Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Secure webl gate way

  • Be the first to comment

  • Be the first to like this

Secure webl gate way

  1. 1. Clearswift SECURE Email Gateway 3.2 VFM Systems & Services (P) Ltd.
  2. 2. Unifying information security  Clearswift is a security Software company that aims to simplify companies’ IT security to better protect businesses’ intellectual property and data. This in turn gives businesses the confidence to adopt web, email and collaboration technologies to ultimately allow the business to innovate and grow.
  3. 3.  Clearswift’s security solutions are built around a core content inspection engine. Policy and reporting on content, threats and user activity are then applied to the communication channels. Today Clearswift SECURE solutions are available for web and email ensuring compliance across all digital communication channels.
  4. 4. Clearswift SECURE Web Gateway Secure and resilient platform –Pre-built and supplied on Dell hardware. –Deployed on own hardware or as VMware. –Optimisation of Linux OS tuned for web gateway. Easy to install – Up and running in under an hour. – Pre-configured with Default ‘Standard’ Policy. Easy to use & manage 100% web-based GUI. Graphical ‘drill-down’ reporting. Automatic security software updates. 4
  5. 5. Complete Web Gateway protection MIMEsweeper content-aware policy engine – True binary signature file identification. – Lexical analysis/templates. – Comprehensive data leakage controls. Kaspersky Anti-virus/malware – Viruses, worms, Trojans and malicious code. Sunbelt Software Anti-spyware Spyware “call home” prevention. Tracking Cookie detection/removal. URL filtering – 77 categories more than 30 million web sites. 5
  6. 6. Fully conjoined policy updating Policy Web Gateway Email Gateway
  7. 7. Fully conjoined policy updating Policy Web Gateway Email Gateway 7
  8. 8. Easy to understand and use policy model  Policy Configuration  User authentication with NTLM or Kerberos  Policy based on Users, Content Rules & Routes  The Web policy protects ‘Everyone’  Viruses, Spyware, dangerous payloads types such as executables  Dubious types of site such as Pornography, Hacking, etc.  Block uploading of ‘office’ or ‘confidential’ documents 8
  9. 9. Comprehensive URL filtering capabilities • URL Database – Millions of sites – 77 categories – Daily updates • Real-time categoriser – Pornography – Anoynmizer – Hate, violence etc. • Embedded URL detection – Google & Yahoo! Cached items – Google translation pages 9
  10. 10. Time based policy quota  Using the example ‘Everyone to Non Business Related’ route shown previously  The green area defines when access to this route is allowed  The white area defines when it is blocked  The orange area defines a period with 60 minutes browse time quota 10
  11. 11. Lexical Analysis  Lexical content rules easily configured to search for words or phrases within:  Requested URL  Format types i.e. Excel, Word, etc.  Web Page  HTTP Headers  Examples of usage  Search for confidential phrases within office type such as Word and Excel (see image)  Search for suspicious script commands within script  Search headers to prevent old browser versions  Block inappropriate search requests  Block posts that include the company name 11
  12. 12. Data loss templates & compliance lists  Predefined regular expressions for PII (Personally Identifiable Information) and PCl (Personal Credit Information)  National insurance number  Credit card numbers  Social security number  Editable compliance dictionaries  Gramm-Leach-Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA), Securities and Equities Commission (SEC) and Sarbanes Oxley (SOX).  Benefits  Easy to use (simply add to route)  No configuration errors 12
  13. 13. HTTPS content scanning and certificate policy • Full content scanning of HTTPS/SSL encrypted data • Detects malware or data leakage in encrypted HTTPS traffic • Provides policy based certificate checking for added protection 13
  14. 14. Personalized user feedback • Block Pages – Policy violations • Progress Pages – Informative feedback when downloading large files • Acceptable Use Policy Page – Users are reminded at regular intervals with ‘Accept’ button 14
  15. 15. Interactive graphical reporting Interactive drill downs 15
  16. 16. System Health 16
  17. 17. SNMP and SMTP alerting 17
  18. 18. Deployment options 1. Pre-built on a Dell server platform 2. Deployed on choice of own hardware 3. Virtualization within a VMware environment 18
  19. 19. Platform information• R210 range • R610 range – Under <500 & 200-500 – Designed to support 2,500 users users `
  20. 20. 24x7 technical support • Clearswift provides professional, intelligent and adaptable support and training services to meet the exacting needs of our enterprise Customers • Clearswift Global Support (24x7 as standard) is provided to help with any questions or issues relating to your Clearswift deployment • Technical information is available at anytime for our supported Customers from the Clearswift Knowledge Base • We pride ourselves on exceeding Customers’ expectations. Results of the Jun 2010 global support survey are: •Met or exceeded expectation of initial response time - 93.29% •Met or exceeded expectation of ability to solve problem - 90.85% •Met or exceeded expectation of overall response time - 93.21% •Met or exceeded expectation of technical competency - 93.83% 20

×