br />The Weather Channel<br />
  27. 27. Reputation Lists<br />RBL/<br />URL Censor<br />Custom<br />(Whitelists, etc.)<br />SpamProfiler<br />SpamCensor<br />SPAM<br />80.0%<br />95.0%<br />99.5%<br />99.9%<br />99.95%<br />Defense-in-Depth<br />Marshal&apos;s Anti-Spam & Anti-Phishing System<br />
  28. 28. MailMarshal SMTP v6.4<br />SpamProfiler - Spam Signature Service, Deployed at the MMReceiver<br />Marshal IP Reputation Service – Mixture Of White & Black Data<br />Auto white-listing for Reputation/RBL lists based on number of successfully delivered email and % of Spam received<br />Enhanced Email Routing Options<br />Marshal Notification Service – RSS feeds from Marshal, 4 feeds: Product Updates & Notifications, TRACE Alerts, TRACE News and Offers & Promotions<br />Image Analyzer Update – More Accurate, Faster<br />Full Office 2007 File Support<br />McAfee Engine Update<br />Dead-letter updates – Expanded Support for Bulk E-mailers<br />SQM Update<br />Extending SpamCensor Scans Complete Message Body and Attachments<br />
  29. 29. Anti-Spam Arsenal<br />Reputation Lists - Automatic Adaptive Whitelisting<br />SpamProfiler - Regularly updated list of intelligent profiles for Spam Messages, run at receiver<br />SpamCensor - Heuristic detection engine with more than 1800 checks on Email header alone<br />URLCensor - Looks for URL links inside email messages – Phishing Detection, de-obfuscates mined URL’s<br />Custom – CountryCensor, Whitelists, etc.<br />
  30. 30. SpamCensor<br />Heuristic detection engine with more than 1800 checks on Email header alone – Most Configurable<br />Works on a scoring system, by default over 60 pts is considered a Spam message<br />Has series of Spam categories to identify Spam makeup<br />Automatically updated weekly<br />Framework for delivering Zero day Spam & Virus updates<br />Can be used for many other functions in MailMarshal<br />
  31. 31. URLCensor<br />Looks for URL links inside email messages – Phishing Detection<br />De-obviouscates mined URL’s<br />Performs DNS check against external suRBL lists to see if URL is listed<br />
  32. 32. DNS Blacklists<br />One of the traditional methods of Spam detection<br />Looks up IP addresses or Sender names in remote DNS lists<br />Examples of DNS Blacklists are:-<br />SpamHaus<br />SpamCop<br />
  33. 33. CountryCensor<br />Identifies the IP address of the original sender<br />Looks up this IP address against a database of the IP address ranges allocated to different countries<br />Can allow, Block or just log in the instance of an Email coming in from a region or a particular country – Detects country of origin<br />
  34. 34. TRACE Team<br />Marshal TRACE: Threat Research and Content Engineering<br />Global Spam Honeypots and Submitters<br />Research by Security Experts<br />Spam, Threat and<br />Zero Day Updates<br />TRACE<br />Threat Research and Content Engineering<br />MailMarshal<br />Server<br />Automatic Machine Learning Analysis<br />Threat Database<br />
  35. 35. TRACE Website <br />Currently covering Email, Web and malware threats<br />Full range of emerging threats and advice<br />Detailed statistics and reports<br />Blogs & RSS feeds<br />Future is for greater automatic protection directly into products and correlation of threat data from customer base<br />www.marshal.com/trace<br />
  36. 36. 9/23/2008<br />Summary<br />Marshal’s Defense-in-Depth Anti-Spam & Anti-Phishing engine is the most advanced available, with multiple facets and layers to cover the ever evolving Spam & Phishing threat<br />Combination of technologies providing consistent results, Zero False Positives and a 99.5% detection rate<br />Designed and tuned for speed without compromising performance<br />Marshal’s Trace team of experts providing the vigilance and protection for your ease of mind<br />Free 30 Day Trial Software at<br />www.marshal.com<br />
  37. 37. MailMarshal For Exchange<br />Internet<br />Monitor Internal Microsoft Exchange Email<br />Addresses Acceptable Use Policy (AUP) of Inter-office Communications <br />Pre-Configured Rule Sets<br />Anti-Virus for Internal Email<br />Same Attachment & Message Scanning Engine as MailMarshal<br />Reporting Includes ALL Internal Email<br />On average, 70% of corporate email, excluding spam, is internal, 30% external<br />Exchange Server<br />Firewall<br />
  38. 38. Provides ‘the best of both worlds’ – appliance hardware and software<br />Easy to deploy - hardened platform - low administration overhead<br />Flexible – upgradeable - scalable – multi-function security<br />‘MailMarshal software solution in a box’<br />Full functionality of MailMarshal software – packaged in a box!<br />Hardened Email Security Appliance<br />Standard 1U 19” rack mountable chassis<br />Unified solution for anti-virus, anti-spam and email security <br />9/23/2008<br />Marshal e10000 Security Appliance<br />
  39. 39. WebMarshalv6.0<br />Beyond URL Filtering<br />
  40. 40. The Wild, Wild Web<br />“To date, most large enterprises already have some combination of network firewall, URL filter and proxy server to protect and manage Web traffic. However, most organizations do not effectively filter malware from Web traffic. Gartner estimates that fewer than 15% of enterprises scan Web traffic for viruses.” (Gartner March 2007)<br />“Marshal’s TRACE Team last year predicted that social networking sites such as MySpace would be increasingly used as vehicles for spreading malware in 2008. Their popularity and rapid growth with Internet savvy users makes them an ideal vehicle for this kind of activity. People’s guards are lower and they are more accepting of familiar looking messages coming from seemingly trusted and frequently used websites.”<br />
  41. 41. Web 2.0, Employee 2.0<br />Web 2.0 is the term that refers to a second generation of hosting and online communities, social-networking sites (personal and business), content sharing (videos and photos), wikis (user created content) that facilitates sharing, creativity and collaboration between users.<br />The next generation Employee 2.0 has grown accustomed to these services and stopping all access could cause hiring issues and corporate culture stigmas.<br />What are your choices?<br />
  42. 42. What Are Your Choices?<br />Stop all access to these websites, or…<br />Create an Acceptable Use Policy and institute some simple, yet thorough protections against the malware and malicious content that grows each day on the web.<br />
  43. 43. 9/23/2008<br />Market Future - Web<br />The rise of Web 2.0 and lack of protection is causing a rapid rise in the attacks using Internet browsing. Organizations need to protect this widely used communication path in and out of their networks. <br />Companies need to look for products delivering a Secure Web Gateway vision, moving beyond only URL Filtering to provide real ‘web access control’ for the content users are actually visiting<br />Advanced multi-layered threat protection in real-time on the content being accessed and Data Leakage protection across this popular outbound path of data.<br />Web Access Control<br />Web Threat Protection<br />Data Loss Prevention<br />
  44. 44. Securing the Web Gateway<br />“The Internet has become a major source of infection for PCs, and the massive adoption of Web applications, in addition to the popularity of blogs and social-networking sites, has made this vector much harder to control. The Internet and Internet applications will be the primary sources of malware infections in the enterprise in 2008 and beyond. <br />Most companies have focused on the desktop or e-mail gateway to block malicious content. The enterprise Web gateway is another tier in need of additional protection from malicious code and inappropriate use.” (Gartner March 2007)<br />
  45. 45. 9/23/2008<br />WebMarshal-Beyond URL Filtering<br />WebMarshal 6.0 is a Secure Web Gateway<br />It Goes Beyond URL Filtering<br />Provides real-time content analysis of incoming and outgoing Web traffic<br />Webmarshal Is Designed To Meet The Needs Of All Organizations – Large And Small<br />Array Manager architecture allows management of distributed multi-server environments <br />
  46. 46. Key Functionalities<br />WebMarshal combines 3 key functions into one Secure Web Gateway: <br />Web Access Control – management of employee Internet use <br />Web Threat Security – protection against Web-based security threats <br />Data Leakage Prevention – security of confidential or sensitive information <br />Free 30 Day Trial Software at<br />www.marshal.com<br />
  47. 47. Common Policy Engine Components<br />AV Scanners<br />Spyware Scanners<br />URLCensor<br />TextCensor & TextCensor Scripts<br />File Un-packer<br />File type identifier<br />Policy definition wizard (Customized to suit product)<br />
  48. 48. Secure Web Gateway Appliance<br />All in one combined Email & Web Security Appliance<br />Unified Administration, Management & Reporting<br />Suited for sub 2500 user companies that are looking for a single all in one appliance, a hardened solution for MailMarshal & WebMarshal products<br />9/23/2008<br />
  49. 49. Marshal EndPoint Security<br />Email Content Security<br />
  50. 50. Where Does The Threat Originate?<br />74% of survey respondents said threats to corporate security are now coming from inside the organization.<br />IBM Security Survey 2006<br />Up to 70% of identity theft starts with the deliberate removal of personal data from a company by an employee<br />Professor Judith Collins, Michigan State University<br />Human Error was responsible for nearly 60% of security breaches in 2005<br />4th Annual CompTIA Study on Information security and the Workforce<br />70% of threats come from inside the organization<br />Analyst Firm<br />
  51. 51. Marshal EndPoint Security<br />Helps protect your data, both on and off the network:<br />Prevention - Prevents the transfer of files to or from unauthorized portable devices <br />Protection - Automatically encrypts data copied to approved devices <br />Visibility - Provides complete visibility of device and file accesses on the network <br />Flexibility - Provides granular control over who has access to what devices and for how long <br />
  52. 52. Security Reporting Centerv2.5<br />Reporting Tool<br />
  53. 53. Integration with new Marshal URL Filtering List<br />New Device Support<br />Microsoft ISA Security Logs in addition to current proxy support<br />Borderware update to latest OS<br />NetScreen update to latest OS<br />Juniper update to latest OS<br />Highlights:<br />URL filtering list integration<br />ISA Security log support<br />Updated Borderware support<br />Updated Netscreen support<br />Updated Juniper support<br />Security Reporting CenterFirewall Reporting<br />WebMarshalInternet Browsing Content Security<br />MailMarshalEmail Content Security<br />Security Reporting Center v2.5<br />
  54. 54. When Selecting a Security Partner…<br />Consistent Policy Engine<br />Does Spam Filtering Occur Inside the Firewall<br />Zero Day Protection<br />Allow Custom File Type Definitions<br />Is There a 24-hour Protection Team<br />Actively Scan all Web Content in Real Time<br />
  55. 55. Marshal<br />Your preferred and trusted partner for email and internet content security.<br />

×