jayne bernardini peter schunk jan vanecek. presentation outline evolution of security software...

24
Jayne Bernardini Peter Schunk Jan Vanecek

Upload: posy-summers

Post on 24-Dec-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Jayne BernardiniPeter SchunkJan Vanecek

Page 2: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Presentation OutlineEvolution of Security SoftwareCompany ProfilesCompare System

Page 3: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System
Page 4: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Security DefinedEnsure data stored in a computer cannot be read without

authorizationData encryption and passwords

Encryption-translation of document into unintelligible language

Source: http://www.cert.org/encyc_article/tocencyc.html#ImprSec

Page 5: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

History of Internet Security Incidents1969 ARPANET begins 1986

First well-publicized security incident1988

First automated network security incident “the Morris Worm”1989

ARPANET officially becomes the InternetWANK/OILZ worm

1994Tools “sniff” packets from the network

1995Attacks on computers that have trust relationships

Source: http://www.cert.org/encyc_article/tocencyc.html#ImprSec

Page 6: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Security TechnologyOperational Technology

PasswordsFirewallsMonitoring ToolsSecurity Analysis ToolsAntivirus

Crytography

Source: http://www.cert.org/encyc_article/tocencyc.html#ImprSec

Page 7: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System
Page 8: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System
Page 9: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Future of Security TechnologyInternetworking Protocols

Cope with vastly increased routing needsIntrusion Detection

Anomaly detection and pattern recognitionSoftware Engineering and System Survivability

No single point of failureWeb-Related Programming and Scripting Languages

Inform usersIntelligent Autonomous Agents

Performs computation or gathers info and presents a result

Source: http://www.cert.org/encyc_article/tocencyc.html#ImprSec

Page 10: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System
Page 11: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

SymantecKerioFounded in April 19822005 revenue – $2,583

million IPO on June 23, 1989More than 17,500

employeesOperations in 40 countries

securing sensitive online consumer interactions financial transactions instant messaging preventing malicious

threats and crime ware

Entered market in 19972005 revenue – $20,253Customers in 70 countriesOffices in U.S., Great

Britain, and Czech RepublicServices

Communication Security Software Products

Internet Messaging and Firewall productsKerio Mail ServerKerio WinRoute FirewallKerio WebSTAR

Source: Kerio s. r. o. Source: Symantec

Page 12: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Kerio Mail Server – Release history January 17, 2002

* SSL now works from browsers supporting 40-bit enryptionMarch 25, 2003

+ SpamAssassin spam filter * improved spam header filter

April 2, 2003 + spam filter can change message subject

September 26, 2003 + fax plugin

July 18, 2005 + WebMail mini + support for MacOS X Tiger (10.4) + Kerio Synchronization Plug-in for Outlook (synchronization

of contacts and calendars in Outlook e-mail profile)Source: http://www.kerio.com

Page 13: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Kerio Mail Server – Release history + ability to use two antiviruses simultaneously (McAfee + one

external plugin) + support for PDA in WebMail (http://server/pda)

October 26, 2005 * Enhanced backup options: added support for differential

backup, backup scheduler is more flexible July 18, 2006

+ Added two-level spam rating. Spam messages could be tagged or blocked depending on spam score.

+ New SURBL (Spam URI Realtime Blocklist) anti-spam check significantly increases Spam Filter efficiency.

December 13, 2006 + Over-the-air synchronization with Microsoft mobile devices

via Microsoft ActiveSync® protocol.

Source: http://www.kerio.com

Page 14: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Source: http://www.kerio.com

Page 15: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Source: http://www.kerio.com

Page 16: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Source: http://www.kerio.com

Page 17: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Source: Kerio s. r. o.

Page 18: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System
Page 19: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Includes: Integrated virus scanningAntispamContent filtering controlsFlexibility to choose between multi-platform software-

basedAppliance-based and hosted service solutions

What is mail security software?

Page 20: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

System Requirements• Symantec Mail

Security for Microsoft Exchange:Microsoft Exchange

Server 2000/2003 Intel Server-class 32-bit

processor, 1 GB of RAM

• Kerio Mail ServerCPU 500 MHz, 256 MB

RAMMicrosoft Windows,

Linux

Page 21: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Business RequirementsUnited States: B&B Electronics

Long-Term plans Often renew licenses

with same vendorPriceUser-friendly

Czech Republic: IIB s. r. o.

Short-Term plans Shorter licenses

Price sensitiveUser-friendliness only a

“plus”

Page 22: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Software Implementation

Page 23: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Common ElementsManagement commitmentTech supportCommunication of the policySecurity awareness of all users

Page 24: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System

Questions?

Thank you for your attention.