Upload
rosamond-dorsey
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
InterScan Gateway Security Appliance 1.0
Filip Demianiuk
Sales Engineer Eastern Europe
08.11.06
Copyright 2005 - Trend Micro Inc.
What is a Mid-Market customer?
• Limited security expertise– A few generalists -often < 5
• Networks can be complex• Don’t have time to become experts• But still like to feel in control• Need to be seen to have taken
appropriate security measures• More price sensitive than Enterprise• IT owns budget and makes purchase decision
?
Copyright 2005 - Trend Micro Inc.
What products do they want?
THEY DON’T!
They want SOLUTIONS which:
• Solve recognizable business problems• Employ best of breed technology• Are simple to buy, deploy and manage• Are flexible and scaleable• Help IT staff to feel in control
Copyright 2005 - Trend Micro Inc.
Relative positioning of gateway solutions
# IT staff&
Level ofExpertise
Degree of flexibility & control desired
Managed / hostedManaged / hostedservicesservices
AppliancesAppliances
SoftwareSoftwareCost of deployment& administration
Cost of purchase
TCO is similar for each
Copyright 2005 - Trend Micro Inc.
Internet cloud
SCM – Secure Content Management
SCM ApplianceFirewall
ProtectedLAN
Most medium businessesalready have a firewall
SCM builds uponThis investment
Copyright 2005 - Trend Micro Inc.
What appliances do customers need at the gateway?
Users
2000
1000
500
100
Importance of best of breed , flexibility & performance
Worry freeWorry freeEasy, All-in-one – UTM?Easy, All-in-one – UTM?
Flexibility, EasyFlexibility, EasyPrice performancePrice performance
All-in-one -SCMAll-in-one -SCM
ScalabilityScalabilityPerformancePerformance
Separate Mail & WebSeparate Mail & Web
Copyright 2005 - Trend Micro Inc.
What appliances do customers need at the gateway?
Users
2000
1000
600
300200100
Price sensitivePrice sensitiveAll-in-one -SCMAll-in-one -SCM
Flexibility, EasyFlexibility, EasyPrice performancePrice performance
All-in-one -SCMAll-in-one -SCM
ScalabilityScalabilityPerformancePerformance
Separate Mail & WebSeparate Mail & Web
IGSA
IWSAIMSA
Below 100 users customers may prefer UTMSince best of breed becomes less important
Seamless SCM portfolio
ASA 5500
Customer Pain
Copyright 2005 - Trend Micro Inc.
Customer Pain : Internet Threats
Malware – Viruses still #1 IT Security concern1
– Targeted Attacks: Bots - Variants increasing rapidly
– 15,820 unique phishing reports reported in October 2005
– Web mail bypasses SMTP gateway scanning
Spyware– 67% of all computers have some form of spyware
– Increased burden on IT resources
– Reduced system performance and stability
– Reduced employee productivity
– Compromised customer data
Copyright 2005 - Trend Micro Inc.
Customer Pain : Internet Threats
Spam– Spam now 70% of e-mail traffic growing to 78% by 2009*– Bandwidth, storage problems– Legal Liability concerns– Employee productivity concerns
Mail Content– Government and industry regulations (SOX, HIPAA, …etc)– Loss or leakage of confidential or customer information– Loss or leakage of intellectual property– Legal liability due to inappropriate or offensive material
Web Content– Employee Productivity– Ensure Business Efficiency– Legal liability due to inappropriate or offensive material
Mail Content
Web Content
InterScan Gateway Security Appliance 1.0
The Gateway Solution for MB
Copyright 2005 - Trend Micro Inc.
IGSA Key Features
Entry-point protection for SMTP, POP3, HTTP & FTP
• Transparent scanning• Antivirus
– True type file recognition– IntelliTrap
• Anti-spyware• Anti-phishing• Content filtering• Outbreak Prevention
• Active Update• Quarantine• Logging• Notifications• Secure web-based console
Copyright 2005 - Trend Micro Inc.
Internet cloud
Malware– the IGSA Solution
X
XXX Block Malware at
the internet gateway
Keep desktops &Servers free of malware
InterScan Gateway Security Appliance
Copyright 2005 - Trend Micro Inc.
Malware & Spyware – the IGSA solution
1. Block Spyware at Internet Gateway
SECRET
2. Block Phone Home Attempts
X
3. Clean-UpSpyware
InterScan Gateway Security Appliance
X XX Internet cloud
Copyright 2005 - Trend Micro Inc.
Internet cloud
Spam – the IGSA solution
Reduced Storage Challenges
Heuristic Filtershighly effective with
reduced load
Fewer Productivity Challenges
End-User Quarantine
Connection Dropped Before Mail is sent
X
or X
DIRECTORYHARVESTATTACKS X mail server
desktops
Prevents:
NetworkReputationServices
InterScan Gateway Security Appliance
Copyright 2005 - Trend Micro Inc.
desktops
Mail Content – the Solution
Confidential
Damaging
Profanity
Hate
Inappropriate
XXX X
Filter Mail leaving or enteringyour organisation atthe internet gateway
InterScan Gateway Security Appliance
Add Disclaimers – Legal Liability
Copyright 2005 - Trend Micro Inc.
Web Content – the IGSA solution
Hate
Shopping
X
XXXX
Block at Internet Gateway
auctionAllow personal access at appropriate times
InterScan Gateway Security Appliance
Copyright 2005 - Trend Micro Inc.
Basic Deployment Scenario
Deployment notes:• All traffic should physically passthrough the IGSA device
• Can deploy multiple IGSAs for multiple entry points
• Supports failopen/LAN bypass
• Can deploy redundant IGSAs with use of L4 switch
Internet Access / EdgeRouter
Firewall IGSA LAN Switch,Router, or Hub
Users
Copyright 2005 - Trend Micro Inc.
Operation Modes—Transparent Proxy Mode
• Outgoing TrafficAccess / Edge
Router / Firewall
• Incoming Traffic
InternetIGSAUser Request
IP Address:10.0.0.199
IP Address:10.0.0.5
IP Address Seen on the Outside:10.0.0.5
InternetAccess / EdgeRouter / FirewallIGSASMTP Server
IP Address Seen on Inside:10.0.0.5
IP Address:10.0.0.5
Source IP Address:198.60.22.2
Copyright 2005 - Trend Micro Inc.
Operation Modes—Transparent and Fully Transparent Compared
• Transparent Proxy Mode (outgoing traffic)InternetAccess / Edge
Router / FirewallIGSAUser Request
IP Address:10.0.0.199
IP Address:10.0.0.5
IP Address Seen on the Outside:10.0.0.5
• Fully Transparent Mode (outgoing traffic)InternetAccess / Edge
Router / FirewallIGSAUser Request
IP Address:10.0.0.199
IP Address:10.0.0.5
IP Address Seen on the Outside:10.0.0.199
Copyright 2005 - Trend Micro Inc.
IGSA Integration—
One Firewall without a DMZ
Internet
FirewallPOP3 Clients
FTP Clients
Web (HTTP)Clients
CorporateLAN
SMTP EmailServer
IGSA
Switch/Hub
Copyright 2005 - Trend Micro Inc.
IGSA Integration—
Two Firewalls with a DMZ
Internet
ExternalFirewall
InternalFirewall
DMZ
POP3 Clients
FTP Clients
Web (HTTP)Clients
SMTP EmailServer
CorporateLANSMTP Relay
(optional)
Features and Benefits
Copyright 2005 - Trend Micro Inc.
Why Gateway?
• All-in-one, Internet Gateway Secure Content Management– Protects at the most effective point in your infrastructure– Scan all potentially infected traffic at the gateway to your
infrastructure– Protect un-patched/out-of date PCs /Servers– Filter mail from viruses and spam before it gets to your
mail servers– Ensure employee productivity– Limit legal liability/leakage of confidential documents
Copyright 2005 - Trend Micro Inc.
Top 5 IGSA Customer Silver Bullets
1. First in Internet gateway antivirus, six years running
2. Only gateway appliance with automated desktop cleanup of spyware and malware• Saves time and removes the need for sneakernet solution
3. All-in-one solution, no hidden add-ons or extra costs
4. Automated threat protection closes the window of vulnerability quickly • Improving your security and reducing your stress 24 by 7
5. Simplified purchase, one decision, one price, one device
Copyright 2005 - Trend Micro Inc.
IGSA Global pricing model
Pricing and licensing: – IGSA Hardware replacement– IGSA 100 users *– IGSA 200 users *– IGSA 300 users *– IGSA 600 users * – IGSA 800 users *– IGSA 1000 users *
* Includes hardware and software license with all functionality enabledso NRS, URL etc. become differentiators rather than optional add-ons. Hardware Warranty is included in 1st year price.
Q&A and Thank You!