SlideShare a Scribd company logo
1 of 39
SonicWALL Email Security
Agenda ,[object Object],[object Object],[object Object],[object Object]
SonicWALL Market Leadership *Appliances Selling for $490 - $1,499 and $1,500 - $5,000 Sources: IDC 2004, IDC 2005, Infonetics, Q3’05 2005 in Units and Revenue   in   Unified Threat Management #1 in  Security Appliances   in Revenue and Units*  #2 Web Filtering Appliance  Provider #3 Secure Content Management  Provider #4
SonicWALL Solution Suite Policy and Management Business  Continuity Secure Content Management Network Security
SonicWALL Solution Suite Global Management Secure Wireless SonicPoint GMS Content Security Network Security TZ & PRO Email Security & CSM Business Continuity CDP Remote Access SSL-VPN
Agenda ,[object Object],[object Object],[object Object],[object Object]
IT Security Concerns Top 5: Virus, Spyware, SPAM, Intrusion & Theft
Threats: More, and More Malicious …and Now Compliance Requirements That 3 year old spam box just isn’t cutting it anymore! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Notes: (1) eMarketer, 2004 (2) National Technology Readiness Survey, Rockbridge Associates, Inc. & Maryland Business School, 11/2004
Spam Many messages are obviously spam
Is it Spam? Other messages will be disagreed upon
Phishing Some emails are easy to determine as phish
Phishing? Sometimes it is hard to tell
Viruses Spread Rapidly Virus outbreaks continue to happen
Virus Signatures Take Time ,[object Object],[object Object],[object Object],[object Object],Virus signatures take hours to become available
Outbound Risks and Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],All organizations need to be address compliance requirements
Inbound and Outbound Threats Threats Require Inbound and Outbound Protection
Proliferation of Systems Typical Mail Data Center Management of Multiple Systems Becomes Complex
Agenda ,[object Object],[object Object],[object Object],[object Object]
Collect Worldwide Threat Data
Analyze for Bad/Good Email Patterns Likely Virus Good Email SonicWALL  Analyzes Patterns Good Pattern Bad Pattern 40 million emails  …  sent by newsletter@microsoft.com …  from 3 IP addresses  …  in Seattle …  and never junked 50 people  …  in 6 different countries …  receive a new attachment … that has never been seen before …  within 30 minutes
Cross Analyze Patterns with  Content Evaluation and Reputation SonicWALL Determines a Definitive  Judgment  – Not Just a Score
SonicWALL Email Security Stops Today’s and Tomorrow’s Threats Threats Evolve – SonicWALL Protects
Agenda ,[object Object],[object Object],[object Object],[object Object]
Best-of-Breed Product 2,000+ Customers & 96% Retention Healthcare Transportation Nonprofit Retail Consumer Goods Automotive Entertainment Financial Services Technology Media/Publishing Pharmaceutical Aerospace/Defense Manufacturing Technology Government Hospitality Education Retail Media/Publishing Consumer Goods
Award Winning Email Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Best Content Security Solution Overall Category Winner and Winner for Best Anti-Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://scmagazine.com/us/news/article/546173/best+content+security+solution/
SonicWALL Email Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Product Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Quick Configuration ,[object Object],[object Object],[object Object]
Anti-Spam, Anti-Phishing, Anti-Virus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Administrative and End-User Junk Box ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Junk Box Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email Policy & Compliance Approach Robust tools to Identify, Monitor, and Enforce
Policy and Compliance Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email Auditing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reporting and Monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Instant Deployment
High Availability Deployment
Products & Subscriptions
Thank you. www.sonicwall.com

More Related Content

What's hot

Information Security for Enterprise
Information Security for EnterpriseInformation Security for Enterprise
Information Security for EnterpriseArjun V
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftSchipul - The Web Marketing Company
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by AttackersFireEye, Inc.
 
KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024Frank Maiorca
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRameesha1
 
Data Security
Data SecurityData Security
Data Securitybackdoor
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part Onebackdoor
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)akkharbabu
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Safeguarding Your Data
Safeguarding Your DataSafeguarding Your Data
Safeguarding Your Datatgturner05
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?AariyaRathi
 

What's hot (19)

Information Security for Enterprise
Information Security for EnterpriseInformation Security for Enterprise
Information Security for Enterprise
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Data Security
Data SecurityData Security
Data Security
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Cyber security (daffodil international university)
Cyber security (daffodil international university)Cyber security (daffodil international university)
Cyber security (daffodil international university)
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Safeguarding Your Data
Safeguarding Your DataSafeguarding Your Data
Safeguarding Your Data
 
Network security
Network securityNetwork security
Network security
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?
 

Viewers also liked

Configuring sonic wall__port_forwarding
Configuring sonic wall__port_forwardingConfiguring sonic wall__port_forwarding
Configuring sonic wall__port_forwardingHelmer Villarreal
 
Taking your open source email security to the next level
Taking your open source email security to the next levelTaking your open source email security to the next level
Taking your open source email security to the next levelCyren, Inc
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayandreasschuster
 
SonicWall Configuration
SonicWall ConfigurationSonicWall Configuration
SonicWall Configurationneweb
 
SonicWall VPN Configuration
SonicWall VPN ConfigurationSonicWall VPN Configuration
SonicWall VPN Configurationneweb
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 
How to install SQLSERVER 2012
How to install SQLSERVER 2012How to install SQLSERVER 2012
How to install SQLSERVER 2012Andre Nascimento
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepInstall Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepMehdi Poustchi Amin
 
Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012 Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012 Sameh AboulDahab
 

Viewers also liked (14)

Configuring sonic wall__port_forwarding
Configuring sonic wall__port_forwardingConfiguring sonic wall__port_forwarding
Configuring sonic wall__port_forwarding
 
Taking your open source email security to the next level
Taking your open source email security to the next levelTaking your open source email security to the next level
Taking your open source email security to the next level
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gateway
 
SonicWall Configuration
SonicWall ConfigurationSonicWall Configuration
SonicWall Configuration
 
SonicWall VPN Configuration
SonicWall VPN ConfigurationSonicWall VPN Configuration
SonicWall VPN Configuration
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
How to install SQLSERVER 2012
How to install SQLSERVER 2012How to install SQLSERVER 2012
How to install SQLSERVER 2012
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Email
EmailEmail
Email
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepInstall Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-Step
 
Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012 Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012
 

Similar to Sonic Wall Email Security End User

SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxssuser813dcd
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...Louis Göhl
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat LandscapeNuspire Networks
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingSoftware Guru
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBMChris Sparshott
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsLumension
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015eFax Corporate®
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses TodayVelocity Network Solutions
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 

Similar to Sonic Wall Email Security End User (20)

SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptx
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat Landscape
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
Cyber Hacking in Healthcare & The Best Practices for Securing ePHI in 2015
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Information security
Information securityInformation security
Information security
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
brif enpoint.pptx
brif enpoint.pptxbrif enpoint.pptx
brif enpoint.pptx
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 

Sonic Wall Email Security End User

Editor's Notes

  1. Main Point: Despite what you may have heard, we have continued to distinguish ourselves from the competition and maintain leadership positions in the markets we serve. We are number one in UTM in both units and revenue. Juniper is number 2 in units and Fortinet is number 2 in revenue. We are number two in firewall VPN appliances selling for $490-$1499 and $1,500-$4,999 in both revenue and units. Cisco is number one as of Q3’05. We are number three web filtering appliance vendor after St. Bernards, and 8e6 Technologies. We are the number four secure content management provider after CipherTrust, McAfee, and IronPort (software and appliances). Transition: Our financial results reiterate the soundness of our strategy.
  2. Main message: SonicWALL chose to focus on these three areas due to strong growth, good margins, fit with our channel and the ability to manage from a central location. Transition: Let’s take a close look at the growth prospects for all three of these areas.
  3. And it’s not just a consumer problem… Notice the increasing sophistication along the timeline. Service Providers meant to the IT services that a company uses today, for example DNS services, web hosting services, etc. We have already seen some of these. Vendor ePayments are meant to cover the growing trend for a company to deliver payments over the internet, like online banking, or subscriptions. It starts with getting a bill from a fake vendor (one that didn’t provide services) or getting a fake bill from a company that does provide services. “Click here to pay this bill now before interest is accrued”.
  4. Script Here is a email attack from beginning to end. A spammer or hacker creates a template to send out hundreds of thousands (possibly millions) of slightly different messages. The messages are sent by hundreds of SMTP servers worldwide, which might be hijacked servers or their own servers Those messages are received by millions of people throughout the world, from the US to Europe to Asia. When people open the message, the message includes headers, a body, possibly an attachment, and often a URL that takes them to a spam site, a phishing site, or possibly a site that will infect them with spyware. This is the standard path for every email attack – whether a spam, phishing, virus, worm, or other outbreak. Ok, so how do you stop this kind of attack?
  5. … sees over 40 thousand attacks every hour, including new spam, viruses, phishing and other types of threats. MailFrontier Cognite enables us to deliver comprehensive email security, including anti-spam, anti-virus, anti-phishing, policy management and DHA/DoS Protection For example, in the area of Spam, Cognite is able to eliminate False Positives in Definite Spam In the are of Virus Attacks, Cognite blocks new, ingenious attacks when they first occur or in as little as 20 – 30 minutes while other products take hour, days and sometimes weeks to develop and deploy a virus signature.