SlideShare una empresa de Scribd logo
1 de 21
V 1.53P
Notes/Domino: The Gold Standard for e-mail Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E-mail security is harder, more important than ever ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E-mail-borne attacks change rapidly Source: IBM X-Force Research 2008
Dynamics of Security Integration Effort / Complexity Effectiveness “ Silo” Security Integrated Security
VPN server_32b256px.png Security in a Domino network notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png notes32b256p.png SMTP empty-red-rectangle red-top-faded Edge Components Antispam/Antivirus E-mail Encryption DLP VPN empty-red-rectangle red-top-faded Client Components E-mail Encryption DLP VPN E-mail / Calendar notesminder32b256px.png empty-red-rectangle red-top-faded Server Components E-mail Encryption DLP Antispam/Antivirus
GEL Rounded Rectangle cobalt GEL Rounded Rectangle msyellow notesminder32b256px.png server_32b256px.png IBM LOTUS DOMINO Lotus Protector capabilities, packaging, and release sequence subject to change GEL Rounded Rectangle cobalt GEL Rounded Rectangle cobalt GEL Rounded Rectangle cobalt IBM Lotus Protector Offering Family ,[object Object],[object Object],[object Object],[object Object],Antispam &  Antivirus Encryption Data Loss Prevention … Security Products
 
Optimized SMTP Protection For Lotus Domino  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Software Appliance Hardware Appliance Proventia notes32b256p.png server_32b256px.png
 
Popular Filter Deployment Options server_32b256px.png Clean ,[object Object],[object Object],[object Object],[object Object],notes32b256p.png Clean INTERNET Edge Appliances Server Tasks
Filter Process
 
IBM X-Force Research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Protection
Policy Editor Granular Policy Control
Protector for Mail Security Price Promotion 2009 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Three deployment options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IBM off-the-shelf hardware Customer provides hardware Specialized hardware x3350 from IBM STG MS3004LP Appliance from IBM ISS ,[object Object],VMware throughput: 12,000 mails/hr Appliance throughput: 36,000 mails/hr 1 1 2 2 3 3
Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? http://www.ibm.com/software/lotus/products/protector/

Más contenido relacionado

La actualidad más candente

TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability AssessmentTALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability AssessmentDawn Yankeelov
 
Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidrackAID Support
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
Quick Overview of ClrStream
Quick Overview of ClrStreamQuick Overview of ClrStream
Quick Overview of ClrStreamClrStream
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Mona Rajput
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingTarun Arora
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Client server network threat
Client server network threatClient server network threat
Client server network threatRaj vardhan
 
Presentacion demo mc afee siem
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siemvictor bueno
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYTim O'Leary
 
Document Security
Document SecurityDocument Security
Document SecurityTim O'Leary
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 

La actualidad más candente (18)

TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability AssessmentTALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
 
Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaid
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Quick Overview of ClrStream
Quick Overview of ClrStreamQuick Overview of ClrStream
Quick Overview of ClrStream
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
 
"EL ATAQUE INTERNO"
"EL ATAQUE INTERNO""EL ATAQUE INTERNO"
"EL ATAQUE INTERNO"
 
Unit4
Unit4Unit4
Unit4
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Software Security
Software SecuritySoftware Security
Software Security
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
U nit 4
U nit 4U nit 4
U nit 4
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
Presentacion demo mc afee siem
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siem
 
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITYFOUR BEST PRACTICES TO IMPROVE DOC SECURITY
FOUR BEST PRACTICES TO IMPROVE DOC SECURITY
 
Document Security
Document SecurityDocument Security
Document Security
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 

Destacado

BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10Dan Bolser
 
Photofraphy by Solve Sundsbo
Photofraphy by Solve SundsboPhotofraphy by Solve Sundsbo
Photofraphy by Solve SundsboRossica Hristova
 
Technology And Teaching
Technology And TeachingTechnology And Teaching
Technology And TeachingAustin ISD
 
Business Opportunity
Business OpportunityBusiness Opportunity
Business Opportunitydonwilkinson
 
Live Deal Media Kit
Live Deal Media KitLive Deal Media Kit
Live Deal Media Kitrandiw37
 
Ensembl plants hsf_d_bolser_2012
Ensembl plants hsf_d_bolser_2012Ensembl plants hsf_d_bolser_2012
Ensembl plants hsf_d_bolser_2012Dan Bolser
 
Developing your social media strategy
Developing your social media strategyDeveloping your social media strategy
Developing your social media strategyGood Circle
 
Manifesto Dos EmpresáRios
Manifesto Dos EmpresáRiosManifesto Dos EmpresáRios
Manifesto Dos EmpresáRiosFabricio Martins
 
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCIChien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCILe Thuy Hanh
 
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with MnemosyneFISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosynedanphilpott
 
Appearances do matter leadership in a crisis
Appearances do matter leadership in a crisisAppearances do matter leadership in a crisis
Appearances do matter leadership in a crisisJane Jordan-Meier
 
NETTAB 2012 flyer
NETTAB 2012 flyerNETTAB 2012 flyer
NETTAB 2012 flyerDan Bolser
 
Comprion Tech Day 2009 Dev App Scws
Comprion Tech Day 2009 Dev App ScwsComprion Tech Day 2009 Dev App Scws
Comprion Tech Day 2009 Dev App ScwsVladimir Nagin
 
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?Martina Rüdiger
 
Breaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbsBreaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbsLe Thuy Hanh
 

Destacado (20)

BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10
 
Photofraphy by Solve Sundsbo
Photofraphy by Solve SundsboPhotofraphy by Solve Sundsbo
Photofraphy by Solve Sundsbo
 
Technology And Teaching
Technology And TeachingTechnology And Teaching
Technology And Teaching
 
Business Opportunity
Business OpportunityBusiness Opportunity
Business Opportunity
 
Microweb
MicrowebMicroweb
Microweb
 
Live Deal Media Kit
Live Deal Media KitLive Deal Media Kit
Live Deal Media Kit
 
LotusLive Overvew
LotusLive OvervewLotusLive Overvew
LotusLive Overvew
 
Ensembl plants hsf_d_bolser_2012
Ensembl plants hsf_d_bolser_2012Ensembl plants hsf_d_bolser_2012
Ensembl plants hsf_d_bolser_2012
 
Developing your social media strategy
Developing your social media strategyDeveloping your social media strategy
Developing your social media strategy
 
Amazon Ec2
Amazon Ec2Amazon Ec2
Amazon Ec2
 
Manifesto Dos EmpresáRios
Manifesto Dos EmpresáRiosManifesto Dos EmpresáRios
Manifesto Dos EmpresáRios
 
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCIChien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
Chien luoc-xay-dung-thuong-hieu-qua-mang-xa-hoi tại VCCI
 
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with MnemosyneFISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
 
Appearances do matter leadership in a crisis
Appearances do matter leadership in a crisisAppearances do matter leadership in a crisis
Appearances do matter leadership in a crisis
 
NETTAB 2012 flyer
NETTAB 2012 flyerNETTAB 2012 flyer
NETTAB 2012 flyer
 
Questions
QuestionsQuestions
Questions
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
Comprion Tech Day 2009 Dev App Scws
Comprion Tech Day 2009 Dev App ScwsComprion Tech Day 2009 Dev App Scws
Comprion Tech Day 2009 Dev App Scws
 
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
wchh2014 Wordpress ChildThemes - wieso, weshalb, warum?
 
Breaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbsBreaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbs
 

Similar a IBM Lotus Domino: Gold Standard Email Security

Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityHarold Wong
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud ServicesOzgur Gercek
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...Louis Göhl
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentationtechworldvn
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppttswong
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)PT Datacomm Diangraha
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentationtswong
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platformcostigaj
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009OS-Cubed, Inc.
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managmentDean Iacovelli
 

Similar a IBM Lotus Domino: Gold Standard Email Security (20)

Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Exchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 SecurityExchange Conference (Philadelphia) - Exchange 2007 Security
Exchange Conference (Philadelphia) - Exchange 2007 Security
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Information Security
Information SecurityInformation Security
Information Security
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
S T M U T M
S T M  U T MS T M  U T M
S T M U T M
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppt
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
 

Más de Chris Sparshott

2016 IBM choice award winners
2016 IBM choice award winners2016 IBM choice award winners
2016 IBM choice award winnersChris Sparshott
 
2016 IBM Beacon award winners
2016 IBM Beacon award winners2016 IBM Beacon award winners
2016 IBM Beacon award winnersChris Sparshott
 
How to create an event video
How to create an event videoHow to create an event video
How to create an event videoChris Sparshott
 
Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Chris Sparshott
 
SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?Chris Sparshott
 
WebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewWebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewChris Sparshott
 
Urban code - DevOps - cost reduction
Urban code - DevOps - cost reductionUrban code - DevOps - cost reduction
Urban code - DevOps - cost reductionChris Sparshott
 
Bluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoBluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoChris Sparshott
 
Cloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSCloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSChris Sparshott
 
IBM Software Support and Subscription
IBM Software Support and SubscriptionIBM Software Support and Subscription
IBM Software Support and SubscriptionChris Sparshott
 
Install Lotus Connections on Blackberry
Install Lotus Connections on BlackberryInstall Lotus Connections on Blackberry
Install Lotus Connections on BlackberryChris Sparshott
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBMChris Sparshott
 
SUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingSUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingChris Sparshott
 
Domino must gather information
Domino must gather informationDomino must gather information
Domino must gather informationChris Sparshott
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1Chris Sparshott
 
IBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureIBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureChris Sparshott
 
IBM SaaS Complete A Questionnaire
IBM SaaS Complete A QuestionnaireIBM SaaS Complete A Questionnaire
IBM SaaS Complete A QuestionnaireChris Sparshott
 

Más de Chris Sparshott (20)

IBM and Apache Spark
IBM and Apache SparkIBM and Apache Spark
IBM and Apache Spark
 
2016 IBM choice award winners
2016 IBM choice award winners2016 IBM choice award winners
2016 IBM choice award winners
 
2016 IBM Beacon award winners
2016 IBM Beacon award winners2016 IBM Beacon award winners
2016 IBM Beacon award winners
 
How to create an event video
How to create an event videoHow to create an event video
How to create an event video
 
IBM Acquisitions
IBM AcquisitionsIBM Acquisitions
IBM Acquisitions
 
Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015
 
SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?
 
WebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewWebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overview
 
Urban code - DevOps - cost reduction
Urban code - DevOps - cost reductionUrban code - DevOps - cost reduction
Urban code - DevOps - cost reduction
 
Bluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoBluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demo
 
Cloud Computing IaaS
Cloud Computing IaaSCloud Computing IaaS
Cloud Computing IaaS
 
Cloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSCloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaS
 
IBM Software Support and Subscription
IBM Software Support and SubscriptionIBM Software Support and Subscription
IBM Software Support and Subscription
 
Install Lotus Connections on Blackberry
Install Lotus Connections on BlackberryInstall Lotus Connections on Blackberry
Install Lotus Connections on Blackberry
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBM
 
SUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingSUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensing
 
Domino must gather information
Domino must gather informationDomino must gather information
Domino must gather information
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1
 
IBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureIBM SaaS Change Profile Picture
IBM SaaS Change Profile Picture
 
IBM SaaS Complete A Questionnaire
IBM SaaS Complete A QuestionnaireIBM SaaS Complete A Questionnaire
IBM SaaS Complete A Questionnaire
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

IBM Lotus Domino: Gold Standard Email Security

Notas del editor

  1. This talk introduces the Lotus Protector security strategy, and features Protector for Mail Security, the first offering in the product delivery plan.
  2. “ Don’t you wish everything was as secure as Notes?” This hard-earned reputation for protecting customers and end users is what separates Lotus from other e-mail vendors. Today we’ll be talking about Lotus Protector, a new family of security offering that extends this legendary security to the next layer, protecting against Internet-borne threats and securing sensitive or confidential information from loss via e-mail.
  3. E-mail has proved to be a boon to communication and productivity, but also is a prime attack vector for those who would separate you from your assets – whether monetary or confidential data. Spam, viruses, trojans, targeted attacks, and spyware infest the Internet. By many accounts, the vast majority of all traffic is garbage – either garden variety spam or much more malicious content. It clogs up your bandwidth and systems and, if it gets through, it can impact your organization’s image inside and outside the firewall. Every day the sophistication and risk grows, as the bad guys increasingly seek to monetize the use of spam and malware, aided by worldwide networks of compromised servers and PCs that lower the effective cost of the activity to zero. Furthermore, companies face increasing risks that sensitive data can leak out via e-mail – intentionally but more often inadvertently or carelessly – creating competitive disadvantages, risks, and liabilities.
  4. As this chart shows, the game of cat-and-mouse between criminals and security experts has created a fast-changing environment. IBM X-Force analysis shows several trends. Keyword spam was largely defeated, so image spam spiked until methods were devised to combat it. Recently it’s simple URL-based spam, where the only goal is to get users to click on links that either present a detailed sales pitch or, more ominously, seek to plant “drive-by” malware on their computers. Spam and phishing URLs are now engineered for short lifespans, so they can be used in the time before they are either detected by filters or taken down by their hosts.
  5. The problem with all of these threats and risks is that they often require different tools and approaches to combat them. This leads to “security clash” – where multiple vendors and systems (“silos”) create excessive effort to deploy, and tend to suppress the overall effectiveness because they often need to be dialed down to prevent conflict. As this chart illustrates, having integrated security means you can attack the problem with less time and effort, and far greater effectiveness.
  6. The Lotus Protector security strategy is represented by this simple chart. In one sentence, we're launching products that protect against the whole set of security challenges facing collaboration customers today. These typically are driven by external threats (such as spam and viruses) and regulatory/legal pressures (such as content control). Our unique differentiator is that, while everyone else treats this as an SMTP problem, we're doing all of this exclusively from the perspective of a Notes/Domino customer. This gives us an opportunity to create a more integrated and fundamentally better experience for our customers, by weaving the security capabilities seamlessly into the user and administrator experience. There are several distinct solution types needed to secure – even to deploy -- an SMTP e-mail system. Everyone needs a spam/virus filter, of course, as 90% plus of all e-mail traffic is now either spam, phishing, or malware. Not coincidentally, the first Lotus Protector product does just that, and it’s what we’re talking about today. But there are other needs that must be addressed as well. Encryption is a perpetual challenge, because SMTP doesn't define that kind of security. Various standards approaches (S/MIME, TLS) are so problematic that they suffer from low – often stalled -- deployment. At the same time, encryption is taken for granted by Notes users. Notes-to-Notes e-mail lets you apply security with a per-user or per-message setting, ensuring that the information is not intercepted or modified between sender and receiver. However, that’s only within the Domino system; regular Internet recipients are sent unencrypted (after a notification/warning to the sender). Our goal is to deliver an encryption system that extends Notes security, so it's a single experience for the user. Data Loss Prevention (sometimes called Data Leak Prevention), or DLP, is a growing area that we're also planning to address with Protector. With DLP, you can inspect content flowing between people, to ensure that no sensitive content leaves your organization, either intentionally or (as is most typical) inadvertently. You can log, warn, or block activities in real time. You get two big benefits: you gain visibility into where your sensitive data (confidential, personal, or regulated content) is going, and it trains your people to be careful about things. We're exploring this capability, again in the Protector Notes/Domino centric mode, as a product offering. Lastly, there's a bunch of categories that also fall into that bucket of "things you need to run a modern collaboration system," and we continue to actively investigate there. We have a number of initiatives to improve archiving and eDiscovery. We're exploring things like virtual private networking (VPN) and Web protection as well. These things will be discussed as and when they are announced, but will follow the Protector theme of great security technology, optimized for IBM and Lotus customers. That leads us to the integration opportunities, and we have two distinct categories: vertical and horizontal. Vertical integration is where all Protector products gain maximum integration with Notes/Domino so that everything fits seamlessly into the experience for the user and administrator. Horizontal integration is where Protector products are aware of each other, and keep from getting in each other's way. A great example of this is encryption; as you bring that into the equation you start inhibiting your ability to inspect content for security purposes. Lotus Protector products take care of this, basically by sharing the Notes/Domino security context.
  7. From here on, we’re speaking specifically about Lotus Protector for Mail Security, the spam/virus filter product in the Lotus Protector family
  8. This is the overview slide about that introduces people to what we are selling; it may be flipped/alternated with the next one. Lotus Protector for Mail Security is a software solution sold as an end user license. It is deployed as a network appliance (physical or virtual, we’ll talk about that in a minute) that sits between your Domino Server’s SMTP interface and the wild wooly Internet, and filters all the bad stuff out before Domino has to deal with it. In reality, every SMTP server needs this and virtually every customer already has something, or else they would be drowning in spam. Our differentiation is we’re applying premium security technology, molded to satisfy the unique needs and requirements of Domino customers. The filtering software itself is high quality, 100% IBM-owned technology. The IBM Proventia product that shares the Protector engine is built upon Cobion, a long-time leader in multi-language spam filtering, that came to IBM in its Internet Security Systems (ISS) acquisition in 2006. The feature list will be covered in detail, but on this page we go through some of the competetively critical and/or differentiating capabilities of Protector for Mail security. Dynamic host reputation is our implementation of what is often called IP Reputation Filtering or IP Filtering. This assigns a likelihood of spam based on its origination IP, according to a dynamic reputation system that examines the rate and ratio of spam received. Multi-level message analysis is the heart of the system, where a set of different filters is applied to look for different types of threats. This is where a lot of the proprietary stuff comes in, because it’s what makes the difference between 90-95% filter quality, or 98-99% like Protector does. Signature and behavioral virus is a “belt and suspenders” approach to protect against both known and unknown threats. Our signature antivirus is powered by the premium quality Sophos engine (the only part of Protector for mail security that isn’t 100% IBM technology), while the behavioral antivirus applies many of the same techniques as our spam analysis to spot threats that are unknown to the signature antivirus database. We’ll talk about our massive URL database, but the idea is that all spam has to have a method to fulfill its goals, and that typically is a link to somewhere on the Web. Through our database of over 84 million known bad URLs (inappropriate/pornographic or infected with malware), we can eliminate much of the most dangerous content with one simple check. Protector for Mail Security supports end user management of their own whitelists (allow) and blacklists (block), as well as a hosted version of the user’s quarantine. That’s a powerful feature in itself, but we’re extending this capability to Notes, for seamless integration of network filtering and client UI. We talked about the integration, but again the real point here is that we’ve narrowed our field of vision on behalf of our customer base, and given ourselves permission to see things from their point of view. Thus all the enhancements we’re making are toward delivering a product that extends and integrates what customer already do with Notes and Domino. Preemptive protection is a little different category of security, in this context. Whereas everything above is kind of looking out for all the bad stuff that bad people like to do, preemptive protection looks to stop things before they happen. So the rules/policy engine, which we’ll discuss in depth in a few minutes, can be applied to both incoming and outgoing e-mail to block the transmission of common categories of sensitive information, and be infinitely tuned to block customized kinds of information, specific to an industry or organization. We call out the place this product holds in the IBM Proventia security product family, because it takes advantage of all the work done in ISS to harden that line of intrusion prevention systems (IPSs), firewall, etc. This protects Protector against attacks on the software from vectors other than SMTP.
  9. This more graphically appealing slide gives us the opportunity to talk about the main messages for Protector for Mail Security. In the first box, our unique advantage is our position within the core Notes/Domino family. We work directly with the Lotus Westford architects and development teams. We’re implementing numerous integration points in support of the Protector ideals around integration and targeted value. In the second box, we talk about how we’re delivering world class technology – a sixth generation spam filtering technology -- that is 100% proprietary (in the good way) to IBM. The IBM Proventia technology, which has its roots in Cobion Software’s advanced spam identification products, matches up very well for efficacy (quality of spam blocking) and throughput (volume of mail handled) against incumbent vendors who attack this, typically, from a security perspective. We look at it from an operational and e-mail perspective, which is closer to how Domino customers view it when we talk to them. Also in the second box, we’ve earned ICSA Labs certification on spam filtering, which requires a 95% “trap” rate for spam (Protector typically achieves 98%+), with a .001% “false positive” rate (which we typically better as well). In the third box, we call out deployment flexibility as an important differentiator. Protector for Mail Security is sold as a per-user license, like Notes or Sametime or Quickr or Connections. And like many Lotus licenses, it includes all the server software you need, so it scales cost-effectively from one user to infinity. But ultimately this is an edge server application, because that’s where the spam is coming in. Here it’s important to understand that Protector for Mail Security is different from other Lotus products in that it’s a complete server solution, containing the (Linux) OS as well as the filter application, and is designed to run all by itself on a computer. In fact, in this model it serves as an “appliance” due to that plug’n’play kind of design. We’re one of a few vendors in the market who offer both software and hardware deployment licenses – and we do it with the same per-user software license. Smaller organizations or branch offices can deploy the VMware version on standard x86 hardware, while larger organizations will order the specialized hardware version, which comes preloaded with the server software. Both contain the same filtering software, and can be mixed and matched – e.g., hardware appliance in headquarters and VMware versions at branch offices.
  10. This slide is included to facilitate a discussion of the different approaches available to Domino e-mail customers. Typically there are three ways to filter an SMTP stream: “ Cloud” Services – The customer MX record is pointed to a SaaS data center, and only the cleaned stream is passed on to the customer network. Edge Appliances – The SMTP stream is treated at the edge of the customer network, and only the cleaned stream is passed onto the Domino server. Server tasks – Unfiltered SMTP flows directly to the Domino server, where a filter software program cleans it as the Domino server software sees it. The different approaches offer different benefits and tradeoffs. Cloud-based filtering can be done at a very low cost, and additionally they save lots of downstream bandwidth to the customer’s network. Edge appliances tend to give a lot of control and customizability, and don’t require customers to trust their user’s email to a third party. Server tasks can inspect both internal and Internet mail, which is necessary anyway, at least for virus filtering. Generally speaking the cloud/appliance options have the benefit of filtering SMTP threats before Domino has to deal with them, but are difficult to integrate with e-mail systems and other security functions. Server tasks can look at both internal and external traffic, but must accept all traffic (good and bad) and process it using the Domino’s server’s CPU – which will affect scalability and throughput for mail processing. Edge appliances and Cloud option take the load off Domino but cannot scan internal mail and aren’t integrated with Notes and Domino. In addition, the Cloud option tends to allow more spam to pass or more good email (HAM) to be withheld without direct customer control. <click> The Protector for Mail Security appliance is solving those problems through enhanced integration with Domino and Notes, so customers gain the benefits of on-server filtering without the extra CPU load, and in-the-mailbox integration for end users.
  11. The filter process applies several different types of protection against e-mail threats. First, the system itself recognizes a myriad of attack types and intrusion methods, to blocks threats that target the filter itself. Next, the system examines methods using traditional antivirus signatures from our antivirus partner Sophos, blocking over 1200 known malware attacks and variants A behavioral antivirus module applies analysis based on known attack designs, so that even unknown malware is blocked before it can infect your users Spam control – the heart of the system, which we’ll discuss next – applies sophisticated and efficient filtering that is 98% or better effective, out of the box, with less than .001% false positives, or one in 100,000 messages. This is important because “overblocking” of good messages is a direct revenue risk to an organization. Lastly, the rich customizable policy engine can prevent messages with preset content types (e,g. hate/inappropriate language, credit card numbers, customer confidential data) or custom keywords (e.g., project code names, industry terms) from getting through. Importantly, this function (like all filters) works on both outgoing and incoming messages, so you can apply policies to prevent information from leaving your environment as well as entering it.
  12. Protector for mail security applies a granular and highly efficient content analysis against e-mails sent to your domain. First, a set of “pre-filters” is applied that knocks out a large part of the bad e-mail – 80% or more – before your system even accepts it. First it checks that there’s actually a user at the recipient address, using LDAP lookups that are cached locally when found. Then it applies a custom “blackhole list” that filters known spammer addresses, without overblocking as many public lists are prone to do. Then it applies a proprietary dynamic reputation system, which grades the volumes of e-mail arriving from particular IP addresses or ranges, and blocks messages arriving from known IPs that have a high spam-to-ham (ham= “good e-mail”) ratio. If the percentage of “ham” from those IPs increases, the system automatically adjusts to permit traffic. This dynamic aspect is particularly useful when a computer is taken over by a spammer and subsequently removed from service. These pre-filters are particularly useful in some countries (e.g. Germany) that have strict retention rules. Since the mail is never accepted, it doesn’t need to be stored, retained, backed up, etc. The next set of filters looks for things like known spam “signatures” (including “fuzzy” variants); classifications driven by a Bayesian “learning” filter; structure analysis of words and phrases; flow control that measures traffic from different sources over time; heuristics that grade a message’s likelihood of being spam based on a set of content characteristics; “fingerprinting” (including images) against other known spam; logic that grades a message’s likelihood of being a “phishing” attack (to harvest personal information through fake versions of real Web sites such as Paypal); and a check against preset or custom keywords a customer has chosen to filter. The net result is a highly efficient filter system that works out of the box, without the training/tuning needed by many competitive products. Lastly, the system checks contained URLs against a database of over 7 billion known “bad” URLs/objects, and conducts a file analysis (including zipped files up to 100 levels deep) that, if necessary, quarantines the e-mail and sends the file attachment to the ISS lab in Kassel Germany for human analysis.
  13. The heart of the system is a sophisticated and scientific approach to filtering driven by IBM X-Force research. IBM engineers and linguists constantly update the proprietary software behind the filters, with a global network of spam traps and Web crawlers combating new threats as they appear, for “zero-hour” protection. X-Force has built an unrivaled database of spam signatures, known “bad” URLs, and “phishing” attacks (both messages and URLs). This is the basis of the unrivaled “out of the box” performance of Protector for Mail Security, and the “set it and forget it” performance it delivers.
  14. Phishing attacks ebb and flow on the Internet. The Protector appliance can trap (default) or notify users of suspicious messages that try to trick them into revealing personal or sensitive information. With the growing sophistication of targeted attacks (“spear phishing”), the importance of this protection continues to grow. In “spear phishing,” a customized attack is targeted at a specific user or group of users, often using publicly available information or data shared on social networks, to create authentic-looking and compelling attacks.
  15. The policy editor in Lotus Protector is a high-value differentiator from other spam filter products. With a rich set of preconfigured policies, the system allows “checkbox” filtering of specific categories of content (hate/inappropriate language, personal/confidential information, etc.), plus infinite customer customizations. The rule set acts against all the variables used by the core filter (sender/recipient/groups, time, content analysis, etc.) and allows a wide range of predefined dispositions (block, quarantine, delete, etc.). Since this works on outgoing as well as incoming mail, the organization can deploy anything from “stock” to infinitely fine-grained control over e-mail content, without any additional products or purchases.
  16. Independent of core software costs, customers are able to choose from among an array of server deployment options. Since the server software is always included with the user licenses, it’s up to the customer to decide how to deploy the server – or even to adjust/change approach over time. The first two options are based on VMware deployment. In these instances, throughput is rated at about 12,000 e-mails per hour (including both good e-mail (“ham”) and unsolicited bulk e-mail (UBE – a.k.a. “spam”). Customers with virtualization strategies can simply deploy Protector for Mail Security within their VMware framework, at no additional cost beyond meeting the hardware and VMware requirements listed For customers who want a new hardware-based solution – particularly smaller or price-sensitive customers – we’ve identified an IBM xSeries machine that will run Protector for Mail Security well. This x3350 1U system offers good performance and IBM reliability at a competitive cost. Our roadmap calls for future versions of Protector to run natively (no VMware required) on specific xSeries machines; while there are no guarantees that it will prove possible, the x3350 is one of the target units. While it will always be a good VMware unit, native support is likely to only improve throughput/performance. For larger customers or those with heavy mail usage, the MS3004LP unit is a good choice. While more expensive than typical VMware machines or the x3350, the MS3004LP unit is designed for high throughput of approximately 36,000 e-mails per hour. Much of this performance is related to running Protector for Mail Security “on the metal” – no VMware virtualization overhead – but also simply being tuned to the hardware and drivers of this particular unit. It also offers redundancy (power suppies, fans etc.) and multiple disks employing RAID support. This gives the unit a reliability profile much greater than the commodity hardware option. MS3004LPs are also “clusterable,” although it’s important to realize that clustering is related more to administrative benefits (centralized spam processing/access) than the same term in the Domino world (high availability, failover).
  17. Here’s a short list of information available to you on the IBM Lotus public Web site. Check Xtreme Leverage or PartnerWorld for Sales Kit links for additional internal information