SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Business-Ready Security—Secure Messaging Solution
Is Your Messaging Infrastructure Secure?
E-mail and instant messaging represent two of the most common threats facing organizations today, which can range from incoming complex malware
to information loss and misuse. Increasingly, hackers are using multiple techniques to bypass older messaging security solutions. The latest trend is for
spammers to embed URL links in spam to lure users to malicious Web sites (phishing). Blended threats that use spam, phishing, spyware, viruses, and
malicious Web sites are on the rise, making it difficult for companies to provide adequate security. In such an environment, spam, inappropriate content,
and information leaks can reduce productivity, increase business costs and risks, and make it difficult to meet compliance mandates.

Messaging infrastructure demands advanced protection while still enabling secure access to e-mail from virtually anywhere and on almost any device.



Secure Messaging Solution
                                                                                                                                  Malware and spam cleaning
                                                                                                    Internal mail protected
Microsoft® Forefront™ has brought together key capabilities needed to provide an                   with Forefront Protection
                                                                                                                                  in the cloud with Forefront
                                                                                                                                       Online Protection
integrated solution to secure the messaging environment. The Secure Messaging                      2010 for Exchange Server
                                                                                                                                          for Exchange
solution enables more secure business communications from virtually any location
or device, while preventing unauthorized use of confidential information. Through
deep integration across the messaging platform, IT administrators can enable more
secure communication both within the enterprise and with outside organizations
by using standards-based and interoperable identity sharing. With simplified
security management that provides critical enterprise-wide visibility, businesses can
implement centralized control of messaging security.

The Secure Messaging solution is part of Microsoft Business-Ready Security, which
focuses on the principle that security is a means to a business end. Microsoft offers
security solutions that help companies manage risks and empower people with access
to the information they need to get their jobs done.
                                                                                                      Always-on access              Information protection
                                                                                                      built into platform            built into the platform

Protect Everywhere, Access Anywhere
The Secure Messaging solution gives users more secure access to e-mail that is free
of spam and malware from virtually any location and device. With identity-centric and
policy-based protection across multiple layers, IT can prevent unauthorized use of sensitive
information either in motion or at rest.                                                          “Forefront Security for Exchange
    Deliver best-in-class security with multiple scan engines from industry-leading               Server can support up to five
    vendors with Microsoft Forefront Protection 2010 for Exchange Server.                         scanning engines at the same
    Provide on-premises and cloud-based anti-spam protection through aggregated                   time. Thus, it offers a more secure
    reputation services and SmartScreen filtering with Microsoft Forefront Protection             environment, compared with
    2010 for Exchange Server and Forefront Online Protection for Exchange.                        products that support using only a
    Automatically protect sensitive e-mail and documents with Active Directory®                   single engine.”
    Rights Management Services that goes wherever the data goes.

    Help enforce policy-based restricted use of e-mail attachments with document                  Akihiro Shiotani
    scrubbing to remove cached content and prevent data leaks with Forefront                      Section Chief of the Infrastructure Group
    Unified Access Gateway.
                                                                                                  Astellas Pharma Information Systems Department
    Enable secure, seamless, nearly continual access to messaging from Windows® 7
    clients with DirectAccess in Microsoft Windows Server® 2008 R2.
Integrate and Extend Security Across the Enterprise
                                                                                                                     “Today, people send lots of protected
The Secure Messaging solution extends secure e-mail to partners by using standards-                                  e-mail. This [Active Directory Rights
based, interoperable identity sharing and deep integration with Exchange Server,
                                                                                                                     Management Services] enables people
Active Directory Rights Management Services, and Microsoft Office.
                                                                                                                     to download rights-protected e-mail
    Optimize malware detection by balancing security and performance needs
                                                                                                                     when connected to the corporate
    through the Intelligent Engine Selection Policy controls of Forefront Protection
    2010 for Exchange Server.                                                                                        network and read it at a later time,
                                                                                                                     even if they’re working offline.”
    Increase mail throughput by analyzing multiple messages or documents
    simultaneously with unique, in-memory, multi-threaded malware scanning in
    Forefront Protection 2010 for Exchange Server.                                                                   Robbie Roberts
                                                                                                                      IT Manager
    Help Federate Active Directory Rights Management Services with outside
    organizations to extend secure communication and collaboration to business                                       Windrush
    partners using Active Directory Federation Services.



Simplify the Security Experience, Manage Compliance
The Secure Messaging solution helps reduce IT overhead with easy-to-use tools that
provide enterprise-wide visibility into messaging and the client security state and
resources. The console in Forefront Server Security Management helps to:

    Single console for managing on-premise and cloud-based messaging security
    providing central configuration and operation, automated download and
    distribution of signature and scan engine updates, and comprehensive reporting.

    Reduce IT training time with a single console with easy-to-use wizards and
    templates to configure e-mail security, respond to threats, and create alerts.




The Secure Messaging solution is composed of an integrated line of protection and access and management
products, all built around users’ identities and integrated with the platform.


                                                    Cloud-based, layered technologies to                                                   Comprehensive, secure remote access
                                                    actively help protect businesses’ inbound and                                          to corporate resources for employees,
                                                    outbound e-mail from spam, viruses, phishing                                           partners, and vendors on both managed
                                                    scams, and e-mail policy violations, including                                         and unmanaged PCs and mobile devices
                                                    a 100 percent SLA for viruses and spam


                                                    Central console for simplifying the                                                    Fast and effective detection of viruses,
                                                    management of messaging and                                                            worms, and spyware by integrating multiple
                                                    collaboration application security                                                     scanning engines from industry-leading
                                                                                                                                           partners, with 99.7 percent spam detection
                                                                                                                                           through premium anti-spam services


                                                    Persistent, identity-based encryption                                                  Fast and effective protection against
                                                    and usage policies to safeguard digital                                                inappropriate content and IM-based
     Active Directory® Rights Management Services
                                                    information from unauthorized use—both                                                 malware through multiple scanning engines
                                                    online and offline, inside and outside of the                                          from industry-leading security partners
                                                    corporate firewall




                                        Learn more about the Secure Messaging solution and download it at:

                                   http://www.microsoft.com/forefront
© 2009 Microsoft Corporation. All rights reserved. Microsoft, the Microsoft logo, Forefront, Windows, Windows Server, all Forefront products, and Active Directory Rights Management
Services are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective
owners. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

Mais conteúdo relacionado

Mais procurados

Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaid
rackAID Support
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
guestb099f64c
 
Smart Protection Network
Smart Protection NetworkSmart Protection Network
Smart Protection Network
kevin liao
 
Ds security
Ds securityDs security
Ds security
Servium
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 

Mais procurados (19)

Buyers Guide To Messaging Security Dec 2009
Buyers Guide To Messaging Security Dec 2009Buyers Guide To Messaging Security Dec 2009
Buyers Guide To Messaging Security Dec 2009
 
Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaid
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
Smart Protection Network
Smart Protection NetworkSmart Protection Network
Smart Protection Network
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
Ds security
Ds securityDs security
Ds security
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Architecting Secure Service Oriented Web Services
Architecting Secure Service Oriented Web ServicesArchitecting Secure Service Oriented Web Services
Architecting Secure Service Oriented Web Services
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
489 493
489 493489 493
489 493
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
Microsoft India  - Forefront Threat Management Gateway 2010 Case StudyMicrosoft India  - Forefront Threat Management Gateway 2010 Case Study
Microsoft India - Forefront Threat Management Gateway 2010 Case Study
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 

Semelhante a Microsoft Forefront - Secure Messaging Solution Datasheet

Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Private Cloud
 
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Forefront -  Online Security For Exchange WhitepaperMicrosoft Forefront -  Online Security For Exchange Whitepaper
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Private Cloud
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Private Cloud
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Private Cloud
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
☁ ☁ Gautam T ☁☁
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Private Cloud
 
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Private Cloud
 
Microsoft Forefront - Security for SharePoint Whitepaper
Microsoft Forefront - Security for SharePoint WhitepaperMicrosoft Forefront - Security for SharePoint Whitepaper
Microsoft Forefront - Security for SharePoint Whitepaper
Microsoft Private Cloud
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Octree securapro mauleverer case study
Octree securapro mauleverer case studyOctree securapro mauleverer case study
Octree securapro mauleverer case study
Tony Richardson CISSP
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 

Semelhante a Microsoft Forefront - Secure Messaging Solution Datasheet (20)

Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
 
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Forefront -  Online Security For Exchange WhitepaperMicrosoft Forefront -  Online Security For Exchange Whitepaper
Microsoft Forefront - Online Security For Exchange Whitepaper
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
 
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_USMicrosoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
Microsoft_Enterprise_Mobility_plus_Security_datasheet_EN_US
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
 
Microsoft Forefront - Security for SharePoint Whitepaper
Microsoft Forefront - Security for SharePoint WhitepaperMicrosoft Forefront - Security for SharePoint Whitepaper
Microsoft Forefront - Security for SharePoint Whitepaper
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Octree securapro mauleverer case study
Octree securapro mauleverer case studyOctree securapro mauleverer case study
Octree securapro mauleverer case study
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 

Mais de Microsoft Private Cloud

Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data QuestMicrosoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft Private Cloud
 
Economics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyEconomics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO Survey
Microsoft Private Cloud
 
Assess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingAssess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth Modeling
Microsoft Private Cloud
 
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyTicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
Microsoft Private Cloud
 
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
Microsoft Private Cloud
 
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyGodiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Microsoft Private Cloud
 
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Microsoft Private Cloud
 
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Private Cloud
 
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperSimplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Microsoft Private Cloud
 
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Microsoft Private Cloud
 
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Microsoft Private Cloud
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Microsoft Private Cloud
 
Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...
Microsoft Private Cloud
 
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Microsoft Private Cloud
 
Cloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftCloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from Microsoft
Microsoft Private Cloud
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Microsoft Private Cloud
 

Mais de Microsoft Private Cloud (20)

Hyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivityHyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivity
 
AcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper VAcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper V
 
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data QuestMicrosoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
Microsoft at No. 1 Spot In Customer Satisfaction Audit - Data Quest
 
Cloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the CloudCloud Computing Myth Busters - Know the Cloud
Cloud Computing Myth Busters - Know the Cloud
 
Economics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO SurveyEconomics of the Cloud - A Report Based On CFO Survey
Economics of the Cloud - A Report Based On CFO Survey
 
Assess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth ModelingAssess The Economics Of The Cloud By Using In Depth Modeling
Assess The Economics Of The Cloud By Using In Depth Modeling
 
A Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud PowerA Guide To Finding Your Cloud Power
A Guide To Finding Your Cloud Power
 
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case StudyTicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
TicTacTi Advertising Improves by 400% by Adopting to Cloud Computing Case Study
 
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
REEDS Jeweller Moves to Online Services to Boost Productivity and Cut Costs b...
 
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case StudyGodiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
Godiva Chocolatier Saves $250,000 Annually by Moving Email to Cloud Case Study
 
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
Aviva Insurance Enhanced its Global Communication and Collaboration with Micr...
 
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
Microsoft Windows Server 2008 R2 - Upgrading from Windows 2000 to Server 2008...
 
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: WhitepaperSimplify Your IT Management with Microsoft SharePoint Online: Whitepaper
Simplify Your IT Management with Microsoft SharePoint Online: Whitepaper
 
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
Engage Customers through Real Time Meetings with Microsoft Office Live Meetin...
 
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
Get Instant Messaging and Presence Functionality with Microsoft Office Commun...
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
 
Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...Communicate Easily with Others in Different Locations with Microsoft Office C...
Communicate Easily with Others in Different Locations with Microsoft Office C...
 
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
Introduction to Microsoft SharePoint Online Capabilities, Security, Deploymen...
 
Cloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from MicrosoftCloud Based Communications Solutions from Microsoft
Cloud Based Communications Solutions from Microsoft
 
Reduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online SuiteReduce Capital & Operational Expenses with Business Productivity Online Suite
Reduce Capital & Operational Expenses with Business Productivity Online Suite
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

Microsoft Forefront - Secure Messaging Solution Datasheet

  • 1. Business-Ready Security—Secure Messaging Solution Is Your Messaging Infrastructure Secure? E-mail and instant messaging represent two of the most common threats facing organizations today, which can range from incoming complex malware to information loss and misuse. Increasingly, hackers are using multiple techniques to bypass older messaging security solutions. The latest trend is for spammers to embed URL links in spam to lure users to malicious Web sites (phishing). Blended threats that use spam, phishing, spyware, viruses, and malicious Web sites are on the rise, making it difficult for companies to provide adequate security. In such an environment, spam, inappropriate content, and information leaks can reduce productivity, increase business costs and risks, and make it difficult to meet compliance mandates. Messaging infrastructure demands advanced protection while still enabling secure access to e-mail from virtually anywhere and on almost any device. Secure Messaging Solution Malware and spam cleaning Internal mail protected Microsoft® Forefront™ has brought together key capabilities needed to provide an with Forefront Protection in the cloud with Forefront Online Protection integrated solution to secure the messaging environment. The Secure Messaging 2010 for Exchange Server for Exchange solution enables more secure business communications from virtually any location or device, while preventing unauthorized use of confidential information. Through deep integration across the messaging platform, IT administrators can enable more secure communication both within the enterprise and with outside organizations by using standards-based and interoperable identity sharing. With simplified security management that provides critical enterprise-wide visibility, businesses can implement centralized control of messaging security. The Secure Messaging solution is part of Microsoft Business-Ready Security, which focuses on the principle that security is a means to a business end. Microsoft offers security solutions that help companies manage risks and empower people with access to the information they need to get their jobs done. Always-on access Information protection built into platform built into the platform Protect Everywhere, Access Anywhere The Secure Messaging solution gives users more secure access to e-mail that is free of spam and malware from virtually any location and device. With identity-centric and policy-based protection across multiple layers, IT can prevent unauthorized use of sensitive information either in motion or at rest. “Forefront Security for Exchange Deliver best-in-class security with multiple scan engines from industry-leading Server can support up to five vendors with Microsoft Forefront Protection 2010 for Exchange Server. scanning engines at the same Provide on-premises and cloud-based anti-spam protection through aggregated time. Thus, it offers a more secure reputation services and SmartScreen filtering with Microsoft Forefront Protection environment, compared with 2010 for Exchange Server and Forefront Online Protection for Exchange. products that support using only a Automatically protect sensitive e-mail and documents with Active Directory® single engine.” Rights Management Services that goes wherever the data goes. Help enforce policy-based restricted use of e-mail attachments with document Akihiro Shiotani scrubbing to remove cached content and prevent data leaks with Forefront Section Chief of the Infrastructure Group Unified Access Gateway. Astellas Pharma Information Systems Department Enable secure, seamless, nearly continual access to messaging from Windows® 7 clients with DirectAccess in Microsoft Windows Server® 2008 R2.
  • 2. Integrate and Extend Security Across the Enterprise “Today, people send lots of protected The Secure Messaging solution extends secure e-mail to partners by using standards- e-mail. This [Active Directory Rights based, interoperable identity sharing and deep integration with Exchange Server, Management Services] enables people Active Directory Rights Management Services, and Microsoft Office. to download rights-protected e-mail Optimize malware detection by balancing security and performance needs when connected to the corporate through the Intelligent Engine Selection Policy controls of Forefront Protection 2010 for Exchange Server. network and read it at a later time, even if they’re working offline.” Increase mail throughput by analyzing multiple messages or documents simultaneously with unique, in-memory, multi-threaded malware scanning in Forefront Protection 2010 for Exchange Server. Robbie Roberts IT Manager Help Federate Active Directory Rights Management Services with outside organizations to extend secure communication and collaboration to business Windrush partners using Active Directory Federation Services. Simplify the Security Experience, Manage Compliance The Secure Messaging solution helps reduce IT overhead with easy-to-use tools that provide enterprise-wide visibility into messaging and the client security state and resources. The console in Forefront Server Security Management helps to: Single console for managing on-premise and cloud-based messaging security providing central configuration and operation, automated download and distribution of signature and scan engine updates, and comprehensive reporting. Reduce IT training time with a single console with easy-to-use wizards and templates to configure e-mail security, respond to threats, and create alerts. The Secure Messaging solution is composed of an integrated line of protection and access and management products, all built around users’ identities and integrated with the platform. Cloud-based, layered technologies to Comprehensive, secure remote access actively help protect businesses’ inbound and to corporate resources for employees, outbound e-mail from spam, viruses, phishing partners, and vendors on both managed scams, and e-mail policy violations, including and unmanaged PCs and mobile devices a 100 percent SLA for viruses and spam Central console for simplifying the Fast and effective detection of viruses, management of messaging and worms, and spyware by integrating multiple collaboration application security scanning engines from industry-leading partners, with 99.7 percent spam detection through premium anti-spam services Persistent, identity-based encryption Fast and effective protection against and usage policies to safeguard digital inappropriate content and IM-based Active Directory® Rights Management Services information from unauthorized use—both malware through multiple scanning engines online and offline, inside and outside of the from industry-leading security partners corporate firewall Learn more about the Secure Messaging solution and download it at: http://www.microsoft.com/forefront © 2009 Microsoft Corporation. All rights reserved. Microsoft, the Microsoft logo, Forefront, Windows, Windows Server, all Forefront products, and Active Directory Rights Management Services are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.