SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
03/28/12
Stephen Cohen
Senior System Engineer
stephenc@gwava.com
Introduction

    • Anti Spam
    • Anti Virus
    • Content Control
    • Image Analyzer
    • Attachment Filters - Extension
    • Attachment Fingerprinting - Content
    • Connection Dropping
    • RBL, SURBL, SPF
    • Conversation Tracking
    • Web Quarantine & Email Digest
2   © GWAVA Inc, Confidential & Proprietary
Scanners
Anti Spam

    • Signature Spam Engine
           • Auto Updates
           • No Manual Training
    • Little to None False Positives
    • Works much like an AV Scanner
    • Reduces Need for Exception Lists
    • Provides 0-Day AV Scanning




4   © GWAVA Inc, Confidential & Proprietary
Anti Virus


    • Kaspersky AV integrated
    • 0-Day AV scan part of AS Scanner




5   © GWAVA Inc, Confidential & Proprietary
SMTP Scanner

    • Works with any Messaging Platform
           • GroupWise, Exchange, Domino etc
    • Works as a Proxy
    • Block Unwanted at the Perimeter
    • Allows for Connection Level Services




6   © GWAVA Inc, Confidential & Proprietary
Image Analyzer

    • Limits distribution of Porn via Email
    • Technology scans “Real Time”
    • Utilizes Multiple Heuristic detection methods
    • Identifies users abusing email
    • Monitors images containing high risk
      attachments
    • Educates users on company usage policies
    • Enforces policies when required
    • Post Office scanning
    • Vibe scanning

7   © GWAVA Inc, Confidential & Proprietary
Connection Dropping



    • Block Messages Before the Message is
      Received
           • Dramatically Reduce Server Load
           • Server can handle More `Good` Email
           • Utilizes RBL, IP reputation & SPF




8   © GWAVA Inc, Confidential & Proprietary
SPF


    • Sender Policy Framework
    • Validate the Sender Address via DNS SPF
      record
           • SPF Record has a List of Server IP
             Addresses That can Send Email for Your
             Domain
           • Stops Spoofed messages
    • Prevents Spammers From Sending you Email
      With the Same Sender and Recipient
           • Set up Your own SPF Record

9   © GWAVA Inc, Confidential & Proprietary
IP Reputation



     • Determine the Validity of a Sender based on
       IP Address
     • Intelligent Greylisting
            • Known Spammers are Denied
            • Possible Spammers Have to try Again
            • Good Email is Allowed
     • Unknown Spammers Cannot get Through
            • 0-Day Spam protection


10   © GWAVA Inc, Confidential & Proprietary
Policy Enforcement


     • Recommended Scans
            • AV
            • Attachment-Fingerprinting
            • Content Filters
     • Available Actions
            • Block (Delete)
            • Quarantine
            • Notifications
            • BCC

11   © GWAVA Inc, Confidential & Proprietary
WASP Scanner


     • WebAccess Server Protection
     • Stand Alone or Integrated
     • Integrates w/ WebAccess Application
     • Scans Messages Before Being Sent




12   © GWAVA Inc, Confidential & Proprietary
POA Scanner


     • Uses IMAP & Trusted Application
     • Scans Email in Encrypted Message Store
            • Able to Rip Email out of GroupWise
     • Typical Uses:
            • Remove Hidden Viruses
            • Detect Unwanted Content
            • Notify HR or Administrator
            • BCC a Copy of Message
            • Delete Messages

13   © GWAVA Inc, Confidential & Proprietary
Policy Manager


     • Multiple configurations/Policies
     • Multiple Domain support
     • User level policies




14   © GWAVA Inc, Confidential & Proprietary
GWAVA 6

     • Windows – Runs as a Service
     • Statistics
     • Reports & Alerts
     • Message Tracking
     • Policy Manager
     • SSL/TLS
     • LDAP
     • Image Analyzer
     • Multi-Tenet
     • Teaming 3
15   © GWAVA Inc, Confidential & Proprietary
GWAVA Futures

     • Social Platform scanning
     • Enhanced Reporting & Alerting
     • Adapting scanners to integrate with other
       collaborative Technology Platforms




16   © GWAVA Inc, Confidential & Proprietary
Thank You!
Unpublished Work of GWAVA, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of GWAVA, Inc. Access
to this work is restricted to GWAVA employees who have a need to know to perform tasks within the scope of their assignments.
No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed,
expanded, collected, or adapted without the prior written consent of GWAVA, Inc. Any use or exploitation of this work without
authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a product.
GWAVA, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, GWAVA, Inc., reserves the
right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity
of such revisions or changes. All GWAVA marks referenced in this presentation are trademarks or registered trademarks of
GWAVA, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.

Contenu connexe

Tendances

An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Netpluz Asia Pte Ltd
 
Overview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for youOverview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for youCloudflare
 
Konsultan SEO Malang - Jasa SEO Malang - 081333555017
Konsultan SEO Malang - Jasa SEO Malang - 081333555017Konsultan SEO Malang - Jasa SEO Malang - 081333555017
Konsultan SEO Malang - Jasa SEO Malang - 081333555017'Agus DistroBlogger
 
ThousandEyes Alerting Essentials for Your Network
ThousandEyes Alerting Essentials for Your NetworkThousandEyes Alerting Essentials for Your Network
ThousandEyes Alerting Essentials for Your NetworkThousandEyes
 
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnD3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnImperva Incapsula
 
How to Flip a Switch for 55% Web Performance Gains
How to Flip a Switch for 55% Web Performance GainsHow to Flip a Switch for 55% Web Performance Gains
How to Flip a Switch for 55% Web Performance GainsCloudflare
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyCloudflare
 
Web Socket ASM support lior rotkovitch
Web Socket ASM support   lior rotkovitchWeb Socket ASM support   lior rotkovitch
Web Socket ASM support lior rotkovitchLior Rotkovitch
 
Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...
Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...
Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...Cloudflare
 
What's New at Cloudflare
What's New at CloudflareWhat's New at Cloudflare
What's New at CloudflareCloudflare
 
Nginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkNginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkJuraj Hantak
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudImperva Incapsula
 
Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Cloudflare
 
SSL for SaaS Providers
SSL for SaaS ProvidersSSL for SaaS Providers
SSL for SaaS ProvidersCloudflare
 
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t EnoughSecure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t EnoughKhash Nakhostin
 

Tendances (20)

An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva
 
Overview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for youOverview of SSL: choose the option that's right for you
Overview of SSL: choose the option that's right for you
 
Konsultan SEO Malang - Jasa SEO Malang - 081333555017
Konsultan SEO Malang - Jasa SEO Malang - 081333555017Konsultan SEO Malang - Jasa SEO Malang - 081333555017
Konsultan SEO Malang - Jasa SEO Malang - 081333555017
 
ThousandEyes Alerting Essentials for Your Network
ThousandEyes Alerting Essentials for Your NetworkThousandEyes Alerting Essentials for Your Network
ThousandEyes Alerting Essentials for Your Network
 
Application Resiliency
Application ResiliencyApplication Resiliency
Application Resiliency
 
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnD3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
 
How to Flip a Switch for 55% Web Performance Gains
How to Flip a Switch for 55% Web Performance GainsHow to Flip a Switch for 55% Web Performance Gains
How to Flip a Switch for 55% Web Performance Gains
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense Strategy
 
Web Socket ASM support lior rotkovitch
Web Socket ASM support   lior rotkovitchWeb Socket ASM support   lior rotkovitch
Web Socket ASM support lior rotkovitch
 
Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...
Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...
Cloudflare Load Balancing for Monitoring Origin Server Health and Automatic F...
 
What's New at Cloudflare
What's New at CloudflareWhat's New at Cloudflare
What's New at Cloudflare
 
Nginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lkNginx app protect-for-meetup-v1.0-202006_lk
Nginx app protect-for-meetup-v1.0-202006_lk
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the Cloud
 
Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
SSL for SaaS Providers
SSL for SaaS ProvidersSSL for SaaS Providers
SSL for SaaS Providers
 
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t EnoughSecure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough
 
Cloudflare
CloudflareCloudflare
Cloudflare
 

En vedette

GWAVACon 2015: MVP - Benutzerverzeichnisstandardisierung, so wird's gemacht!
GWAVACon 2015: MVP - Benutzerverzeichnisstandardisierung, so wird's gemacht!GWAVACon 2015: MVP - Benutzerverzeichnisstandardisierung, so wird's gemacht!
GWAVACon 2015: MVP - Benutzerverzeichnisstandardisierung, so wird's gemacht!GWAVA
 
GWAVACon 2015: GWAVA - Up in the Air
GWAVACon 2015: GWAVA - Up in the Air GWAVACon 2015: GWAVA - Up in the Air
GWAVACon 2015: GWAVA - Up in the Air GWAVA
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7GWAVA
 
GroupWise & Friends: GWAVA Lösungen fürMicro Focus imÜberblick
GroupWise & Friends: GWAVA Lösungen fürMicro Focus imÜberblickGroupWise & Friends: GWAVA Lösungen fürMicro Focus imÜberblick
GroupWise & Friends: GWAVA Lösungen fürMicro Focus imÜberblickGWAVA
 
The latest in Retain & GWAVA
The latest in Retain & GWAVAThe latest in Retain & GWAVA
The latest in Retain & GWAVAGWAVA
 

En vedette (6)

GWAVACon 2015: MVP - Benutzerverzeichnisstandardisierung, so wird's gemacht!
GWAVACon 2015: MVP - Benutzerverzeichnisstandardisierung, so wird's gemacht!GWAVACon 2015: MVP - Benutzerverzeichnisstandardisierung, so wird's gemacht!
GWAVACon 2015: MVP - Benutzerverzeichnisstandardisierung, so wird's gemacht!
 
GWAVACon 2015: GWAVA - Up in the Air
GWAVACon 2015: GWAVA - Up in the Air GWAVACon 2015: GWAVA - Up in the Air
GWAVACon 2015: GWAVA - Up in the Air
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7
 
GroupWise & Friends: GWAVA Lösungen fürMicro Focus imÜberblick
GroupWise & Friends: GWAVA Lösungen fürMicro Focus imÜberblickGroupWise & Friends: GWAVA Lösungen fürMicro Focus imÜberblick
GroupWise & Friends: GWAVA Lösungen fürMicro Focus imÜberblick
 
The latest in Retain & GWAVA
The latest in Retain & GWAVAThe latest in Retain & GWAVA
The latest in Retain & GWAVA
 

Similaire à Gwava gwava6

Gwava redline3.5
Gwava   redline3.5Gwava   redline3.5
Gwava redline3.5GWAVA
 
Gwava best practices
Gwava   best practicesGwava   best practices
Gwava best practicesGWAVA
 
Gwava con retain introduction
Gwava con retain introductionGwava con retain introduction
Gwava con retain introductionGWAVA
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017Philippe Gamache
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 Philippe Gamache
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 
Top 5 Data Security Strategies in QA
Top 5 Data Security Strategies in QATop 5 Data Security Strategies in QA
Top 5 Data Security Strategies in QAQASource
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
Mobile security, OWASP Mobile Top 10, OWASP SeraphimdroidMobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
Mobile security, OWASP Mobile Top 10, OWASP SeraphimdroidNikola Milosevic
 
GWAVACon2012 keynote jared allen final
GWAVACon2012 keynote jared allen finalGWAVACon2012 keynote jared allen final
GWAVACon2012 keynote jared allen finalGWAVA
 
MySQL Tech Tour 2015 - 5.7 Security
MySQL Tech Tour 2015 - 5.7 SecurityMySQL Tech Tour 2015 - 5.7 Security
MySQL Tech Tour 2015 - 5.7 SecurityMark Swarbrick
 
Top Azure security fails and how to avoid them
Top Azure security fails and how to avoid themTop Azure security fails and how to avoid them
Top Azure security fails and how to avoid themKarl Ots
 
SecurityGateway for Email Servers - Feature Overview
SecurityGateway for Email Servers - Feature OverviewSecurityGateway for Email Servers - Feature Overview
SecurityGateway for Email Servers - Feature OverviewAlt-N Technologies
 
GWAVA roadmap future final - publish
GWAVA roadmap future   final - publishGWAVA roadmap future   final - publish
GWAVA roadmap future final - publishGWAVA
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 

Similaire à Gwava gwava6 (20)

Gwava redline3.5
Gwava   redline3.5Gwava   redline3.5
Gwava redline3.5
 
Gwava best practices
Gwava   best practicesGwava   best practices
Gwava best practices
 
Gwava con retain introduction
Gwava con retain introductionGwava con retain introduction
Gwava con retain introduction
 
WebApp_to_Container_Security.pdf
WebApp_to_Container_Security.pdfWebApp_to_Container_Security.pdf
WebApp_to_Container_Security.pdf
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
Top 5 Data Security Strategies in QA
Top 5 Data Security Strategies in QATop 5 Data Security Strategies in QA
Top 5 Data Security Strategies in QA
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Security testautomation
Security testautomationSecurity testautomation
Security testautomation
 
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
Mobile security, OWASP Mobile Top 10, OWASP SeraphimdroidMobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
Mobile security, OWASP Mobile Top 10, OWASP Seraphimdroid
 
Cloud Adoption - A Practical Approach
Cloud Adoption - A Practical ApproachCloud Adoption - A Practical Approach
Cloud Adoption - A Practical Approach
 
GWAVACon2012 keynote jared allen final
GWAVACon2012 keynote jared allen finalGWAVACon2012 keynote jared allen final
GWAVACon2012 keynote jared allen final
 
MySQL Tech Tour 2015 - 5.7 Security
MySQL Tech Tour 2015 - 5.7 SecurityMySQL Tech Tour 2015 - 5.7 Security
MySQL Tech Tour 2015 - 5.7 Security
 
Top Azure security fails and how to avoid them
Top Azure security fails and how to avoid themTop Azure security fails and how to avoid them
Top Azure security fails and how to avoid them
 
SecurityGateway for Email Servers - Feature Overview
SecurityGateway for Email Servers - Feature OverviewSecurityGateway for Email Servers - Feature Overview
SecurityGateway for Email Servers - Feature Overview
 
GWAVA roadmap future final - publish
GWAVA roadmap future   final - publishGWAVA roadmap future   final - publish
GWAVA roadmap future final - publish
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 

Plus de GWAVA

Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen GWAVA
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschGWAVA
 
Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunGWAVA
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishGWAVA
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrintGWAVA
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GWAVA
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...GWAVA
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationGWAVA
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldGWAVA
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - OverviewGWAVA
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom DevelopmentGWAVA
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWiseGWAVA
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud OfferingGWAVA
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesGWAVA
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationGWAVA
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)GWAVA
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersGWAVA
 
Mobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainMobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainGWAVA
 

Plus de GWAVA (20)

Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor Deutsch
 
Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit Run
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor English
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows world
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - Overview
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom Development
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWise
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud Offering
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and Features
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud Migration
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYING
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
 
Mobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainMobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with Retain
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Gwava gwava6

  • 1. 03/28/12 Stephen Cohen Senior System Engineer stephenc@gwava.com
  • 2. Introduction • Anti Spam • Anti Virus • Content Control • Image Analyzer • Attachment Filters - Extension • Attachment Fingerprinting - Content • Connection Dropping • RBL, SURBL, SPF • Conversation Tracking • Web Quarantine & Email Digest 2 © GWAVA Inc, Confidential & Proprietary
  • 4. Anti Spam • Signature Spam Engine • Auto Updates • No Manual Training • Little to None False Positives • Works much like an AV Scanner • Reduces Need for Exception Lists • Provides 0-Day AV Scanning 4 © GWAVA Inc, Confidential & Proprietary
  • 5. Anti Virus • Kaspersky AV integrated • 0-Day AV scan part of AS Scanner 5 © GWAVA Inc, Confidential & Proprietary
  • 6. SMTP Scanner • Works with any Messaging Platform • GroupWise, Exchange, Domino etc • Works as a Proxy • Block Unwanted at the Perimeter • Allows for Connection Level Services 6 © GWAVA Inc, Confidential & Proprietary
  • 7. Image Analyzer • Limits distribution of Porn via Email • Technology scans “Real Time” • Utilizes Multiple Heuristic detection methods • Identifies users abusing email • Monitors images containing high risk attachments • Educates users on company usage policies • Enforces policies when required • Post Office scanning • Vibe scanning 7 © GWAVA Inc, Confidential & Proprietary
  • 8. Connection Dropping • Block Messages Before the Message is Received • Dramatically Reduce Server Load • Server can handle More `Good` Email • Utilizes RBL, IP reputation & SPF 8 © GWAVA Inc, Confidential & Proprietary
  • 9. SPF • Sender Policy Framework • Validate the Sender Address via DNS SPF record • SPF Record has a List of Server IP Addresses That can Send Email for Your Domain • Stops Spoofed messages • Prevents Spammers From Sending you Email With the Same Sender and Recipient • Set up Your own SPF Record 9 © GWAVA Inc, Confidential & Proprietary
  • 10. IP Reputation • Determine the Validity of a Sender based on IP Address • Intelligent Greylisting • Known Spammers are Denied • Possible Spammers Have to try Again • Good Email is Allowed • Unknown Spammers Cannot get Through • 0-Day Spam protection 10 © GWAVA Inc, Confidential & Proprietary
  • 11. Policy Enforcement • Recommended Scans • AV • Attachment-Fingerprinting • Content Filters • Available Actions • Block (Delete) • Quarantine • Notifications • BCC 11 © GWAVA Inc, Confidential & Proprietary
  • 12. WASP Scanner • WebAccess Server Protection • Stand Alone or Integrated • Integrates w/ WebAccess Application • Scans Messages Before Being Sent 12 © GWAVA Inc, Confidential & Proprietary
  • 13. POA Scanner • Uses IMAP & Trusted Application • Scans Email in Encrypted Message Store • Able to Rip Email out of GroupWise • Typical Uses: • Remove Hidden Viruses • Detect Unwanted Content • Notify HR or Administrator • BCC a Copy of Message • Delete Messages 13 © GWAVA Inc, Confidential & Proprietary
  • 14. Policy Manager • Multiple configurations/Policies • Multiple Domain support • User level policies 14 © GWAVA Inc, Confidential & Proprietary
  • 15. GWAVA 6 • Windows – Runs as a Service • Statistics • Reports & Alerts • Message Tracking • Policy Manager • SSL/TLS • LDAP • Image Analyzer • Multi-Tenet • Teaming 3 15 © GWAVA Inc, Confidential & Proprietary
  • 16. GWAVA Futures • Social Platform scanning • Enhanced Reporting & Alerting • Adapting scanners to integrate with other collaborative Technology Platforms 16 © GWAVA Inc, Confidential & Proprietary
  • 17.
  • 19. Unpublished Work of GWAVA, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of GWAVA, Inc. Access to this work is restricted to GWAVA employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of GWAVA, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. GWAVA, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, GWAVA, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All GWAVA marks referenced in this presentation are trademarks or registered trademarks of GWAVA, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.