frontbridge business & technology james hamilton gm frontbridge technologies...
Post on 18-Dec-2015
212 views
TRANSCRIPT
Agenda
FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model
Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings
Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption
Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo
Active Message ContinuityActive Message Continuity
FrontBridge SnapshotOverviewOverview
Founded 1999Founded 1999160 employees in US, Canada and Europe160 employees in US, Canada and Europe80 in R&D, Client Support & Operations80 in R&D, Client Support & Operations
Moved HQ team from LA to RedmondMoved HQ team from LA to RedmondWinnipeg team stays in placeWinnipeg team stays in place
Microsoft Acquired Aug 31, 2005Microsoft Acquired Aug 31, 2005
Global CustomersGlobal Customers3,200 customers world-wide3,200 customers world-wideCoverage in leading verticalsCoverage in leading verticals
Financial services, life sciences, Financial services, life sciences, manufacturing, legal, healthcaremanufacturing, legal, healthcare
Global Network Global Network Nine globally-distributed data centersNine globally-distributed data centersProcessing over 6 billion messages per Processing over 6 billion messages per monthmonth100% historic uptime100% historic uptime
Eight global partners & direct sales forceEight global partners & direct sales forceGlobal Recognition Global Recognition
Analyst, press endorsement as market Analyst, press endorsement as market visionaryvisionaryLeader category in Gartner magic Leader category in Gartner magic quadrantquadrant
Customers…
Global Distribution…
Awards…
Business EnvironmentBusiness Environment
Security Vulnerabilities Still ExistSecurity Vulnerabilities Still Exist Spam, viruses and phishing still plague inboxesSpam, viruses and phishing still plague inboxes Closer relationship between viruses and spamCloser relationship between viruses and spam Companies ill-equipped to stay ahead of threatsCompanies ill-equipped to stay ahead of threats
E-mail Retention is Becoming a Primary E-mail Retention is Becoming a Primary ConcernConcern
IntenseIntense Pressure on IT to Improve Productivity Pressure on IT to Improve Productivity Focus on projects that provide competitive Focus on projects that provide competitive
advantageadvantage Make mission-critical systems more reliableMake mission-critical systems more reliable Deploy Secure, Reliable, Manageable, & Cost-Deploy Secure, Reliable, Manageable, & Cost-
EffectiveEffective
Compliance: Need a complete, tamper-proof Compliance: Need a complete, tamper-proof archivearchive
e-Discovery: Need to store, find & produce e-Discovery: Need to store, find & produce information in a complete & timely mannerinformation in a complete & timely manner
Manage cost and Manage cost and complexitycomplexity
Secure, protect Secure, protect and complyand comply
Inbox value and Inbox value and accessaccess
No HW/SW to No HW/SW to install and manage install and manage
Outsource routine Outsource routine IT managementIT management
Predictable Predictable subscription based subscription based serviceservice
Scalable at no Scalable at no additional costadditional cost
Eliminate threats Eliminate threats before they reach before they reach the networkthe network
Policy-compliant Policy-compliant infrastructureinfrastructure
Service-based e-Service-based e-mail archiving for mail archiving for rapid deployment rapid deployment
Eliminate spam Eliminate spam and viruses from and viruses from the e-mail stream the e-mail stream to boost to boost productivityproductivity
Reliable e-mail Reliable e-mail availability and availability and continuity continuity systemssystems
Recover from Recover from unplanned unplanned outages or outages or disastersdisasters
Meeting Messaging Meeting Messaging ChallengesChallenges
Focus: Total Message ManagementFocus: Total Message Management
Partner & direct sales modelPartner & direct sales model2 to 3 year subscriptions with monthly 2 to 3 year subscriptions with monthly paymentpayment
Channel: Direct, white label with Telcos, & Channel: Direct, white label with Telcos, & resellersresellers
Typical customerTypical customer1000-2000 seats for Filtering, 400-500 seats for 1000-2000 seats for Filtering, 400-500 seats for ArchiveArchive
Some customers >100k seatsSome customers >100k seats
Filtering is largest part of revenueFiltering is largest part of revenue
Archiving is fastest growing.Archiving is fastest growing.
FrontBridge BusinessFrontBridge Business
Agenda
FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model
Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings
Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption
Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo
Active Message ContinuityActive Message Continuity
FrontBridge Global Network
99.999% uptime SLA99.999% uptime SLA100% historical uptime made possible by global, load-balanced network100% historical uptime made possible by global, load-balanced network
Eight data centersEight data centers537 servers537 servers
Over 200 million message recipients processed/dayOver 200 million message recipients processed/dayOver 350 million at peakOver 350 million at peak
Store & forward system ensures no legitimate mail is lostStore & forward system ensures no legitimate mail is lostAutomatic deferral, retry every 20 min for up to 5 daysAutomatic deferral, retry every 20 min for up to 5 days
Agenda
FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model
Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings
Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption
Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo
Active Message ContinuityActive Message Continuity
Primary FrontBridge Service Primary FrontBridge Service OfferingsOfferings
E-mailE-mailFilteringFiltering
MessageMessageArchiveArchive
Secure Secure E-mailE-mail
ActiveActiveMessageMessage
ContinuityContinuity
Layered anti-spam Layered anti-spam
Multi-engine anti-Multi-engine anti-virusvirus
Corporate Policy Corporate Policy EnforcementEnforcement
Real-time attack Real-time attack preventionprevention
Interception-based Interception-based message archivingmessage archiving
Customized report Customized report generation for generation for demonstrating demonstrating compliancecompliance
Fully-indexed, Fully-indexed, searchable archivesearchable archive
Rapid deployment Rapid deployment to meet deadlines to meet deadlines or immediate or immediate needsneeds
Full e-mail Full e-mail encryption encryption
B-to-C focusedB-to-C focused
No public and No public and private key private key managementmanagement
Gateway, policy-Gateway, policy-based e-mail based e-mail encryptionencryption
Uninterrupted e-Uninterrupted e-mail accessibilitymail accessibility
Rapid recovery Rapid recovery from unplanned from unplanned disasters and disasters and network outagesnetwork outages
30-day historical e-30-day historical e-mail storemail store
Agenda
FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model
Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings
Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption
Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo
Active Message ContinuityActive Message Continuity
FrontBridge: Email Security
Anti-Virus, Anti-Spam, & Corporate Policy Anti-Virus, Anti-Spam, & Corporate Policy EnforcementEnforcementNetwork TLS Enabled Network TLS Enabled Web-based management & reportingWeb-based management & reporting
Highly customizable filtering environmentHighly customizable filtering environment
Easy customer on-boardingEasy customer on-boardingOnly requires MX record changeOnly requires MX record changeNo disruption in mail flowNo disruption in mail flowOne month free trialOne month free trial
Four Anti-Virus engines integratedFour Anti-Virus engines integratedSymantec, Trend Micro, Sophos, & KasperskySymantec, Trend Micro, Sophos, & KasperskyUpdates pushed every 10 minutesUpdates pushed every 10 minutes
FrontBridge Anti-Spam EngineFrontBridge Anti-Spam EngineBlocks 95%+ SpamBlocks 95%+ SpamLow false positive rateLow false positive rate
1 in 250,000 false positive 1 in 250,000 false positive (bulk email)(bulk email)
1 in 1,000,000 false critical 1 in 1,000,000 false critical (direct business-to-business messages)(direct business-to-business messages)
FrontBridge: Filtering Flow Diagram MTA 1
MessageSwitch, DeliverHosts, Quarantine
MTA 2
Spam Filtering: On the Edge
SMTP ValidationSMTP ValidationSome easy to detect & common spammer mistakesSome easy to detect & common spammer mistakes
Sender Policy FrameworkSender Policy FrameworkPoints for later spam scoringPoints for later spam scoringOptional CSFM (Custom Spam Filter Management)Optional CSFM (Custom Spam Filter Management)
Blacklists / Reputation ServicesBlacklists / Reputation ServicesBlacklists internally maintained by spam analysts teamBlacklists internally maintained by spam analysts teamSeed pool generated from daily reports of top IPs hitting Seed pool generated from daily reports of top IPs hitting networknetworkIPs are then investigated by SA and added to listIPs are then investigated by SA and added to list
Directory ServicesDirectory ServicesAdministration center upload or automated SFTP dumpAdministration center upload or automated SFTP dumpUpdated every 15 minutesUpdated every 15 minutes
Spam Filtering: Fingerprinting
Message FingerprintingMessage FingerprintingMessages fingerprinted via modified MD5 hashMessages fingerprinted via modified MD5 hash
Adapt to avoid most hash breakersAdapt to avoid most hash breakersFingerprints are compared with a per-Message Switch cacheFingerprints are compared with a per-Message Switch cacheCache synchronized with central DBCache synchronized with central DB
Moving to real time central DB updateMoving to real time central DB updateGray list: SMTP 450 on significant traffic changesGray list: SMTP 450 on significant traffic changes
Database tracks all messages moving through system Database tracks all messages moving through system Spam Analyst acts on real-time patterns detectedSpam Analyst acts on real-time patterns detected
Spam matches signatures in DBSpam matches signatures in DB
HoneypotsHoneypotsAccounts set up to gather spamAccounts set up to gather spamHoneypot messages automatically fingerprinted for Honeypot messages automatically fingerprinted for blockingblocking
Spam Filtering: Rule Engine
FrontBridge Anti-Spam EngineFrontBridge Anti-Spam EngineSpam Analyst on duty 16x7Spam Analyst on duty 16x7
Regular expression-based rulesRegular expression-based rulesFour new rule pushes each dayFour new rule pushes each day
Spam Analyst input:Spam Analyst input:Honeypots: Known SpamHoneypots: Known SpamCustomer spam submissionsCustomer spam submissionsSpam Rule Analyzer DBSpam Rule Analyzer DB
Spam Rule AnalyzerSpam Rule AnalyzerOver 61k rules in DB of which ~16k are activeOver 61k rules in DB of which ~16k are activeEach message that triggers a rule also updates usage DBEach message that triggers a rule also updates usage DBFalse positives update the DBFalse positives update the DB
Corporate Policy Enforcement
• Domain• IP or IP Range• Sender• Recipient• Subject• Body
• Character set
• Filename
• File Size
• File Extension
• Executable content
Rules used to enforce customer-specific policyRules used to enforce customer-specific policyCreate rules based on multiple message parametersCreate rules based on multiple message parameters
Simple wildcard & pattern matching capabilitiesSimple wildcard & pattern matching capabilities/d/d/d-/d/d-/d/d/d/d matches any SSN/d/d/d-/d/d-/d/d/d/d matches any SSN
Per rule customizations (notification, comments)Per rule customizations (notification, comments)Supported both inbound and outboud (ILP)Supported both inbound and outboud (ILP)Actions: reject, allow, deliver w/BCC, quarantine, test, encryptActions: reject, allow, deliver w/BCC, quarantine, test, encrypt
Mail Traffic Reports
Web based reports in Admin CenterWeb based reports in Admin CenterMost can span up to 2 months of data at a timeMost can span up to 2 months of data at a timeExportable to Microsoft ExcelExportable to Microsoft Excel
Organization, domain, or domain-group Organization, domain, or domain-group reportingreporting
Total messagesTotal messagesInbound messagesInbound messagesOutbound messagesOutbound messagesPolicy filtered messagesPolicy filtered messages
Message Level detail down to sender, recipient and policy rule Message Level detail down to sender, recipient and policy rule appliedapplied
Content filtered messagesContent filtered messagesMessage Level detail down to sender, recipient & content rule Message Level detail down to sender, recipient & content rule appliedapplied
Virus Filtered messagesVirus Filtered messagesMessage Level detail down to sender, recipient and virus nameMessage Level detail down to sender, recipient and virus name
FrontBridge Secure E-mailFrontBridge Secure E-mail
User sends an e-mail to FrontBridgeUser sends an e-mail to FrontBridge
E-mail is automatically encrypted at the gateway according E-mail is automatically encrypted at the gateway according to rules created and managed within the Policy Enforcement to rules created and managed within the Policy Enforcement modulemodule
The public key is based on the message recipient’s e-mail The public key is based on the message recipient’s e-mail address to encrypt the E-mailaddress to encrypt the E-mail
The private key is dynamically generated for the message The private key is dynamically generated for the message recipient when they decrypt their messagerecipient when they decrypt their message
Agenda
FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model
Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings
Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption
Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo
Active Message ContinuityActive Message Continuity
Message Archive Overview
Hosted serviceHosted serviceLow cost of storage & administrationLow cost of storage & administration
Captures Email, IM, Bloomberg & archives Captures Email, IM, Bloomberg & archives documentsdocumentsMultiple Business Drivers includingMultiple Business Drivers including
Meets regulatory compliance requirements Meets regulatory compliance requirements Offers corporate surveillance functionality Offers corporate surveillance functionality Provides Knowledge management capabilities Provides Knowledge management capabilities
Easy on-boarding of serviceEasy on-boarding of serviceRequires MX record change for external emailRequires MX record change for external emailEnvelope Journaling for internal emailEnvelope Journaling for internal email
Web-based supervisory, auditing & reporting Web-based supervisory, auditing & reporting toolstools
FrontBridge Message ArchiveFrontBridge Message Archive
Inbound E-mail scrubbed for unwanted contentInbound E-mail scrubbed for unwanted content
Messages captured and copied “in stream”Messages captured and copied “in stream”
Message store holds e-mail, IM, Bloomberg & uploaded Message store holds e-mail, IM, Bloomberg & uploaded documentsdocuments
End users have full E-mail functionality via web-based OWA End users have full E-mail functionality via web-based OWA cloneclone
Supervisors can have access to archive for message Supervisors can have access to archive for message monitoringmonitoring
Auditors and outside counsel can access archive and/or Auditors and outside counsel can access archive and/or reportsreports
Compliance Managers & Supervisors
SEC 17a-4 – Physical Retention requirementsSEC 17a-4 – Physical Retention requirementsMail stored for 3 years (1-7 years retention available)Mail stored for 3 years (1-7 years retention available)Each message assigned a unique contiguous serial numberEach message assigned a unique contiguous serial numberTwo online copies of each message stored in 2 discreet locationsTwo online copies of each message stored in 2 discreet locationsMessages available online 24 x 7Messages available online 24 x 7Can be exported as EML files in ZIPCan be exported as EML files in ZIPFrontBridge will provide letter of attestation to the SECFrontBridge will provide letter of attestation to the SEC
Act on customer’s behalf for SEC queriesAct on customer’s behalf for SEC queries
External Auditor role permits outside access for auditors External Auditor role permits outside access for auditors Mail destroyed on expiration date; Destruction report includedMail destroyed on expiration date; Destruction report included
NASD 3010 – Communications Review requirementsNASD 3010 – Communications Review requirementsKeyword list and message sampling supportKeyword list and message sampling supportWhitelist trusted senders from random sampleWhitelist trusted senders from random sampleRandom sampling support of int/ext mail, int/ext IMRandom sampling support of int/ext mail, int/ext IMMessage harvest process built inMessage harvest process built inReview classification categories, with escalation capability Review classification categories, with escalation capability includedincluded
Corporate HR & Legal
Advanced SearchAdvanced SearchSearch across message headers, bodies and 200 Search across message headers, bodies and 200 attachment typesattachment typesRegex, Soundex, Stemming search supportedRegex, Soundex, Stemming search supportedTag messages for others; add notes to messagesTag messages for others; add notes to messages
Case ManagementCase ManagementReturn search results to custom foldersReturn search results to custom foldersShare folders with othersShare folders with others
Destruction HoldDestruction HoldStall message destruction by user, by organizationStall message destruction by user, by organization
Attorney/Client Privilege protectionAttorney/Client Privilege protection
Message Archive: Reporting
Compliance Reports & system ReportsCompliance Reports & system Reports23 predefined reports available23 predefined reports available
Web-based report-generation engineWeb-based report-generation engineAvailable 24x7Available 24x7
Data harvested & parsed in real timeData harvested & parsed in real timeReports can be scheduled for regular Reports can be scheduled for regular deliverydeliveryPDF or XLS formatPDF or XLS format
Archiving Competition
More than 50 companies in the spaceMore than 50 companies in the spaceBig divide between service provider & Big divide between service provider & on-premiseon-premiseMajor competitorsMajor competitors
ZantazZantazIron MountainIron MountainiLumin (Assentor)iLumin (Assentor)KVSKVSEMC/Legato/OTGEMC/Legato/OTG
Other notable competitorsOther notable competitorsAdvisorMailAdvisorMail
Message Archiving & AMC Demo
Kevin Merritt, ArchitectKevin Merritt, Architect
Agenda
FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model
Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings
Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption
Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo
Active Message ContinuityActive Message Continuity
FrontBridge Active Message FrontBridge Active Message ContinuityContinuity
Fully functioning supplementary email system – can send Fully functioning supplementary email system – can send new messages and reply to and forward previously received new messages and reply to and forward previously received messagesmessages
Easy point in time as well as ad hoc restoration of messagesEasy point in time as well as ad hoc restoration of messages
100% shared code base with Message Archive (including the 100% shared code base with Message Archive (including the OWA clone web-based front end) with some minor tweaks:OWA clone web-based front end) with some minor tweaks:
30-day perpetually rolling archive30-day perpetually rolling archive
Compliance features and reports concealedCompliance features and reports concealed
Active Message Continuity
Shared code base & infrastructure with Shared code base & infrastructure with Message ArchivingMessage ArchivingTargeted as a continuity solution, not Targeted as a continuity solution, not retentionretentionOnly differences between AMC and MA are:Only differences between AMC and MA are:
30 day rolling archive instead of 3, 5 or 7 30 day rolling archive instead of 3, 5 or 7 yearsyearsAttachments and bodies not searchableAttachments and bodies not searchableCompliance workflow tools removedCompliance workflow tools removedFewer reportsFewer reportsEasier to useEasier to useLess expensive MRRLess expensive MRR
Limited Competition – MessageOneLimited Competition – MessageOne
Summary
E-mail is a mission critical applicationE-mail is a mission critical application
Customer benefits from software as a service Customer benefits from software as a service model:model:
Enable companies to tackle complex e-mail tasks with Enable companies to tackle complex e-mail tasks with minimal IT staffminimal IT staff
No upfront capital investmentNo upfront capital investment
Predictable recurring costsPredictable recurring costs
Allow IT staff to focus on more strategic projects offering Allow IT staff to focus on more strategic projects offering real competitive advantagereal competitive advantage
FrontBridge, a Microsoft subsidiary, is the leading FrontBridge, a Microsoft subsidiary, is the leading services provider for e-mail security, protection, services provider for e-mail security, protection, and complianceand complianceWe’re hiringWe’re hiring
Developers, Testers, Program Managers, System Developers, Testers, Program Managers, System Administrators, DBAs, and Client SupportAdministrators, DBAs, and Client SupportHelp drive Microsoft success in non-consumer hosted Help drive Microsoft success in non-consumer hosted servicesservices
Commercial Database Security Issues James Hamilton [email protected] Microsoft SQL Server 2002.10.16
Active Server Availability Feedback James Hamilton [email protected] Microsoft SQL Server 2002.06.12