SlideShare a Scribd company logo
1 of 2
Download to read offline
Case Study




Ernst & Young AB Using M86 WebMarshal
to Stop Web Mail Viruses Before
They Do Damage
Client:                     Financial consultancies and professional services companies are only
Ernst & Young AB            as good as their communications. Whether written, spoken, posted or
                            emailed, these companies live or die by how well they can transfer words
Web Site:
                            and concepts from one person to another. The Internet has revolutionized
http://www.ey.com/SE
                            the whole industry and has opened a number of new opportunities. But with
Requirements:               opportunities come risks.
Webmail Filtering
Filtering Solutions:        Global companies have come to rely on their Internet-based
                            communications for any number of client-based and internal functions and
M86 WebMarshal
                            have to ensure these information networks remain operational. They can’t
                            wait for an incident to take place… they have to stop all threats before they
                            become a problem.
“It’s hard to put a value
                            Background
on threat prevention, but
                            Ernst & Young AB is the Swedish branch of Ernst & Young. It is a global
the software has done       professional services company offering clients expert advice and consulting

exactly what we wanted.”    in auditing, accounting advice, tax compliance, planning and corporate
                            finance transactions. As a global organization with global clients, it is
Ludwig Brogård
                            essential that their systems are kept up and running and operating at
NT-Manager                  peak efficiency.
Ernst & Young AB
                            Ernst & Young AB, were acutely aware there were many external threats
                            to their network and wanted to ensure they could continue to provide
                            uninterrupted support to their client base. “We hadn’t experienced any
                            problems,” says Ludwig Brogård, ITManager at Ernst & Young AB, “and we
                            wanted to ensure that it stayed that way.”

                            “We have a written security policy that specifies how our users should use
                            digital information, but there was the possibility that perhaps something
                            might slip through the cracks. We already had an anti-virus program in
                            place,” says Brogård, “but it didn’t go far enough.”

                            “The growing popularity of web-based email has opened up very real
                            risks that viruses and other threats to the network can sneak in past our
                            traditional anti-virus defences. Again, we hadn’t had any incidents, but
                            we wanted to guarantee that we would have no incidents in the future.
                            With more than 2000 users on our network, it only takes one person to
                            circumvent the rules and cause irreparable harm to the network and
                            our reputation.”

                            So Brogård started a process of investigating what solutions on the market
                            could prevent these types of threats from infecting their network. “We
                            were fortunate in that we knew exactly what to look for in the solutions we
                            examined,” says Brogård. “We undertook some very basic benchmarks
                            and identified key features and benefits in the various solutions. After
                            looking at the available solutions, we selected M86 WebMarshal due to
                            its web scanning capabilities and the fact that it provided the best
                            cost/performance ratio.”


m86security.com
The Ernst & Young AB network consists of a Windows 2000 network that
                                                                                                       connects approximately 80 offices throughout Sweden. The various offices
                                                                                                       connect to the Internet at speeds ranging from 384 Kb to 4 Mb.

                                                                                                       Key Reasons for Selecting M86 WebMarshal
        “Setting up M86
        WebMarshal across the                                                                          •	
                                                                                                       •	
                                                                                                               Best performance of all solutions examined
                                                                                                               Easy to set up and operate
        network went very well.”                                                                       •	      Can support extended operations from centralized management

        Ludwig Brogård                                                                                 Key Benefits
        NT-Manager
        Ernst & Young AB
                                                                                                       •	      Prevents viruses from entering the network via web mail
                                                                                                       •	      Enforces formal Internet Acceptable Use Policy
                                                                                                       •	      Ensures the network remains virus-free and operational

                                                                                                       “Setting up M86 WebMarshal across the network went very well,” says
                                                                                                       Brogård. “We installed and configured M86 WebMarshal with our existing
                                                                                                       Internet Authentication Service (IAS) Server. We had a few questions with
                                                                                                       the exact configuration for the rules set up, but a few calls to our M86
                                                                                                       WebMarshal supplier, Inuit AB, cleared up all of the issues. We tested the
                                                                                                       rules and then went live.”

                                                                                                       Conclusion
                                                                                                       Since installation, M86 WebMarshal has performed excellently. “We are still
                                                                                                       virus-free,” says Brogård. “It’s hard to put a value on threat prevention,
                                                                                                       but the software has done exactly what we wanted. It is great software for
                                                                                                       content scanning of proxy traffic, one of the hidden threats that can cause
                                                                                                       damage if undetected. We undertook some very basic benchmarks and
                                                                                                       identified key features and benefits in the various solutions and are very
                                                                                                       happy with M86.” Ludwig Brogård, NT-Manager at Ernst & Young AB.




        ABOUT M86 SECURITY
        M86 Security is the global expert in real-time
        threat protection and the industry’s leading
        Secure Web Gateway provider. The company’s
        appliance, software, and Software as a Service
        (SaaS) solutions for Web and email security
        protect more than 24,000 customers and over
        17 million users worldwide. M86 products use
        patented real-time code analysis and behavior-
        based malware detection technologies as well
        as threat intelligence from M86 Security Labs
        to protect networks against new and advance
        threats, secure confidential information, and
        ensure regulatory compliance. The company is
        based in Orange, California with international
        headquarters in London and development
        centers in California, Israel, and New Zealand.




TRY BEFORE YOU BUY
M86 Security offers free product trials and evaluations. Simply contact us or visit www.m86security.com/downloads
                                                                Corporate Headquarters                           International Headquarters                       Asia-Pacific
                                                                828 West Taft Avenue                             Renaissance 2200                                 Millennium Centre, Bldg C, Level 1
                                                                Orange, CA 92865                                 Basing View, Basingstoke                         600 Great South Road
                                                                United States                                    Hampshire RG21 4EQ                               Ellerslie, Auckland, 1051
                                                                Phone: +1 (714) 282-6111                         United Kingdom                                   New Zealand
                                                                Fax: +1 (714) 282-6116                           Phone: +44 (0) 1256 848 080                      Phone: +64 (0) 9 984 5700
                                                                                                                 Fax: +44 (0) 1256 848 060                                                                                       Version 03.30.10
                                                                                                                                                                  Fax: +64 (0) 9 984 5720
© Copyright 2010 M86 Security. All rights reserved. M86 Security is a registered trademark of M86 Security. All other product and company names mentioned herein are trademarks or registered trademarks of their respective companies.

More Related Content

What's hot

Great Ormond Street Childrens Hospital- Cisco
Great Ormond Street Childrens Hospital- CiscoGreat Ormond Street Childrens Hospital- Cisco
Great Ormond Street Childrens Hospital- Cisco
Cisco Case Studies
 
AMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success StoryAMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success Story
Imprivata
 
Egress Switch Introduction
Egress Switch IntroductionEgress Switch Introduction
Egress Switch Introduction
yonifine
 
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O..."Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
IBM India Smarter Computing
 

What's hot (19)

mresumelatest
mresumelatestmresumelatest
mresumelatest
 
2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer Privacy2010 10 27 Isc2 Protecting Consumer Privacy
2010 10 27 Isc2 Protecting Consumer Privacy
 
Great Ormond Street Childrens Hospital- Cisco
Great Ormond Street Childrens Hospital- CiscoGreat Ormond Street Childrens Hospital- Cisco
Great Ormond Street Childrens Hospital- Cisco
 
Cisco Connect 2018 Thailand - Introducing cisco dna assurance the future of n...
Cisco Connect 2018 Thailand - Introducing cisco dna assurance the future of n...Cisco Connect 2018 Thailand - Introducing cisco dna assurance the future of n...
Cisco Connect 2018 Thailand - Introducing cisco dna assurance the future of n...
 
232 a7d01
232 a7d01232 a7d01
232 a7d01
 
"Compliance First" or "Security First"
"Compliance First" or "Security First""Compliance First" or "Security First"
"Compliance First" or "Security First"
 
AMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success StoryAMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success Story
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
16231
1623116231
16231
 
Winkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and MobilityWinkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and Mobility
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
2012 global cloud_security_survey_executive_summary
2012 global cloud_security_survey_executive_summary2012 global cloud_security_survey_executive_summary
2012 global cloud_security_survey_executive_summary
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
 
Cloud Security Alliance Q2-2012 Atlanta Meeting
Cloud Security Alliance Q2-2012 Atlanta MeetingCloud Security Alliance Q2-2012 Atlanta Meeting
Cloud Security Alliance Q2-2012 Atlanta Meeting
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Egress Switch Introduction
Egress Switch IntroductionEgress Switch Introduction
Egress Switch Introduction
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O..."Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
 

Viewers also liked (8)

Purple people eater
Purple people eaterPurple people eater
Purple people eater
 
Theming for mobile devices recent
Theming for mobile devices recentTheming for mobile devices recent
Theming for mobile devices recent
 
Punctuation
PunctuationPunctuation
Punctuation
 
Drupal Omega and Responsive Build out
Drupal Omega and Responsive Build outDrupal Omega and Responsive Build out
Drupal Omega and Responsive Build out
 
Value Of Plan F
Value Of Plan FValue Of Plan F
Value Of Plan F
 
Responsive drupal and omega theme
Responsive drupal and omega themeResponsive drupal and omega theme
Responsive drupal and omega theme
 
Lucía
LucíaLucía
Lucía
 
María
MaríaMaría
María
 

Similar to Case Studies M86 Security - Ernst & Young (Web Security)

Juniper Networks secures the future for Mozzart Bet, see why...
Juniper Networks secures the future for Mozzart Bet, see why...Juniper Networks secures the future for Mozzart Bet, see why...
Juniper Networks secures the future for Mozzart Bet, see why...
Juniper Networks UKI
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
Netwrix Corporation
 
Australia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_ReportAustralia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_Report
Blake Douglas
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
John White
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
richard_turner
 

Similar to Case Studies M86 Security - Ernst & Young (Web Security) (20)

Juniper Networks secures the future for Mozzart Bet, see why...
Juniper Networks secures the future for Mozzart Bet, see why...Juniper Networks secures the future for Mozzart Bet, see why...
Juniper Networks secures the future for Mozzart Bet, see why...
 
NewStar NIMS Profile
NewStar NIMS ProfileNewStar NIMS Profile
NewStar NIMS Profile
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
Australia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_ReportAustralia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_Report
 
Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network Virtualization
 
RAMAKANT
RAMAKANTRAMAKANT
RAMAKANT
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tips
 
Grupo Banco Popular: Software Deployment Case Study
Grupo Banco Popular:  Software Deployment Case StudyGrupo Banco Popular:  Software Deployment Case Study
Grupo Banco Popular: Software Deployment Case Study
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
Building a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network AutomationBuilding a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network Automation
 
Nestle
NestleNestle
Nestle
 
Arup
ArupArup
Arup
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Antivirus management lexington ky
Antivirus management lexington kyAntivirus management lexington ky
Antivirus management lexington ky
 
CMIT 320 FINAL PROJECT. NETWORK SECURITY
CMIT 320 FINAL PROJECT. NETWORK SECURITYCMIT 320 FINAL PROJECT. NETWORK SECURITY
CMIT 320 FINAL PROJECT. NETWORK SECURITY
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)
 

More from INSPIRIT BRASIL

Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
INSPIRIT BRASIL
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)
INSPIRIT BRASIL
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
INSPIRIT BRASIL
 

More from INSPIRIT BRASIL (20)

Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
INSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT nova institucional
INSPIRIT nova institucional
 
Projeto Zoo INSPIRIT
Projeto Zoo INSPIRITProjeto Zoo INSPIRIT
Projeto Zoo INSPIRIT
 
XCS - Watchguard
XCS - WatchguardXCS - Watchguard
XCS - Watchguard
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
 
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
 
IT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesIT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simples
 
New-Desktop Central para IT Managers
New-Desktop Central para IT ManagersNew-Desktop Central para IT Managers
New-Desktop Central para IT Managers
 
New institucional inspirit (esp)
New institucional inspirit (esp)New institucional inspirit (esp)
New institucional inspirit (esp)
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
M86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web GatewayM86 Security apresenta Secure Web Gateway
M86 Security apresenta Secure Web Gateway
 
Trustwave - Segurança 360
Trustwave - Segurança 360Trustwave - Segurança 360
Trustwave - Segurança 360
 
NOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITNOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRIT
 
Overview -IT360 ManageEngine
Overview -IT360 ManageEngineOverview -IT360 ManageEngine
Overview -IT360 ManageEngine
 
Estudo Gartner - IT360 ManageEngine
Estudo Gartner -  IT360 ManageEngineEstudo Gartner -  IT360 ManageEngine
Estudo Gartner - IT360 ManageEngine
 
Forrester - Wave Community
Forrester  - Wave CommunityForrester  - Wave Community
Forrester - Wave Community
 
Coletânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDColetânea de Cases - RIVERBED
Coletânea de Cases - RIVERBED
 
INSPIRIT- Riverbed- Data protection and Disaster Recovery
INSPIRIT-  Riverbed- Data protection and Disaster RecoveryINSPIRIT-  Riverbed- Data protection and Disaster Recovery
INSPIRIT- Riverbed- Data protection and Disaster Recovery
 
TrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoTrustWave - Visão Geral da Solução
TrustWave - Visão Geral da Solução
 

Case Studies M86 Security - Ernst & Young (Web Security)

  • 1. Case Study Ernst & Young AB Using M86 WebMarshal to Stop Web Mail Viruses Before They Do Damage Client: Financial consultancies and professional services companies are only Ernst & Young AB as good as their communications. Whether written, spoken, posted or emailed, these companies live or die by how well they can transfer words Web Site: and concepts from one person to another. The Internet has revolutionized http://www.ey.com/SE the whole industry and has opened a number of new opportunities. But with Requirements: opportunities come risks. Webmail Filtering Filtering Solutions: Global companies have come to rely on their Internet-based communications for any number of client-based and internal functions and M86 WebMarshal have to ensure these information networks remain operational. They can’t wait for an incident to take place… they have to stop all threats before they become a problem. “It’s hard to put a value Background on threat prevention, but Ernst & Young AB is the Swedish branch of Ernst & Young. It is a global the software has done professional services company offering clients expert advice and consulting exactly what we wanted.” in auditing, accounting advice, tax compliance, planning and corporate finance transactions. As a global organization with global clients, it is Ludwig Brogård essential that their systems are kept up and running and operating at NT-Manager peak efficiency. Ernst & Young AB Ernst & Young AB, were acutely aware there were many external threats to their network and wanted to ensure they could continue to provide uninterrupted support to their client base. “We hadn’t experienced any problems,” says Ludwig Brogård, ITManager at Ernst & Young AB, “and we wanted to ensure that it stayed that way.” “We have a written security policy that specifies how our users should use digital information, but there was the possibility that perhaps something might slip through the cracks. We already had an anti-virus program in place,” says Brogård, “but it didn’t go far enough.” “The growing popularity of web-based email has opened up very real risks that viruses and other threats to the network can sneak in past our traditional anti-virus defences. Again, we hadn’t had any incidents, but we wanted to guarantee that we would have no incidents in the future. With more than 2000 users on our network, it only takes one person to circumvent the rules and cause irreparable harm to the network and our reputation.” So Brogård started a process of investigating what solutions on the market could prevent these types of threats from infecting their network. “We were fortunate in that we knew exactly what to look for in the solutions we examined,” says Brogård. “We undertook some very basic benchmarks and identified key features and benefits in the various solutions. After looking at the available solutions, we selected M86 WebMarshal due to its web scanning capabilities and the fact that it provided the best cost/performance ratio.” m86security.com
  • 2. The Ernst & Young AB network consists of a Windows 2000 network that connects approximately 80 offices throughout Sweden. The various offices connect to the Internet at speeds ranging from 384 Kb to 4 Mb. Key Reasons for Selecting M86 WebMarshal “Setting up M86 WebMarshal across the • • Best performance of all solutions examined Easy to set up and operate network went very well.” • Can support extended operations from centralized management Ludwig Brogård Key Benefits NT-Manager Ernst & Young AB • Prevents viruses from entering the network via web mail • Enforces formal Internet Acceptable Use Policy • Ensures the network remains virus-free and operational “Setting up M86 WebMarshal across the network went very well,” says Brogård. “We installed and configured M86 WebMarshal with our existing Internet Authentication Service (IAS) Server. We had a few questions with the exact configuration for the rules set up, but a few calls to our M86 WebMarshal supplier, Inuit AB, cleared up all of the issues. We tested the rules and then went live.” Conclusion Since installation, M86 WebMarshal has performed excellently. “We are still virus-free,” says Brogård. “It’s hard to put a value on threat prevention, but the software has done exactly what we wanted. It is great software for content scanning of proxy traffic, one of the hidden threats that can cause damage if undetected. We undertook some very basic benchmarks and identified key features and benefits in the various solutions and are very happy with M86.” Ludwig Brogård, NT-Manager at Ernst & Young AB. ABOUT M86 SECURITY M86 Security is the global expert in real-time threat protection and the industry’s leading Secure Web Gateway provider. The company’s appliance, software, and Software as a Service (SaaS) solutions for Web and email security protect more than 24,000 customers and over 17 million users worldwide. M86 products use patented real-time code analysis and behavior- based malware detection technologies as well as threat intelligence from M86 Security Labs to protect networks against new and advance threats, secure confidential information, and ensure regulatory compliance. The company is based in Orange, California with international headquarters in London and development centers in California, Israel, and New Zealand. TRY BEFORE YOU BUY M86 Security offers free product trials and evaluations. Simply contact us or visit www.m86security.com/downloads Corporate Headquarters International Headquarters Asia-Pacific 828 West Taft Avenue Renaissance 2200 Millennium Centre, Bldg C, Level 1 Orange, CA 92865 Basing View, Basingstoke 600 Great South Road United States Hampshire RG21 4EQ Ellerslie, Auckland, 1051 Phone: +1 (714) 282-6111 United Kingdom New Zealand Fax: +1 (714) 282-6116 Phone: +44 (0) 1256 848 080 Phone: +64 (0) 9 984 5700 Fax: +44 (0) 1256 848 060 Version 03.30.10 Fax: +64 (0) 9 984 5720 © Copyright 2010 M86 Security. All rights reserved. M86 Security is a registered trademark of M86 Security. All other product and company names mentioned herein are trademarks or registered trademarks of their respective companies.