Sonic Wall Email Security End User


Published on

  • Be the first to comment

Sonic Wall Email Security End User

  1. 1. SonicWALL Email Security
  2. 2. Agenda <ul><li>SonicWALL Overview </li></ul><ul><li>Email Threat Landscape </li></ul><ul><li>Protecting Against Email Threats </li></ul><ul><li>SonicWALL Email Security Product Line </li></ul>
  3. 3. SonicWALL Market Leadership *Appliances Selling for $490 - $1,499 and $1,500 - $5,000 Sources: IDC 2004, IDC 2005, Infonetics, Q3’05 2005 in Units and Revenue in Unified Threat Management #1 in Security Appliances in Revenue and Units* #2 Web Filtering Appliance Provider #3 Secure Content Management Provider #4
  4. 4. SonicWALL Solution Suite Policy and Management Business Continuity Secure Content Management Network Security
  5. 5. SonicWALL Solution Suite Global Management Secure Wireless SonicPoint GMS Content Security Network Security TZ & PRO Email Security & CSM Business Continuity CDP Remote Access SSL-VPN
  6. 6. Agenda <ul><li>SonicWALL Overview </li></ul><ul><li>Email Threat Landscape </li></ul><ul><li>Protecting Against Email Threats </li></ul><ul><li>SonicWALL Email Security Product Line </li></ul>
  7. 7. IT Security Concerns Top 5: Virus, Spyware, SPAM, Intrusion & Theft
  8. 8. Threats: More, and More Malicious …and Now Compliance Requirements That 3 year old spam box just isn’t cutting it anymore! <ul><li>U.S. Email volume 2.4Bn/day in 2006(1 ) </li></ul><ul><li>Email is the perimeter application that reaches all users </li></ul><ul><li>Cost of email threats is over $20Bn(2 ) </li></ul><ul><ul><li>Volume is exploding </li></ul></ul><ul><ul><li>Threats spreading faster, more malicious </li></ul></ul><ul><ul><li>Hybrids more like viruses in their approach </li></ul></ul><ul><li>Enterprise’s infrastructure is at stake </li></ul>Notes: (1) eMarketer, 2004 (2) National Technology Readiness Survey, Rockbridge Associates, Inc. & Maryland Business School, 11/2004
  9. 9. Spam Many messages are obviously spam
  10. 10. Is it Spam? Other messages will be disagreed upon
  11. 11. Phishing Some emails are easy to determine as phish
  12. 12. Phishing? Sometimes it is hard to tell
  13. 13. Viruses Spread Rapidly Virus outbreaks continue to happen
  14. 14. Virus Signatures Take Time <ul><li>Stop gap reactions </li></ul><ul><li>Disconnect from Internet </li></ul><ul><li>Send multiple “do not open” warnings </li></ul><ul><li>Panic </li></ul>Virus signatures take hours to become available
  15. 15. Outbound Risks and Compliance <ul><li>U.S. Federal: HIPAA, GLBA, SOX, Sec 17a-4, NASD3010, PATRIOT Act Section 326 </li></ul><ul><li>European: Safe Harbor, EU Data Protection Directive 95/46 </li></ul><ul><li>Organization: VISA CISP, MasterCard Site Data Protection Program, FERPA </li></ul><ul><li>State: CA SB 1386 & AB 1950 / NY Bill A04254 / IL H.B. 1633 </li></ul><ul><li>Corporate : Prevent offensive language, add disclaimers, block files </li></ul><ul><li>Many more… </li></ul>All organizations need to be address compliance requirements
  16. 16. Inbound and Outbound Threats Threats Require Inbound and Outbound Protection
  17. 17. Proliferation of Systems Typical Mail Data Center Management of Multiple Systems Becomes Complex
  18. 18. Agenda <ul><li>SonicWALL Overview </li></ul><ul><li>Email Threat Landscape </li></ul><ul><li>Protecting Against Email Threats </li></ul><ul><li>SonicWALL Email Security Product Line </li></ul>
  19. 19. Collect Worldwide Threat Data
  20. 20. Analyze for Bad/Good Email Patterns Likely Virus Good Email SonicWALL Analyzes Patterns Good Pattern Bad Pattern 40 million emails … sent by … from 3 IP addresses … in Seattle … and never junked 50 people … in 6 different countries … receive a new attachment … that has never been seen before … within 30 minutes
  21. 21. Cross Analyze Patterns with Content Evaluation and Reputation SonicWALL Determines a Definitive Judgment – Not Just a Score
  22. 22. SonicWALL Email Security Stops Today’s and Tomorrow’s Threats Threats Evolve – SonicWALL Protects
  23. 23. Agenda <ul><li>SonicWALL Overview </li></ul><ul><li>Email Threat Landscape </li></ul><ul><li>Protecting Against Email Threats </li></ul><ul><li>SonicWALL Email Security Product Line </li></ul>
  24. 24. Best-of-Breed Product 2,000+ Customers & 96% Retention Healthcare Transportation Nonprofit Retail Consumer Goods Automotive Entertainment Financial Services Technology Media/Publishing Pharmaceutical Aerospace/Defense Manufacturing Technology Government Hospitality Education Retail Media/Publishing Consumer Goods
  25. 25. Award Winning Email Security <ul><li>FINALISTS: </li></ul><ul><li>Barracuda Networks, Inc. for Barracuda Spam Firewall </li></ul><ul><li>BorderWare Technologies for MXTreme Mail Firewall </li></ul><ul><li>Clearswift for Clearswift/MIMEsweeper for SMTP </li></ul><ul><li>CipherTrust, Inc. for CipherTrust IronMail Gateway </li></ul><ul><li>eSoft, Inc. for eSoft ThreatWall 300 </li></ul><ul><li>GFI Software Ltd for GFI MailSecurity for Exchange/SMTP </li></ul>Best Content Security Solution Overall Category Winner and Winner for Best Anti-Spam <ul><li>AND MORE FINALISTS: </li></ul><ul><li>MailFrontier, Inc. for MailFrontier Gateway </li></ul><ul><li>MailShell for MailShell SDK </li></ul><ul><li>Solinus, Inc. for MailFoundry Email Filtering Appliance </li></ul><ul><li>Sunbelt Software for iHateSpam for Exchange </li></ul><ul><li>Symantec Corporation for Symantec Brightmail AntiSpam </li></ul><ul><li>Tumbleweed Communications for MailGate Email Firewall </li></ul>
  26. 26. SonicWALL Email Security <ul><li>Anti-Spam , Anti-Phishing , Anti-Virus </li></ul><ul><li>Compliance and Policy Management </li></ul><ul><li>Appliance and Software options </li></ul><ul><li>Works with any email system (SMTP) </li></ul><ul><li>Unified inbound and outbound protection </li></ul><ul><li>Installs in < 1 Hour…managed in < 10 minutes/week </li></ul><ul><li>For businesses from Less than 50 users to Over 5000 Users </li></ul>
  27. 27. Product Overview <ul><li>Quick Installation </li></ul><ul><li>Anti-Spam, Anti-Phishing, Anti-Virus </li></ul><ul><li>Administrative and End-User Junk Box </li></ul><ul><li>Junk Box Summaries </li></ul><ul><li>Policy & Compliance Management </li></ul><ul><li>Email Auditing </li></ul><ul><li>Reporting & Monitoring </li></ul>
  28. 28. Quick Configuration <ul><li>5 Steps to Configure </li></ul><ul><li>Full install in < 1 hour </li></ul><ul><li>High availability options </li></ul>
  29. 29. Anti-Spam, Anti-Phishing, Anti-Virus <ul><li>Complete protection </li></ul><ul><ul><li>Inbound/Outbound </li></ul></ul><ul><ul><li>Spam, Virus, Phishing </li></ul></ul><ul><ul><li>Zombies, DHA, DoS </li></ul></ul><ul><li>Automatic updates </li></ul><ul><ul><li>No rules to write </li></ul></ul><ul><li>Complete flexibility </li></ul><ul><ul><li>Per-user and per-group </li></ul></ul>
  30. 30. Administrative and End-User Junk Box <ul><li>Web-based Junk Box </li></ul><ul><ul><li>Search, sort, preview </li></ul></ul><ul><ul><li>View all threats </li></ul></ul><ul><li>1-click UnJunk </li></ul><ul><ul><li>Retrieves </li></ul></ul><ul><ul><li>Adds to allowed list </li></ul></ul><ul><ul><li>Provides feedback </li></ul></ul><ul><li>Administrative, End-User </li></ul>
  31. 31. Junk Box Summary <ul><li>Easy quarantine view </li></ul><ul><ul><li>Email summary </li></ul></ul><ul><li>Configurable </li></ul><ul><ul><li>Frequency </li></ul></ul><ul><ul><li>Specific time and day </li></ul></ul><ul><ul><li>11 languages </li></ul></ul><ul><ul><li>All or just questionable </li></ul></ul><ul><li>Preview and UnJunk </li></ul><ul><ul><li>1-click </li></ul></ul>
  32. 32. Email Policy & Compliance Approach Robust tools to Identify, Monitor, and Enforce
  33. 33. Policy and Compliance Management <ul><li>Powerful filters </li></ul><ul><ul><li>Search any message part </li></ul></ul><ul><ul><li>Scan within attachments </li></ul></ul><ul><ul><li>Check for disguised text </li></ul></ul><ul><ul><li>Match against dictionaries </li></ul></ul><ul><ul><li>Judgment-based policies </li></ul></ul><ul><li>15 action options </li></ul><ul><ul><li>Bounce, quarantine, log </li></ul></ul><ul><ul><li>Add disclaimers </li></ul></ul><ul><ul><li>Strip attachments </li></ul></ul><ul><ul><li>Etc. </li></ul></ul><ul><li>Apply to specific groups </li></ul><ul><ul><li>LDAP-based </li></ul></ul>
  34. 34. Email Auditing <ul><li>Full email audit </li></ul><ul><ul><li>All good mail </li></ul></ul><ul><ul><li>All bad mail </li></ul></ul><ul><ul><li>Inbound </li></ul></ul><ul><ul><li>Outbound </li></ul></ul><ul><li>Searchable </li></ul><ul><ul><li>From, To, Subject </li></ul></ul><ul><ul><li>Today or multi-day </li></ul></ul><ul><li>Detailed information </li></ul><ul><ul><li>Per-recipient data </li></ul></ul><ul><ul><li>Full audit trail </li></ul></ul>
  35. 35. Reporting and Monitoring <ul><li>25+ Web-based reports </li></ul><ul><ul><li>Dashboard, System Status </li></ul></ul><ul><ul><li>Spam, Phishing, Virus </li></ul></ul><ul><ul><li>Policy and Compliance </li></ul></ul><ul><ul><li>Return-on-Investment </li></ul></ul><ul><li>Custom reports </li></ul><ul><li>Emailed reports </li></ul><ul><li>Schedulable reports </li></ul>
  36. 36. Instant Deployment
  37. 37. High Availability Deployment
  38. 38. Products & Subscriptions
  39. 39. Thank you.