0% found this document useful (0 votes)
93 views2 pages

SOL106 0807 R3 Email Security

Embedded within the stream of relatively harmless spam are sophisticated phishing exploits, spyware bots and viruses. Unfiltered volumes of spam impact network / mail server performance, annoy users and impact productivity. Businesses can face legal challenges from employees or customers for damages from fraud, inappropriate content or failures to meet regulatory mandates.

Uploaded by

Kike Sarao
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views2 pages

SOL106 0807 R3 Email Security

Embedded within the stream of relatively harmless spam are sophisticated phishing exploits, spyware bots and viruses. Unfiltered volumes of spam impact network / mail server performance, annoy users and impact productivity. Businesses can face legal challenges from employees or customers for damages from fraud, inappropriate content or failures to meet regulatory mandates.

Uploaded by

Kike Sarao
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

FortiMail

Dedicated Email Security Antispam / Antivirus


Solutions

The Business Imperative


Email is a mission critical application that is under continuous attack from a barrage of Spam messages. Embedded within the stream of relatively
harmless Spam are sophisticated phishing exploits, spyware bots and viruses. Unfiltered volumes of Spam not only impact network/mail server
performance, annoy users and impact productivity, but also harbor targeted attacks intended to steal information, goods or services. In addition,
businesses can face legal challenges from employees or customers for damages from fraud, inappropriate content or failures to meet regulatory
mandates. Understanding the challenges and the business impacts are the first step in implementing an effective email security strategy.

Effective Antispam Protection Requires Multi-Layered Protection


BUSINESS CHALLENGES SOLUTION REQUIREMENTS
INBOUND ACTIONS OUTBOUND ACTIONS
Maintain Complete
Network Performance Content Protection
Apply Policy Archive
Maximize User to Company “Good”
Productivity Email Content Email Content

Block Block Viruses,


Avoid Data Leaks DDOS, DOS, Block Spyware and
DHA Attacks Spam and Malware
Loss / Fraud
Phishing
Protect Block Spam,
Meet Regulatory Minimize Network Zombies
Compliance Legal Risks from RBL and Bots

The Building Blocks of a Best-in-Class Antispam Solution


Best-in-class antispam and antivirus protection requires a comprehensive set of capabilities in order to meet and to maintain business requirements.
Solutions must enable turn-key deployment in existing mail server configurations and provide flexible scalability and high-availability. Accurate
detection requires the use of multiple scanning technologies combined with an integrated suite of security services to protect against a broad range
of spam, viruses, worms, trojans, spyware and other malware. The automated delivery of updates developed by dedicated security research teams
who continuously maintain spam databases and antivirus signatures ensures the highest level of accuracy and protection. Finally, powerful tools to
m anage
manageg email archivingg and auditing
g are ne
n e
needed mizz e leg
mi
to minimize g al exp
legal p osures and to meet/maintain re
exposures rregulatory
g compliance requirements.

✔ Delivers high accuracy rates using ✔ Integrated security services that secures
multiple Spam detection methods email from viruses, worms, trojans,
Hawaiian Airlines
spyware and other malware
✔ Dedicated research to maintain accurate
databases of Spammers / Spam content ✔ Uses multi-pass checking, RBL/ORDB, “We needed comprehensive
Bayesian, Heuristics, Sender verification/ security protection, which we
✔ Automatic Spam / AV signatures updates reputation, Custom Black/White lists
found with Fortinet. We felt
that Fortinet offered us the best
Accuracy Multi-Layer solution to meet our needs
& Coverage Security while also being cost-effective.

Deployment Archiving Since deploying the Fortinet


& Operations & Reporting solution, we’ve cut down about
95,000 spam emails per week
✔ Turn-key deployment and management ✔ Easy archiving of email transactions across our corporate network.”
with redundancy and scalability
✔ Deployment in any network using – David Lopes
Gateway, Transparent or Server modes ✔ Granular auditing per user and per
group with detailed reporting / logging
Manager of network
✔ Bi-directional scanning with multi- infrastructure and telecom
domain email server support ✔ Support across multiple mail servers
FortiGateTM and FortiMailTM Integrated Hardware, Software and Services
Fortinet’s family of FortiGate and FortiMail appliances provides the latest in advanced antispam and antivirus technology. FortiGate supplies a
combination of antispam protection along with full Unified Threat Management (UTM) capabilities, while FortiMail supports multiple modes of operation
that allow integration into a broad range of mail environments. FortiMail appliances are able to deliver the highest level of antispam protection by
using multi-layered spam engines to detect, tag, quarantine and block spam messages and their malicious attachments. Unlike an array of point-
product solutions, FortiMail is a cost-effective integrated appliance that is easy to deploy and operate. FortiAnalyzer TM products provide system-wide
antispam/antivirus event logging, comprehensive reporting and scheduled report generation. Integrating both FortiGate and FortiMail units together
in a network environment provides the most comprehensive security solution available today.
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

Fortinet Antispam and Multi-Layered Security Solutions

DEDICATED RESEARCH / RAPID RESPONSE MULTI-LAYERED ANTISPAM & SECURITY


FortiGuard
Worldwide ✔ Real-Time Blackhole List (RBL) INBOUND ACTIONS
Research Teams ✔ Open Relay Database Server (ORDB)
✔ Bayesian
✔ Heuristics
✔ Sender Reputation Database
Complete
✔ Email Throttling Content
✔ Black/White List Support Inspection
✔ Keyword/Phrase Blocking
✔ IP Address Blacklist/Exempt List
FortiGuard
Distribution FortiCare ✔ DNS Lookup
Network Support ✔ Email Address Lookup
Services ✔ MIME Header Checking OUTBOUND ACTIONS

• All technologies are designed / maintained by Fortinet • Multiple detection methods/scanning for high accuracy rates
• FortiGuard Network automatically pushes new updates • Bi-directional inspection and protection from a single device
• 24x7 support with enhanced SLA and Service options • Content level inspection with powerful in/outbound filtering

INTEGRATED SOLUTION MANAGEMENT, LOGGING & REPORTING

Point-Product Solutions

ANTISPAM POLICY ANTISPAM Management, Logging,


ANTIVIRUS MGMT ANTIVIRUS Reporting
POLICY
MGMT
ROUTING MAIL
(MTA) ARCHIVE
ROUTING
(MTA)
MAIL
MAIL ARCHIVE MAIL EXTERNAL MAIL
SERVERS SERVERS ARCHIVE

• Integrated solution with antispam, antivirus and antispyware • Comprehensive email archiving for Legal/Compliance use
• Easy to deploy: supports Gateway, Server, Transparent modes • Flexible policy definition and customizable Black/White lists
• Cost effective: per device, not per user/mail box, pricing • Comprehensive centralized Reporting, Logging, Searching
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

GLOBAL HEADQUARTERS EMEA SALES OFFICE-FRANCE APAC SALES OFFICE-HONG KONG


Fortinet Incorporated Fortinet Incorporated Fortinet Incorporated
1090 Kifer Road, Sunnyvale, CA 94086 USA 120 rue Albert Caquot Room 2429-2431, 24/F Sun Hung Kai Centre
Tel +1-408-235-7700 06560, Sophia Antipolis, France No.30 Harbour Road, WanChai, Hong Kong
Fax +1-408-235-7737 Tel +33-4-8987-0510 Tel +852-3171-3000
www.fortinet.com/sales Fax +33-4-8987-0501 Fax +852-3171-3008

©2006-2007 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiOS, FortiAnalyzer, FortiASIC, FortiLog, FortiCare, FortiManager, FortiWiFi, FortiGuard, FortiClient, and FortiReporter are trademarks or registered trademarks of
the Fortinet Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Licensed under U.S. Patent No. 5,623,600.
Although Fortinet has attempted to provide accurate information in these materials, Fortinet assumes no legal responsibility for the accuracy or completeness of the information. Please note that no Fortinet statements herein
constitute or contain any guarantee, warranty or legally binding representation. All materials contained in this publication are subject to change without notice, and Fortinet reserves the right to change, modify, transfer, or
otherwise revise this publication without notice. SOL106-0807-R3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy