SlideShare a Scribd company logo
SHIELDEX
Email
Gateway
Contents SHIELDEX Email Gateway
1. Company Introduction
2. SHIELDEX Email Gateway Solution
3. Summary
Chapter 1. Company Introduction
• Company overview
• Business Units
• Corporate Vision
• Major clients and partners
/ 200
Softcamp
1. Company Introduction
Company overview
Softcamp, an IT security solution company that assists enterprise clients’ valuable information, data, and digital assets
protection from both internal and external security threats.
We ensure our clients
to perform their task safely and securely
Softcamp Co., Ltd.
Technology-oriented
management
Stable overseas
business
Well-experienced in
information & data
protection technology
 Company : Softcamp Co., Ltd.
 Established : July,1999
 CEO: Bae, Hwan-Kuk
 Number of Employees : 120 (70% on R&D)
 Total Revenue : 17 Million USD (2019 forecast)
17, Pangyo-ro 228 beon-gil, Bundang-gu, Seongnam-si, Gyeonggi-do,
Republic of Korea
T +82-1644-9366 F +82-31-697-4599
www.softcamp.co.kr
4
/ 200
Softcamp
1. Company Introduction
Business Units
Softcamp provides the optimal security solution for internal information leakage and external threats prevention based
on kernel and OS level based security technology.
SHIELDEX Email Gateway
One-stop Email Security Solution
Document DRM
Area DRM/Isolation
Electronic document encryption Various
permission control
Information leakage prevention/control solutions
Storing/Controlling in a specific virtual security area
and leakage prevention through PC virtualization
technology, unstructured data security solution
Centralized Document Management
Document Disarm & Reconstruction
Store documents in centralized storage within an organization
Comprehensive management based on Distributed File
System
Solutions achieving innovative business collaborative system
Content disarm and reconstruction through CDR technology
APT, Ransomware malware prevention solution that allows only
safe documents
“SECURE OS” - Performing security on the OS level
Document Security
S-Work FX/Isolation VD
SHIELDEX SaniTrans Mail/Net
MAXEON FX
5
AND
NOW
/ 200
Softcamp
1. Company Introduction
Corporate Vision
6
More
Creative
More
Confidence
More
Increase
More
Reduction
Innovative Product
Providing high quality
product and service
Reducing product
development, operation
cost, and employee efforts
Service value
Customer satisfaction
No.1 Global Security Solution Company
The power to do safely
A company that helps customers perform their task safely and securely
Develop highest quality of software and solution
that enables safer usage of document
Creating innovative products that
currently does not exist
Trust Based Reduce Opportunity Cost Increase Value
/ 200
Softcamp
1. Company Introduction
Major clients and partners
400 domestic and 100 Japanese clients, Softcamp has been selected as the standard product for domestic enterprise
groups.
Overseas
Domestic
7
Chapter 2. SHIELDEX Email Gateway Solution
/ 200
Problem
2. SHIELDEX Email Gateway Solution
Rise of email security threats and attacks
9
The email security threats are always growing and evolving even with various types of social engineering email attacks
such as spear phishing, business email compromise, and ransomware.
Potentially
malicious
application and
program
Social
engineering
threats
Unwanted SW
type
Malicious URL
Unknown type
Malware
Virus
/ 200
Problem
2. SHIELDEX Email Gateway Solution
Typical email security trends (A LA CARTE)
10
TCO increased due to multiple and separated email security solutions within an organization
Still difficult to defend against advanced intelligent types of threats, as well as difficult to manage the solutions.
Anti-spam
$$
Anti-
Malware
Anti-Virus
$$
APT
Prevention
$$
Document
conversion
$$
[ Challenges for organization ]
 TCO increased
 Management point increased
 Troubleshooting management point increased
Difficult to defend against advanced
intelligent types of threats
/ 200
Suggestion
2. SHIELDEX Email Gateway Solution
What Gartner suggests about advanced email security
11
Gartner says, “Capabilities to defend against an evolving landscape of advanced and targeted threats differentiate
providers in an otherwise mature and saturated secure email gateway market. Security and risk management leaders
should use this research to help evaluate and select SEG products.”
< Figure. Secure Email Gateway Components and Capabilities>
MTA = message transfer agent; CDR = content disarm and
reconstruction
Source: Gartner (May 2017)
/ 200
Solution
2. SHIELDEX Email Gateway Solution
Overview: SHIELDEX Email Gateway
12
Featured with various email protection techniques from essential to advanced on this highly capable and flexible SEG
solution to protect your email and working environment by one-stop.
Anti-Spam
Spam mail blocking support
Signature-based Anti-Malware
Globally renowned Anti-Malware/Virus integration support
Marketing and graymail classification, and personalized controls
Rewriting and time-of-click analysis for advanced, URL-based threat defense
URL reputation checking support
Fraudulent domain verification
Verify domain spoofing support
Content Disarmed and Reconstruction(CDR)
CDR for all the visible document contents
Attached document file conversion
Scan, verify, and convert document attachments for safe document viewer
**DLP & Email Encryption TBD, planning to support with Softcamp’s email encryption and right
management solution, Ex-Right, integration
Real-time malicious URL scanning
Offers safe browsing with URL reputation checking when user click on any URLs from email body
Attached document files safety process
Viewing attached document file from safe viewer always, and CDR it in real time before the actual
downloading by users
Email management and monitoring by user
: User email incoming/outgoing history and protection status
Monitoring
Post-processingPre-processing
<SEG Protection Cycle>
/ 200
Solution
2. SHIELDEX Email Gateway Solution
SHIELDEX Email Gateway email processing and protection flows
User
SHIELDEX Email
Gateway
Mail Server
FILTER
Detection SPAM / Malware
FILTER
Sanitization Safe Viewing URL Verification
Safe browsing check and verify
Block or redirect
</>
13
Monitoring
URL
CDR-ed documents download
Administrator page, User page, History/policy mgt.
Attachment
/ 200
Solution
2. SHIELDEX Email Gateway Solution
Comparison: Conventional vs. SHIELDEX Email Gateway
14
SHIELDEX Email Gateway provides static and dynamic protection techniques both for attached document files.
Identified as
normal email
Spam / Malware
FILTER
SHIELDEX Email Gateway
Conventional Email Protection Process
Identified as
normal email
Spam / Malware
FILTER
VS
Filtering potential threats from the point of email
inbounding, but no protection guaranteed at the
post stage
Step 1
Filtering potential threats
from the point of email
inbounding
Step 2
Preview attached
documents from safe
viewer without actual file
downloading
Step 3
CDR processed when the
point of attached
document files
downloading
?
?
?
?
/ 200
Phishing
Attachments
Malware
Virus
Solution
2. SHIELDEX Email Gateway Solution
vs. potential threats: “Detection and Verification”
15
Offers anti-spam, anti-malware, and malicious URL verification(time-of-click URL checking)
SPAM?
YES NO
Malicious URL verification first,
then connect/redirectSPAM NORMAL
Spam mail blocking Malicious mail blocking Malicious URL verification
URL
X
/ 200
Solution
2. SHIELDEX Email Gateway Solution
vs. potential threats: “Safe Viewing”
16
Document file attachments can be opened and reviewed through SEG’s safe viewer environment first to prevent any
malware infections. (document file attachments can be downloaded after CDR sanitization process)
SMG Pre-Processing
“Time-of-click”
with
SAFETY AWARENESS
Review supported file formats :
doc, docx, rtf, dot, dotx, dotm, flatopc, odt, ott, xml, txt, xls, xlsx, xlsb, xltx, xltm, xlsm, xml, ods, csv, tab delimited, html, mhtml, ppt, pptx, pps, ppsx, pptm, ppsm, potx, potm, pdf
Step 1
Review from “safe” document viewer
Step 2
Sanitized document attachments by CDR
can be downloaded
/ 200
Solution
2. SHIELDEX Email Gateway Solution
vs. potential threats: “Sanitization”
17
Email body, document file attachments CDR(sanitization) feature – remove malicious scripts and macros via advanced
CDR technique.
Mail body analysis
& reconstruction
Mail body content CDR
Attached document file CDR
Document contents analysis
& reconstruction
Sanitization supported file formats :
Microsoft Word (*.doc, *.docx, *.docm, *.rtf) | Microsoft PowerPoint (*.ppt, *.pptx, *. pptm) | Microsoft Excel (*.xls, *.xlsx, *.xlsm, *.csv)
Adobe PDF (*.pdf) | Ichitaro (*.jtd) | Images files (*.jpg, *.jpeg, *.gif, *.tif, *.tiff, *.bmp, *.png, *.ico) | Compress files (*.zip, *.lzh)
AutoCAD (*.dwg, *.dxf, *.dwf) | Email files : *.msg, *.eml
</>
1. Format Verification
Mail body structure
Header structure
2. Structure Analysis
Visible objects (paragraph,
shape, table, image…) structure
3. Component Extraction
Document object component
Valid component analysis
4. Re-Construction Verification
Extracted visible components
reconstruction and verification
/ 200
Solution
2. SHIELDEX Email Gateway Solution
Email round-trip “Monitoring”
18
Offers various monitoring information and history for administrator and end-users such as overall dashboard, email
round-trip status and tracking, email protection process/results, and system/service/event status.
System monitoring Queue monitoring
Dashboard
Email monitoring
Detail info.Mail tracking mgt.Log monitoringService monitoring Event monitoring
Monitoring
/ 200
Solution
2. SHIELDEX Email Gateway Solution
SHIELDEX Email Gateway system diagram
19
SHIELDEX Email Gateway locates right in front of email server, and incoming malicious threats via emails will be detected,
analyzed, verified, safe, and sanitized by the SEG solution.
IntranetDMZExternal side
Mail Sender
External User
Internet
User 1
User 2
SHIELDEX Email
Gateway
Mail Server
• SMTP engine
• Anti-Spam
• Virus
• URL Inspection
• Attached document safe viewer
• CDR
• Monitoring
/ 200
Solution
2. SHIELDEX Email Gateway Solution
SHIELDEX Email Gateway deployment and service model
20
Offers various and flexible deployment and business models with customization options to meet up with customers’
requirements as much as possible.
ON-
PREMISE
CLOUD
(B2B)
CLOUD
(B2C)
Solution package
Appliance / Virtual appliance
Private cloud service (as cloud-
based secure email gateway)
Offers secure and reliable email
account service for individual end
users who are using public email
services
SHIELDEX Email
Gateway
SHIELDEX Email
Gateway
Mail Server
Mail Server 1
Mail Server 2
SHIELDEX Email
Gateway
Chapter 3. Summary
/ 200
Summary
3. Summary
SHIELDEX Email Gateway
22
• Intuitive UI and UX
• Easy gateway service usage and system operation
for users and administrator
• Proactively take actions to protect your emails
and working environment by various notifications,
alerts, email/system status from the monitoring
tools of SMG
• Designed and developed SMG based on Gartner’s SEG
technical suggestion
• (Market Guide for Secure Email Gateway, 3 May 2017,
Gartner)
• CDR, Anti-spam, Anti-virus/malware, URL
fraudulent verification, monitoring, history and
record management … are in one solution
SHIELDEX
Email
Gateway
User-oriented safe and clean email
and work environment
Equipped market proven CDR
technology
Based on Gartner’s SEG tech suggestion Competitive ONESTOP email threats protection
Various email security monitoring tools Efficiently intuitive usage and management
Thank You

More Related Content

Similar to [SEG] SHIELDEX Email Gateway

"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Dean Iacovelli
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Ravikumar Sathyamurthy
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
Robert Crane
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
Primend
 
Trend Micro - Hosted eMail Security
Trend Micro - Hosted eMail SecurityTrend Micro - Hosted eMail Security
Trend Micro - Hosted eMail Security
Teddy Wijaya
 
SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail
Softcamp Co., Ltd.
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
NBBNOC
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
- Mark - Fullbright
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology Licensing
Pavel Fyodorov
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
Prime Infoserv
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
Didiet Kusumadihardja
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Create IT
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
kovec2684
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
Dean Iacovelli
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
IRJET Journal
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
Vignesh Ganesan I Microsoft MVP
 
SOFTCAMP SHIELDEX AD
SOFTCAMP SHIELDEX AD SOFTCAMP SHIELDEX AD
SOFTCAMP SHIELDEX AD
Softcamp Co., Ltd.
 

Similar to [SEG] SHIELDEX Email Gateway (20)

"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Trend Micro - Hosted eMail Security
Trend Micro - Hosted eMail SecurityTrend Micro - Hosted eMail Security
Trend Micro - Hosted eMail Security
 
SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology Licensing
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
SOFTCAMP SHIELDEX AD
SOFTCAMP SHIELDEX AD SOFTCAMP SHIELDEX AD
SOFTCAMP SHIELDEX AD
 

More from Softcamp Co., Ltd.

SHIELD@Homeㅣテレワークソリューション
SHIELD@HomeㅣテレワークソリューションSHIELD@Homeㅣテレワークソリューション
SHIELD@Homeㅣテレワークソリューション
Softcamp Co., Ltd.
 
SHIELDEX GateXcanner
SHIELDEX GateXcannerSHIELDEX GateXcanner
SHIELDEX GateXcanner
Softcamp Co., Ltd.
 
SHIELDEX GateXcanner
SHIELDEX GateXcannerSHIELDEX GateXcanner
SHIELDEX GateXcanner
Softcamp Co., Ltd.
 
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
Softcamp Co., Ltd.
 
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
Softcamp Co., Ltd.
 
SHIELDEX GateXcanner
SHIELDEX GateXcannerSHIELDEX GateXcanner
SHIELDEX GateXcanner
Softcamp Co., Ltd.
 
SHIELDEX EnCrypto
SHIELDEX EnCryptoSHIELDEX EnCrypto
SHIELDEX EnCrypto
Softcamp Co., Ltd.
 
CDR/Shieldex Kiosk
CDR/Shieldex KioskCDR/Shieldex Kiosk
CDR/Shieldex Kiosk
Softcamp Co., Ltd.
 
Threat management, Ex-Scan
Threat management, Ex-ScanThreat management, Ex-Scan
Threat management, Ex-Scan
Softcamp Co., Ltd.
 
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENGCDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
Softcamp Co., Ltd.
 
SHIELDEX - CDR/Incoming File Control, SOFTCAMP
SHIELDEX - CDR/Incoming File Control, SOFTCAMPSHIELDEX - CDR/Incoming File Control, SOFTCAMP
SHIELDEX - CDR/Incoming File Control, SOFTCAMP
Softcamp Co., Ltd.
 
Document Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENGDocument Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENG
Softcamp Co., Ltd.
 
MAXEON - Document Centralization, SOFTCAMP
MAXEON - Document Centralization, SOFTCAMP MAXEON - Document Centralization, SOFTCAMP
MAXEON - Document Centralization, SOFTCAMP
Softcamp Co., Ltd.
 
Virtual Domains Software, SOFTCAMP S-Work FX_ENG
Virtual Domains Software, SOFTCAMP S-Work FX_ENGVirtual Domains Software, SOFTCAMP S-Work FX_ENG
Virtual Domains Software, SOFTCAMP S-Work FX_ENG
Softcamp Co., Ltd.
 
S-Work - Virtual Domains Software, SOFTCAMP
S-Work - Virtual Domains Software, SOFTCAMPS-Work - Virtual Domains Software, SOFTCAMP
S-Work - Virtual Domains Software, SOFTCAMP
Softcamp Co., Ltd.
 
Document DRM, SOFTCAMP Document Security_ENG
Document DRM, SOFTCAMP Document Security_ENGDocument DRM, SOFTCAMP Document Security_ENG
Document DRM, SOFTCAMP Document Security_ENG
Softcamp Co., Ltd.
 
Document Security - Document DRM, SOFTCAMP
Document Security - Document DRM, SOFTCAMPDocument Security - Document DRM, SOFTCAMP
Document Security - Document DRM, SOFTCAMP
Softcamp Co., Ltd.
 
Softcamp Company Introduction_ENG
Softcamp Company Introduction_ENGSoftcamp Company Introduction_ENG
Softcamp Company Introduction_ENG
Softcamp Co., Ltd.
 
소프트캠프 회사소개서 - Softcamp Company Introduction
소프트캠프 회사소개서 - Softcamp Company Introduction소프트캠프 회사소개서 - Softcamp Company Introduction
소프트캠프 회사소개서 - Softcamp Company Introduction
Softcamp Co., Ltd.
 
SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail
Softcamp Co., Ltd.
 

More from Softcamp Co., Ltd. (20)

SHIELD@Homeㅣテレワークソリューション
SHIELD@HomeㅣテレワークソリューションSHIELD@Homeㅣテレワークソリューション
SHIELD@Homeㅣテレワークソリューション
 
SHIELDEX GateXcanner
SHIELDEX GateXcannerSHIELDEX GateXcanner
SHIELDEX GateXcanner
 
SHIELDEX GateXcanner
SHIELDEX GateXcannerSHIELDEX GateXcanner
SHIELDEX GateXcanner
 
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
SHIELD@Home (실드앳홈)ㅣ재택근무솔루션ㅣ소프트캠프
 
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
SHIELD@Homeㅣ재택근무를 위한 원격접속솔루션ㅣ소프트캠프
 
SHIELDEX GateXcanner
SHIELDEX GateXcannerSHIELDEX GateXcanner
SHIELDEX GateXcanner
 
SHIELDEX EnCrypto
SHIELDEX EnCryptoSHIELDEX EnCrypto
SHIELDEX EnCrypto
 
CDR/Shieldex Kiosk
CDR/Shieldex KioskCDR/Shieldex Kiosk
CDR/Shieldex Kiosk
 
Threat management, Ex-Scan
Threat management, Ex-ScanThreat management, Ex-Scan
Threat management, Ex-Scan
 
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENGCDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
CDR/Incoming File Control, SOFTCAMP SHIELDEX_ENG
 
SHIELDEX - CDR/Incoming File Control, SOFTCAMP
SHIELDEX - CDR/Incoming File Control, SOFTCAMPSHIELDEX - CDR/Incoming File Control, SOFTCAMP
SHIELDEX - CDR/Incoming File Control, SOFTCAMP
 
Document Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENGDocument Centralization, SOFTCAMP MAXEON FX_ENG
Document Centralization, SOFTCAMP MAXEON FX_ENG
 
MAXEON - Document Centralization, SOFTCAMP
MAXEON - Document Centralization, SOFTCAMP MAXEON - Document Centralization, SOFTCAMP
MAXEON - Document Centralization, SOFTCAMP
 
Virtual Domains Software, SOFTCAMP S-Work FX_ENG
Virtual Domains Software, SOFTCAMP S-Work FX_ENGVirtual Domains Software, SOFTCAMP S-Work FX_ENG
Virtual Domains Software, SOFTCAMP S-Work FX_ENG
 
S-Work - Virtual Domains Software, SOFTCAMP
S-Work - Virtual Domains Software, SOFTCAMPS-Work - Virtual Domains Software, SOFTCAMP
S-Work - Virtual Domains Software, SOFTCAMP
 
Document DRM, SOFTCAMP Document Security_ENG
Document DRM, SOFTCAMP Document Security_ENGDocument DRM, SOFTCAMP Document Security_ENG
Document DRM, SOFTCAMP Document Security_ENG
 
Document Security - Document DRM, SOFTCAMP
Document Security - Document DRM, SOFTCAMPDocument Security - Document DRM, SOFTCAMP
Document Security - Document DRM, SOFTCAMP
 
Softcamp Company Introduction_ENG
Softcamp Company Introduction_ENGSoftcamp Company Introduction_ENG
Softcamp Company Introduction_ENG
 
소프트캠프 회사소개서 - Softcamp Company Introduction
소프트캠프 회사소개서 - Softcamp Company Introduction소프트캠프 회사소개서 - Softcamp Company Introduction
소프트캠프 회사소개서 - Softcamp Company Introduction
 
SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail SOFTCAMP SHIELDEX SaniTrans Mail
SOFTCAMP SHIELDEX SaniTrans Mail
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

[SEG] SHIELDEX Email Gateway

  • 2. Contents SHIELDEX Email Gateway 1. Company Introduction 2. SHIELDEX Email Gateway Solution 3. Summary
  • 3. Chapter 1. Company Introduction • Company overview • Business Units • Corporate Vision • Major clients and partners
  • 4. / 200 Softcamp 1. Company Introduction Company overview Softcamp, an IT security solution company that assists enterprise clients’ valuable information, data, and digital assets protection from both internal and external security threats. We ensure our clients to perform their task safely and securely Softcamp Co., Ltd. Technology-oriented management Stable overseas business Well-experienced in information & data protection technology  Company : Softcamp Co., Ltd.  Established : July,1999  CEO: Bae, Hwan-Kuk  Number of Employees : 120 (70% on R&D)  Total Revenue : 17 Million USD (2019 forecast) 17, Pangyo-ro 228 beon-gil, Bundang-gu, Seongnam-si, Gyeonggi-do, Republic of Korea T +82-1644-9366 F +82-31-697-4599 www.softcamp.co.kr 4
  • 5. / 200 Softcamp 1. Company Introduction Business Units Softcamp provides the optimal security solution for internal information leakage and external threats prevention based on kernel and OS level based security technology. SHIELDEX Email Gateway One-stop Email Security Solution Document DRM Area DRM/Isolation Electronic document encryption Various permission control Information leakage prevention/control solutions Storing/Controlling in a specific virtual security area and leakage prevention through PC virtualization technology, unstructured data security solution Centralized Document Management Document Disarm & Reconstruction Store documents in centralized storage within an organization Comprehensive management based on Distributed File System Solutions achieving innovative business collaborative system Content disarm and reconstruction through CDR technology APT, Ransomware malware prevention solution that allows only safe documents “SECURE OS” - Performing security on the OS level Document Security S-Work FX/Isolation VD SHIELDEX SaniTrans Mail/Net MAXEON FX 5 AND NOW
  • 6. / 200 Softcamp 1. Company Introduction Corporate Vision 6 More Creative More Confidence More Increase More Reduction Innovative Product Providing high quality product and service Reducing product development, operation cost, and employee efforts Service value Customer satisfaction No.1 Global Security Solution Company The power to do safely A company that helps customers perform their task safely and securely Develop highest quality of software and solution that enables safer usage of document Creating innovative products that currently does not exist Trust Based Reduce Opportunity Cost Increase Value
  • 7. / 200 Softcamp 1. Company Introduction Major clients and partners 400 domestic and 100 Japanese clients, Softcamp has been selected as the standard product for domestic enterprise groups. Overseas Domestic 7
  • 8. Chapter 2. SHIELDEX Email Gateway Solution
  • 9. / 200 Problem 2. SHIELDEX Email Gateway Solution Rise of email security threats and attacks 9 The email security threats are always growing and evolving even with various types of social engineering email attacks such as spear phishing, business email compromise, and ransomware. Potentially malicious application and program Social engineering threats Unwanted SW type Malicious URL Unknown type Malware Virus
  • 10. / 200 Problem 2. SHIELDEX Email Gateway Solution Typical email security trends (A LA CARTE) 10 TCO increased due to multiple and separated email security solutions within an organization Still difficult to defend against advanced intelligent types of threats, as well as difficult to manage the solutions. Anti-spam $$ Anti- Malware Anti-Virus $$ APT Prevention $$ Document conversion $$ [ Challenges for organization ]  TCO increased  Management point increased  Troubleshooting management point increased Difficult to defend against advanced intelligent types of threats
  • 11. / 200 Suggestion 2. SHIELDEX Email Gateway Solution What Gartner suggests about advanced email security 11 Gartner says, “Capabilities to defend against an evolving landscape of advanced and targeted threats differentiate providers in an otherwise mature and saturated secure email gateway market. Security and risk management leaders should use this research to help evaluate and select SEG products.” < Figure. Secure Email Gateway Components and Capabilities> MTA = message transfer agent; CDR = content disarm and reconstruction Source: Gartner (May 2017)
  • 12. / 200 Solution 2. SHIELDEX Email Gateway Solution Overview: SHIELDEX Email Gateway 12 Featured with various email protection techniques from essential to advanced on this highly capable and flexible SEG solution to protect your email and working environment by one-stop. Anti-Spam Spam mail blocking support Signature-based Anti-Malware Globally renowned Anti-Malware/Virus integration support Marketing and graymail classification, and personalized controls Rewriting and time-of-click analysis for advanced, URL-based threat defense URL reputation checking support Fraudulent domain verification Verify domain spoofing support Content Disarmed and Reconstruction(CDR) CDR for all the visible document contents Attached document file conversion Scan, verify, and convert document attachments for safe document viewer **DLP & Email Encryption TBD, planning to support with Softcamp’s email encryption and right management solution, Ex-Right, integration Real-time malicious URL scanning Offers safe browsing with URL reputation checking when user click on any URLs from email body Attached document files safety process Viewing attached document file from safe viewer always, and CDR it in real time before the actual downloading by users Email management and monitoring by user : User email incoming/outgoing history and protection status Monitoring Post-processingPre-processing <SEG Protection Cycle>
  • 13. / 200 Solution 2. SHIELDEX Email Gateway Solution SHIELDEX Email Gateway email processing and protection flows User SHIELDEX Email Gateway Mail Server FILTER Detection SPAM / Malware FILTER Sanitization Safe Viewing URL Verification Safe browsing check and verify Block or redirect </> 13 Monitoring URL CDR-ed documents download Administrator page, User page, History/policy mgt. Attachment
  • 14. / 200 Solution 2. SHIELDEX Email Gateway Solution Comparison: Conventional vs. SHIELDEX Email Gateway 14 SHIELDEX Email Gateway provides static and dynamic protection techniques both for attached document files. Identified as normal email Spam / Malware FILTER SHIELDEX Email Gateway Conventional Email Protection Process Identified as normal email Spam / Malware FILTER VS Filtering potential threats from the point of email inbounding, but no protection guaranteed at the post stage Step 1 Filtering potential threats from the point of email inbounding Step 2 Preview attached documents from safe viewer without actual file downloading Step 3 CDR processed when the point of attached document files downloading ? ? ? ?
  • 15. / 200 Phishing Attachments Malware Virus Solution 2. SHIELDEX Email Gateway Solution vs. potential threats: “Detection and Verification” 15 Offers anti-spam, anti-malware, and malicious URL verification(time-of-click URL checking) SPAM? YES NO Malicious URL verification first, then connect/redirectSPAM NORMAL Spam mail blocking Malicious mail blocking Malicious URL verification URL X
  • 16. / 200 Solution 2. SHIELDEX Email Gateway Solution vs. potential threats: “Safe Viewing” 16 Document file attachments can be opened and reviewed through SEG’s safe viewer environment first to prevent any malware infections. (document file attachments can be downloaded after CDR sanitization process) SMG Pre-Processing “Time-of-click” with SAFETY AWARENESS Review supported file formats : doc, docx, rtf, dot, dotx, dotm, flatopc, odt, ott, xml, txt, xls, xlsx, xlsb, xltx, xltm, xlsm, xml, ods, csv, tab delimited, html, mhtml, ppt, pptx, pps, ppsx, pptm, ppsm, potx, potm, pdf Step 1 Review from “safe” document viewer Step 2 Sanitized document attachments by CDR can be downloaded
  • 17. / 200 Solution 2. SHIELDEX Email Gateway Solution vs. potential threats: “Sanitization” 17 Email body, document file attachments CDR(sanitization) feature – remove malicious scripts and macros via advanced CDR technique. Mail body analysis & reconstruction Mail body content CDR Attached document file CDR Document contents analysis & reconstruction Sanitization supported file formats : Microsoft Word (*.doc, *.docx, *.docm, *.rtf) | Microsoft PowerPoint (*.ppt, *.pptx, *. pptm) | Microsoft Excel (*.xls, *.xlsx, *.xlsm, *.csv) Adobe PDF (*.pdf) | Ichitaro (*.jtd) | Images files (*.jpg, *.jpeg, *.gif, *.tif, *.tiff, *.bmp, *.png, *.ico) | Compress files (*.zip, *.lzh) AutoCAD (*.dwg, *.dxf, *.dwf) | Email files : *.msg, *.eml </> 1. Format Verification Mail body structure Header structure 2. Structure Analysis Visible objects (paragraph, shape, table, image…) structure 3. Component Extraction Document object component Valid component analysis 4. Re-Construction Verification Extracted visible components reconstruction and verification
  • 18. / 200 Solution 2. SHIELDEX Email Gateway Solution Email round-trip “Monitoring” 18 Offers various monitoring information and history for administrator and end-users such as overall dashboard, email round-trip status and tracking, email protection process/results, and system/service/event status. System monitoring Queue monitoring Dashboard Email monitoring Detail info.Mail tracking mgt.Log monitoringService monitoring Event monitoring Monitoring
  • 19. / 200 Solution 2. SHIELDEX Email Gateway Solution SHIELDEX Email Gateway system diagram 19 SHIELDEX Email Gateway locates right in front of email server, and incoming malicious threats via emails will be detected, analyzed, verified, safe, and sanitized by the SEG solution. IntranetDMZExternal side Mail Sender External User Internet User 1 User 2 SHIELDEX Email Gateway Mail Server • SMTP engine • Anti-Spam • Virus • URL Inspection • Attached document safe viewer • CDR • Monitoring
  • 20. / 200 Solution 2. SHIELDEX Email Gateway Solution SHIELDEX Email Gateway deployment and service model 20 Offers various and flexible deployment and business models with customization options to meet up with customers’ requirements as much as possible. ON- PREMISE CLOUD (B2B) CLOUD (B2C) Solution package Appliance / Virtual appliance Private cloud service (as cloud- based secure email gateway) Offers secure and reliable email account service for individual end users who are using public email services SHIELDEX Email Gateway SHIELDEX Email Gateway Mail Server Mail Server 1 Mail Server 2 SHIELDEX Email Gateway
  • 22. / 200 Summary 3. Summary SHIELDEX Email Gateway 22 • Intuitive UI and UX • Easy gateway service usage and system operation for users and administrator • Proactively take actions to protect your emails and working environment by various notifications, alerts, email/system status from the monitoring tools of SMG • Designed and developed SMG based on Gartner’s SEG technical suggestion • (Market Guide for Secure Email Gateway, 3 May 2017, Gartner) • CDR, Anti-spam, Anti-virus/malware, URL fraudulent verification, monitoring, history and record management … are in one solution SHIELDEX Email Gateway User-oriented safe and clean email and work environment Equipped market proven CDR technology Based on Gartner’s SEG tech suggestion Competitive ONESTOP email threats protection Various email security monitoring tools Efficiently intuitive usage and management