25
a l a d d i n . c o m eSafe 6 FR2 Product Overview

A l a d d i n. c o m eSafe 6 FR2 Product Overview

Embed Size (px)

Citation preview

a l a d d i n . c o m

eSafe 6 FR2 Product Overview

a l a d d i n . c o m

© Copyright 2008 Aladdin Knowledge Systems Ltd. All rights reserved.

Aladdin, Aladdin Knowledge Systems, HASP®, eTokenTM and eSafe® are only a few of Aladdin Knowledge Systems

Ltd.’s (“Aladdin”) proprietary trademarks. The Aladdin Knowledge Systems logo is also proprietary to Aladdin.

The information contained in this presentation is protected by international copyright laws. The copyrights are

owned by Aladdin or the original creator of the material. The information contained herein is provided to you for

informational purposes only, and except and to the extent specifically permitted, no portion of this presentation

may be copied, reproduced (or the like), distributed or used in any way whatsoever whether directly or indirectly.

In addition to Aladdin’s trademarks, logos, content and information, this presentation may contain references to

trademarks and/or logos owned by other entities. Aladdin expressly disclaims any proprietary interest in trademarks

and/or logos owned by other entities and makes no representation of any association, sponsorship, affiliation, or

endorsement with or by the owners of such trademarks and/or logos.

This presentation may contain references and use of third party web sites for purposes of providing examples relevant

to this course. Aladdin assumes no responsibility and/or liability for any content and/or information contained in such

third party web sites. Aladdin further does not endorse the companies or contents of any referenced sites.

Aladdin does not assume any responsibility or liability for the accuracy of the information contained in this presentation.

The information contained in this presentation is provided "as is" and does not constitute a warranty of any kind, either

express or implied. Aladdin disclaims all warranties, expressed or implied, including but not limited to implied

warranties of merchantability, fitness for a particular purpose, and non-infringement.

a l a d d i n . c o m

Legal Notice

a l a d d i n . c o m

Why eSafe?

a l a d d i n . c o m

• More security - The only proven proactive threat protection– Consistently blocks over 96% of previously unknown threats– Eliminates over 99% of common and drive-by spyware– Prevents zero-hour vulnerabilities and exploits Transparent user

experience

• Transparent deep web-content inspection– Patented NitroInspection™ technology– Wire-speed inspection of web pages including all HTML – Zero-latency with no impact on user experience– Complements firewalls, IPS, and desktop antivirus

Why eSafe Web?

a l a d d i n . c o m

• Best performance & scalability - Starting at 5 million processed web pages per hour– Scalable for hundreds to millions of users– Multiple installation modes for seamless integration into

customer’s network– ISP-grade content security performance– Trusted by fortune 500 corporations

• Unique inbound/outbound application control– Regulate Internet-enabled applications traffic (P2P, IM, Skype,

etc…)– Prevent use of Anonymous Proxies for security circumvention – Identify and block spyware/malware information extrusion

Why eSafe Web?

a l a d d i n . c o m

• The most effective email security and spam control

eSafe’s Dual-Engine Email Security is the first to combine the world’s Real-time Reputation and deep Content Analysis technologies. It blocks virtually all spam and malware, without blocking legitimate emails, including messages from mailing lists.

• Zero-hour malware, outbreak prevention– Unique technology which identifies and proactively blocks

malicious worm and other malware outbreak characteristics at zero-hour using the Realtime Reputation and Distribution Patterns Engine.

Why eSafe dual engine email security?

a l a d d i n . c o m

• Comprehensive Microsoft Office document filtering

– Unique stripping of meta-data from Office documents– prevents exposure of hidden, confidential information embedded in Office files, including revisions and collaboration information.

– including selective stripping of macros, and embedded objects with enhanced support for Microsoft Office 2007 file formats

Why eSafe dual engine email security?

a l a d d i n . c o m

eSafe solutions and add-ons

a l a d d i n . c o m

eSafe Components

a l a d d i n . c o m

eSafe Web add-ons

a l a d d i n . c o m

eSafe Mail add-ons

a l a d d i n . c o m

URL filtering (Web Filtering)

Control & Security

a l a d d i n . c o m

URL Filtering

a l a d d i n . c o m

Web Application Filtering

Security & Control - AppliFilter

a l a d d i n . c o m

Communications Security

• eSafe AppliFilter inspects, tracks, and controls inbound and outbound application traffic on all possible communication venues using it’s deep packet inspection technology, eliminating the security risk and network clogs caused by Web 2.0 and P2P applications.

The Value:– Identify and block malicious inbound and outbound

communication activities (Over 500+ applications)• Regulate various IM and SKYPE activity.• Block P2P communications.• Block and Control other Web 2.0 internet applications.

a l a d d i n . c o m

• Anonymous Proxy technology is used to bypass almost any organizational security solution

• Content Security products offer “list-based” approach against Anonymous proxies

• AppliFilter’s unique “Anonymous Web Proxy” filter catches requests for anonymous proxies on the fly, providing organizations zero-hour protection against circumvention and anonymity techniques

Anonymous Proxies

a l a d d i n . c o m

eSafe Web SSL

Encrypted Communications Scanning

a l a d d i n . c o m

Encrypted Web Traffic Facts

• It is assumed that over 15% of Public web sites are protected by SSL and today’s encrypted traffic accounts for up to 30% of web traffic

• Invisible to virtually every security product, including firewalls and intrusion prevention solutions

• Encrypted site can be malicious to begin with, or a hacked site implanted with malware

a l a d d i n . c o m

eSafe - Encrypted Web Traffic

eSafe Web SSL• Enforces web policy also on SSL encrypted sites• Proactively identify malware hiding behind encrypted

traffic• Blocks self-signed SSL sites • Validates certificate policies, issuers, revocations, etc…• Provide a platform solution for web Anonymizers

Tunneling applications

• eSafe AppliFilter Blocks Tunneling applications that were designed to bypass content filtering products

a l a d d i n . c o m

How does it work?

• Operates similarly to an IPS• “Source” is neutral• Inspects content in transit, without delay, at the gateway• Fast: Does not need to cache or write to disk• In-depth inspection of all packets• Ignores irrelevant content or protocols• Analyzes the application protocol and content

a l a d d i n . c o m

Dual engine email security

Secure and Control

a l a d d i n . c o m

Mail is a vital business tool. Keeping it clean is the top agenda of every CISO

eSafe Dual Engine Email Security provides a complete

robust security and productivity solution:• Proven proactive security solution protects against known and unknown

threats• eSafe Anti Spam provides; 99% spam detection and SPAM management• Real-time distribution pattern analysis detects and blocks all email worm

outbreaks at zero-hour• Anti Phishing solutions blocks Phishing attacks at the gateway• Most massive phishing is blocked as spam

• UNIQUE to eSafe: Phishing elements are stripped from all suspicious email blocking targeted attacks on organizations

• Added value: Prevent email tracking

Dual Engine Email Security

a l a d d i n . c o m

Email security and spam control

• eSafe’s Dual-Engine Email Security is the first to combine the world’s Real-time Reputation and deep Content Analysis technologies. It blocks virtually all spam and malware, without blocking legitimate emails, including messages from mailing lists.

• Zero-hour malware, outbreak prevention– Unique technology which identifies and proactively blocks malicious

worm and other malware outbreak characteristics at zero-hour using the Realtime Reputation and Distribution Patterns Engine.

• Comprehensive Microsoft Office document filtering– including selective stripping of macros, and embedded objects with

enhanced support for Microsoft Office 2007 file formats

– Unique stripping of meta-data from Office documents– prevents exposure of hidden, confidential information embedded in Office files, including revisions and collaboration information.

a l a d d i n . c o m

• No lost email• No angered end-users• No administrator hassle• No need for “special spam mailbox”• Learning system – not prone to user error

Moving From Antispam to Spam Management

a l a d d i n . c o m

Securing the Global Village

Thank YouThank You