SlideShare uma empresa Scribd logo
1 de 22
© 2016 Alt-N Technologies
Layered Protection for Email
Servers
Feature Overview
© 2016 Alt-N Technologies
Meeting Customer Email Security Needs
• Real-time Spam Protection
• Anti-Spoofing Tools
• Anti-Abuse Tools
• Protects Against False Positives
• Low Software costs
– Flexible Licensing Structure
• Low Hardware expenses
– Runs on existing hardware
• No Specialized IT staff Required
• Flexible configuration
© 2016 Alt-N Technologies
Interoperability
• SecurityGateway works with any email server
Internet
Email ServerSecurityGateway
© 2016 Alt-N Technologies
Feature Details: Security Options
• Multiple Security Tools
– Anti-Spam
– Anti-Virus
– Anti-Spoofing
– Anti-Abuse
– Filtering
– Blacklists & Whitelists
• Weighted detection
– No single point-of-failure to
exploit
SecurityGateway uses multiple security tests to defend
against spammers and hackers. It never gives them a
single point-of-failure to exploit.
© 2016 Alt-N Technologies
Anti-Spam Tools
• Heuristic & Bayesian analysis
• DNS Blacklists
• URL Blacklists
• Greylisting
• Message Certification
• Backscatter Protection
• Message Scoring
© 2016 Alt-N Technologies
Anti-Virus Tools
• Cyren AV
• Clam-AV
• Automatic Pattern Updates
© 2016 Alt-N Technologies
Anti-Spoofing Tools
• Reverse Lookups
• DKIM Signing & Verification
• DMARC
• SPF
• Callback Verification.
© 2016 Alt-N Technologies
Anti-Abuse Tools
• Relay Control,
• SMTP Authentication
• IP Shielding
• Dynamic Screening
• Tarpitting
• Bandwidth Throttling
• Account Hijack Detection
© 2016 Alt-N Technologies
Feature Details: Administrative Options
• Intuitive Web Interface
• Automated creation & maintenance of:
– Domains & Accounts (by querying the default user
verification source)
– Whitelists (created from recipients in outbound messages)
– Backups
• Quarantines – Quarantined messages can be released for
delivery by the administrator.
• Message Logs
• Real-Time Graphical Reports
© 2016 Alt-N Technologies
Feature Details: Message Logs
Message logs make it easy to
determine what happened to a
message – whether it was
delivered, quarantined, or
rejected.
© 2016 Alt-N Technologies
Feature Details: Queues
Message Queues
• Quarantined for the user
• Administrative quarantine (for
data leak prevention or infected
messages)
• Messages queued for delivery
• Bad message queue – for
undeliverable messages
© 2016 Alt-N Technologies
Outbreak Protection
Protect from spam &
virus outbreaks in
real-time with Cyren
Outbreak Protection.
© 2016 Alt-N Technologies
Anti-Virus
Dual anti-virus engines –
Cyren & ClamAV.
Infected messages can be
refused or quarantined –
globally or per-domain
© 2016 Alt-N Technologies
Quarantine Summary
Users can receive a personalized
quarantine summary report.
Users can:
• Release the message for delivery
• Whitelist the sender
• Blacklist the sender
© 2016 Alt-N Technologies
Quarantine Summary
Users can also click this link to view
their quarantine in SecurityGateway
© 2016 Alt-N Technologies
Feature Details: Graphical Reports
• View current and
historic data
• Clickable points link to
message logs
• See trends in real time
© 2016 Alt-N Technologies
Feature Details: Graphical Reports
Report types
• Inbound & outbound traffic
• Good vs. junk email
• Junk mail by type (spam,
virus, spoofing)
• Bandwidth usage
• Top senders & recipients
• Top sending & receiving
domains that send spam
• Viruses detected – by
volume & name
© 2016 Alt-N Technologies
Reports
Reports are designed to help
administrators quickly & easily
understand & analyze email traffic
& performance.
The comprehensive reporting
provides at-a-glance identification
of trends & potential issues.
The detailed reporting also helps
identify troublesome senders and
delivery areas that can be
addressed to further improve server
performance.
© 2016 Alt-N Technologies
Reports
The easy-to-use, point-
and-click, drill-down
functionality allows
administrators to
quickly and easily
analyze a potential
problem.
© 2016 Alt-N Technologies
Reports
This is the message set
for the data point
clicked – a one hour
range.
© 2016 Alt-N Technologies
Reports
Common SMTP
commands and
responses in message
transcripts are color-
coded to easily
investigate and identify
reasons for message
actions.
© 2016 Alt-N Technologies
Summary
• Dedicated, high performance email gateway
• Cutting edge security features
• Intuitive, task-based user interface
• Detailed reports
Visit www.altn.com to learn more!

Mais conteúdo relacionado

Mais procurados

D3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS MitigationD3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS MitigationImperva Incapsula
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackImperva
 
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010Affan Basalamah
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudImperva Incapsula
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionAndy Ellis
 
Fine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted softwareFine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted softwarePhú Phùng
 

Mais procurados (7)

Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
 
D3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS MitigationD3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS Mitigation
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the Cloud
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
Fine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted softwareFine-grained policy enforcement for untrusted software
Fine-grained policy enforcement for untrusted software
 

Destaque

Destaque (8)

Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Malware
MalwareMalware
Malware
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Growth Hacking
Growth HackingGrowth Hacking
Growth Hacking
 

Semelhante a SecurityGateway for Email Servers - Feature Overview

Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseCisco Canada
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaperrun_frictionless
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackImperva
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate wayvfmindia
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxssuser813dcd
 
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...omgmaxsmith
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareTzar Umang
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarAdelaide Hill
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ralbary
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceJason Trost
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 

Semelhante a SecurityGateway for Email Servers - Feature Overview (20)

Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
 
Network security
Network securityNetwork security
Network security
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
 
SonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptxSonicWALL - Skytek - VnPro.pptx
SonicWALL - Skytek - VnPro.pptx
 
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
Spamtitan_brochure_V3
Spamtitan_brochure_V3Spamtitan_brochure_V3
Spamtitan_brochure_V3
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 

Último

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 

Último (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 

SecurityGateway for Email Servers - Feature Overview

  • 1. © 2016 Alt-N Technologies Layered Protection for Email Servers Feature Overview
  • 2. © 2016 Alt-N Technologies Meeting Customer Email Security Needs • Real-time Spam Protection • Anti-Spoofing Tools • Anti-Abuse Tools • Protects Against False Positives • Low Software costs – Flexible Licensing Structure • Low Hardware expenses – Runs on existing hardware • No Specialized IT staff Required • Flexible configuration
  • 3. © 2016 Alt-N Technologies Interoperability • SecurityGateway works with any email server Internet Email ServerSecurityGateway
  • 4. © 2016 Alt-N Technologies Feature Details: Security Options • Multiple Security Tools – Anti-Spam – Anti-Virus – Anti-Spoofing – Anti-Abuse – Filtering – Blacklists & Whitelists • Weighted detection – No single point-of-failure to exploit SecurityGateway uses multiple security tests to defend against spammers and hackers. It never gives them a single point-of-failure to exploit.
  • 5. © 2016 Alt-N Technologies Anti-Spam Tools • Heuristic & Bayesian analysis • DNS Blacklists • URL Blacklists • Greylisting • Message Certification • Backscatter Protection • Message Scoring
  • 6. © 2016 Alt-N Technologies Anti-Virus Tools • Cyren AV • Clam-AV • Automatic Pattern Updates
  • 7. © 2016 Alt-N Technologies Anti-Spoofing Tools • Reverse Lookups • DKIM Signing & Verification • DMARC • SPF • Callback Verification.
  • 8. © 2016 Alt-N Technologies Anti-Abuse Tools • Relay Control, • SMTP Authentication • IP Shielding • Dynamic Screening • Tarpitting • Bandwidth Throttling • Account Hijack Detection
  • 9. © 2016 Alt-N Technologies Feature Details: Administrative Options • Intuitive Web Interface • Automated creation & maintenance of: – Domains & Accounts (by querying the default user verification source) – Whitelists (created from recipients in outbound messages) – Backups • Quarantines – Quarantined messages can be released for delivery by the administrator. • Message Logs • Real-Time Graphical Reports
  • 10. © 2016 Alt-N Technologies Feature Details: Message Logs Message logs make it easy to determine what happened to a message – whether it was delivered, quarantined, or rejected.
  • 11. © 2016 Alt-N Technologies Feature Details: Queues Message Queues • Quarantined for the user • Administrative quarantine (for data leak prevention or infected messages) • Messages queued for delivery • Bad message queue – for undeliverable messages
  • 12. © 2016 Alt-N Technologies Outbreak Protection Protect from spam & virus outbreaks in real-time with Cyren Outbreak Protection.
  • 13. © 2016 Alt-N Technologies Anti-Virus Dual anti-virus engines – Cyren & ClamAV. Infected messages can be refused or quarantined – globally or per-domain
  • 14. © 2016 Alt-N Technologies Quarantine Summary Users can receive a personalized quarantine summary report. Users can: • Release the message for delivery • Whitelist the sender • Blacklist the sender
  • 15. © 2016 Alt-N Technologies Quarantine Summary Users can also click this link to view their quarantine in SecurityGateway
  • 16. © 2016 Alt-N Technologies Feature Details: Graphical Reports • View current and historic data • Clickable points link to message logs • See trends in real time
  • 17. © 2016 Alt-N Technologies Feature Details: Graphical Reports Report types • Inbound & outbound traffic • Good vs. junk email • Junk mail by type (spam, virus, spoofing) • Bandwidth usage • Top senders & recipients • Top sending & receiving domains that send spam • Viruses detected – by volume & name
  • 18. © 2016 Alt-N Technologies Reports Reports are designed to help administrators quickly & easily understand & analyze email traffic & performance. The comprehensive reporting provides at-a-glance identification of trends & potential issues. The detailed reporting also helps identify troublesome senders and delivery areas that can be addressed to further improve server performance.
  • 19. © 2016 Alt-N Technologies Reports The easy-to-use, point- and-click, drill-down functionality allows administrators to quickly and easily analyze a potential problem.
  • 20. © 2016 Alt-N Technologies Reports This is the message set for the data point clicked – a one hour range.
  • 21. © 2016 Alt-N Technologies Reports Common SMTP commands and responses in message transcripts are color- coded to easily investigate and identify reasons for message actions.
  • 22. © 2016 Alt-N Technologies Summary • Dedicated, high performance email gateway • Cutting edge security features • Intuitive, task-based user interface • Detailed reports Visit www.altn.com to learn more!