SlideShare a Scribd company logo
Securing Your Email - Data Loss Prevention Deniz Kaya Microsoft, Cisco, Ironport, Mile2 Instructor CCSI, CCNP, MCT, MCSE, ICSI, ICSP, CPTS
IronPort ®  Gateway Security Products Web Security   |  Email Security   |  Security Management   |   Encryption EMAIL Security Appliance WEB Security Appliance Security MANAGEMENT Appliance IronPort SenderBase APPLICATION-SPECIFIC SECURITY GATEWAYS CLIENTS BLOCK Incoming Threats PROTECT Corporate Assets Data Loss Prevention Encryption CENTRALIZE Administration Internet ENCRYPTION Appliance
IronPort + Cisco Market Leadership Customer Leadership - Over 6,000 customers globally  - 99% customer retention rate Technology Leadership - Industry leading email and   Web security applications   and management tools Global Leadership - Worldwide business operations - Global technology infrastructure
The IronPort SenderBase ®  Network Global Reach Yields Benchmark Accuracy 5B+ queries daily 150+ Email and Web parameters 35% of the World’s Traffic IronPort EMAIL Security Appliances IronPort WEB Security Appliances IronPort SenderBase Combines Email & Web Traffic Analysis View into  both  Email & Web traffic dramatically improves efficacy 80% of spam contains URLs Email is a key distribution vector for Web-based malware
IronPort Consolidates the Network Perimeter  For Security, Reliability and Lower Maintenance After IronPort Groupware Firewall IronPort Email Security Appliance Internet Users Before IronPort Anti-Spam Anti-Virus Policy Enforcement Mail Routing Internet Firewall Groupware Users Encryption Platform MTA DLP Scanner DLP Policy Manager
IronPort Architecture  Multi-Layered Email Security MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
IronPort AsyncOS  Unmatched Scalability and Security •  IronPort AsyncOS is a scalable and secure operating system, optimized for messaging •  Advanced Email Controls protect reputation and downstream systems •  Standards-based Integration replaces legacy systems with ease MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
Multi-layer Spam Defense Best-of-Breed Protection at the Gateway •  IronPort Reputation Filters™: the outer layer defense •  IronPort Anti-Spam ™ :  stops the broadest array of threats – spam, phishing, fraud and more MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
SenderBase ®   Data Makes the Difference •  Complaint Reports •  Spam Traps •  Message Composition Data  •  Global Volume Data •  URL Lists •  Compromised  Host Lists •  Web Crawlers •  IP Blacklists  & Whitelists •  Additional Data SenderBase Data Data Analysis/ Security Modeling SenderBase Reputation Scores -10 to +10 Parameters Threat Prevention in Realtime
Introducing IronPort Spam Defense Multi-layer spam defense designed to: Stop spam quickly Stop spam accurately Reputation Worlds first and best sender based reputation service - Blocks 80% of spam at gateway - World class accuracy SBRS IPAS Who? How? What? Where? World’s most accurate content based spam engine - 98% catch rate - World class accuracy
IronPort Anti-Spam Accuracy Powered By Context Adaptive Scanning Engine WHAT? HOW? WHO? WHERE? All text inside an image Random dots appear within the message Nearly identical color scheme in 100,000’s spamtrap msgs Verdict BLOCK IP address recently started sending email Message originated from dial-up IP address Sending IP address located in Russia Message leaves trace of spamware tool
IronPort Reputation Filters   Dell Case Study Dell’s challenge: Dell currently receives  26M  messages per day Only  1.5M  are legitimate messages 68 existing gateways  running Spam Assassin were not accurate IronPort solution: Reputation Filters block over  19M  messages per day 5.5M  messages per day scanned by anti-spam engine Replaced  68  servers with  8  IronPort C60s Accuracy of spam filtering increased  10x  Servers consolidated by  70% Operating costs reduced by  75% “ IronPort has increased the quality and reliability of our network operations, while reducing our costs.” -- Tim Helmsetetter Manager, Global Collaborative Systems Engineering and Service Management, DELL CORPORATION
Multi-layer Virus Defense Best-of-Breed Protection at the Gateway •  IronPort Virus Outbreak Filters  : stop outbreaks 13 hours ahead of traditional signatures •  McAfee and Sophos Anti-Virus: signature-based solutions with industry leading accuracy MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
IronPort Outbreak Filters   Close the Reaction Time Gap
How Virus Outbreak Filters Work Dynamic Quarantine In Action T = 0 zip (exe) files T = 5 mins -zip (exe) files -Size 50 to 55 KB. T = 10 mins zip (exe) files Size 50 to 55KB “ Price” in the  name file T = 8 hours Release messages  if signature  update is in place Messages Scanned & Deleted Fine-grained Rules, Multiple Parameters: Attachment Type, Attachment Size, URLs, Filenames & More
Industry Leading Signatures from Sophos and McAfee Anti-Virus Integrated Sophos ®   anti-virus engine High performance in-line scanning Easy to deploy and manage Intuitive user interface Single view with Mail Flow Monitor Auto updates Lower TCO with integrated solution
IronPort Data Loss Prevention Inbound/Outbound Policy Enforcement •  Integrated Scanning makes DLP deployments quick & easy •  Integrated Remediation eases work flow burden MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE DATA LOSS PREVENTION VIRUS DEFENSE EMAIL ENCRYPTION
Data Loss Prevention Multi-Faceted Problem Regulatory Compliance HIPAA, GLBA, PCI, SOX Regulations Scan for sensitive information and block infractions Secure business partner communication Acceptable Use Block offensive content Enforce messaging policy (attachment size, etc) Add legal disclaimers to outgoing mails Intellectual Property Protection Block messages containing confidential data Prevent email communications with competitor
PCI Applies to Nearly Every Industry PCI Not Just for Retail Utilities E-Commerce Transportation Restaurant Financial/ Insurance Retail Service Provider Healthcare Federal Mobile Universities Sports and Entertainment State Agencies
The Payment Card Industry (PCI)  Data Security Standard Published January 2005 Impacts ALL who  process, transmit, or store   cardholder data Also applies to 3 rd -party hosting companies, information storage companies, etc. Monthly fines ranging from $5,000 to $50,000 for  missed deadlines Has global reach Source: pcisecuritystandards.org Not Published yet Latin American CEMEA 2008 TBD 2008 TBD 2008 TBD Canada DEC 2009 DEC 2009 DEC 2009 Asia MAR-DEC 2008 MAR-DEC 2008 Negotiated individually Western Europe DEC 2008 DEC 2007 SEP 2007 US Level 3 Level 2 Level 1 Theater
Data Loss Prevention Foundation Integrated Scanning Users Integrated Scanning Makes DLP Deployments Quick & Easy Outbound Mail Weighted Content Dictionaries Compliance Dictionaries Attachment Scanning Custom Content Filters Smart Identifiers
Data Loss Prevention Foundation Integrated Remediation Users Integrated Remediation Eases Work Flow Burden Outbound Mail Remediation:  Quarantine Remediation Notification Remediation:  Reporting Encrypt The Message
IronPort Email Encryption  Don’t Remediate…Accelerate MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE DATA LOSS PREVENTION VIRUS DEFENSE EMAIL ENCRYPTION
Encryption Market Evolution The Technical View    Encryption technology is the foundation for  business class email Secure Envelopes S/MIME, PGP, Secure Webmail Single, Integrated Platform No Certificate Complexity  Universal Reach Multi-Platform Deployment  Certificate Requirements  Sender/Receiver Plug-Ins  IronPort PXE ™ Legacy Encryption Solutions
IronPort PXE: Sending a Message Instant Deployment, Zero Management Costs IronPort Hosted Keys  Gateway encrypts message  User opens IronPort PXE in browser  User authenticates & gets message key Password  Decrypted message displayed Message  pushed to Recipient Key Stored
IronPort PXE: Receiving a Message Seamless End-User Experience  View message  Enter password  Open Attachment   
Management for Organizations of All Sizes IronPort Email Security Manager   – unified policy management IronPort Email Security Monitor   – enterprise-class reporting system Management Interfaces – simple integration and increased productivity MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
IronPort Email Security Manager Single view of policies for the entire organization IT SALES LEGAL Mark and Deliver Spam Delete Executables Archive all mail Virus Outbreak Filters disabled for .doc files Allow all media files Quarantine executables “ Email Security Manager serves as a single, versatile dashboard to manage all the services on the appliance.” -- PC Magazine 2/22/05 Categories: by Domain, Username, or LDAP
Cisco Self-Defending Network (SDN) Cisco Security- Portfolio @ a Glance Network & End-point Security Content & Application Security Systems & Security Management
The Portfolio at a Glance… Content and Application Security Content Security Reputation based, zero-day defense Capability to address diverse attacks types and techniques Secure all sources of attack Application Security Layer 7 protection for application  and data vulnerabilities XML traffic validation and inspection Enhanced deep packet inspection Product Highlights: Ironport Email Ironport Web Intrusion Prevention Systems Product Highlights: ACE XML Gateway  Web Application Firewall
Systems Approach to Stop Malware: Visibility and Control Intrusion Prevention Detection Precision response Content Security Email SPAM Web filtering Endpoint Security Host IPS AV solutions Firewall and VPN Traffic access control Encryption Centralized Policy Management and Monitoring
Cisco’s Security Portfolio— Offers End-to-End Compliance with PCI Requirements
Cisco Data Loss Prevention Solution NAC, CSA, IronPort, and TrustSec IronPort NAC Appliance ASA printer IronPort  Prevent data loss at perimeter Mail policy verification Logs transaction Encrypts mail message and notifies recipient NAC Appliance Verifies CSA and endpoint posture TrustSec TrustSec Enforces data policy through  role-based access control Cisco Security Agent Scan files for sensitive data Prevents copying to external media Prevents transfer with internetwork applications Prevents bypass of gateway security policy Internet Internet Internet Internet Hi Joan,  Could you send those files over? Sure  Bob,  I’ll find a way to get those files to you!
Preventing Data Leakage and Disclosure  Self-Defending Network Applied Data Center Employees Network Edge Tape Devices Application Server Cisco  MDS 9000 C-Series E-Mail Security Appliance Internet Corporate Network Cisco ®  Security Agent Prevents endpoint data loss Prevents bypass of Cisco IronPort network protection Inspects and classifies content (similar to Cisco IronPort) in a future release Partners Customers Remote Employees Storage Media Encryption Prevention of unauthorized access and loss of data at rest Full integration with SAN fabric and management  Secure, highly available service IronPort  Prevent data loss at network perimeter  Inspect and control content Address privacy regulations Take advantage of existing anti-spam and anti-spyware infrastructure
Self-Defending Network in the Campus Centralized threat management, including correlation and mitigation Centralized policy and device management across entire Cisco infrastructure for IPS, VPN, and firewall Web and mail content scanning to reduce malware introduction and propagation Layer 3 – 7 inspection and traffic control Converged remote site and user  IPsec and SSL VPN services Trojan horse and spyware to control channel monitoring and mitigation Gateway and Internet Services Prevent exploits of vulnerabilities on PCs and other endpoints Minimize the entrance and propagation of new threats on trusted PCs Enforce access controls to trusted, untrusted, and guest users Protect and isolate intra-LAN segments  Policy Enforcement and Endpoint Protection Threat Management and Policy Control Cisco ®  Security Management Suite Cisco ASA 5500 Firewall, VPN, and IPS Cisco IPS 4200 Series Sensors Network Admission Control FWSM and Cisco ASA 5500 Series Cisco IronPort Cisco ASA 5500 CSC Cisco Security Agent Endpoint Security Policy and Posture Centralized Policy and Threat Management Traffic and Admission Control Targeted Attack Protection Web and Mail Malware Scan Intra-LAN Policy Enforcement Internet Public WAN
Self-Defending Network in the Data Center Cisco ASA ACS Cisco Security MARS Cisco ®  WAAS Web  Servers Cisco ACE Cisco Security Agent Cisco Security Agent Cisco Security Agent Application Servers Database  Servers AXG  (Web Applications) Cisco Security Agent Cisco Security Agent Cisco MDS  with SME Tier 1/2/3  Storage Tape/Offsite  Backup AXG (B2B) CSM Cisco Security Agent-MC CW-LMN Data-Center Edge Firewall and IPS DoS protection Application protocol inspection Web Services security VPN termination E-mail and Web access control Cisco Catalyst 6000 FWSM Web Access Web security Application security Application isolation Content inspection SSL encryption and offload Server hardening Applications and Database XML, SOAP, and AJAX security DoS prevention Application-to-application security Server hardening Storage Data encryption In motion At rest Stored data access control Segmentation Management Tiered access Monitoring and analysis Role-based access AAA access control Cisco IronPort  E-Mail Security AXG  (DHTML  to XML) Cisco IronPort  Web Security Cisco IronPort  Web Security
Access to the presentations http://www.newhorizons.bg/powerpoint/802.1x.ppt http://www.newhorizons.bg/powerpoint/Layer2_Attacks.ppt  http://www.newhorizons.bg/powerpoint/ Ironport-DLP .ppt
New Horizons' Partners

More Related Content

PDF
SIEM Architecture
Nishanth Kumar Pathi
 
PPTX
SOC and SIEM.pptx
SandeshUprety4
 
PPTX
Introduction to PCI DSS
Saumya Vishnoi
 
PDF
5. Identity and Access Management
Sam Bowne
 
PPTX
What is zero trust model (ztm)
Ahmed Banafa
 
PPTX
Cyber Security Awareness Program.pptx
Dinesh582831
 
PPT
Authentication Technologies
Nicholas Davis
 
PDF
Password Management
Rick Chin
 
SIEM Architecture
Nishanth Kumar Pathi
 
SOC and SIEM.pptx
SandeshUprety4
 
Introduction to PCI DSS
Saumya Vishnoi
 
5. Identity and Access Management
Sam Bowne
 
What is zero trust model (ztm)
Ahmed Banafa
 
Cyber Security Awareness Program.pptx
Dinesh582831
 
Authentication Technologies
Nicholas Davis
 
Password Management
Rick Chin
 

What's hot (20)

PDF
Brute Force Attack
Ahmad karawash
 
PDF
Cybersecurity Basics - Aravindr.com
Aravind R
 
PPTX
Information and data security block cipher operation
Mazin Alwaaly
 
PPT
The Trouble with Cloud Forensics
Sharique Rizvi
 
PPTX
E mail Investigation
Dr Raghu Khimani
 
PDF
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Kranthi Aragonda
 
PDF
Setting up CSIRT
APNIC
 
PDF
BEST CYBER SECURITY PRACTICES
Happiest Minds Technologies
 
PPT
Information security management
UMaine
 
PPT
IT Security Awareness-v1.7.ppt
OoXair
 
PDF
Secure Session Management
GuidePoint Security, LLC
 
PPT
Digital signature
AJAL A J
 
PDF
Cybersecurity Employee Training
Paige Rasid
 
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
PPTX
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
PPTX
IT Security DOs and DON'Ts
Sophos
 
PPTX
public key infrastructure
vimal kumar
 
PPTX
Endpoint Security Solutions
The TNS Group
 
PDF
Nessus Software
Megha Sahu
 
PPTX
Vapt pci dss methodology ppt v1.0
Network Intelligence India
 
Brute Force Attack
Ahmad karawash
 
Cybersecurity Basics - Aravindr.com
Aravind R
 
Information and data security block cipher operation
Mazin Alwaaly
 
The Trouble with Cloud Forensics
Sharique Rizvi
 
E mail Investigation
Dr Raghu Khimani
 
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Kranthi Aragonda
 
Setting up CSIRT
APNIC
 
BEST CYBER SECURITY PRACTICES
Happiest Minds Technologies
 
Information security management
UMaine
 
IT Security Awareness-v1.7.ppt
OoXair
 
Secure Session Management
GuidePoint Security, LLC
 
Digital signature
AJAL A J
 
Cybersecurity Employee Training
Paige Rasid
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
IT Security DOs and DON'Ts
Sophos
 
public key infrastructure
vimal kumar
 
Endpoint Security Solutions
The TNS Group
 
Nessus Software
Megha Sahu
 
Vapt pci dss methodology ppt v1.0
Network Intelligence India
 
Ad

Viewers also liked (20)

PDF
Green Storage 1: Economics, Environment, Energy and Engineering
digitallibrary
 
PPTX
Agile Product Management Basics
Rich Mironov
 
PPTX
Practical introduction to hadoop
inside-BigData.com
 
PDF
Improving Utilization of Infrastructure Cloud
IJASCSE
 
DOCX
college assignment on Applications of ipsec
bigchill29
 
PDF
Basics of print planning
Philip Vantassel, C.P.M.
 
PDF
Compulsory motor third party liability in Mozambique
https://logisticscompanies.co.za
 
PDF
Informatica transformation guide
sonu_pal
 
PPTX
Top 8 print production manager resume samples
kelerdavi
 
PPTX
Optimized Learning and Development
AIESEC
 
PDF
How to measure illumination
ajsatienza
 
PDF
6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management Excellence
Change Management Institute
 
KEY
User Behavior Tracking with Google Analytics, Garb, and Vanity
Tony Pitale
 
PDF
Software QA Metrics Dashboard Benchmarking
John Carter
 
PPTX
Promotion in the internet marketing mix
NadiaElSamsam
 
PPTX
Advertising photography
Ryan Broome
 
PPTX
Revenue cycle management presentation
fernan716
 
PPTX
E learning Implementation strategy
G-Cube: Custom e-learning service provider
 
Green Storage 1: Economics, Environment, Energy and Engineering
digitallibrary
 
Agile Product Management Basics
Rich Mironov
 
Practical introduction to hadoop
inside-BigData.com
 
Improving Utilization of Infrastructure Cloud
IJASCSE
 
college assignment on Applications of ipsec
bigchill29
 
Basics of print planning
Philip Vantassel, C.P.M.
 
Compulsory motor third party liability in Mozambique
https://logisticscompanies.co.za
 
Informatica transformation guide
sonu_pal
 
Top 8 print production manager resume samples
kelerdavi
 
Optimized Learning and Development
AIESEC
 
How to measure illumination
ajsatienza
 
6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management Excellence
Change Management Institute
 
User Behavior Tracking with Google Analytics, Garb, and Vanity
Tony Pitale
 
Software QA Metrics Dashboard Benchmarking
John Carter
 
Promotion in the internet marketing mix
NadiaElSamsam
 
Advertising photography
Ryan Broome
 
Revenue cycle management presentation
fernan716
 
E learning Implementation strategy
G-Cube: Custom e-learning service provider
 
Ad

Similar to Ironport Data Loss Prevention (20)

PDF
IronPort
Netwax Lab
 
PDF
Presentation cisco iron port product family
xKinAnx
 
PPTX
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
Louis Göhl
 
PDF
Microsoft Forefront - Secure Messaging Solution Datasheet
Microsoft Private Cloud
 
DOCX
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Private Cloud
 
PPTX
Video - FortiMail and FortiMail Cloud - April 2021.pptx
EsminGadalaKattnMart
 
PPT
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Private Cloud
 
PDF
Cisco iron port_email_data_loss_prevention_overview
Ilyanna
 
PPTX
Email Security: The Threat Landscape
Nuspire Networks
 
PPTX
FortiMail-Email-Secure-Gateway-May-2018_v1.pptx
juliopradobol
 
PDF
Email Security: Protecting Your Business from Cyber Threats | Infographic | U...
United States Cybersecurity Institute (USCSI®)
 
PDF
Implementing Application Security
Information Technology
 
PDF
Presentation cisco iron port email & web security
xKinAnx
 
PPT
Exchange Conference (Philadelphia) - Exchange 2007 Security
Harold Wong
 
PDF
Email Security Overview
- Mark - Fullbright
 
PPTX
Email: still the favourite route of attack
Claranet UK
 
PDF
MessageLabs_Investor_Presentation
finance40
 
PPT
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Private Cloud
 
IronPort
Netwax Lab
 
Presentation cisco iron port product family
xKinAnx
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
Louis Göhl
 
Microsoft Forefront - Secure Messaging Solution Datasheet
Microsoft Private Cloud
 
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Private Cloud
 
Video - FortiMail and FortiMail Cloud - April 2021.pptx
EsminGadalaKattnMart
 
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Private Cloud
 
Cisco iron port_email_data_loss_prevention_overview
Ilyanna
 
Email Security: The Threat Landscape
Nuspire Networks
 
FortiMail-Email-Secure-Gateway-May-2018_v1.pptx
juliopradobol
 
Email Security: Protecting Your Business from Cyber Threats | Infographic | U...
United States Cybersecurity Institute (USCSI®)
 
Implementing Application Security
Information Technology
 
Presentation cisco iron port email & web security
xKinAnx
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Harold Wong
 
Email Security Overview
- Mark - Fullbright
 
Email: still the favourite route of attack
Claranet UK
 
MessageLabs_Investor_Presentation
finance40
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Private Cloud
 

More from dkaya (11)

PPTX
Mitigating worm attacks
dkaya
 
PPTX
Ccna security
dkaya
 
PPT
Hacking Cisco Networks and Countermeasures
dkaya
 
PPT
Sniffing SSL Traffic
dkaya
 
PPT
Intrusion Discovery on Windows
dkaya
 
PPT
Implementing Cisco AAA
dkaya
 
PPT
Cisco Ccna Certification
dkaya
 
PPT
Cisco Switch Security
dkaya
 
PPT
Mitigating Layer2 Attacks
dkaya
 
PPTX
Microsoft Days 09 Windows 2008 Security
dkaya
 
PPT
Implementing 802.1x Authentication
dkaya
 
Mitigating worm attacks
dkaya
 
Ccna security
dkaya
 
Hacking Cisco Networks and Countermeasures
dkaya
 
Sniffing SSL Traffic
dkaya
 
Intrusion Discovery on Windows
dkaya
 
Implementing Cisco AAA
dkaya
 
Cisco Ccna Certification
dkaya
 
Cisco Switch Security
dkaya
 
Mitigating Layer2 Attacks
dkaya
 
Microsoft Days 09 Windows 2008 Security
dkaya
 
Implementing 802.1x Authentication
dkaya
 

Recently uploaded (20)

PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Chapter 1 Introduction to CV and IP Lecture Note.pdf
Getnet Tigabie Askale -(GM)
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Software Development Company | KodekX
KodekX
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PDF
DevOps & Developer Experience Summer BBQ
AUGNYC
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Chapter 1 Introduction to CV and IP Lecture Note.pdf
Getnet Tigabie Askale -(GM)
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Software Development Company | KodekX
KodekX
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
DevOps & Developer Experience Summer BBQ
AUGNYC
 

Ironport Data Loss Prevention

  • 1. Securing Your Email - Data Loss Prevention Deniz Kaya Microsoft, Cisco, Ironport, Mile2 Instructor CCSI, CCNP, MCT, MCSE, ICSI, ICSP, CPTS
  • 2. IronPort ® Gateway Security Products Web Security | Email Security | Security Management | Encryption EMAIL Security Appliance WEB Security Appliance Security MANAGEMENT Appliance IronPort SenderBase APPLICATION-SPECIFIC SECURITY GATEWAYS CLIENTS BLOCK Incoming Threats PROTECT Corporate Assets Data Loss Prevention Encryption CENTRALIZE Administration Internet ENCRYPTION Appliance
  • 3. IronPort + Cisco Market Leadership Customer Leadership - Over 6,000 customers globally - 99% customer retention rate Technology Leadership - Industry leading email and Web security applications and management tools Global Leadership - Worldwide business operations - Global technology infrastructure
  • 4. The IronPort SenderBase ® Network Global Reach Yields Benchmark Accuracy 5B+ queries daily 150+ Email and Web parameters 35% of the World’s Traffic IronPort EMAIL Security Appliances IronPort WEB Security Appliances IronPort SenderBase Combines Email & Web Traffic Analysis View into both Email & Web traffic dramatically improves efficacy 80% of spam contains URLs Email is a key distribution vector for Web-based malware
  • 5. IronPort Consolidates the Network Perimeter For Security, Reliability and Lower Maintenance After IronPort Groupware Firewall IronPort Email Security Appliance Internet Users Before IronPort Anti-Spam Anti-Virus Policy Enforcement Mail Routing Internet Firewall Groupware Users Encryption Platform MTA DLP Scanner DLP Policy Manager
  • 6. IronPort Architecture Multi-Layered Email Security MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
  • 7. IronPort AsyncOS Unmatched Scalability and Security • IronPort AsyncOS is a scalable and secure operating system, optimized for messaging • Advanced Email Controls protect reputation and downstream systems • Standards-based Integration replaces legacy systems with ease MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
  • 8. Multi-layer Spam Defense Best-of-Breed Protection at the Gateway • IronPort Reputation Filters™: the outer layer defense • IronPort Anti-Spam ™ : stops the broadest array of threats – spam, phishing, fraud and more MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
  • 9. SenderBase ® Data Makes the Difference • Complaint Reports •  Spam Traps • Message Composition Data • Global Volume Data • URL Lists • Compromised Host Lists • Web Crawlers • IP Blacklists & Whitelists • Additional Data SenderBase Data Data Analysis/ Security Modeling SenderBase Reputation Scores -10 to +10 Parameters Threat Prevention in Realtime
  • 10. Introducing IronPort Spam Defense Multi-layer spam defense designed to: Stop spam quickly Stop spam accurately Reputation Worlds first and best sender based reputation service - Blocks 80% of spam at gateway - World class accuracy SBRS IPAS Who? How? What? Where? World’s most accurate content based spam engine - 98% catch rate - World class accuracy
  • 11. IronPort Anti-Spam Accuracy Powered By Context Adaptive Scanning Engine WHAT? HOW? WHO? WHERE? All text inside an image Random dots appear within the message Nearly identical color scheme in 100,000’s spamtrap msgs Verdict BLOCK IP address recently started sending email Message originated from dial-up IP address Sending IP address located in Russia Message leaves trace of spamware tool
  • 12. IronPort Reputation Filters Dell Case Study Dell’s challenge: Dell currently receives 26M messages per day Only 1.5M are legitimate messages 68 existing gateways running Spam Assassin were not accurate IronPort solution: Reputation Filters block over 19M messages per day 5.5M messages per day scanned by anti-spam engine Replaced 68 servers with 8 IronPort C60s Accuracy of spam filtering increased 10x Servers consolidated by 70% Operating costs reduced by 75% “ IronPort has increased the quality and reliability of our network operations, while reducing our costs.” -- Tim Helmsetetter Manager, Global Collaborative Systems Engineering and Service Management, DELL CORPORATION
  • 13. Multi-layer Virus Defense Best-of-Breed Protection at the Gateway • IronPort Virus Outbreak Filters  : stop outbreaks 13 hours ahead of traditional signatures • McAfee and Sophos Anti-Virus: signature-based solutions with industry leading accuracy MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
  • 14. IronPort Outbreak Filters Close the Reaction Time Gap
  • 15. How Virus Outbreak Filters Work Dynamic Quarantine In Action T = 0 zip (exe) files T = 5 mins -zip (exe) files -Size 50 to 55 KB. T = 10 mins zip (exe) files Size 50 to 55KB “ Price” in the name file T = 8 hours Release messages if signature update is in place Messages Scanned & Deleted Fine-grained Rules, Multiple Parameters: Attachment Type, Attachment Size, URLs, Filenames & More
  • 16. Industry Leading Signatures from Sophos and McAfee Anti-Virus Integrated Sophos ® anti-virus engine High performance in-line scanning Easy to deploy and manage Intuitive user interface Single view with Mail Flow Monitor Auto updates Lower TCO with integrated solution
  • 17. IronPort Data Loss Prevention Inbound/Outbound Policy Enforcement • Integrated Scanning makes DLP deployments quick & easy • Integrated Remediation eases work flow burden MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE DATA LOSS PREVENTION VIRUS DEFENSE EMAIL ENCRYPTION
  • 18. Data Loss Prevention Multi-Faceted Problem Regulatory Compliance HIPAA, GLBA, PCI, SOX Regulations Scan for sensitive information and block infractions Secure business partner communication Acceptable Use Block offensive content Enforce messaging policy (attachment size, etc) Add legal disclaimers to outgoing mails Intellectual Property Protection Block messages containing confidential data Prevent email communications with competitor
  • 19. PCI Applies to Nearly Every Industry PCI Not Just for Retail Utilities E-Commerce Transportation Restaurant Financial/ Insurance Retail Service Provider Healthcare Federal Mobile Universities Sports and Entertainment State Agencies
  • 20. The Payment Card Industry (PCI) Data Security Standard Published January 2005 Impacts ALL who process, transmit, or store cardholder data Also applies to 3 rd -party hosting companies, information storage companies, etc. Monthly fines ranging from $5,000 to $50,000 for missed deadlines Has global reach Source: pcisecuritystandards.org Not Published yet Latin American CEMEA 2008 TBD 2008 TBD 2008 TBD Canada DEC 2009 DEC 2009 DEC 2009 Asia MAR-DEC 2008 MAR-DEC 2008 Negotiated individually Western Europe DEC 2008 DEC 2007 SEP 2007 US Level 3 Level 2 Level 1 Theater
  • 21. Data Loss Prevention Foundation Integrated Scanning Users Integrated Scanning Makes DLP Deployments Quick & Easy Outbound Mail Weighted Content Dictionaries Compliance Dictionaries Attachment Scanning Custom Content Filters Smart Identifiers
  • 22. Data Loss Prevention Foundation Integrated Remediation Users Integrated Remediation Eases Work Flow Burden Outbound Mail Remediation: Quarantine Remediation Notification Remediation: Reporting Encrypt The Message
  • 23. IronPort Email Encryption  Don’t Remediate…Accelerate MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE DATA LOSS PREVENTION VIRUS DEFENSE EMAIL ENCRYPTION
  • 24. Encryption Market Evolution The Technical View    Encryption technology is the foundation for business class email Secure Envelopes S/MIME, PGP, Secure Webmail Single, Integrated Platform No Certificate Complexity Universal Reach Multi-Platform Deployment Certificate Requirements Sender/Receiver Plug-Ins IronPort PXE ™ Legacy Encryption Solutions
  • 25. IronPort PXE: Sending a Message Instant Deployment, Zero Management Costs IronPort Hosted Keys  Gateway encrypts message  User opens IronPort PXE in browser  User authenticates & gets message key Password  Decrypted message displayed Message pushed to Recipient Key Stored
  • 26. IronPort PXE: Receiving a Message Seamless End-User Experience  View message  Enter password  Open Attachment   
  • 27. Management for Organizations of All Sizes IronPort Email Security Manager  – unified policy management IronPort Email Security Monitor  – enterprise-class reporting system Management Interfaces – simple integration and increased productivity MANAGEMENT TOOLS THE IRONPORT A SYNC OS™ EMAIL PLATFORM SPAM DEFENSE VIRUS DEFENSE DATA LOSS PREVENTION EMAIL ENCRYPTION
  • 28. IronPort Email Security Manager Single view of policies for the entire organization IT SALES LEGAL Mark and Deliver Spam Delete Executables Archive all mail Virus Outbreak Filters disabled for .doc files Allow all media files Quarantine executables “ Email Security Manager serves as a single, versatile dashboard to manage all the services on the appliance.” -- PC Magazine 2/22/05 Categories: by Domain, Username, or LDAP
  • 29. Cisco Self-Defending Network (SDN) Cisco Security- Portfolio @ a Glance Network & End-point Security Content & Application Security Systems & Security Management
  • 30. The Portfolio at a Glance… Content and Application Security Content Security Reputation based, zero-day defense Capability to address diverse attacks types and techniques Secure all sources of attack Application Security Layer 7 protection for application and data vulnerabilities XML traffic validation and inspection Enhanced deep packet inspection Product Highlights: Ironport Email Ironport Web Intrusion Prevention Systems Product Highlights: ACE XML Gateway Web Application Firewall
  • 31. Systems Approach to Stop Malware: Visibility and Control Intrusion Prevention Detection Precision response Content Security Email SPAM Web filtering Endpoint Security Host IPS AV solutions Firewall and VPN Traffic access control Encryption Centralized Policy Management and Monitoring
  • 32. Cisco’s Security Portfolio— Offers End-to-End Compliance with PCI Requirements
  • 33. Cisco Data Loss Prevention Solution NAC, CSA, IronPort, and TrustSec IronPort NAC Appliance ASA printer IronPort Prevent data loss at perimeter Mail policy verification Logs transaction Encrypts mail message and notifies recipient NAC Appliance Verifies CSA and endpoint posture TrustSec TrustSec Enforces data policy through role-based access control Cisco Security Agent Scan files for sensitive data Prevents copying to external media Prevents transfer with internetwork applications Prevents bypass of gateway security policy Internet Internet Internet Internet Hi Joan, Could you send those files over? Sure Bob, I’ll find a way to get those files to you!
  • 34. Preventing Data Leakage and Disclosure Self-Defending Network Applied Data Center Employees Network Edge Tape Devices Application Server Cisco MDS 9000 C-Series E-Mail Security Appliance Internet Corporate Network Cisco ® Security Agent Prevents endpoint data loss Prevents bypass of Cisco IronPort network protection Inspects and classifies content (similar to Cisco IronPort) in a future release Partners Customers Remote Employees Storage Media Encryption Prevention of unauthorized access and loss of data at rest Full integration with SAN fabric and management Secure, highly available service IronPort Prevent data loss at network perimeter Inspect and control content Address privacy regulations Take advantage of existing anti-spam and anti-spyware infrastructure
  • 35. Self-Defending Network in the Campus Centralized threat management, including correlation and mitigation Centralized policy and device management across entire Cisco infrastructure for IPS, VPN, and firewall Web and mail content scanning to reduce malware introduction and propagation Layer 3 – 7 inspection and traffic control Converged remote site and user IPsec and SSL VPN services Trojan horse and spyware to control channel monitoring and mitigation Gateway and Internet Services Prevent exploits of vulnerabilities on PCs and other endpoints Minimize the entrance and propagation of new threats on trusted PCs Enforce access controls to trusted, untrusted, and guest users Protect and isolate intra-LAN segments Policy Enforcement and Endpoint Protection Threat Management and Policy Control Cisco ® Security Management Suite Cisco ASA 5500 Firewall, VPN, and IPS Cisco IPS 4200 Series Sensors Network Admission Control FWSM and Cisco ASA 5500 Series Cisco IronPort Cisco ASA 5500 CSC Cisco Security Agent Endpoint Security Policy and Posture Centralized Policy and Threat Management Traffic and Admission Control Targeted Attack Protection Web and Mail Malware Scan Intra-LAN Policy Enforcement Internet Public WAN
  • 36. Self-Defending Network in the Data Center Cisco ASA ACS Cisco Security MARS Cisco ® WAAS Web Servers Cisco ACE Cisco Security Agent Cisco Security Agent Cisco Security Agent Application Servers Database Servers AXG (Web Applications) Cisco Security Agent Cisco Security Agent Cisco MDS with SME Tier 1/2/3 Storage Tape/Offsite Backup AXG (B2B) CSM Cisco Security Agent-MC CW-LMN Data-Center Edge Firewall and IPS DoS protection Application protocol inspection Web Services security VPN termination E-mail and Web access control Cisco Catalyst 6000 FWSM Web Access Web security Application security Application isolation Content inspection SSL encryption and offload Server hardening Applications and Database XML, SOAP, and AJAX security DoS prevention Application-to-application security Server hardening Storage Data encryption In motion At rest Stored data access control Segmentation Management Tiered access Monitoring and analysis Role-based access AAA access control Cisco IronPort E-Mail Security AXG (DHTML to XML) Cisco IronPort Web Security Cisco IronPort Web Security
  • 37. Access to the presentations http://www.newhorizons.bg/powerpoint/802.1x.ppt http://www.newhorizons.bg/powerpoint/Layer2_Attacks.ppt http://www.newhorizons.bg/powerpoint/ Ironport-DLP .ppt