SlideShare una empresa de Scribd logo
1 de 44
Taking your open source email security
to the next level
Gabriel M. Mizrahi
VP Technologies
                                         March 18, 2010
About Me


       12 years of email security experience
       Over 15 years in the open source
        community
       Founded an Internet security company
        in 2001
       Married with 2 kids
       A big Barcelona FC fan!
   Hosting Provider Quiz
Today’s      Issues with open source security
Agenda       Taking open source email security
              to the next level
             Case Studies
The Hosting Provider Quiz



    1) We use open source because…

       a) we started with it and grew
       b) it’s low cost
       c) we’re comfortable with it
       d) all of the above
The Hosting Provider Quiz



    2) We would love to be able to…

       a) reduce the cost of handling email
       b) enhance detection rates & lower FPs
       c) improve customer satisfaction &
          increase our business
       d) all of the above
The Hosting Provider Quiz



    3) But… to adopt a new solution

       a) we won’t throw out our existing investment
       b) it would have to easily integrate with
          current infrastructure
       c) it must provide a differentiator
       d) all of the above
The Hosting Provider Quiz



    4) How much does it cost to handle spam
      with your current solution?

       a) I know exactly all my costs
       b) I have a rough estimate
       c) Not sure
Something We Can Agree On

       Email is a low margin service with high costs
        (Capex/Opex)
       You‟re using open source security because it
        offers flexibility
       Any changes you would make need to be
        justified
        •   Financially
        •   With regards to level of service
One Last Question



    4) Will open source alone be able to take
      you to where you need to go?




                    ?
Why Open Source Email Security is an Issue




            Security
           Spam, phishing         Costs
          and viruses trends




                      Infrastructure
Spam & Phishing Trends
                                                                Security


       Increasing Spam Levels
        •   2002 – 25%
        •   2010 – over 90%

       Spammers improving their techniques
        •   Blended threats
        •   Free Webmail accounts compromised and sending spam
            attacks
        •   Use of popular sites – CNN, Adobe, others to trick users
            to malware sites
        •   Other social engineering techniques
Virus Trends
                                                        Security




       Distributed faster/more frequently than
        AV Signatures are created
       Vulnerability in first hours
       Multiple variants in the same attack
       Life of a variant can be as little as several
        hours
Outbound Spam – The Latest Concern
                                                          Security




       Compromised accounts
       You are at risk of being BLACKLISTED because
        of outbound spam/viruses – “Shared
        reputation”
        •   RBLs that block entire “C” classes
        •   Virtual servers on a single physical server

       Deal with abuse complaints
Existing Infrastructure Issues
                                                                  Infrastructure

    A short list of open source email
    security tools:
        SpamAssassin
        Bayesian Filters (e.g. Bogofilter, DSPAM)
        Signature based anti-virus (e.g. ClamAV)
        Collaborative filters (e.g. Pyzor, Razor, DCC)
        Lexical filters (e.g. Block subjects with the word „viagra‟)
        Greylisting (e.g. Postgrey, Greymilter)
        SPF/Domain Keys
        SMTP „HELO‟ checks
        SMTP „MAIL FROM‟ checks
        SMTP early talker detection
        Local IP whitelists and blacklists
        Domain based RBLs (e.g. SURBL, URIBL, DBL)
        IP based RBLs (e.g. SBL, XBL, APEWS)
Common Administrative Issues
                                                         Infrastructure

       Time consuming
        •   To achieve better coverage – must
            use/maintain/tune many tools
       Admin staff
        •   Someone needs to manage and maintain long list of open
            source tools
       Staff expertise
        •   Need to analyze each missed spam
            and identify unique parameters
        •   Language dependant
        •   By nature opens possibility for FPs/FNs
Rising Email Security Costs                              Costs


        Spam Cycle             Additional Costs


           Spam               Customer dissatisfaction
         increases
                              Helpdesk resources for
                               increased complaints

                              More Servers to cope
More
         Never       More     with rising spam levels
FNs      ending      FPs
          cycle                   IT Resources to
                                     write rules

                              Helpdesk resources for
                               increased complaints
           More
           rules                  More Bandwidth
Hosting Analysis Exercise

              Number of
              mail subscribers
                                              100,000

              Average legitimate
              messages/day/subscriber
                                                      7

              Average messages/                    150
              day/subscriber              (95% are spam)


              Total messages/day           15,000,000

              Average message size               25Kb

              Total message traffic/day        358GB
Hosting Provider Cost & Savings Analysis
Peak Bandwidth
                       Bandwidth Comparison                                        Sustained




                       100                               Commercial IP Reputation solution
Bandwidth usage (Mb)




                                                           can reduce traffic up to 85%*
                                                                         More Predictable
                                                                         Reduced bandwidth costs
                              135.7                                      Fewer mails to analyze
                              Mbps

                        50

                                                            67.8
                                                            Mbps
                                                                                                           Pay for
                                                                         5.1                    3.1        only this
                                         20.5M                                       20.3
                                                                        Mbps                   Mbps      95% of peak
                                          bps                                        Mbps

                             No IP Filtering                 IP Based RBL         Commercial IP Reputation
                                                     Bandwidth Consumption
                                    * Data supplied by Commtouch partners
Hardware Comparison

                                36                    18
                       20     Servers               Servers
                                                                                          18,000,000 msgs/day

                                                                                            15,000,000 msgs/day
Messages (Millions)




                                                                     Only 4 servers            ( + 20% spare)
                       15
                                                                       required*


                       10


                                                                                             Server Capacity

                       5                                                                       500,000 msgs/day
                                                                                             1,100,000 msgs/day
                                                                                             5,000,000 msgs/day

                            SpamAssassin SpamAssassin                     Commercial         Servers
                                         + IP Based RBL                  Email Security
                                 * Data supplied by Commtouch partners
Take your open source
 email security to the
      next level
What if you could…

       Increase detection with your existing
        infrastructure
       Reduce inbound bandwidth
       Not only block outbound spam but catch the
        spammers
        •   Put an end to your IP ranges being blacklisted

        and…
       Reduce costs
Essentials for Solution

        A global view of email traffic
         •   Higher detection rate
         •   Lower FPs

        Scalable, transparent processing power
        Unattended operation
        Easy integration with your existing
         open source security solutions
Furthermore…

      Reduces Capex/Opex
       •   Enables scalable growth
       •   Decreases IT/Admin involvement
       •   Reduces support calls
       •   Creates excess processing power that can be repurposed

      Provides new opportunities and differentiators
       •   Configure the services you want/need
       •   Offer new premium services
       •   Increases your business
Hosting Providers
that took their open
   source to the
      next level
Metanet AG & mail2world
Hosting provider
   Founded in 2000
   Offers services for resellers
    and end customers
   One of top 10 hosting
    companies in Switzerland
   750 servers in network
   > 10,000 SMB customers
   100,000 email accounts
   60,000 domains
Previous Infrastructure
   SpamAssassin with various
    community-driven SA rules
Problem/Pain
   Low detection/high FPs
   Rising costs
   High support/maintenance
    costs
   Many helpdesk calls
   Additional system load due to
    server-side scanning
Solution


  Commtouch Anti-spam
with SpamAssassin Plug-in
Results
 30%                    25-30%




 Spam        False       Per Server   Support   Help Desk
Detection   Positives   Performance    Costs      Calls




                                                 10%
               0                      25%
What Metanet had to say



              "With a highly skilled team and its rock-solid
              performance, Commtouch          delivered
              superior detection and service from the
              implementation phase through production. After
              evaluating other commercial anti-spam technologies,
              we found that Commtouch‟s cloud-based
              architecture has unmatched spam
              filtering accuracy. It perfectly complements our
              long-established anti-spam strategy.“


              Mirco Schnarwiler
              AG, Co-founder &Technical Director
              METANET
Hosting Provider
   100,000+ provisioned domains
   Average of 330 million message
    transactions/day
    (10 billion messages/month)
Problem/Pain
   Spam load impacting ability to
    deliver timely mail
   Help desk spending too much
    time with FPs & customer virus
    issues
   Customers blacklisted by bots
    that compromised email accounts
    & sending spam
   Costs for managing email
    infrastructure unpredictable and
    difficult to manage
Solution
   Commtouch Anti-Spam
   Commtouch Mail Reputation
   Commtouch Zero-Hour Virus
    Protection
Result




     Incoming   Hardware    Per user   Email Help
        Mail     Usage     Bandwidth   Desk Calls




                                       significant


                            80%
     ~95%        85%
What mail2world had to say



                “As part of our multi layer protection strategy,
                our operations team relies on Commtouch to
                scale automatically to quickly
                absorb and eliminate new spam
                outbreaks. Commtouch‟s technology further
                enables us to reduce our bandwidth
                costs and ensure that our
                customers do not know when spam
                storms hit.”
                Kamil Asfour
                Director of Operations
                Mail2World
What Others Have to Say

              “We saw an immediate 10-15% drop in
              the infrastructure required to run our
              messaging system.”
              Hosting Product Manager
              Large Web Hosting Provider




              “…80% of the messages are eliminated
              with Commtouch’s GlobalView IP reputation.
              Therefore, 1 server is doing the previous
              work of 5 servers doing just content-based
              anti-spam scanning.”
              Director, Business Development
              MTA Appliance vendor
Easy Integration With Open Source




            Easy integration with popular open source
Easy Integration With Open Source cont…
                          Sendmail Milter
                          Seamless integration with:
                          • IP Reputation
                          • Anti-Spam
                          • Virus Outbreak Detection



                          Patch to integrate
                          • GlobalView IP Reputation
                          Qmail-Scanner Plug-in for
                          • Anti-Spam
                          • Virus Outbreak Detection
                          QpSMTPd Plug-in


                                 Plug-in for
                                 • Anti-Spam
                                 • Virus Outbreak Detection
Easy Integration With Open Source cont…
                          Generic Plug-in enables to
                          disable SpamAssassin and to
                          integrate:
                          • Anti-Spam
                          • Virus Outbreak Detection




                           Patch to integrate:
                           • Anti-Spam
                           • Virus Outbreak Detection




                                 RBL Interface for
                Other            • GlobalView IP Reputation
Not Only Open Source but “Pluggable”




             Connector for Exchange 2007/2010
             • GlobalView IP Reputation
             • Anti-Spam
             • Virus Outbreak Detection
Taking Your Open Source Email
           Security to the Next Level
   Lower your costs
       Reduce mail entering your network
       Reduce number of processors needed
       Lower Help Desk calls & IT/Admin time
   Integrate with your open source
       Protect your current investment
       Minimal technical requirements
   Improve detection rates
       Improve customer satisfaction
       Low FPs/FNs
   Eliminate Outbound spam
Thank You
Gabriel.Mizrahi@commtouch.com   www.commtouch.com
                                http://blog.commtouch.com/cafe

Más contenido relacionado

Destacado

Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 

Destacado (6)

Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Email
EmailEmail
Email
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 

Similar a Taking your open source email security to the next level

Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on CloudSATYAVEER PAL
 
A Marketer's Guide to the 4 ISP's
A Marketer's Guide to the 4 ISP'sA Marketer's Guide to the 4 ISP's
A Marketer's Guide to the 4 ISP'sVivastream
 
Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webSymantec Italia
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterJohn Jefferies
 
How to secure your data in the cloud
How to secure your data in the cloudHow to secure your data in the cloud
How to secure your data in the cloudOptfinITy
 
Scaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, GoalsScaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, Goalskamaelian
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
respond_to :voice - the convergence of voice and web interfaces with Rails an...
respond_to :voice - the convergence of voice and web interfaces with Rails an...respond_to :voice - the convergence of voice and web interfaces with Rails an...
respond_to :voice - the convergence of voice and web interfaces with Rails an...jpalley
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentationSoftechms
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Private Cloud
 
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdfQConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdfSimranjyotSuri
 
Mastering Chaos - A Netflix Guide to Microservices
Mastering Chaos - A Netflix Guide to MicroservicesMastering Chaos - A Netflix Guide to Microservices
Mastering Chaos - A Netflix Guide to MicroservicesJosh Evans
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
03.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 201003.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 2010mcini
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...HostedbyConfluent
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Finalniallmmackey
 
Building a Great Web API - Evan Cooke - QCON 2011
Building a Great Web API - Evan Cooke - QCON 2011Building a Great Web API - Evan Cooke - QCON 2011
Building a Great Web API - Evan Cooke - QCON 2011Twilio Inc
 
OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009Gerardo Pardo-Castellote
 

Similar a Taking your open source email security to the next level (20)

Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on Cloud
 
A Marketer's Guide to the 4 ISP's
A Marketer's Guide to the 4 ISP'sA Marketer's Guide to the 4 ISP's
A Marketer's Guide to the 4 ISP's
 
Il Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del webIl Cloud a difesa della mail e del web
Il Cloud a difesa della mail e del web
 
Abaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam FilterAbaca: The World's Most Effective Spam Filter
Abaca: The World's Most Effective Spam Filter
 
How to secure your data in the cloud
How to secure your data in the cloudHow to secure your data in the cloud
How to secure your data in the cloud
 
Scaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, GoalsScaling Streaming - Concepts, Research, Goals
Scaling Streaming - Concepts, Research, Goals
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
respond_to :voice - the convergence of voice and web interfaces with Rails an...
respond_to :voice - the convergence of voice and web interfaces with Rails an...respond_to :voice - the convergence of voice and web interfaces with Rails an...
respond_to :voice - the convergence of voice and web interfaces with Rails an...
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentation
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
 
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdfQConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
QConSF2016-JoshEvans-MasteringChaosANetflixGuidetoMicroservices-compressed.pdf
 
Mastering Chaos - A Netflix Guide to Microservices
Mastering Chaos - A Netflix Guide to MicroservicesMastering Chaos - A Netflix Guide to Microservices
Mastering Chaos - A Netflix Guide to Microservices
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
03.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 201003.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 2010
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
Fan-in Flames: Scaling Kafka to Millions of Producers With Ryanne Dolan | Cur...
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Final
 
Building a Great Web API - Evan Cooke - QCON 2011
Building a Great Web API - Evan Cooke - QCON 2011Building a Great Web API - Evan Cooke - QCON 2011
Building a Great Web API - Evan Cooke - QCON 2011
 
OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009
 

Más de Cyren, Inc

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowCyren, Inc
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksCyren, Inc
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyCyren, Inc
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatCyren, Inc
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeCyren, Inc
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteCyren, Inc
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportCyren, Inc
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportCyren, Inc
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 

Más de Cyren, Inc (20)

Webinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to knowWebinar: Is your web security broken? - 10 things you need to know
Webinar: Is your web security broken? - 10 things you need to know
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array worksWebinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: Stopping evasive malware - how a cloud sandbox array works
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking surveyWebinar: IT security at SMBs: 2016 benchmarking survey
Webinar: IT security at SMBs: 2016 benchmarking survey
 
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threatWebinar: A deep dive on phishing, today's #1 business threat
Webinar: A deep dive on phishing, today's #1 business threat
 
Webinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrimeWebinar: Botnets - The clone army of cybercrime
Webinar: Botnets - The clone army of cybercrime
 
Webinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsoleteWebinar: How hackers are making your security obsolete
Webinar: How hackers are making your security obsolete
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat ReportWebinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats ReportWebinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Taking your open source email security to the next level

  • 1. Taking your open source email security to the next level Gabriel M. Mizrahi VP Technologies March 18, 2010
  • 2. About Me  12 years of email security experience  Over 15 years in the open source community  Founded an Internet security company in 2001  Married with 2 kids  A big Barcelona FC fan!
  • 3. Hosting Provider Quiz Today’s  Issues with open source security Agenda  Taking open source email security to the next level  Case Studies
  • 4. The Hosting Provider Quiz 1) We use open source because… a) we started with it and grew b) it’s low cost c) we’re comfortable with it d) all of the above
  • 5. The Hosting Provider Quiz 2) We would love to be able to… a) reduce the cost of handling email b) enhance detection rates & lower FPs c) improve customer satisfaction & increase our business d) all of the above
  • 6. The Hosting Provider Quiz 3) But… to adopt a new solution a) we won’t throw out our existing investment b) it would have to easily integrate with current infrastructure c) it must provide a differentiator d) all of the above
  • 7. The Hosting Provider Quiz 4) How much does it cost to handle spam with your current solution? a) I know exactly all my costs b) I have a rough estimate c) Not sure
  • 8. Something We Can Agree On  Email is a low margin service with high costs (Capex/Opex)  You‟re using open source security because it offers flexibility  Any changes you would make need to be justified • Financially • With regards to level of service
  • 9. One Last Question 4) Will open source alone be able to take you to where you need to go? ?
  • 10. Why Open Source Email Security is an Issue Security Spam, phishing Costs and viruses trends Infrastructure
  • 11. Spam & Phishing Trends Security  Increasing Spam Levels • 2002 – 25% • 2010 – over 90%  Spammers improving their techniques • Blended threats • Free Webmail accounts compromised and sending spam attacks • Use of popular sites – CNN, Adobe, others to trick users to malware sites • Other social engineering techniques
  • 12. Virus Trends Security  Distributed faster/more frequently than AV Signatures are created  Vulnerability in first hours  Multiple variants in the same attack  Life of a variant can be as little as several hours
  • 13. Outbound Spam – The Latest Concern Security  Compromised accounts  You are at risk of being BLACKLISTED because of outbound spam/viruses – “Shared reputation” • RBLs that block entire “C” classes • Virtual servers on a single physical server  Deal with abuse complaints
  • 14. Existing Infrastructure Issues Infrastructure A short list of open source email security tools:  SpamAssassin  Bayesian Filters (e.g. Bogofilter, DSPAM)  Signature based anti-virus (e.g. ClamAV)  Collaborative filters (e.g. Pyzor, Razor, DCC)  Lexical filters (e.g. Block subjects with the word „viagra‟)  Greylisting (e.g. Postgrey, Greymilter)  SPF/Domain Keys  SMTP „HELO‟ checks  SMTP „MAIL FROM‟ checks  SMTP early talker detection  Local IP whitelists and blacklists  Domain based RBLs (e.g. SURBL, URIBL, DBL)  IP based RBLs (e.g. SBL, XBL, APEWS)
  • 15. Common Administrative Issues Infrastructure  Time consuming • To achieve better coverage – must use/maintain/tune many tools  Admin staff • Someone needs to manage and maintain long list of open source tools  Staff expertise • Need to analyze each missed spam and identify unique parameters • Language dependant • By nature opens possibility for FPs/FNs
  • 16. Rising Email Security Costs Costs Spam Cycle Additional Costs Spam Customer dissatisfaction increases Helpdesk resources for increased complaints More Servers to cope More Never More with rising spam levels FNs ending FPs cycle IT Resources to write rules Helpdesk resources for increased complaints More rules More Bandwidth
  • 17. Hosting Analysis Exercise Number of mail subscribers 100,000 Average legitimate messages/day/subscriber 7 Average messages/ 150 day/subscriber (95% are spam) Total messages/day 15,000,000 Average message size 25Kb Total message traffic/day 358GB
  • 18. Hosting Provider Cost & Savings Analysis
  • 19. Peak Bandwidth Bandwidth Comparison Sustained 100 Commercial IP Reputation solution Bandwidth usage (Mb) can reduce traffic up to 85%*  More Predictable  Reduced bandwidth costs 135.7  Fewer mails to analyze Mbps 50 67.8 Mbps Pay for 5.1 3.1 only this 20.5M 20.3 Mbps Mbps 95% of peak bps Mbps No IP Filtering IP Based RBL Commercial IP Reputation Bandwidth Consumption * Data supplied by Commtouch partners
  • 20. Hardware Comparison 36 18 20 Servers Servers 18,000,000 msgs/day 15,000,000 msgs/day Messages (Millions) Only 4 servers ( + 20% spare) 15 required* 10 Server Capacity 5 500,000 msgs/day 1,100,000 msgs/day 5,000,000 msgs/day SpamAssassin SpamAssassin Commercial Servers + IP Based RBL Email Security * Data supplied by Commtouch partners
  • 21. Take your open source email security to the next level
  • 22. What if you could…  Increase detection with your existing infrastructure  Reduce inbound bandwidth  Not only block outbound spam but catch the spammers • Put an end to your IP ranges being blacklisted and…  Reduce costs
  • 23. Essentials for Solution  A global view of email traffic • Higher detection rate • Lower FPs  Scalable, transparent processing power  Unattended operation  Easy integration with your existing open source security solutions
  • 24. Furthermore…  Reduces Capex/Opex • Enables scalable growth • Decreases IT/Admin involvement • Reduces support calls • Creates excess processing power that can be repurposed  Provides new opportunities and differentiators • Configure the services you want/need • Offer new premium services • Increases your business
  • 25. Hosting Providers that took their open source to the next level
  • 26. Metanet AG & mail2world
  • 27. Hosting provider  Founded in 2000  Offers services for resellers and end customers  One of top 10 hosting companies in Switzerland  750 servers in network  > 10,000 SMB customers  100,000 email accounts  60,000 domains
  • 28. Previous Infrastructure  SpamAssassin with various community-driven SA rules
  • 29. Problem/Pain  Low detection/high FPs  Rising costs  High support/maintenance costs  Many helpdesk calls  Additional system load due to server-side scanning
  • 30. Solution Commtouch Anti-spam with SpamAssassin Plug-in
  • 31. Results 30% 25-30% Spam False Per Server Support Help Desk Detection Positives Performance Costs Calls 10% 0 25%
  • 32. What Metanet had to say "With a highly skilled team and its rock-solid performance, Commtouch delivered superior detection and service from the implementation phase through production. After evaluating other commercial anti-spam technologies, we found that Commtouch‟s cloud-based architecture has unmatched spam filtering accuracy. It perfectly complements our long-established anti-spam strategy.“ Mirco Schnarwiler AG, Co-founder &Technical Director METANET
  • 33. Hosting Provider  100,000+ provisioned domains  Average of 330 million message transactions/day (10 billion messages/month)
  • 34. Problem/Pain  Spam load impacting ability to deliver timely mail  Help desk spending too much time with FPs & customer virus issues  Customers blacklisted by bots that compromised email accounts & sending spam  Costs for managing email infrastructure unpredictable and difficult to manage
  • 35. Solution  Commtouch Anti-Spam  Commtouch Mail Reputation  Commtouch Zero-Hour Virus Protection
  • 36. Result Incoming Hardware Per user Email Help Mail Usage Bandwidth Desk Calls significant 80% ~95% 85%
  • 37. What mail2world had to say “As part of our multi layer protection strategy, our operations team relies on Commtouch to scale automatically to quickly absorb and eliminate new spam outbreaks. Commtouch‟s technology further enables us to reduce our bandwidth costs and ensure that our customers do not know when spam storms hit.” Kamil Asfour Director of Operations Mail2World
  • 38. What Others Have to Say “We saw an immediate 10-15% drop in the infrastructure required to run our messaging system.” Hosting Product Manager Large Web Hosting Provider “…80% of the messages are eliminated with Commtouch’s GlobalView IP reputation. Therefore, 1 server is doing the previous work of 5 servers doing just content-based anti-spam scanning.” Director, Business Development MTA Appliance vendor
  • 39. Easy Integration With Open Source Easy integration with popular open source
  • 40. Easy Integration With Open Source cont… Sendmail Milter Seamless integration with: • IP Reputation • Anti-Spam • Virus Outbreak Detection Patch to integrate • GlobalView IP Reputation Qmail-Scanner Plug-in for • Anti-Spam • Virus Outbreak Detection QpSMTPd Plug-in Plug-in for • Anti-Spam • Virus Outbreak Detection
  • 41. Easy Integration With Open Source cont… Generic Plug-in enables to disable SpamAssassin and to integrate: • Anti-Spam • Virus Outbreak Detection Patch to integrate: • Anti-Spam • Virus Outbreak Detection RBL Interface for Other • GlobalView IP Reputation
  • 42. Not Only Open Source but “Pluggable” Connector for Exchange 2007/2010 • GlobalView IP Reputation • Anti-Spam • Virus Outbreak Detection
  • 43. Taking Your Open Source Email Security to the Next Level  Lower your costs  Reduce mail entering your network  Reduce number of processors needed  Lower Help Desk calls & IT/Admin time  Integrate with your open source  Protect your current investment  Minimal technical requirements  Improve detection rates  Improve customer satisfaction  Low FPs/FNs  Eliminate Outbound spam
  • 44. Thank You Gabriel.Mizrahi@commtouch.com www.commtouch.com http://blog.commtouch.com/cafe

Notas del editor

  1. Data source: Testimonials from Commtouch partners: MTA vendors, Gateway vendors, hosting providers.