SlideShare a Scribd company logo
1 of 57
Symantec Brightmail Anti-Spam 6.0  Product Overview Presentation 08. März 2005 Christoph Kugler Territory Account Manager [email_address]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Growing Spam Problem
Who am I? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Merkmale von Spam ,[object Object],[object Object],[object Object],[object Object],Wenn Sie es nicht erhalten, Würden Sie es vermissen??
Spam Continues to Grow and Evolve
Symantec Mail Security
Symantec Mail Security SMS - Symantec Mail Security SBAS - Symantec Brightmail AntiSpam
Symantec Mail Security Product Family     Software Deployment   Appliance      SMS for Domino     SMS for Exchange    SMS for SMTP     SBAS Limited     SMS 8200    Limited  SMS 8100 Traffic Shaping Content Filtering AV AS Network Gateway Groupware Key Features Protection Tier
Symantec Brightmail Anti-Spam 6.0 Product Features
Leadership ,[object Object],325 million mailboxes 25% of global mailboxes 2,000 businesses 9 of top 12 U.S. ISPs Protects over 100 billion in June 2004* 15% of global Internet traffic* *Nearest competitor: 6 billion messages & 1% global traffic Messages Filtered *Nearest competitor: 6 billion messages & 1% global traffic
Zero Administration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Look for: Zero Administration
Lowest False Positives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Look for: 1 in 1 million false positives
Catch the Most Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Look for: 95% Catch Rate
Symantec Brightmail Anti-Spam Customers Enterprise Service Provider
Product Review and Industry Analyst Validation " A benchmark in the field … … 95 to 96 percent effective Easy to install and maintain “ Brightmail  caught the highest %of spam  and had the  lowest false-positive rate  of any of the products tested.” “… a real  "set and forget"  system. “ Brightmail Anti-Spam's false-positive score speaks for itself… Brightmail Anti Spam is the best answer we know of.” Positioned in the “ Leaders ” Quadrant -  Magic Quadrant for Enterprise Spam Filtering - Gartner Research, 2004 “ Brightmail, the leading provider of AntiSpam software, achieves a  1-message-in-1-million false positive rate. ” –  Yankee Group 2004
Info World Article Review
 
Architecture, Deployment, Sizing
What is Brightmail 6.0 (BAS)? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Features Flexible Spam Handling •  Modify subject line or header •  Delete •  Forward to email address for review •  Administrator Quarantine Per-User Quarantines •  Web-based quarantine •  Groupware quarantines  - Exchange and Domino Customized Mail Policies •  Group Policies •  Adjustable spam thresholds Per User Spam Control •  Allow/Block lists •  Language preference •  Submissions Powerful Administration •  Web-based Control Center •  Global management of multiple servers •  Centralized granular reporting •  Assignable administrator privileges •  Alerts Flexible Architecture •  Multiple LDAP integrations •  Multiple MTA integrations Content Filtering •  Block Lists •  Allow Lists •  Custom Filters Editor Complete Threat Protection •  Anti-Virus – Optional module
High-level Architecture Symantec Operations Customer Site
Spam Analysis and Operations: the BLOC
Flexible Deployment ,[object Object],[object Object],[object Object],[object Object]
Scalability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Filtering Technologies
Defending Against Spam: a Multi-layered Approach
Points to Remember ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Brightmail Scanner
What is the Brightmail Scanner? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What it Does What it Includes
Secure Filter Transmission Polls for new filters every minute ,[object Object],[object Object],[object Object],Each Scanner retrieves its own filters 40-50KB Future downloads  (updates only) 10-15MB First complete  set of filters Filter Download Sizes
Platform and Mail Server Support Sendmail 8.12 Sendmail Switch 3.1 Exim Postfix 2.1.3 QMail Sun Messaging Server 5.2/6.0 Solaris 8 Solaris 9 Solaris Sendmail 8.12 Enterprise Linux ES 3.0 Enterprise Linux AS 3.0 Linux (Red Hat) Microsoft IIS SMTP* Exchange 2000 Exchange 2003 Windows 2000 Server Windows Server 2003 Windows MTA Support Version Platform * Other MTAs, including Exchange 5.5 and Domino, can be supported in a relay configuration. To enable this support, Brightmail Anti-Spam is installed on an upstream machine with the IIS SMTP Service relaying filtered mail to the target MTA. Sendmail 8.12 Linux 9.1 Linux (SuSe)
Control Center
Brightmail Control Center ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Brightmail Control Center Settings Create list of blocked senders Create list of allowed senders Adjust threshold for filtering aggressiveness Choose reputation filters to employ Enable language identification features Migrate settings from previous releases Set up alert triggers Work with consolidated reports View consolidated and individual logs Set up group policies Set up and view Web Quarantine Work with Brightmail Scanners Identify external mail servers  Add admins with specific privileges Set up antivirus filtering Create custom content filters Change LDAP settings  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Complete Solution
Spam Scoring ,[object Object],[object Object],[object Object],[object Object],[object Object]
Detailed Reporting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Group Policies
Group Policies ,[object Object],[object Object],[object Object],[object Object],Multiple Types of Members ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Six Email Categories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Six Verdicts
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Control Center Security
LDAP Capabilities and Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System Alerts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enhanced Web-based Quarantine ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Benefits
Sample Quarantine Screenshots
Folder Agents
Exchange Spam Folder Agent ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Domino Agent ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Brightmail Plug-in for Outlook
Brightmail Plug-in for Outlook ,[object Object],[object Object],[object Object]
Symantec Mail Security 8200 Series
High-level Overview *Under testing, subject to change The most accurate email security appliance powered by the award-winning, industry-leading Brightmail AntiSpam technology from Symantec, the global leader in Information Security     Antivirus Limited Limited Traffic shaping   Antispam Over 1,000 Users 100-1,000 Users Customer segment Hard disk, power supply, fans 73 GB  1U 8260 40 GB Storage Hard disk Redundancy 1U Form factor 8240 Model
Appliance Platform Highlights ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* Where available:  some small European countries and rural areas are excluded
Key Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* Denotes new feature
Architecture
Summary Why is Brightmail the best …
Why is Brightmail the Best… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You Kostenloser 30 Tage Download unter:  http:// emea . symantec .com/ brightmail

More Related Content

What's hot

Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringAmit Gatenyo
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacionrubychavez
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Sarah Isaacs
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin PrivilegesBeyondTrust
 
Software Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationSoftware Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationBruce Hafner
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONGS CHO
 

What's hot (20)

Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 
Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
 
Software Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationSoftware Vulnerabilities Risk Remediation
Software Vulnerabilities Risk Remediation
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 

Viewers also liked

Email List-Building 101: How to Reel In New Readers with a Few Simple Steps
Email List-Building 101: How to Reel In New Readers with a Few Simple StepsEmail List-Building 101: How to Reel In New Readers with a Few Simple Steps
Email List-Building 101: How to Reel In New Readers with a Few Simple StepsAWeber
 
Get More Email Subscribers
Get More Email SubscribersGet More Email Subscribers
Get More Email SubscribersAWeber
 
Microsoft word java
Microsoft word   javaMicrosoft word   java
Microsoft word javaRavi Purohit
 
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROIAWeber
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Email Marketing Ppt Presentation
Email Marketing Ppt PresentationEmail Marketing Ppt Presentation
Email Marketing Ppt PresentationDiseño Domingo
 
Email Marketing Presentation
Email Marketing PresentationEmail Marketing Presentation
Email Marketing PresentationIain Davenport
 
POLICY MAKING PROCESS
POLICY MAKING PROCESSPOLICY MAKING PROCESS
POLICY MAKING PROCESSYammie Daud
 

Viewers also liked (11)

Email List-Building 101: How to Reel In New Readers with a Few Simple Steps
Email List-Building 101: How to Reel In New Readers with a Few Simple StepsEmail List-Building 101: How to Reel In New Readers with a Few Simple Steps
Email List-Building 101: How to Reel In New Readers with a Few Simple Steps
 
Get More Email Subscribers
Get More Email SubscribersGet More Email Subscribers
Get More Email Subscribers
 
Microsoft word java
Microsoft word   javaMicrosoft word   java
Microsoft word java
 
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
25 List Building Tricks: Ideas, Examples and Resources to Improve Your Email ROI
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Marco Hogewoning -XS4all
Marco Hogewoning -XS4allMarco Hogewoning -XS4all
Marco Hogewoning -XS4all
 
Email Marketing Ppt Presentation
Email Marketing Ppt PresentationEmail Marketing Ppt Presentation
Email Marketing Ppt Presentation
 
Email Marketing Presentation
Email Marketing PresentationEmail Marketing Presentation
Email Marketing Presentation
 
POLICY MAKING PROCESS
POLICY MAKING PROCESSPOLICY MAKING PROCESS
POLICY MAKING PROCESS
 

Similar to Symantec AntiSpam Complete Overview (PowerPoint)

Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterJohn Jefferies
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection SystemApollo_n
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBMChris Sparshott
 
UserGate Mail Server
UserGate Mail ServerUserGate Mail Server
UserGate Mail Serverentensys
 
Forefront Protection for Office Overview
Forefront Protection for Office OverviewForefront Protection for Office Overview
Forefront Protection for Office OverviewCurtis Parker
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityHarold Wong
 
On Premises Protection Technologies
On Premises Protection TechnologiesOn Premises Protection Technologies
On Premises Protection TechnologiesCurtis Parker
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...Louis Göhl
 
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)Harold Wong
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayINSPIRIT BRASIL
 
Modern Anti-Spam Protection - Rejection, no sorting
Modern Anti-Spam Protection - Rejection, no sortingModern Anti-Spam Protection - Rejection, no sorting
Modern Anti-Spam Protection - Rejection, no sortingGranikos GmbH & Co. KG
 
Email Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to ConsiderEmail Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to Considerwebhostingguy
 
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)Harold Wong
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLaboraDK
 

Similar to Symantec AntiSpam Complete Overview (PowerPoint) (20)

Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam Filter
 
Spamtitan_brochure_V3
Spamtitan_brochure_V3Spamtitan_brochure_V3
Spamtitan_brochure_V3
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection System
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 
Cloud Email Firewall
Cloud Email FirewallCloud Email Firewall
Cloud Email Firewall
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
UserGate Mail Server
UserGate Mail ServerUserGate Mail Server
UserGate Mail Server
 
Forefront Protection for Office Overview
Forefront Protection for Office OverviewForefront Protection for Office Overview
Forefront Protection for Office Overview
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 Security
 
On Premises Protection Technologies
On Premises Protection TechnologiesOn Premises Protection Technologies
On Premises Protection Technologies
 
MBESProductSheet (1)
MBESProductSheet (1)MBESProductSheet (1)
MBESProductSheet (1)
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 13 Of 24)
24 Hours Of Exchange Server 2007 ( Part 13 Of 24)
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
 
Modern Anti-Spam Protection - Rejection, no sorting
Modern Anti-Spam Protection - Rejection, no sortingModern Anti-Spam Protection - Rejection, no sorting
Modern Anti-Spam Protection - Rejection, no sorting
 
Spamato
SpamatoSpamato
Spamato
 
Email Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to ConsiderEmail Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to Consider
 
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)24  Hours Of  Exchange  Server 2007 ( Part 14 Of 24)
24 Hours Of Exchange Server 2007 ( Part 14 Of 24)
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 

More from webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guidewebhostingguy
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serverswebhostingguy
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidationwebhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreementwebhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...webhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructurewebhostingguy
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.pptwebhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Productswebhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
 

More from webhostingguy (20)

File Upload
File UploadFile Upload
File Upload
 
Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
Notes8
Notes8Notes8
Notes8
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 

Symantec AntiSpam Complete Overview (PowerPoint)

  • 1. Symantec Brightmail Anti-Spam 6.0 Product Overview Presentation 08. März 2005 Christoph Kugler Territory Account Manager [email_address]
  • 2.
  • 4.
  • 5.
  • 6. Spam Continues to Grow and Evolve
  • 8. Symantec Mail Security SMS - Symantec Mail Security SBAS - Symantec Brightmail AntiSpam
  • 9. Symantec Mail Security Product Family     Software Deployment   Appliance      SMS for Domino     SMS for Exchange    SMS for SMTP     SBAS Limited     SMS 8200  Limited  SMS 8100 Traffic Shaping Content Filtering AV AS Network Gateway Groupware Key Features Protection Tier
  • 10. Symantec Brightmail Anti-Spam 6.0 Product Features
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Symantec Brightmail Anti-Spam Customers Enterprise Service Provider
  • 16. Product Review and Industry Analyst Validation " A benchmark in the field … … 95 to 96 percent effective Easy to install and maintain “ Brightmail caught the highest %of spam and had the lowest false-positive rate of any of the products tested.” “… a real "set and forget" system. “ Brightmail Anti-Spam's false-positive score speaks for itself… Brightmail Anti Spam is the best answer we know of.” Positioned in the “ Leaders ” Quadrant - Magic Quadrant for Enterprise Spam Filtering - Gartner Research, 2004 “ Brightmail, the leading provider of AntiSpam software, achieves a 1-message-in-1-million false positive rate. ” – Yankee Group 2004
  • 18.  
  • 20.
  • 21. Key Features Flexible Spam Handling • Modify subject line or header • Delete • Forward to email address for review • Administrator Quarantine Per-User Quarantines • Web-based quarantine • Groupware quarantines - Exchange and Domino Customized Mail Policies • Group Policies • Adjustable spam thresholds Per User Spam Control • Allow/Block lists • Language preference • Submissions Powerful Administration • Web-based Control Center • Global management of multiple servers • Centralized granular reporting • Assignable administrator privileges • Alerts Flexible Architecture • Multiple LDAP integrations • Multiple MTA integrations Content Filtering • Block Lists • Allow Lists • Custom Filters Editor Complete Threat Protection • Anti-Virus – Optional module
  • 22. High-level Architecture Symantec Operations Customer Site
  • 23. Spam Analysis and Operations: the BLOC
  • 24.
  • 25.
  • 27. Defending Against Spam: a Multi-layered Approach
  • 28.
  • 30.
  • 31.
  • 32. Platform and Mail Server Support Sendmail 8.12 Sendmail Switch 3.1 Exim Postfix 2.1.3 QMail Sun Messaging Server 5.2/6.0 Solaris 8 Solaris 9 Solaris Sendmail 8.12 Enterprise Linux ES 3.0 Enterprise Linux AS 3.0 Linux (Red Hat) Microsoft IIS SMTP* Exchange 2000 Exchange 2003 Windows 2000 Server Windows Server 2003 Windows MTA Support Version Platform * Other MTAs, including Exchange 5.5 and Domino, can be supported in a relay configuration. To enable this support, Brightmail Anti-Spam is installed on an upstream machine with the IIS SMTP Service relaying filtered mail to the target MTA. Sendmail 8.12 Linux 9.1 Linux (SuSe)
  • 34.
  • 35.
  • 36.
  • 37.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 46.
  • 47.
  • 49.
  • 50. Symantec Mail Security 8200 Series
  • 51. High-level Overview *Under testing, subject to change The most accurate email security appliance powered by the award-winning, industry-leading Brightmail AntiSpam technology from Symantec, the global leader in Information Security   Antivirus Limited Limited Traffic shaping   Antispam Over 1,000 Users 100-1,000 Users Customer segment Hard disk, power supply, fans 73 GB 1U 8260 40 GB Storage Hard disk Redundancy 1U Form factor 8240 Model
  • 52.
  • 53.
  • 55. Summary Why is Brightmail the best …
  • 56.
  • 57. Thank You Kostenloser 30 Tage Download unter: http:// emea . symantec .com/ brightmail

Editor's Notes

  1. Symantec, the global leader in information security, is the only vendor that offers best-of-breed email security at the network, gateway, and server, with multiple deployment options for all organizations
  2. What about the size of the rule set Roughly 12 megabytes Turns over every 2-3 days 4 megabytes every day is about 26 seconds of download on a T-1
  3. This slide summarizes how the product has been received. The PC Magazine quote refers to BM’s zero false–positive showing. This writeup is excerpted from PC Magazine’s Editor’s Choice review for antispam products last year. EWeek quote speaks to the metrics that most customers value: high effectiveness, without a significant administrative burden Analysts comments: Yankee Group reaffirms the key 1 in a million false positive rate Gartner puts Symantec Brightmail AntiSpam in the Leader’s quadrant
  4. Administrators can set actions on a per module – different action for Brightmail Module, Custom Rules Module and Blacklist Module. Administrators can set different actions on per domain basis. So you can delete for one domain and end user quarantine for another domain.
  5. Appliance Form Factor Hardware*, OS*, Mail Relay*, Hardened Configuration*, Scanner, Control Center, TLS Encryption* Benefit: Secure solution that is easy to deploy and manage Email Security Brightmail AntiSpam Symantec AntiVirus TurnTide Traffic Shaping* Email Firewall- Automated Defenses* Email Firewall-Reputation Lists SPF* Content Filtering Benefit: Secures inbound and outbound email communication Mail Management Group Policies LDAP Group Policies* X Number of Actions (Y New Actions) Multiple Actions* Gateway End User Preferences* Benefit: Allows for granular control based upon an organization’s email best practice policy System Management Web-based Administration, Global Management, Multiple Administrators, Alerts, Automatic Rule Updates, 50 Reports (35 New)*, Software Update Mechanism* Benefit: Allows for simple monitoring and management of entire deployment