Email Security

Information about Email Security

Published on October 7, 2007

Author: Christian

Source: authorstream.com

Content

Email Security:  Email Security Contents:  Contents Email Security Challenges Emerging Threats Explanation and demonstration of email security technologies By Joe Green Summary Email Security:  Email Security Email communication is absolutely essential for most companies and individuals. The problem is that it is increasingly used as a method of attack by outsiders and a source of information loss. Spam Viruses Phishing Spyware Email Security Challenges:  Email Security Challenges It is a difficult balance of access and control You must maintain essential business communication Customers Vendors Partners Policy and regulatory compliance Managing information leaks Keeping current updates to your security technology Measuring the effectiveness of solutions Planning for the future Emerging Threats:  Emerging Threats Increase in spam Volume Sophistication Increase in Phishing Spyware, Keystroke loggers, and Trojans spread by email Targeted attacks See our whitepapers http://www.esoft.com/solutions/white_paper.cfm Joe Green:  Joe Green Email Security Demonstration What is Bayesian Filtering?:  What is Bayesian Filtering? A 240 year old mathematical algorithm adapted to fight spam Creates a database of words, phrases and email attributes with an associated probability of being in a spam message Each database is unique to the user network How does Bayesian filtering work?:  How does Bayesian filtering work? The ThreatWall examines messages that flow through your system that have been marked as spam or ham (not spam) As the database is built, words, phrases and elements are assigned a probability of being associated with spam or associated with ham (not spam) The database can change over time as new messages are examined All incoming messages are compared to the database, words and phrases are matched for at total score Bayesian filter example:  Bayesian filter example Joe,   I understand you are discounting the esoft VPN client softpak.  I never had any of my customers subscribe to it previously, however now, I have a couple of customers that need something like it.  What do you recommend as a replacement?  Does the Greenbow VPN client work well?  Any help would be appreciated as I am finding a growing need for VPN client software.   Thanks Larry   Larry Waters Bit Byte Data, LLC 503-628-3210 [email protected] www.bitbytedata.com Summary:  Summary There is a often a delicate balance between security risks and valid communications. Threats will continue to increase in volume and sophistication. New technology and constant updates are absolutely necessary to combat these threats. Solutions must be easy to install and manage. ThreatWall and InstaGate offer feature-rich, expandable and affordable solutions for your growing security needs. Thank You!:  Thank You! Download the presentation using the link on our SpamFilter SoftPak web page: www.esoft.com/products/softpak_spam.cfm Additional Slides Anti-Spam terms Header Example Quarantine Notification Aberdeen Messaging Security Report Offer **NEW** SpamFilter Training Guide Appendix: Anti-Spam Terms:  Appendix: Anti-Spam Terms RBL (Realtime Blackhole List) – List of known and suspicious email servers Rule based scoring – Database of typical spam behaviors, keywords and other indicators White/Black lists – Custom lists to allow or deny messages through based on the sender domain or email address Address Verification – Make sure the recipient and sender and valid email accounts Appendix: Anti-Spam Terms:  Appendix: Anti-Spam Terms Bayesian Filtering – Advanced statistical analysis of email to determine the probability of spam based on historical evidence SPF (Sender Policy Framework) – Verify email server is legitimate for the domain Historical Averaging – Learns good and bad senders Outlook Plug-in – User tool to train Bayesian Filter good and bad email messages for improved filtering User Quarantine Notification – Email with clickable links so users can manage their own quarantine Automated Quarantine Maintenance – Expire messages from the quarantine automatically for simplified management *go back Sample detailed message headers:  Sample detailed message headers From: "Russ Valdez" <[email protected]> To: [email protected] Cc: [email protected] Subject: Your account #4V7744 Mime-Version: 1.0 Content-Type: text/plain; X-Envelope-From: [email protected] X-Spam-Report: Spam detection software, running on the system "ThreatWall", has        identified this incoming email as possible spam. The original message        has been attached to this so you can view it (if it isn't spam) or label        similar future email. If you have any questions, see        the administrator of that system for details.        Content preview: Hello, We tried contacting you awhile ago about your        low interest morta(ge rate. You have qualified for the lowest rate in        years. [...]        Content analysis details: (10.8 points, 5.0 required)        pts rule name description        ---- ---------------------- --------------------------------------------------        0.0 RCVD_BY_IP Received by mail server with no name        10 DCC_CHECK Listed in DCC (http://rhyolite.com/anti-spam/dcc/)        0.8 INVALID_MSGID Message-Id is not valid, according to RFC 2822 X-Spam-Status: Yes, hits=10.8 required=5 X-Spam-Level: ++++++++++ X-Spam-Id: 20050107/[email protected]:[email protected]:199.45.143.227 X-Spam-Flag: YES Email notification message:  Email notification message Aberdeen Security Report :  Aberdeen Security Report As you are likely aware, the Aberdeen Group is a well-respected industry analyst organization that covers the security arena. Their reports are highly sought after by security professionals trying to get a better handle on the latest threat types, as well as network security solutions. For a limited time, eSoft customers and channel partners may obtain their upcoming security report (estimated to be $399 at time of publishing), for spending 15 minutes filling out the Aberdeen survey that will help fuel the report. Please visit the following link, if you are interested! Aberdeen survey..

Related presentations


Other presentations created by Christian

adobe satyam customer preso v5
29. 09. 2007
0 views

adobe satyam customer preso v5

Marui
09. 10. 2007
0 views

Marui

qw6p15500g20r7m
10. 10. 2007
0 views

qw6p15500g20r7m

Russia Country Presentation
11. 10. 2007
0 views

Russia Country Presentation

Lequeux
12. 10. 2007
0 views

Lequeux

Daisuke Hiratsuka
12. 10. 2007
0 views

Daisuke Hiratsuka

Introduction 1
15. 10. 2007
0 views

Introduction 1

vollhardt
15. 10. 2007
0 views

vollhardt

Vodovatov
27. 09. 2007
0 views

Vodovatov

sample lecture
16. 10. 2007
0 views

sample lecture

hinduism
04. 12. 2007
0 views

hinduism

WNV and equines slides
21. 10. 2007
0 views

WNV and equines slides

addis Abeba
23. 10. 2007
0 views

addis Abeba

mexico 2006 Kadri
24. 10. 2007
0 views

mexico 2006 Kadri

Google AdWords Intro
16. 11. 2007
0 views

Google AdWords Intro

Graft Healing and Return to Play
19. 11. 2007
0 views

Graft Healing and Return to Play

Drama Methods And Education
23. 11. 2007
0 views

Drama Methods And Education

M Kar S Taban CMTEA2005
26. 11. 2007
0 views

M Kar S Taban CMTEA2005

fertility
03. 01. 2008
0 views

fertility

Ch26
13. 10. 2007
0 views

Ch26

BNJ UAI 20030808
29. 10. 2007
0 views

BNJ UAI 20030808

MVA
02. 11. 2007
0 views

MVA

ftl
12. 10. 2007
0 views

ftl

Cause Effect
20. 02. 2008
0 views

Cause Effect

functfam
24. 02. 2008
0 views

functfam

RegionalHazeConsulta tion081407
03. 10. 2007
0 views

RegionalHazeConsulta tion081407

78097 55
02. 10. 2007
0 views

78097 55

vitamin and mineral
04. 03. 2008
0 views

vitamin and mineral

Garfield Engaging At Risk
10. 03. 2008
0 views

Garfield Engaging At Risk

ESA DAvanzo NEON Education1
03. 01. 2008
0 views

ESA DAvanzo NEON Education1

metaphor creativity
18. 03. 2008
0 views

metaphor creativity

The USA
10. 04. 2008
0 views

The USA

551 CH15Lecture
13. 04. 2008
0 views

551 CH15Lecture

235 Reallocation
14. 04. 2008
0 views

235 Reallocation

FuturePriceProposal
16. 04. 2008
0 views

FuturePriceProposal

HBPM presentation QCC
17. 04. 2008
0 views

HBPM presentation QCC

Keynes
18. 04. 2008
0 views

Keynes

71170 pp7
22. 04. 2008
0 views

71170 pp7

VisitBelgium
16. 03. 2008
0 views

VisitBelgium

nts present 2007 english
01. 10. 2007
0 views

nts present 2007 english

SanjivShah
28. 04. 2008
0 views

SanjivShah

hou
24. 02. 2008
0 views

hou

harris 43
07. 05. 2008
0 views

harris 43

Gosbeelides
02. 05. 2008
0 views

Gosbeelides

Hellen Gill
02. 05. 2008
0 views

Hellen Gill

keys
10. 10. 2007
0 views

keys

slac tour 2006
15. 10. 2007
0 views

slac tour 2006

Reg8reportAtlanta
17. 10. 2007
0 views

Reg8reportAtlanta

ppp estrategia fundacion arias
22. 10. 2007
0 views

ppp estrategia fundacion arias

IHY Turkey poster
23. 11. 2007
0 views

IHY Turkey poster

BTW2007 web
15. 10. 2007
0 views

BTW2007 web

castro situacion CR
22. 10. 2007
0 views

castro situacion CR

17th Lecture
10. 10. 2007
0 views

17th Lecture

Guy
23. 10. 2007
0 views

Guy

17661
25. 10. 2007
0 views

17661

D301 Patel
29. 10. 2007
0 views

D301 Patel

Insolvency Presentation
19. 10. 2007
0 views

Insolvency Presentation

ARIntro
23. 10. 2007
0 views

ARIntro

tillman
12. 03. 2008
0 views

tillman

RTV 350 Ch5
08. 10. 2007
0 views

RTV 350 Ch5

Franco cavallo
15. 10. 2007
0 views

Franco cavallo

12 1 5
24. 03. 2008
0 views

12 1 5