© copyright 2005. mx logic, inc. all rights reserved. 1 strictly confidential mx logic corporate...

15
© Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

Upload: beverly-andrews

Post on 22-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 1Strictly Confidential

MX LOGIC CORPORATE OVERVIEW

MX LOGIC CORPORATE OVERVIEW

MARCH 2005MARCH 2005

Page 2: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 2Strictly Confidential

Corporate Overview ─ What We DoCorporate Overview ─ What We Do

MX Logic provides advanced email defense solutions that safeguard enterprises, service providers, government organizations and resellers worldwide

MX Logic provides advanced email defense solutions that safeguard enterprises, service providers, government organizations and resellers worldwide

Delivered as a managed service or on-premise software, MX Logic’s technology analyzes over 3 billion messages a month for more than 1.7 million end-users

Delivered as a managed service or on-premise software, MX Logic’s technology analyzes over 3 billion messages a month for more than 1.7 million end-users

Page 3: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 3Strictly Confidential

Corporate OverviewCorporate Overview

SERVICE PROVIDER

ENTERPRISE PARTNERS

EMAIL DEFENSE SERVICE• 3,900+ enterprise

customers• 720,000+ end users

SOLUTION FEATURES• Anti-Spam• Anti-Virus• DoS Protection• Content Filtering• Policy Enforcement• Abuse Reporting• Disaster Recovery

EMAIL DEFENSE SERVICE• 3,900+ enterprise

customers• 720,000+ end users

SOLUTION FEATURES• Anti-Spam• Anti-Virus• DoS Protection• Content Filtering• Policy Enforcement• Abuse Reporting• Disaster Recovery

EMAIL DEFENSE GATEWAY• NTT / Verio• Tucows• Bellsouth• Level 3• Bresnan Communications• US Interactive• IIJ• CyberTrust

SOLUTIONS• Managed Service Enabling• Hosted Mailbox Protection• Outbound Filtering

EMAIL DEFENSE GATEWAY• NTT / Verio• Tucows• Bellsouth• Level 3• Bresnan Communications• US Interactive• IIJ• CyberTrust

SOLUTIONS• Managed Service Enabling• Hosted Mailbox Protection• Outbound Filtering

HOSTED STRATEGIC PARTNERS• Symantec• Surfcontrol

DISTRIBUTION PARTNERS• 250+ Resellers / VARs• Email Defense Service

TECHNOLOGY PARTNERS• Symantec / Brightmail• Authentium, • HP-Compaq• NTT/Verio

HOSTED STRATEGIC PARTNERS• Symantec• Surfcontrol

DISTRIBUTION PARTNERS• 250+ Resellers / VARs• Email Defense Service

TECHNOLOGY PARTNERS• Symantec / Brightmail• Authentium, • HP-Compaq• NTT/Verio

Page 4: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 4Strictly Confidential

Corporate Overview – Snapshot of Growth 2003 to 2004Corporate Overview – Snapshot of Growth 2003 to 2004

• 457% increase in top-line revenue

• 338% customer growth, currently servicing over 3,900 enterprise accounts and 1.7 million end users

• 343% increase in seat count

• Strong growth in VAR channel program with over 250 active channel partners

• 457% increase in top-line revenue

• 338% customer growth, currently servicing over 3,900 enterprise accounts and 1.7 million end users

• 343% increase in seat count

• Strong growth in VAR channel program with over 250 active channel partners

Page 5: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 5Strictly Confidential

Strong Customer GrowthStrong Customer Growth

Page 6: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 6Strictly Confidential

Corporate Overview ─ VisionCorporate Overview ─ Vision

• A managed service approach to email security will become even more widely adopted

– Security software vendors now consider a managed service offering a key component of their marketing strategy

– Large enterprise will deploy a layered approach

• Transport carriers must inoculate their networks

• Email threat detection will move from submission technology to sensor networks

• Software deployment into large service providers creates the best potential for market dominance

• Bridging the gap between identity management and email for outbound message submission will provide new opportunities for service provider penetration

• A managed service approach to email security will become even more widely adopted

– Security software vendors now consider a managed service offering a key component of their marketing strategy

– Large enterprise will deploy a layered approach

• Transport carriers must inoculate their networks

• Email threat detection will move from submission technology to sensor networks

• Software deployment into large service providers creates the best potential for market dominance

• Bridging the gap between identity management and email for outbound message submission will provide new opportunities for service provider penetration

Page 7: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

SUBSCRIBER REPUTATION FILTERINGNew Product Initiative from MX Logic

SUBSCRIBER REPUTATION FILTERINGNew Product Initiative from MX Logic

Page 8: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 8Strictly Confidential

Subscriber Reputation Filtering (SRF)Subscriber Reputation Filtering (SRF)

• Spam is being distributed through the service provider outbound email gateway

• Email authentication standards are spawning reputation services (Habeas, Kelkea, Equifax, etc.)

• Service providers will need to focus on policing their subscriber base to ensure healthy reputation and successful deliverability of subscribe email

• There is little outbound specific anti-spam protection at the sender level ─ majority of focus currently resides with inbound filtering technologies

• Spam is being distributed through the service provider outbound email gateway

• Email authentication standards are spawning reputation services (Habeas, Kelkea, Equifax, etc.)

• Service providers will need to focus on policing their subscriber base to ensure healthy reputation and successful deliverability of subscribe email

• There is little outbound specific anti-spam protection at the sender level ─ majority of focus currently resides with inbound filtering technologies

Current Market SituationCurrent Market Situation

Page 9: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 9Strictly Confidential

• SMTP was designed as a message transfer protocol• However, SMTP is now being widely used as a message submission protocol• Separating messages into submissions and transfers allows for new gateway

functionality that can provide enhanced security and submission (outbound) policies

• SMTP was designed as a message transfer protocol• However, SMTP is now being widely used as a message submission protocol• Separating messages into submissions and transfers allows for new gateway

functionality that can provide enhanced security and submission (outbound) policies

MessageTransfer Agent

MessageTransfer Agent

MTAMTA

Relays toOther MTAs

Port 25

Relays toOther MTAs

Port 25

MessageSubmission Agent

MessageSubmission Agent

MSAMSA

Transfers to MTA

Port 587 / 25

Transfers to MTA

Port 587 / 25

MessageUser AgentMessage

User Agent

MUAMUA

Submits to MSA

Outlook, Eudora, Thunderbird

Submits to MSA

Outlook, Eudora, Thunderbird

Subscriber Reputation Filtering (SRF)Subscriber Reputation Filtering (SRF)

Submission Security Policies, Control and Identity ManagementSubmission Security Policies, Control and Identity Management

Technology OverviewTechnology Overview

Page 10: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 10Strictly Confidential

Subscriber Reputation Filtering (SRF)Subscriber Reputation Filtering (SRF)

• First introduced as RFC 2476 in 1998

• Allows for flexible authentication

• Enforces service provider AUP

• Enables identity management tied to SMTP transactions on a per subscriber basis

• Protects outbound MTA infrastructure

• Enables reputation-based routing

• Logical place for authentication signing (i.e., Domain Keys)

• First introduced as RFC 2476 in 1998

• Allows for flexible authentication

• Enforces service provider AUP

• Enables identity management tied to SMTP transactions on a per subscriber basis

• Protects outbound MTA infrastructure

• Enables reputation-based routing

• Logical place for authentication signing (i.e., Domain Keys)

Why an MSA?Why an MSA?

Page 11: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 11Strictly Confidential

Subscriber Reputation Filtering (SRF)Subscriber Reputation Filtering (SRF)

• Leverages MX Logic’s MTA framework of technology

• Easily integrates into existing service provider messaging infrastructure as a MSA gateway

• Provides outbound email content filtering for spam and worm originating messages

• Monitors a subscriber’s email sending behavior to build a reputation model for outbound filtering

• Enables the service provider to detect account misuse with abuse trend reporting and alerts

• Provides subscriber notification with problem remediation instructions

• Can be leveraged for either consumer or business subscribers

• Leverages MX Logic’s MTA framework of technology

• Easily integrates into existing service provider messaging infrastructure as a MSA gateway

• Provides outbound email content filtering for spam and worm originating messages

• Monitors a subscriber’s email sending behavior to build a reputation model for outbound filtering

• Enables the service provider to detect account misuse with abuse trend reporting and alerts

• Provides subscriber notification with problem remediation instructions

• Can be leveraged for either consumer or business subscribers

SRF Gateway FeaturesSRF Gateway Features

Page 12: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 12Strictly Confidential

Subscriber Reputation Filtering (SRF)Subscriber Reputation Filtering (SRF)

• Analogous fraud and misuse detection in the credit card, telecom and utility industries

• Behavior models are constructed from each individual email subscriber’s sending behavior (leverages attributes such as time, size, attachments, email format, mail client software)

• A reputation is constructed from historical sending behavior and associated message content

• Uses advanced algorithms such as Hellinger’s Distance to detect deviation and misuse

• Analogous fraud and misuse detection in the credit card, telecom and utility industries

• Behavior models are constructed from each individual email subscriber’s sending behavior (leverages attributes such as time, size, attachments, email format, mail client software)

• A reputation is constructed from historical sending behavior and associated message content

• Uses advanced algorithms such as Hellinger’s Distance to detect deviation and misuse

Behavior−Based Reputation FilteringBehavior−Based Reputation Filtering

Page 13: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 13Strictly Confidential

Subscriber Reputation Filtering (SRF)Subscriber Reputation Filtering (SRF)

Misuse Detection EngineMisuse Detection Engine

Real-Time Attack RecognitionReal-Time Attack Recognition

NetworkOperations

Analyst

NetworkOperations

Analyst

SubscriberReputationSubscriberReputation

MessageDisposition

Policies

MessageDisposition

Policies

Alert on Known AttacksAlert on Known Attacks

Alert on NEW AttacksAlert on NEW Attacks

Spam SignaturesSpam Signatures

Predictive Detection ModelPredictive Detection Model

SMTPData

SMTPData

DataMiningData

Mining

SubscriberActivity

SubscriberActivity

SubscribeProfile DataSubscribe

Profile Data

Model EvaluationModel Evaluation

Page 14: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 14Strictly Confidential

Subscriber Reputation Filtering (SRF)Subscriber Reputation Filtering (SRF)

ArchitectureArchitecture

SRF Gateway sits in front of your current outbound deliverypool and filters traffic fromauthenticated users, buildingreputation and email sendingbehavior profiles for eachsubscriber. Messages arefiltered using the subscriberreputation, email behaviorprofile and message content.

SRF Gateway sits in front of your current outbound deliverypool and filters traffic fromauthenticated users, buildingreputation and email sendingbehavior profiles for eachsubscriber. Messages arefiltered using the subscriberreputation, email behaviorprofile and message content.

SubscriberDatabase

SubscriberDatabase

Reputationand Behavior

Database

Reputationand Behavior

Database

RadiusServer

GatewayControlConsole

GatewayControlConsole

SMTPSMTP SMTPSMTP

SMTPSMTP

SMTPSMTP

XMLXML

HTTPHTTP

LDAPLDAP

InternetInternetService Provider

AuthenticatedSMTP Gateway

(MTA)

Service ProviderAuthenticatedSMTP Gateway

(MTA)

Subscribe(MUA)

Subscribe(MUA)

Subscribe(MUA)

Subscribe(MUA)

Subscribe(MUA)

Subscribe(MUA)

MX LogicSRF Gateway

(MSA)

MX LogicSRF Gateway

(MSA)

AuthenticationModuleAuthenticationModule

SMTP AUTHproxy

SMTP AUTHproxy

Page 15: © Copyright 2005. MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005

© Copyright 2005. MX Logic, Inc. All rights reserved. 15Strictly Confidential

Service Provider Product VisionService Provider Product Vision

Own The EdgeOwn The Edge

MX LOGICTHREAT

MANAGEMENTSERVICES

MX LOGICTHREAT

MANAGEMENTSERVICES

Email, Instant and Mobile Messaging

MX LOGICINBOUND

EDGESERVICES

MX LOGICINBOUND

EDGESERVICES

• Anti-Spam• Anti-Virus• DoS Protection• Compliance

Filtering• Reputation Filtering• Email

Authentication

• Anti-Spam• Anti-Virus• DoS Protection• Compliance

Filtering• Reputation Filtering• Email

Authentication

SERVICEPROVIDERCUSTOMER

SERVICEPROVIDERCUSTOMER

• Commercial Managed Services

• Application Hosting• Domain Registration

Services• Appliance Services

• Commercial Managed Services

• Application Hosting• Domain Registration

Services• Appliance Services

Service ProviderMessaging Infrastructure

(Openwave, Sun,Critical Path)

Service ProviderMessaging Infrastructure

(Openwave, Sun,Critical Path)

MX LOGICOUTBOUND

EDGESERVICES

MX LOGICOUTBOUND

EDGESERVICES

• Anti-Spam• Anti-Virus• DoS Protection• Compliance Filtering• Reputation Filtering• Sender

Authentication

• Anti-Spam• Anti-Virus• DoS Protection• Compliance Filtering• Reputation Filtering• Sender

Authentication

Service ProviderMessage Store

Service ProviderMessage Store

Service ProviderManaged ServicesService Provider

Managed Services

MX LogicSRF

Gateway

MX LogicSRF

Gateway

ConsumerSubscriberConsumerSubscriber

BusinessSubscriberBusiness

Subscriber

ApplianceAttached

ApplianceAttached

InternetInternetMX Logic

EmailDefenseGateway

MX LogicEmail

DefenseGateway

MX LogicThreat NOCMX Logic

Threat NOC