jayne bernardini peter schunk jan vanecek. presentation outline evolution of security software...
TRANSCRIPT
![Page 1: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/1.jpg)
Jayne BernardiniPeter SchunkJan Vanecek
![Page 2: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/2.jpg)
Presentation OutlineEvolution of Security SoftwareCompany ProfilesCompare System
![Page 3: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/3.jpg)
![Page 4: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/4.jpg)
Security DefinedEnsure data stored in a computer cannot be read without
authorizationData encryption and passwords
Encryption-translation of document into unintelligible language
Source: http://www.cert.org/encyc_article/tocencyc.html#ImprSec
![Page 5: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/5.jpg)
History of Internet Security Incidents1969 ARPANET begins 1986
First well-publicized security incident1988
First automated network security incident “the Morris Worm”1989
ARPANET officially becomes the InternetWANK/OILZ worm
1994Tools “sniff” packets from the network
1995Attacks on computers that have trust relationships
Source: http://www.cert.org/encyc_article/tocencyc.html#ImprSec
![Page 6: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/6.jpg)
Security TechnologyOperational Technology
PasswordsFirewallsMonitoring ToolsSecurity Analysis ToolsAntivirus
Crytography
Source: http://www.cert.org/encyc_article/tocencyc.html#ImprSec
![Page 7: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/7.jpg)
![Page 8: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/8.jpg)
![Page 9: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/9.jpg)
Future of Security TechnologyInternetworking Protocols
Cope with vastly increased routing needsIntrusion Detection
Anomaly detection and pattern recognitionSoftware Engineering and System Survivability
No single point of failureWeb-Related Programming and Scripting Languages
Inform usersIntelligent Autonomous Agents
Performs computation or gathers info and presents a result
Source: http://www.cert.org/encyc_article/tocencyc.html#ImprSec
![Page 10: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/10.jpg)
![Page 11: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/11.jpg)
SymantecKerioFounded in April 19822005 revenue – $2,583
million IPO on June 23, 1989More than 17,500
employeesOperations in 40 countries
securing sensitive online consumer interactions financial transactions instant messaging preventing malicious
threats and crime ware
Entered market in 19972005 revenue – $20,253Customers in 70 countriesOffices in U.S., Great
Britain, and Czech RepublicServices
Communication Security Software Products
Internet Messaging and Firewall productsKerio Mail ServerKerio WinRoute FirewallKerio WebSTAR
Source: Kerio s. r. o. Source: Symantec
![Page 12: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/12.jpg)
Kerio Mail Server – Release history January 17, 2002
* SSL now works from browsers supporting 40-bit enryptionMarch 25, 2003
+ SpamAssassin spam filter * improved spam header filter
April 2, 2003 + spam filter can change message subject
September 26, 2003 + fax plugin
July 18, 2005 + WebMail mini + support for MacOS X Tiger (10.4) + Kerio Synchronization Plug-in for Outlook (synchronization
of contacts and calendars in Outlook e-mail profile)Source: http://www.kerio.com
![Page 13: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/13.jpg)
Kerio Mail Server – Release history + ability to use two antiviruses simultaneously (McAfee + one
external plugin) + support for PDA in WebMail (http://server/pda)
October 26, 2005 * Enhanced backup options: added support for differential
backup, backup scheduler is more flexible July 18, 2006
+ Added two-level spam rating. Spam messages could be tagged or blocked depending on spam score.
+ New SURBL (Spam URI Realtime Blocklist) anti-spam check significantly increases Spam Filter efficiency.
December 13, 2006 + Over-the-air synchronization with Microsoft mobile devices
via Microsoft ActiveSync® protocol.
Source: http://www.kerio.com
![Page 14: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/14.jpg)
Source: http://www.kerio.com
![Page 15: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/15.jpg)
Source: http://www.kerio.com
![Page 16: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/16.jpg)
Source: http://www.kerio.com
![Page 17: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/17.jpg)
Source: Kerio s. r. o.
![Page 18: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/18.jpg)
![Page 19: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/19.jpg)
Includes: Integrated virus scanningAntispamContent filtering controlsFlexibility to choose between multi-platform software-
basedAppliance-based and hosted service solutions
What is mail security software?
![Page 20: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/20.jpg)
System Requirements• Symantec Mail
Security for Microsoft Exchange:Microsoft Exchange
Server 2000/2003 Intel Server-class 32-bit
processor, 1 GB of RAM
• Kerio Mail ServerCPU 500 MHz, 256 MB
RAMMicrosoft Windows,
Linux
![Page 21: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/21.jpg)
Business RequirementsUnited States: B&B Electronics
Long-Term plans Often renew licenses
with same vendorPriceUser-friendly
Czech Republic: IIB s. r. o.
Short-Term plans Shorter licenses
Price sensitiveUser-friendliness only a
“plus”
![Page 22: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/22.jpg)
Software Implementation
![Page 23: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/23.jpg)
Common ElementsManagement commitmentTech supportCommunication of the policySecurity awareness of all users
![Page 24: Jayne Bernardini Peter Schunk Jan Vanecek. Presentation Outline Evolution of Security Software Company Profiles Compare System](https://reader035.vdocument.in/reader035/viewer/2022062421/56649dc75503460f94abbb8d/html5/thumbnails/24.jpg)
Questions?
Thank you for your attention.