Professional Documents
Culture Documents
Interscan Messaging Security Solutions: Filip Demianiuk
Interscan Messaging Security Solutions: Filip Demianiuk
Filip Demianiuk
Technical Channel Manager Poland & Baltic Countries
Filip_Demianiuk@Trendmicro.com
Agenda – Gateway Messaging Security
• Email Threats
• InterScan Messaging Security Solutions
• Beyond Gateway Messaging Security
• Summary and Keys to Remember
2
Email Threats
Spam Problem
4
Virus Problem
Viruses are only in about 2-6% of emails.1 And the number of viruses can add up.
HOWEVER, the impact can be substantial.
Blended threats –
Malware and phishing attacks
Key-Logging Trojans also “phish”
for information
Pharming Crimeware redirects
users to fraudulent Web sites
to steal information Source: The Radicati Group, Inc. Email Security
1
7
Data Privacy & Protection
• Regulatory Compliance
Regulations impose mandates on data protection or privacy
Can affect email and other digital communication
• Corporate Governance
Internal standards or policies that a company uses to govern itself
In this case policies for appropriate use of messaging
• Loss of Confidential Information
Protection against data leakage, whether intentional, or inadvertent
8
Email Security Concerns
• Spam
• Viruses
• Network Security
• Regulatory Compliance
• Corporate Governance
• Loss of Confidential
Information
• Spyware
• Denial of Service Attacks
• Phishing
• Directory Harvest Attacks
1
1
Source: The Radicati Group, Inc. Email Security Market, 2006-2010.
June 2006 (Bar Graph)
9
InterScan Messaging Security Solutions
Gateway Email Security Products
Same superior protection in all form factors
• SOFTWARE: InterScan Messaging Security Suite (IMSS)
- Flexible configuration options on customer’s own hardware and on multiple
machines
- Solution on leading operating systems: Windows, Linux and Solaris
11
Comprehensive Messaging Protection
Viruses, Inappropriate
Spyware Spam Phishing
Worms, Trojans Content
Award-Winning Anti-Virus – includes zero-day protection
Anti-Spyware –protection against spyware in email
Multi-Tier Anti-Spam – Network Reputation Services, IP Profiler, and our
anti-spam composite engine for high effectiveness with low false positives
Anti-Phishing – reputation services, signatures, and heuristics aimed at phishing
Inappropriate Content – content filtering enforces compliance and prevents
data leakage
12
Multi-Tier Anti-Spam
13
Network Reputation Services
14
IP Profiler
Customer-Specific
Reputation Services
Spam
Virus
DHA Attacks
Bounced Mail
Customers set thresholds
• Duration emails from an IP Address are monitored
• Percentage of emails from that IP Address that contain the email threat
• Total mails that need to be received to be considered a relevant sample
• Triggering actions – what happens when these thresholds are met
(block temporarily or block permanently)
Provides customer-specific reputation services by blocking IP addresses that
exceed set thresholds—also keeps threats completely off the network
Additional Information
15
Trend Micro Anti-Spam Composite Engine
– Statistical Analysis
– Advanced Heuristics
– Signature Filtering
– Whitelists/Blacklists
– Multilingual Spam Detection
– Patent-Pending Image Spam Detection Technology
16
Image Spam Detection
Patent-Pending
Image Spam Detection
Boils down to the core of
the email—for example,
strips out background and
text colors, dimensions,
and other randomized
elements
Enables just a few main
signatures to stop all of
the numerous variations
17
Award-Winning Antivirus and Anti-Spyware
18
Anti-Phishing
19
Protection from Targeted Attacks
20
Data Privacy and Protection
21
Content Filtering
22
Easy Management
• High performance
• Highly scalable solution
• Single Web-based
management console
• Centralized policy,
quarantine, archive,
logging, and reporting
• Delegated administration
• Message tracking
with flexible search criteria
• End-User Quarantine
23
Policy & Reporting Enhancements
Policies
• Intuitive policy creation
1. Inbound or outbound or both
2. Select what to filter
3. Select the action
4. Review and assign order
Reports
• One-time and scheduled reports
• Reports on mail traffic, viruses, spam,
content, policy, Network Reputation
Services, and IP Profiler
24
Return on Investment
25
Beyond Gateway Email Security
Layered Messaging Security
27
Trend Micro Enterprise Protection Strategy –
A Complete Network Security Framework
28
Summary and Key Points to Remember
Summary and Key Points
30
Gateway Security Leader
33
IP Profiler
Manage currently
monitored
IP Addresses
Display Logs
- Total spam emails
- Total malicious
attempts
- Total connections
- Percentage of
malicious attempt in
the overall number
of connections