Proofpoint: Email Security and Data Loss Prevention Solutions - PowerPoint PPT Presentation

1 / 36
About This Presentation
Title:

Proofpoint: Email Security and Data Loss Prevention Solutions

Description:

4.00 415.00 25247.00 441.00 24053.00 49703.00 419.00 9.55e-03 5/31/2006. 1.00 399.00 27486.00 389.00 28049.00 55902.00 400.00 2.50e-03 6/1/2006. – PowerPoint PPT presentation

Number of Views:2859
Avg rating:5.0/5.0
Slides: 37
Provided by: SeanCW1
Category:

less

Transcript and Presenter's Notes

Title: Proofpoint: Email Security and Data Loss Prevention Solutions


1
ProofpointEmail Security and Data Loss
Prevention Solutions
2
Proofpoint Overview
Customers
  • Unified email security and data loss prevention
    solutions
  • 24x7 support
  • Fastest-growing young technology company in North
    America1 on Deloittes Fast 500 Rising Star
    List 2006

Partners
  • Focus On
  • Research and Innovation
  • Messaging Security
  • Customers

Validation
3
The Messaging Team Has Many Responsibilities
Enterprise
SMTP, HTTP and FTP services
4
How Our Email Security Solution is Different
Proofpoint
Problem
False PositivesFalse Negatives
Accuracy
Scale Limitations
Architecture
Point Solutions
All-In-One Platform
Access for End UsersAdministration Costs Low
Costly
5
All-In-One Platform For Messaging SecurityLess
Infrastructure. Less Training. One Vendor.
Proofpoint Attack Response Center (PARC)
Digital AssetSecurity
Network Content Sentry
Regulatory Compliance
Secure Messaging
Virus Protection
Zero-Hour Anti-Virus
Spam Detection
Dynamic Reputation
Power MTA
Smart Search
6
Architecture Master / AgentOptimal Combination
of Scalability, Redundancy and Performance
  • Manage cluster as single system
  • Reliable architecture
  • Security architecture
  • Dynamic scalability

Single Server
  • Filtering routing
  • Management
  • Consolidated quarantine
  • Full reporting

7
Architecture Master / AgentOptimal Combination
of Scalability, Redundancy and Performance
DMZ
  • Manage cluster as single system
  • Reliable architecture
  • Security architecture
  • Dynamic scalability

Agent(s)
  • Filtering routing

Private Network
Master
  • Management
  • Consolidated quarantine
  • Full reporting

8
Architecture Master / AgentOptimal Combination
of Scalability, Redundancy and Performance
DMZ
  • Manage cluster as single system
  • Reliable architecture
  • Security architecture
  • Dynamic scalability

Data Center 1Houston
Data Center 2 New Jersey
Agent(s)
Private Network
Master
Primary Master
Backup Master
9
Architecture All Deployment Models
AvailableDeployment Flexibility to Suit any
Business Strategy
Models
Sample Scenarios
Single Mode
Software
Appliance
Hybrid
Disaster Recovery
DynamicCapacity
On Demand (Hosted)
Virtual Appliance
10
Accuracy Consistently gt99Less Spam More
Satisfied Users Reduced Load on Mail Servers
11
3rd Generation Anti-Spam TechnologyProofpoint
MLX Peace of Mind
  • Advanced machine learning analysis
  • Multiple techniques
  • Detects image, PDF, adult, phish spams
  • Over 500,000 attributes analyzed
  • Future proof your environment
  • Automatic updates NOT manual upgrades needed
  • MLX adapts to new spam types MP3 audio, Zip,
    Excel, etc.
  • Ongoing RD

We reduced spam with a 99.998 effectiveness
rate overnight. There was not a single false
positive
Proofpoint MLX is dynamic and well suited to the
dynamic nature of spam
12
The Bottom Line High Confidence
13
Case Study Pump and Dump Spam CampaignUses
Image Text Combination Tricks
14
Proofpoint Dynamic Reputation
  • Enhanced utilization from appliances
  • Up to 80 of connections dropped
  • Enhanced effectiveness
  • Up to 0.5 effectiveness gain against dynamic
    botnets
  • Advanced connection management
  • 2 components local and global (netMLX)
  • Complements MLX Anti-Spam technology

15
Multi-layer Virus Protection
Stop viruses at the gateway
  • Signature-based Virus Protection
  • F-Secure 3 anti-virus engines in one
  • McAfee AVERT 100 worldwide researchers
  • Scan inbound and outbound zombie traffic
  • Zero-hour Anti-Virus Protection
  • Non-signature-based approach
  • Stop virus outbreaks
  • As much as 12 hours ahead of signature updates

16
Anti-Virus Engine Detection Rate Comparison
Based on a test by AV-Test.org with a collection
of 468 953 malware samples in November 2006
Source AV-Test.org
17
Proofpoint Zero-Hour Anti-VirusCase Study
Zero-Hour AV Customer (Government) ROI
  • 3,000 Mailboxes
  • 60K Monthly Savings Realized Immediately
  • Total Monthly Zero-Hour Incidents 121
  • Average Cost per Virus Attack 500 per Attack
    (source F-Secure)
  • 1 Major Attack
  • 10.5 of viruses (66 viruses) were not stopped by
    Signature-Based Solution
  • Daily Smaller Attacks
  • Average Number of Viruses is 1-2

18
Proofpoint Power MTA
  • Industry Grade MTA
  • Secure, High Performance
  • Relaying, Routing, Address Rewriting
  • Easy to Use
  • Point and Click
  • Queue Management
  • Sender Authentication, Recipient Verification
  • Built-In Firewall
  • Easily translate your policy
  • Dozens of filtering attributes
  • Detect full or partial content matches
  • Manage 400 files types

19
Proofpoint Smart SearchAdvanced Log Analysis and
Search Tool
20
Insert Additional Slides as Appropriate Here
21
Access for End Users
  • Reduce helpdesk calls with simple end user
    interfaces
  • Greater power to end users
  • Lower cost to administrators

22
Access for End Users
  • Reduce helpdesk calls with simple end user
    interfaces
  • Greater power to end users
  • Lower cost to administrators

23
Access for End Users
  • Reduce helpdesk calls with simple end user
    interfaces
  • Greater power to end users
  • Lower cost to administrators

24
Administration Costs Are Low
  • Consolidated interface for entire cluster
  • Personalized workspace for multiple admins
  • Common interface across all modules
  • Do a lot easily

25
Administration Costs Are Low
  • 50 real-time reports
  • Save customized reports
  • Publishable on a scheduled basis to management
  • No separate server required

26
Proofpoint Summary
Solved
Problem
False PositivesFalse Negatives
Accuracy
Scale Limitations
Architecture
Point Solutions
All-In-One Platform
Access for End UsersAdministration Costs Low
Costly
27
Product Demonstration
28
  • APPENDIX

29
  • CUSTOMER SLIDES BY VERTICAL
  • SERVICE PROVIDER
  • FINANCIAL SERVICES
  • HEALTHCARE PHARMA

30
Proofpoint Overview
Customers
  • Unified email security and data loss prevention
    solutions
  • 24x7 support
  • Fastest-growing young technology company in North
    America1 on Deloittes Fast 500 Rising Star
    List 2006

Commercial
Service Provider
Partners
  • Focus On
  • Research and Innovation
  • Messaging Security
  • Customers

Validation
31
Proofpoint Overview
Customers
Commercial
  • Unified email security and data loss prevention
    solutions
  • 24x7 support
  • Fastest-growing young technology company in North
    America1 on Deloittes Fast 500 Rising Star
    List 2006

Financial
Partners
  • Focus On
  • Research and Innovation
  • Messaging Security
  • Customers

Validation
32
Proofpoint Overview
Customers
Commercial
  • Unified email security and data loss prevention
    solutions
  • 24x7 support
  • Fastest-growing young technology company in North
    America1 on Deloittes Fast 500 Rising Star
    List 2006

Healthcare Pharma
Partners
  • Focus On
  • Research and Innovation
  • Messaging Security
  • Customers

Validation
33
  • DEPLOYMENT MODELS
  • APPLIANCE
  • PROOFPOINT ON DEMAND
  • VIRTUALIZATION

34
Proofpoint Messaging Security Gateways
P640
P840
P320
P845M
P845
1 Rack Unit (1U)
1 Rack Unit (1U)
Rack configuration
1 Rack Unit (1U)
1 Rack Unit (1U)
2 Rack Unit (2U)
1x Quad-Core Intel Xeon
1x Dual-Core Intel Xeon
Processor(s)
2x Quad-Core Intel Xeon
2x Quad-Core Intel Xeon
2x Quad-Core Intel Xeon
4GB
2GB
Memory
8GB
4GB
8GB
2x 146GB RAID1
2x 160GB RAID1
Disks
2x 146GB RAID1
2x 146GB RAID1
6x 300GB RAID10
2x Gigabit BaseT
2x Gigabit BaseT
2x Gigabit BaseT
2x Gigabit BaseT
Network
2x Gigabit BaseT
40,000 msg/hr
65,000 msgs/hr
200,000 msgs/hr
150,000 msgs/hr
200,000 msgs/hr
Throughput (peak)
48,000 msgs/hr
29,000 msg/hr
155,000 msgs/hr
110,000 msgs/hr
155,000 msgs/hr
Throughput (average)
4 hour Dell field support
Next business day Dell field support
4 hour Dell field support
4 hour Dell field support
4 hour Dell field support
Hardware support
  • Throughput numbers based on conservative
    estimates. Certain features such as Reputation,
    Recipient Verification, SMTP Rate Control can
    dramatically increase performance.

35
Proofpoint on Demand Hosted Email Security
Service
  • Service includes
  • Advanced anti-spam, anti-virus protection
  • Advanced DLP and content filtering
  • Robust reporting and end-user capabilities
  • Dedicated environment not shared
  • Geographically dispersed, load-balanced,
    redundant environment
  • Dedicated on demand architecture
  • Complete policy flexibility
  • Dedicated quarantine, reporting user
    information no data leaks
  • Built for instant delivery no shared risk
  • Proofpoint manages
  • Implementation
  • 24x7 monitoring
  • Troubleshooting
  • Updates, upgrades
  • Client manages
  • Policies/email filtering
  • Users/groups
  • Performance
  • 99 spam effectiveness
  • 99.999 availability
  • 100 virus protection
  • Instant email delivery (no delays)
  • Lowest false positives

c1.com
c2.com
c3.com
c4.com
c5.com
c7.com
c6.com
Flexible Managed Service Platform
36
Case Study Cincinnati Bells Email Volume Growth
and Dynamic Capacity Planning via Virtualization
Connections Per Day
Time
Appliances Needed 2 Physical Appliances
Used 2
Appliances Needed 5 Physical Appliances
Used 1 Virtual Appliances Used 4
During spam storm, needed new appliances to
handle load. Added virtual appliances, but in
the end retired physical appliances.
37
Proofpoints Virtual Edition and Modular
Architecture Allows Cincinnati Bell to Reap
Benefits of Virtual Appliances
TODAY
BEFORE
Can provision as many virtual agents as needed
Write a Comment
User Comments (0)
About PowerShow.com