SlideShare uma empresa Scribd logo
1 de 27
Security Crosses
  the Chasm:
Surfing in Peace

     Shane Rice
  Services Evangelist
Why Web Protection?




     “The Web has become the new threat vector of
    choice by hackers and cyber criminals to distribute
    malware and perpetrate identity theft, financial fraud
            and corporate espionage.” -- IDC




                                                    Easy. Effective. Affordable.
Why Web Protection?

• "Malware” - short for malicious software
   – Refers to any software designed to cause damage to a
     single computer, server, or computer network, whether
     it's a virus, spyware, et al.
• Malicious Web content can expose your
  company to higher costs, lower productivity and
  legal issues



 Effective Web security can safeguard employees
     against online threats and protect network
                    infrastructure


                                                             Easy. Effective. Affordable.
Avenues of Attack

 Top Five Categories for Entering Malware Networks by
 Percentage of Requests




   Source: Blue Coat Security Labs            Easy. Effective. Affordable.
Malware Threat is Growing…

 Malware Delivered by Websites is on the Rise
   •   Cumulative Malware *
       – 2007: 5.8 million
       – 2011: 65 million (as of June)
         1120% Increase

   •   Malicious URLs*
       – 7,300 new malicious URLs per day

   •   Legitimate Websites being Compromised
         80% of Websites with Malicious Code




   *Source: McAfee Labs                         Easy. Effective. Affordable.
…And Growing More Effective

                                    More Malware               Malicious
                                     Variations         133%   Code Threats
                                                               in 12 months




 80%
       Of Malware
       infections are Web               68%
       application exploits          Of top Malware          Increasing
                                        infections        Attack Success!
       Web 2.0
                                         exposed
   is the Catalyst!                 confidential data          Of Vulnerable
                                                         4%    Websites get fixed!




                                    Attack Target
    500%        Increase in
                Phishing Sites!   Users vs Machines

                                                               Easy. Effective. Affordable.
Alarming 2011 Trend

 Unique Web Malware Encounters


                                 297% Increase




   Source: Cisco ScanSafe          Easy. Effective. Affordable.
A Clear and Present Danger




   Source: AppRiver          Easy. Effective. Affordable.
A Clear and Present Danger




   Source: AppRiver          Easy. Effective. Affordable.
A Clear and Present Danger




   Source: AppRiver          Easy. Effective. Affordable.
It’s The Economy Stupid




   Source: http://s0.geograph.org.uk/photos/87/30/873046_db56f88b.jpg   Easy. Effective. Affordable.
It’s The Economy Stupid




   Source: flickr.com User: r-z   Easy. Effective. Affordable.
It’s The Economy Stupid




   Source: flickr.com User: AMagill   Easy. Effective. Affordable.
It’s The Economy Stupid




                          Easy. Effective. Affordable.
Categorization: First Line of Defense
                             Web Filter

                                                                Shopping

                                              Gambling

                                                                Business

                                                IM

                                                         Porn


                                              Security

                                                         Business

                Filtering
                Database
                                    •   Secures The Network Environment
                 Security
               Pornography          •   Enforces Business-focused Internet Access
                Hate Sites
                Gambling            •   Reduces Liability
                Shopping
                Business            •   Manages Bandwidth
                   IM


                                                                           Easy. Effective. Affordable.
Layered Security – Stronger Protection
  Signature based detection is not enough to cover today’s targeted Malware attacks

          Anti-Virus                 Intent Analysis                 Anti-Malware

  • Anti-Virus                 • Authenticode –                • Prevents OS, browser
                                 Checks for Digital              and application exploits
  • However it is only a         Signature on active             as a result of:
    single aspect of the
    complete solution
                                 code                             • Protects from known
                               • Media Type Filter -                malicious code
  • Signature based              verification via “magic          • Protects from
    detection is not
    enough to cover
    today’s targeted Web
    2.0 Malware attacks
                           +     byte” analysis not MIME
                               • Behavioral Malware
                                 detector - scans for
                                                           =        unknown malicious
                                                                    mobile code for
                                                                    which no signature
                                                                    exists
                                 malicious script intent
                                 and removes offending
                                 function calls
                               • Behavioral exploit
                                 detector – inspects
                                 code for hostile
                                 behavior like buffer
                                 overflows, etc.




                                                                         Easy. Effective. Affordable.
Why Web Protection as a Service?

• Diminishing IT Dollars and Resources for a Growing
  Problem
   – IT is constantly asked to do more with a flat budget
   – Many smaller organizations do not have adequate IT
     resources to buy and manage appliances or complex
     deployments


• Web Protection as a Service Offers
   – Lower upfront costs
   – Ease and Speed of Deployment
       • No on-site hardware or software to
         maintain, upgrade, or support
       • Simply redirect Web traffic
   – Fixed operational expense instead of a
     capital expense



                                                            Easy. Effective. Affordable.
SecureSurf Case Study

  Blocking a Keylogger Attack

  • Title company in South Florida
  • Setup SecureSurf week before Labor Day
  • Keylogger attempted to upload keystrokes
    Friday night
  • SecureSurf blocked traffic to suspicious IP
  • AppRiver analysis determined nature of
    attack and notified customer




                                                                           18
                                                  Easy. Effective. Affordable.
SecureSurf Web & Malware Protection




                                      Easy. Effective. Affordable.
SecureSurf Web & Malware Protection

 Cloud-based Web Protection & Endpoint Security

 Features & Benefits
   • Shields networks from malware, adware
     and viruses
   • Protects employees; improves productivity
   • Helps avoid legal/compliance issues
   • Deploys quickly and customizes easily
   • Allows filtering at company or workgroup
     level
   • Enforces safe search on major search
     engines
   • Easy set up and deployment
   • Intuitive browser-based Web Portal Access
     for Administrators
   • Anti-Malware/Spyware Protection –
     proactive intent-based protection that scans
     the active code on a Web site before it
     enters your network
  More details at http://www.appriver.com/services/web-protection/

                                                               Easy. Effective. Affordable.
SecureSurf Web & Malware Protection

 Cloud-based Web Protection & Endpoint Security

 Features & Benefits
  • Shields networks from malware, adware
    and viruses
  • Protects employees; improves productivity
  • Helps avoid legal/compliance issues
  • Deploys quickly and customizes easily
  • Allows filtering at company or workgroup
    level
  • Enforces safe search on major search
    engines
  • Easy set up and deployment



 AppRiver SecureSurf Agent®
  • User/device-level protection
  • Mobile workforce & off-network security
  • Compliance & enforcement at user level


                                                  Easy. Effective. Affordable.
AppRiver at a Glance

               •   Established: 2002
               •   Headquarters: Gulf Breeze, FL
               •   Employees: 150+                   Company
  Company      •   Privately Held, Debt-free, Self-funded
               •   Focus on Email & Web Security with Phenomenal CareTM
               •   Cloud-based Since Inception


               •   45,000 Customers
               •   6,000,000 Mailboxes Managed
  Customers    •   93% Customer Retention Rate
               •   Channel-centric (70% Customer base)
               •   Focus on the SMB



               •   Leading Worldwide Messaging Security SaaS Provider
               •   Named Best SMB Solution for Hosted Message Security Services
    Market     •   Recognized as a Microsoft Top 5 Hosted Exchange Provider
  Leadership   •   Tremendous Customer ROI of AppRiver’s Security Solutions
               •   Identified as Shaping the Future of Technology


                                                                  Easy. Effective. Affordable.
24/7 – The Next Level


     24/7        •   US-Based, Fully Trained AppRiver Employees
                 •                               Company
                     Available 24 Hours a Day, Every Day
  Phenomenal
                 •   By Phone, Live Chat and Email
    CareTM       •   Easy-to-use Web-based Guides & Tools




      24/7
                 • Worldwide Threat Detection System
  Spam & Virus
                 • Sophisticated, Proprietary Software
   Operations    • Real-time Threat Prevention & Instant System-wide Updates
     Center


      24/7
    Malware      • Continuous Threat Protection for SecureSurf Customers
   Protection    • Threat Data Gleaned from/shared with Spam & Virus Operations
   Operation     • >5 Billion Malicious Websites . . . and Counting
    Center

                                                                  Easy. Effective. Affordable.
AppRiver Timeline


                                                                          Company


     Introduced SecureTideTM                                Integrated First Optimized
                                                            Network for Hosted Exchange
                                                            (Akamai)
     Implemented RackSpace
     Infrastructure
         Daily Quarantine Reports                                      Hired 100th Employee             Hired 150th Employee


  2002                 2004              2006                  2008                  2010                    2012

               ARBO Launched
                                         20,000 Hosted    40,000 Hosted  50,000 Hosted        100,000 Hosted 150,000 Hosted
                                         Exchange Seats   Exchange Seats Exchange Seats       Exchange Seats Exchange Seats


                                    Launched Hosted
    Founded AppRiver                Exchange Service



                                                              Launched Email                      Launched Web & Malware
                                                              Encryption Service                  Protection Service

                                                                                                       Easy. Effective. Affordable.
Proven Track Record

• 2011, 2010, 2009, 2008, 2007 Inc. 5000 Fastest
  Growing Private Companies
• 2011, 2010, 2009 Florida Trend Best Companies
  to Work For in Florida
• 2011 CRN Top 20 Cloud Security Vendor
• 2011, 2009, 2006 Network World Fave Raves
• 2010, 2009 MSExchange.org Readers' Choice
  Award Winner
• 2010, 2009 CRN Five-Star Partner Program
• 2010 CRN Coolest Cloud Security Vendor
• 2009 CSIA International Service Excellence Award
• 2009 Deloitte Technology Fast 500™ Winner
• 2009 Business Solutions Best Channel Product
  – Email Security
• 2009 Ernst & Young Florida Entrepreneur of
  the Year - Michael Murdoch, CEO
• 2009 Business Solutions Best Channel Vendor
  – Security


                                                     Easy. Effective. Affordable.
AppRiver Application Mall

    SecureTideTM
    Spam & Virus Protection

    Exchange Hosting
    Secure Hosted Exchange

    CipherPostTM
    Email Encryption

    SecureSurfTM
    Web & Malware Protection

    Office 365
    Microsoft Cloud-based Service

    ECSTM
    Email Continuity Service

    Learn more at http://www.appriver.com/services/

                                                      Easy. Effective. Affordable.
Questions?




         Find SpiceWorld related links from
         AppRiver @ http://bit.ly/arsw2011

                                              Easy. Effective. Affordable.

Mais conteúdo relacionado

Mais procurados

Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsIBM Security
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainIBM Security
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceIBM Security
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
2011-10 The Path to Compliance
2011-10 The Path to Compliance 2011-10 The Path to Compliance
2011-10 The Path to Compliance Raleigh ISSA
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your FirewallSophos
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic KeyIBM Security
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!IBM Security
 

Mais procurados (20)

Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack Chain
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
2011-10 The Path to Compliance
2011-10 The Path to Compliance 2011-10 The Path to Compliance
2011-10 The Path to Compliance
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 

Destaque

IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...
IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...
IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...IBM Sverige
 
Database Marketing Intensive
Database Marketing IntensiveDatabase Marketing Intensive
Database Marketing IntensiveVivastream
 
TechExpert support_maintenance
TechExpert support_maintenanceTechExpert support_maintenance
TechExpert support_maintenanceTechExpert
 
Historia de la Formación superior de enfermería en san luis.
Historia de la Formación superior de enfermería en san luis.Historia de la Formación superior de enfermería en san luis.
Historia de la Formación superior de enfermería en san luis.Mónica M. Soto Verchér
 
La revista 147 final
La revista 147 finalLa revista 147 final
La revista 147 finalperla1000
 
On Marketing Solutions
On Marketing SolutionsOn Marketing Solutions
On Marketing SolutionsAngel Talavera
 
803 juan david mojica
803 juan david mojica803 juan david mojica
803 juan david mojicajuan mojica
 
Guía de compra en lulu
Guía de compra en luluGuía de compra en lulu
Guía de compra en luluSergioMontoya
 
REPORTAJE: Dubai señala el camino de la construcción española
REPORTAJE: Dubai señala el camino de la construcción españolaREPORTAJE: Dubai señala el camino de la construcción española
REPORTAJE: Dubai señala el camino de la construcción españolaalbert lópez
 
Lodha parkside lodha group worli_archstones_asps_bhavik_bhatt
Lodha parkside   lodha group worli_archstones_asps_bhavik_bhattLodha parkside   lodha group worli_archstones_asps_bhavik_bhatt
Lodha parkside lodha group worli_archstones_asps_bhavik_bhattArchstones property solutions
 
Mercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary Care
Mercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary CareMercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary Care
Mercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary CareMercer Capital
 
One Step For Our Planet
One Step For Our PlanetOne Step For Our Planet
One Step For Our Planetcf1
 

Destaque (20)

IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...
IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...
IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...
 
Database Marketing Intensive
Database Marketing IntensiveDatabase Marketing Intensive
Database Marketing Intensive
 
TechExpert support_maintenance
TechExpert support_maintenanceTechExpert support_maintenance
TechExpert support_maintenance
 
Historia de la Formación superior de enfermería en san luis.
Historia de la Formación superior de enfermería en san luis.Historia de la Formación superior de enfermería en san luis.
Historia de la Formación superior de enfermería en san luis.
 
Vollmacht
VollmachtVollmacht
Vollmacht
 
La revista 147 final
La revista 147 finalLa revista 147 final
La revista 147 final
 
On Marketing Solutions
On Marketing SolutionsOn Marketing Solutions
On Marketing Solutions
 
Stress management
Stress managementStress management
Stress management
 
803 juan david mojica
803 juan david mojica803 juan david mojica
803 juan david mojica
 
Portafolio QuickHelp
Portafolio QuickHelpPortafolio QuickHelp
Portafolio QuickHelp
 
Guía de compra en lulu
Guía de compra en luluGuía de compra en lulu
Guía de compra en lulu
 
Perchè Dio
Perchè DioPerchè Dio
Perchè Dio
 
REPORTAJE: Dubai señala el camino de la construcción española
REPORTAJE: Dubai señala el camino de la construcción españolaREPORTAJE: Dubai señala el camino de la construcción española
REPORTAJE: Dubai señala el camino de la construcción española
 
xanat, El Rincon.
xanat, El Rincon.xanat, El Rincon.
xanat, El Rincon.
 
Lodha parkside lodha group worli_archstones_asps_bhavik_bhatt
Lodha parkside   lodha group worli_archstones_asps_bhavik_bhattLodha parkside   lodha group worli_archstones_asps_bhavik_bhatt
Lodha parkside lodha group worli_archstones_asps_bhavik_bhatt
 
Gruppenreiseplaner 2015
Gruppenreiseplaner 2015Gruppenreiseplaner 2015
Gruppenreiseplaner 2015
 
COMPRENSIÓN DE MENSAJES ORALES
COMPRENSIÓN DE MENSAJES ORALESCOMPRENSIÓN DE MENSAJES ORALES
COMPRENSIÓN DE MENSAJES ORALES
 
Mercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary Care
Mercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary CareMercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary Care
Mercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary Care
 
Zukunftsszenrios Games
Zukunftsszenrios GamesZukunftsszenrios Games
Zukunftsszenrios Games
 
One Step For Our Planet
One Step For Our PlanetOne Step For Our Planet
One Step For Our Planet
 

Semelhante a Spiceworld 2011 - AppRiver breakout session

How to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksHow to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksImperva
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandTyler Shields
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
Malicious Mobile Code Fact Sheet from Finjan
Malicious Mobile Code Fact Sheet from FinjanMalicious Mobile Code Fact Sheet from Finjan
Malicious Mobile Code Fact Sheet from FinjanElliott Lowe
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryInvincea, Inc.
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)DnaSylCotter
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsInvincea, Inc.
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 

Semelhante a Spiceworld 2011 - AppRiver breakout session (20)

How to Stop Man in the Browser Attacks
How to Stop Man in the Browser AttacksHow to Stop Man in the Browser Attacks
How to Stop Man in the Browser Attacks
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
Malicious Mobile Code Fact Sheet from Finjan
Malicious Mobile Code Fact Sheet from FinjanMalicious Mobile Code Fact Sheet from Finjan
Malicious Mobile Code Fact Sheet from Finjan
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Apresentação Allen ES
Apresentação Allen ESApresentação Allen ES
Apresentação Allen ES
 
Malware
MalwareMalware
Malware
 
Declaration of malWARe
Declaration of malWAReDeclaration of malWARe
Declaration of malWARe
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

Spiceworld 2011 - AppRiver breakout session

  • 1. Security Crosses the Chasm: Surfing in Peace Shane Rice Services Evangelist
  • 2. Why Web Protection? “The Web has become the new threat vector of choice by hackers and cyber criminals to distribute malware and perpetrate identity theft, financial fraud and corporate espionage.” -- IDC Easy. Effective. Affordable.
  • 3. Why Web Protection? • "Malware” - short for malicious software – Refers to any software designed to cause damage to a single computer, server, or computer network, whether it's a virus, spyware, et al. • Malicious Web content can expose your company to higher costs, lower productivity and legal issues Effective Web security can safeguard employees against online threats and protect network infrastructure Easy. Effective. Affordable.
  • 4. Avenues of Attack Top Five Categories for Entering Malware Networks by Percentage of Requests Source: Blue Coat Security Labs Easy. Effective. Affordable.
  • 5. Malware Threat is Growing… Malware Delivered by Websites is on the Rise • Cumulative Malware * – 2007: 5.8 million – 2011: 65 million (as of June) 1120% Increase • Malicious URLs* – 7,300 new malicious URLs per day • Legitimate Websites being Compromised 80% of Websites with Malicious Code *Source: McAfee Labs Easy. Effective. Affordable.
  • 6. …And Growing More Effective More Malware Malicious Variations 133% Code Threats in 12 months 80% Of Malware infections are Web 68% application exploits Of top Malware Increasing infections Attack Success! Web 2.0 exposed is the Catalyst! confidential data Of Vulnerable 4% Websites get fixed! Attack Target 500% Increase in Phishing Sites! Users vs Machines Easy. Effective. Affordable.
  • 7. Alarming 2011 Trend Unique Web Malware Encounters 297% Increase Source: Cisco ScanSafe Easy. Effective. Affordable.
  • 8. A Clear and Present Danger Source: AppRiver Easy. Effective. Affordable.
  • 9. A Clear and Present Danger Source: AppRiver Easy. Effective. Affordable.
  • 10. A Clear and Present Danger Source: AppRiver Easy. Effective. Affordable.
  • 11. It’s The Economy Stupid Source: http://s0.geograph.org.uk/photos/87/30/873046_db56f88b.jpg Easy. Effective. Affordable.
  • 12. It’s The Economy Stupid Source: flickr.com User: r-z Easy. Effective. Affordable.
  • 13. It’s The Economy Stupid Source: flickr.com User: AMagill Easy. Effective. Affordable.
  • 14. It’s The Economy Stupid Easy. Effective. Affordable.
  • 15. Categorization: First Line of Defense Web Filter Shopping Gambling Business IM Porn Security Business Filtering Database • Secures The Network Environment Security Pornography • Enforces Business-focused Internet Access Hate Sites Gambling • Reduces Liability Shopping Business • Manages Bandwidth IM Easy. Effective. Affordable.
  • 16. Layered Security – Stronger Protection Signature based detection is not enough to cover today’s targeted Malware attacks Anti-Virus Intent Analysis Anti-Malware • Anti-Virus • Authenticode – • Prevents OS, browser Checks for Digital and application exploits • However it is only a Signature on active as a result of: single aspect of the complete solution code • Protects from known • Media Type Filter - malicious code • Signature based verification via “magic • Protects from detection is not enough to cover today’s targeted Web 2.0 Malware attacks + byte” analysis not MIME • Behavioral Malware detector - scans for = unknown malicious mobile code for which no signature exists malicious script intent and removes offending function calls • Behavioral exploit detector – inspects code for hostile behavior like buffer overflows, etc. Easy. Effective. Affordable.
  • 17. Why Web Protection as a Service? • Diminishing IT Dollars and Resources for a Growing Problem – IT is constantly asked to do more with a flat budget – Many smaller organizations do not have adequate IT resources to buy and manage appliances or complex deployments • Web Protection as a Service Offers – Lower upfront costs – Ease and Speed of Deployment • No on-site hardware or software to maintain, upgrade, or support • Simply redirect Web traffic – Fixed operational expense instead of a capital expense Easy. Effective. Affordable.
  • 18. SecureSurf Case Study Blocking a Keylogger Attack • Title company in South Florida • Setup SecureSurf week before Labor Day • Keylogger attempted to upload keystrokes Friday night • SecureSurf blocked traffic to suspicious IP • AppRiver analysis determined nature of attack and notified customer 18 Easy. Effective. Affordable.
  • 19. SecureSurf Web & Malware Protection Easy. Effective. Affordable.
  • 20. SecureSurf Web & Malware Protection Cloud-based Web Protection & Endpoint Security Features & Benefits • Shields networks from malware, adware and viruses • Protects employees; improves productivity • Helps avoid legal/compliance issues • Deploys quickly and customizes easily • Allows filtering at company or workgroup level • Enforces safe search on major search engines • Easy set up and deployment • Intuitive browser-based Web Portal Access for Administrators • Anti-Malware/Spyware Protection – proactive intent-based protection that scans the active code on a Web site before it enters your network More details at http://www.appriver.com/services/web-protection/ Easy. Effective. Affordable.
  • 21. SecureSurf Web & Malware Protection Cloud-based Web Protection & Endpoint Security Features & Benefits • Shields networks from malware, adware and viruses • Protects employees; improves productivity • Helps avoid legal/compliance issues • Deploys quickly and customizes easily • Allows filtering at company or workgroup level • Enforces safe search on major search engines • Easy set up and deployment AppRiver SecureSurf Agent® • User/device-level protection • Mobile workforce & off-network security • Compliance & enforcement at user level Easy. Effective. Affordable.
  • 22. AppRiver at a Glance • Established: 2002 • Headquarters: Gulf Breeze, FL • Employees: 150+ Company Company • Privately Held, Debt-free, Self-funded • Focus on Email & Web Security with Phenomenal CareTM • Cloud-based Since Inception • 45,000 Customers • 6,000,000 Mailboxes Managed Customers • 93% Customer Retention Rate • Channel-centric (70% Customer base) • Focus on the SMB • Leading Worldwide Messaging Security SaaS Provider • Named Best SMB Solution for Hosted Message Security Services Market • Recognized as a Microsoft Top 5 Hosted Exchange Provider Leadership • Tremendous Customer ROI of AppRiver’s Security Solutions • Identified as Shaping the Future of Technology Easy. Effective. Affordable.
  • 23. 24/7 – The Next Level 24/7 • US-Based, Fully Trained AppRiver Employees • Company Available 24 Hours a Day, Every Day Phenomenal • By Phone, Live Chat and Email CareTM • Easy-to-use Web-based Guides & Tools 24/7 • Worldwide Threat Detection System Spam & Virus • Sophisticated, Proprietary Software Operations • Real-time Threat Prevention & Instant System-wide Updates Center 24/7 Malware • Continuous Threat Protection for SecureSurf Customers Protection • Threat Data Gleaned from/shared with Spam & Virus Operations Operation • >5 Billion Malicious Websites . . . and Counting Center Easy. Effective. Affordable.
  • 24. AppRiver Timeline Company Introduced SecureTideTM Integrated First Optimized Network for Hosted Exchange (Akamai) Implemented RackSpace Infrastructure Daily Quarantine Reports Hired 100th Employee Hired 150th Employee 2002 2004 2006 2008 2010 2012 ARBO Launched 20,000 Hosted 40,000 Hosted 50,000 Hosted 100,000 Hosted 150,000 Hosted Exchange Seats Exchange Seats Exchange Seats Exchange Seats Exchange Seats Launched Hosted Founded AppRiver Exchange Service Launched Email Launched Web & Malware Encryption Service Protection Service Easy. Effective. Affordable.
  • 25. Proven Track Record • 2011, 2010, 2009, 2008, 2007 Inc. 5000 Fastest Growing Private Companies • 2011, 2010, 2009 Florida Trend Best Companies to Work For in Florida • 2011 CRN Top 20 Cloud Security Vendor • 2011, 2009, 2006 Network World Fave Raves • 2010, 2009 MSExchange.org Readers' Choice Award Winner • 2010, 2009 CRN Five-Star Partner Program • 2010 CRN Coolest Cloud Security Vendor • 2009 CSIA International Service Excellence Award • 2009 Deloitte Technology Fast 500™ Winner • 2009 Business Solutions Best Channel Product – Email Security • 2009 Ernst & Young Florida Entrepreneur of the Year - Michael Murdoch, CEO • 2009 Business Solutions Best Channel Vendor – Security Easy. Effective. Affordable.
  • 26. AppRiver Application Mall SecureTideTM Spam & Virus Protection Exchange Hosting Secure Hosted Exchange CipherPostTM Email Encryption SecureSurfTM Web & Malware Protection Office 365 Microsoft Cloud-based Service ECSTM Email Continuity Service Learn more at http://www.appriver.com/services/ Easy. Effective. Affordable.
  • 27. Questions? Find SpiceWorld related links from AppRiver @ http://bit.ly/arsw2011 Easy. Effective. Affordable.