SlideShare une entreprise Scribd logo
1  sur  44
Taking your open source email security
to the next level
Gabriel M. Mizrahi
VP Technologies
                                         March 18, 2010
About Me


       12 years of email security experience
       Over 15 years in the open source
        community
       Founded an Internet security company
        in 2001
       Married with 2 kids
       A big Barcelona FC fan!
   Hosting Provider Quiz
Today’s      Issues with open source security
Agenda       Taking open source email security
              to the next level
             Case Studies
The Hosting Provider Quiz



    1) We use open source because…

       a) we started with it and grew
       b) it’s low cost
       c) we’re comfortable with it
       d) all of the above
The Hosting Provider Quiz



    2) We would love to be able to…

       a) reduce the cost of handling email
       b) enhance detection rates & lower FPs
       c) improve customer satisfaction &
          increase our business
       d) all of the above
The Hosting Provider Quiz



    3) But… to adopt a new solution

       a) we won’t throw out our existing investment
       b) it would have to easily integrate with
          current infrastructure
       c) it must provide a differentiator
       d) all of the above
The Hosting Provider Quiz



    4) How much does it cost to handle spam
      with your current solution?

       a) I know exactly all my costs
       b) I have a rough estimate
       c) Not sure
Something We Can Agree On

       Email is a low margin service with high costs
        (Capex/Opex)
       You‟re using open source security because it
        offers flexibility
       Any changes you would make need to be
        justified
        •   Financially
        •   With regards to level of service
One Last Question



    4) Will open source alone be able to take
      you to where you need to go?




                    ?
Why Open Source Email Security is an Issue




            Security
           Spam, phishing         Costs
          and viruses trends




                      Infrastructure
Spam & Phishing Trends
                                                                Security


       Increasing Spam Levels
        •   2002 – 25%
        •   2010 – over 90%

       Spammers improving their techniques
        •   Blended threats
        •   Free Webmail accounts compromised and sending spam
            attacks
        •   Use of popular sites – CNN, Adobe, others to trick users
            to malware sites
        •   Other social engineering techniques
Virus Trends
                                                        Security




       Distributed faster/more frequently than
        AV Signatures are created
       Vulnerability in first hours
       Multiple variants in the same attack
       Life of a variant can be as little as several
        hours
Outbound Spam – The Latest Concern
                                                          Security




       Compromised accounts
       You are at risk of being BLACKLISTED because
        of outbound spam/viruses – “Shared
        reputation”
        •   RBLs that block entire “C” classes
        •   Virtual servers on a single physical server

       Deal with abuse complaints
Existing Infrastructure Issues
                                                                  Infrastructure

    A short list of open source email
    security tools:
        SpamAssassin
        Bayesian Filters (e.g. Bogofilter, DSPAM)
        Signature based anti-virus (e.g. ClamAV)
        Collaborative filters (e.g. Pyzor, Razor, DCC)
        Lexical filters (e.g. Block subjects with the word „viagra‟)
        Greylisting (e.g. Postgrey, Greymilter)
        SPF/Domain Keys
        SMTP „HELO‟ checks
        SMTP „MAIL FROM‟ checks
        SMTP early talker detection
        Local IP whitelists and blacklists
        Domain based RBLs (e.g. SURBL, URIBL, DBL)
        IP based RBLs (e.g. SBL, XBL, APEWS)
Common Administrative Issues
                                                         Infrastructure

       Time consuming
        •   To achieve better coverage – must
            use/maintain/tune many tools
       Admin staff
        •   Someone needs to manage and maintain long list of open
            source tools
       Staff expertise
        •   Need to analyze each missed spam
            and identify unique parameters
        •   Language dependant
        •   By nature opens possibility for FPs/FNs
Rising Email Security Costs                              Costs


        Spam Cycle             Additional Costs


           Spam               Customer dissatisfaction
         increases
                              Helpdesk resources for
                               increased complaints

                              More Servers to cope
More
         Never       More     with rising spam levels
FNs      ending      FPs
          cycle                   IT Resources to
                                     write rules

                              Helpdesk resources for
                               increased complaints
           More
           rules                  More Bandwidth
Hosting Analysis Exercise

              Number of
              mail subscribers
                                              100,000

              Average legitimate
              messages/day/subscriber
                                                      7

              Average messages/                    150
              day/subscriber              (95% are spam)


              Total messages/day           15,000,000

              Average message size               25Kb

              Total message traffic/day        358GB
Hosting Provider Cost & Savings Analysis
Peak Bandwidth
                       Bandwidth Comparison                                        Sustained




                       100                               Commercial IP Reputation solution
Bandwidth usage (Mb)




                                                           can reduce traffic up to 85%*
                                                                         More Predictable
                                                                         Reduced bandwidth costs
                              135.7                                      Fewer mails to analyze
                              Mbps

                        50

                                                            67.8
                                                            Mbps
                                                                                                           Pay for
                                                                         5.1                    3.1        only this
                                         20.5M                                       20.3
                                                                        Mbps                   Mbps      95% of peak
                                          bps                                        Mbps

                             No IP Filtering                 IP Based RBL         Commercial IP Reputation
                                                     Bandwidth Consumption
                                    * Data supplied by Commtouch partners
Hardware Comparison

                                36                    18
                       20     Servers               Servers
                                                                                          18,000,000 msgs/day

                                                                                            15,000,000 msgs/day
Messages (Millions)




                                                                     Only 4 servers            ( + 20% spare)
                       15
                                                                       required*


                       10


                                                                                             Server Capacity

                       5                                                                       500,000 msgs/day
                                                                                             1,100,000 msgs/day
                                                                                             5,000,000 msgs/day

                            SpamAssassin SpamAssassin                     Commercial         Servers
                                         + IP Based RBL                  Email Security
                                 * Data supplied by Commtouch partners
Take your open source
 email security to the
      next level
What if you could…

       Increase detection with your existing
        infrastructure
       Reduce inbound bandwidth
       Not only block outbound spam but catch the
        spammers
        •   Put an end to your IP ranges being blacklisted

        and…
       Reduce costs
Essentials for Solution

        A global view of email traffic
         •   Higher detection rate
         •   Lower FPs

        Scalable, transparent processing power
        Unattended operation
        Easy integration with your existing
         open source security solutions
Furthermore…

      Reduces Capex/Opex
       •   Enables scalable growth
       •   Decreases IT/Admin involvement
       •   Reduces support calls
       •   Creates excess processing power that can be repurposed

      Provides new opportunities and differentiators
       •   Configure the services you want/need
       •   Offer new premium services
       •   Increases your business
Hosting Providers
that took their open
   source to the
      next level
Metanet AG & mail2world
Hosting provider
   Founded in 2000
   Offers services for resellers
    and end customers
   One of top 10 hosting
    companies in Switzerland
   750 servers in network
   > 10,000 SMB customers
   100,000 email accounts
   60,000 domains
Previous Infrastructure
   SpamAssassin with various
    community-driven SA rules
Problem/Pain
   Low detection/high FPs
   Rising costs
   High support/maintenance
    costs
   Many helpdesk calls
   Additional system load due to
    server-side scanning
Solution


  Commtouch Anti-spam
with SpamAssassin Plug-in
Results
 30%                    25-30%




 Spam        False       Per Server   Support   Help Desk
Detection   Positives   Performance    Costs      Calls




                                                 10%
               0                      25%
What Metanet had to say



              "With a highly skilled team and its rock-solid
              performance, Commtouch          delivered
              superior detection and service from the
              implementation phase through production. After
              evaluating other commercial anti-spam technologies,
              we found that Commtouch‟s cloud-based
              architecture has unmatched spam
              filtering accuracy. It perfectly complements our
              long-established anti-spam strategy.“


              Mirco Schnarwiler
              AG, Co-founder &Technical Director
              METANET
Hosting Provider
   100,000+ provisioned domains
   Average of 330 million message
    transactions/day
    (10 billion messages/month)
Problem/Pain
   Spam load impacting ability to
    deliver timely mail
   Help desk spending too much
    time with FPs & customer virus
    issues
   Customers blacklisted by bots
    that compromised email accounts
    & sending spam
   Costs for managing email
    infrastructure unpredictable and
    difficult to manage
Solution
   Commtouch Anti-Spam
   Commtouch Mail Reputation
   Commtouch Zero-Hour Virus
    Protection
Result




     Incoming   Hardware    Per user   Email Help
        Mail     Usage     Bandwidth   Desk Calls




                                       significant


                            80%
     ~95%        85%
What mail2world had to say



                “As part of our multi layer protection strategy,
                our operations team relies on Commtouch to
                scale automatically to quickly
                absorb and eliminate new spam
                outbreaks. Commtouch‟s technology further
                enables us to reduce our bandwidth
                costs and ensure that our
                customers do not know when spam
                storms hit.”
                Kamil Asfour
                Director of Operations
                Mail2World
What Others Have to Say

              “We saw an immediate 10-15% drop in
              the infrastructure required to run our
              messaging system.”
              Hosting Product Manager
              Large Web Hosting Provider




              “…80% of the messages are eliminated
              with Commtouch’s GlobalView IP reputation.
              Therefore, 1 server is doing the previous
              work of 5 servers doing just content-based
              anti-spam scanning.”
              Director, Business Development
              MTA Appliance vendor
Easy Integration With Open Source




            Easy integration with popular open source
Easy Integration With Open Source cont…
                          Sendmail Milter
                          Seamless integration with:
                          • IP Reputation
                          • Anti-Spam
                          • Virus Outbreak Detection



                          Patch to integrate
                          • GlobalView IP Reputation
                          Qmail-Scanner Plug-in for
                          • Anti-Spam
                          • Virus Outbreak Detection
                          QpSMTPd Plug-in


                                 Plug-in for
                                 • Anti-Spam
                                 • Virus Outbreak Detection
Easy Integration With Open Source cont…
                          Generic Plug-in enables to
                          disable SpamAssassin and to
                          integrate:
                          • Anti-Spam
                          • Virus Outbreak Detection




                           Patch to integrate:
                           • Anti-Spam
                           • Virus Outbreak Detection




                                 RBL Interface for
                Other            • GlobalView IP Reputation
Not Only Open Source but “Pluggable”




             Connector for Exchange 2007/2010
             • GlobalView IP Reputation
             • Anti-Spam
             • Virus Outbreak Detection
Taking Your Open Source Email
           Security to the Next Level
   Lower your costs
       Reduce mail entering your network
       Reduce number of processors needed
       Lower Help Desk calls & IT/Admin time
   Integrate with your open source
       Protect your current investment
       Minimal technical requirements
   Improve detection rates
       Improve customer satisfaction
       Low FPs/FNs
   Eliminate Outbound spam
Thank You
Gabriel.Mizrahi@commtouch.com   www.commtouch.com
                                http://blog.commtouch.com/cafe

Contenu connexe

En vedette

Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 

En vedette (6)

Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Email
EmailEmail
Email
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 

Similaire à Taking your open source email security to the next level

Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on CloudSATYAVEER PAL
 
A Marketer's Guide to the 4 ISP's
A Marketer's Guide to the 4 ISP'sA Marketer's Guide to the 4 ISP's
A Marketer's Guide to the 4 ISP'sVivastream
 
Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webSymantec Italia
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterJohn Jefferies
 
How to secure your data in the cloud
How to secure your data in the cloudHow to secure your data in the cloud
How to secure your data in the cloudOptfinITy
 
Scaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, GoalsScaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, Goalskamaelian
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
respond_to :voice - the convergence of voice and web interfaces with Rails an...
respond_to :voice - the convergence of voice and web interfaces with Rails an...respond_to :voice - the convergence of voice and web interfaces with Rails an...
respond_to :voice - the convergence of voice and web interfaces with Rails an...jpalley
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentationSoftechms
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Private Cloud
 
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdfQConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdfSimranjyotSuri
 
Mastering Chaos - A Netflix Guide to Microservices
Mastering Chaos - A Netflix Guide to MicroservicesMastering Chaos - A Netflix Guide to Microservices
Mastering Chaos - A Netflix Guide to MicroservicesJosh Evans
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
03.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 201003.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 2010mcini
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...HostedbyConfluent
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Finalniallmmackey
 
Building a Great Web API - Evan Cooke - QCON 2011
Building a Great Web API - Evan Cooke - QCON 2011Building a Great Web API - Evan Cooke - QCON 2011
Building a Great Web API - Evan Cooke - QCON 2011Twilio Inc
 
OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009Gerardo Pardo-Castellote
 

Similaire à Taking your open source email security to the next level (20)

Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on Cloud
 
A Marketer's Guide to the 4 ISP's
A Marketer's Guide to the 4 ISP'sA Marketer's Guide to the 4 ISP's
A Marketer's Guide to the 4 ISP's
 
Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del web
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam Filter
 
How to secure your data in the cloud
How to secure your data in the cloudHow to secure your data in the cloud
How to secure your data in the cloud
 
Scaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, GoalsScaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, Goals
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
respond_to :voice - the convergence of voice and web interfaces with Rails an...
respond_to :voice - the convergence of voice and web interfaces with Rails an...respond_to :voice - the convergence of voice and web interfaces with Rails an...
respond_to :voice - the convergence of voice and web interfaces with Rails an...
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentation
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
 
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdfQConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
 
Mastering Chaos - A Netflix Guide to Microservices
Mastering Chaos - A Netflix Guide to MicroservicesMastering Chaos - A Netflix Guide to Microservices
Mastering Chaos - A Netflix Guide to Microservices
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
03.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 201003.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 2010
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Final
 
Building a Great Web API - Evan Cooke - QCON 2011
Building a Great Web API - Evan Cooke - QCON 2011Building a Great Web API - Evan Cooke - QCON 2011
Building a Great Web API - Evan Cooke - QCON 2011
 
OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009
 

Plus de Cyren, Inc

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 

Plus de Cyren, Inc (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Taking your open source email security to the next level

  • 1. Taking your open source email security to the next level Gabriel M. Mizrahi VP Technologies March 18, 2010
  • 2. About Me  12 years of email security experience  Over 15 years in the open source community  Founded an Internet security company in 2001  Married with 2 kids  A big Barcelona FC fan!
  • 3. Hosting Provider Quiz Today’s  Issues with open source security Agenda  Taking open source email security to the next level  Case Studies
  • 4. The Hosting Provider Quiz 1) We use open source because… a) we started with it and grew b) it’s low cost c) we’re comfortable with it d) all of the above
  • 5. The Hosting Provider Quiz 2) We would love to be able to… a) reduce the cost of handling email b) enhance detection rates & lower FPs c) improve customer satisfaction & increase our business d) all of the above
  • 6. The Hosting Provider Quiz 3) But… to adopt a new solution a) we won’t throw out our existing investment b) it would have to easily integrate with current infrastructure c) it must provide a differentiator d) all of the above
  • 7. The Hosting Provider Quiz 4) How much does it cost to handle spam with your current solution? a) I know exactly all my costs b) I have a rough estimate c) Not sure
  • 8. Something We Can Agree On  Email is a low margin service with high costs (Capex/Opex)  You‟re using open source security because it offers flexibility  Any changes you would make need to be justified • Financially • With regards to level of service
  • 9. One Last Question 4) Will open source alone be able to take you to where you need to go? ?
  • 10. Why Open Source Email Security is an Issue Security Spam, phishing Costs and viruses trends Infrastructure
  • 11. Spam & Phishing Trends Security  Increasing Spam Levels • 2002 – 25% • 2010 – over 90%  Spammers improving their techniques • Blended threats • Free Webmail accounts compromised and sending spam attacks • Use of popular sites – CNN, Adobe, others to trick users to malware sites • Other social engineering techniques
  • 12. Virus Trends Security  Distributed faster/more frequently than AV Signatures are created  Vulnerability in first hours  Multiple variants in the same attack  Life of a variant can be as little as several hours
  • 13. Outbound Spam – The Latest Concern Security  Compromised accounts  You are at risk of being BLACKLISTED because of outbound spam/viruses – “Shared reputation” • RBLs that block entire “C” classes • Virtual servers on a single physical server  Deal with abuse complaints
  • 14. Existing Infrastructure Issues Infrastructure A short list of open source email security tools:  SpamAssassin  Bayesian Filters (e.g. Bogofilter, DSPAM)  Signature based anti-virus (e.g. ClamAV)  Collaborative filters (e.g. Pyzor, Razor, DCC)  Lexical filters (e.g. Block subjects with the word „viagra‟)  Greylisting (e.g. Postgrey, Greymilter)  SPF/Domain Keys  SMTP „HELO‟ checks  SMTP „MAIL FROM‟ checks  SMTP early talker detection  Local IP whitelists and blacklists  Domain based RBLs (e.g. SURBL, URIBL, DBL)  IP based RBLs (e.g. SBL, XBL, APEWS)
  • 15. Common Administrative Issues Infrastructure  Time consuming • To achieve better coverage – must use/maintain/tune many tools  Admin staff • Someone needs to manage and maintain long list of open source tools  Staff expertise • Need to analyze each missed spam and identify unique parameters • Language dependant • By nature opens possibility for FPs/FNs
  • 16. Rising Email Security Costs Costs Spam Cycle Additional Costs Spam Customer dissatisfaction increases Helpdesk resources for increased complaints More Servers to cope More Never More with rising spam levels FNs ending FPs cycle IT Resources to write rules Helpdesk resources for increased complaints More rules More Bandwidth
  • 17. Hosting Analysis Exercise Number of mail subscribers 100,000 Average legitimate messages/day/subscriber 7 Average messages/ 150 day/subscriber (95% are spam) Total messages/day 15,000,000 Average message size 25Kb Total message traffic/day 358GB
  • 18. Hosting Provider Cost & Savings Analysis
  • 19. Peak Bandwidth Bandwidth Comparison Sustained 100 Commercial IP Reputation solution Bandwidth usage (Mb) can reduce traffic up to 85%*  More Predictable  Reduced bandwidth costs 135.7  Fewer mails to analyze Mbps 50 67.8 Mbps Pay for 5.1 3.1 only this 20.5M 20.3 Mbps Mbps 95% of peak bps Mbps No IP Filtering IP Based RBL Commercial IP Reputation Bandwidth Consumption * Data supplied by Commtouch partners
  • 20. Hardware Comparison 36 18 20 Servers Servers 18,000,000 msgs/day 15,000,000 msgs/day Messages (Millions) Only 4 servers ( + 20% spare) 15 required* 10 Server Capacity 5 500,000 msgs/day 1,100,000 msgs/day 5,000,000 msgs/day SpamAssassin SpamAssassin Commercial Servers + IP Based RBL Email Security * Data supplied by Commtouch partners
  • 21. Take your open source email security to the next level
  • 22. What if you could…  Increase detection with your existing infrastructure  Reduce inbound bandwidth  Not only block outbound spam but catch the spammers • Put an end to your IP ranges being blacklisted and…  Reduce costs
  • 23. Essentials for Solution  A global view of email traffic • Higher detection rate • Lower FPs  Scalable, transparent processing power  Unattended operation  Easy integration with your existing open source security solutions
  • 24. Furthermore…  Reduces Capex/Opex • Enables scalable growth • Decreases IT/Admin involvement • Reduces support calls • Creates excess processing power that can be repurposed  Provides new opportunities and differentiators • Configure the services you want/need • Offer new premium services • Increases your business
  • 25. Hosting Providers that took their open source to the next level
  • 26. Metanet AG & mail2world
  • 27. Hosting provider  Founded in 2000  Offers services for resellers and end customers  One of top 10 hosting companies in Switzerland  750 servers in network  > 10,000 SMB customers  100,000 email accounts  60,000 domains
  • 28. Previous Infrastructure  SpamAssassin with various community-driven SA rules
  • 29. Problem/Pain  Low detection/high FPs  Rising costs  High support/maintenance costs  Many helpdesk calls  Additional system load due to server-side scanning
  • 30. Solution Commtouch Anti-spam with SpamAssassin Plug-in
  • 31. Results 30% 25-30% Spam False Per Server Support Help Desk Detection Positives Performance Costs Calls 10% 0 25%
  • 32. What Metanet had to say "With a highly skilled team and its rock-solid performance, Commtouch delivered superior detection and service from the implementation phase through production. After evaluating other commercial anti-spam technologies, we found that Commtouch‟s cloud-based architecture has unmatched spam filtering accuracy. It perfectly complements our long-established anti-spam strategy.“ Mirco Schnarwiler AG, Co-founder &Technical Director METANET
  • 33. Hosting Provider  100,000+ provisioned domains  Average of 330 million message transactions/day (10 billion messages/month)
  • 34. Problem/Pain  Spam load impacting ability to deliver timely mail  Help desk spending too much time with FPs & customer virus issues  Customers blacklisted by bots that compromised email accounts & sending spam  Costs for managing email infrastructure unpredictable and difficult to manage
  • 35. Solution  Commtouch Anti-Spam  Commtouch Mail Reputation  Commtouch Zero-Hour Virus Protection
  • 36. Result Incoming Hardware Per user Email Help Mail Usage Bandwidth Desk Calls significant 80% ~95% 85%
  • 37. What mail2world had to say “As part of our multi layer protection strategy, our operations team relies on Commtouch to scale automatically to quickly absorb and eliminate new spam outbreaks. Commtouch‟s technology further enables us to reduce our bandwidth costs and ensure that our customers do not know when spam storms hit.” Kamil Asfour Director of Operations Mail2World
  • 38. What Others Have to Say “We saw an immediate 10-15% drop in the infrastructure required to run our messaging system.” Hosting Product Manager Large Web Hosting Provider “…80% of the messages are eliminated with Commtouch’s GlobalView IP reputation. Therefore, 1 server is doing the previous work of 5 servers doing just content-based anti-spam scanning.” Director, Business Development MTA Appliance vendor
  • 39. Easy Integration With Open Source Easy integration with popular open source
  • 40. Easy Integration With Open Source cont… Sendmail Milter Seamless integration with: • IP Reputation • Anti-Spam • Virus Outbreak Detection Patch to integrate • GlobalView IP Reputation Qmail-Scanner Plug-in for • Anti-Spam • Virus Outbreak Detection QpSMTPd Plug-in Plug-in for • Anti-Spam • Virus Outbreak Detection
  • 41. Easy Integration With Open Source cont… Generic Plug-in enables to disable SpamAssassin and to integrate: • Anti-Spam • Virus Outbreak Detection Patch to integrate: • Anti-Spam • Virus Outbreak Detection RBL Interface for Other • GlobalView IP Reputation
  • 42. Not Only Open Source but “Pluggable” Connector for Exchange 2007/2010 • GlobalView IP Reputation • Anti-Spam • Virus Outbreak Detection
  • 43. Taking Your Open Source Email Security to the Next Level  Lower your costs  Reduce mail entering your network  Reduce number of processors needed  Lower Help Desk calls & IT/Admin time  Integrate with your open source  Protect your current investment  Minimal technical requirements  Improve detection rates  Improve customer satisfaction  Low FPs/FNs  Eliminate Outbound spam
  • 44. Thank You Gabriel.Mizrahi@commtouch.com www.commtouch.com http://blog.commtouch.com/cafe

Notes de l'éditeur

  1. Data source: Testimonials from Commtouch partners: MTA vendors, Gateway vendors, hosting providers.