C O O L S T U F F Anti-Virus & Anti-Spam
12 DEFENCE LAYERS
The Barracuda Spam & Virus Firewall is available in eight models and supports up to 100,000 active users with no per user licensing fees.
Its architecture leverages 12 defense layers:
denial of service and security protection, rate control, IP analysis, sender authentication, recipient verification, virus protection, policy (user-specified rules), fingerprint analysis, intent analysis, image analysis, Bayesian analysis, and a spam rules scoring en- gine.
5.0 is an inbound and outbound e-mail security gateway soft- ware designed to pro- tect corporate e-mail servers from spam, viruses, phishing, fraud, malware and
It also features simultaneous inbound and outbound e- mail filtering, using such techniques as rate controls, domain restrictions, user authentication (SASL), keyword and attach- ment blocking, triple-layer virus blocking, and remote user sup- port for outbound e-mail filtering.
www.barracudanetworks.com
E-MAIL SECURITY
The Astaro Mail Secu-
rity appliance helps ensure real e-mail messages are prop- erly delivered and employees can find what they need without being ex- posed to damaging content. Using Astaro’s mail filtering feature, spam and other un- wanted e-mail can be stopped before it gets delivered and clut- ters up mailboxes. A single Astaro can scan millions of messages per day for multiple domains. Its anti-spam engine monitors e- mail messages in all languages, and has the ability to track and identify spam as it is launched and spreads.
www.astaro.com
HOSTED SERVICE
MessageLabs’ Hosted
Email AntiVirus Service protects businesses from known and un- known e-mail viruses. The scalable, multi-lay- ered,
other electronic threats. With version 5.0, users receive policy management with moderation, filtering, encryption, auditing and archiving. Additional features include quarantine report delega- tion and Microsoft Exchange-specific benefits, such as auto- whitelisting.
www.vircom.com
SOFTWARE AS A SERVICE
POLICY MANAGEMENT
Vircom’s modusGate
M86 Security’s M86 Secure Messaging Service is a cloud-based Software as a Service (SaaS) solution combining inbound/out- bound content filtering, granular policy control, anti-spam en- gine and behavioural malware analysis technology. Designed for the small and medium business, enterprise and ISP markets, the service stops illegitimate or inappropriate e-mails including images, spam and malicious code before it reaches a protected network. It also enables customers to apply more granular con- trol over their policies by customizing the e-mail security and content filtering settings.
www.m86security.com
VIRUS SCANNING
Symantec’s Norton AntiVirus 2010
defends PCs against viruses, spy- ware, bots and worms.
Intelli-
Internet-level e- mail virus protection service stops viruses and malware before
they reach the corporate network, helping organizations avoid costs associated with system downtime, lost productivity and brand damage. Its filter service is compatible with any SMTP- compliant mail servers and it provides a service level agreement to protect against known and zero-hour (i.e., unknown) e-mail viruses. It requires no hardware, no installation and no ongoing upgrades or maintenance.
www.messagelabs.com
34 SECURITY MATTERS • MAY/JUNE 2010
gence-driven technology identifies and targets only files at risk, for faster, less frequent scans, while vulnerability protection prevents threats
from exploiting security holes in a PC’s software. The soft- ware also provides information about the CPU and memory re- sources used by applications to help users keep their PC running at top speed.
It also uses multiple
layers of security that work together to proactively block attacks and detect and remove threats.
www.symantec.com
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42