You are on page 1of 2

datasheet

E-mail Security
incognito security services

Focus on sending e-mail.


We’ll do the rest.
Spam constitutes 96% of all e-mail. Measure that against the
exponentially growing volumes of e-mail each year and you know you • 99.999% uptime
have a problem on your hands. It doesn’t stop there. guarantee
• Accurate spam detection
E-mails are ubiquous and widespread today. This makes them an through advanced analysis
ideal candidate for data leakage, man in the middle attacks and
more. • Image protection
• Multiple scanning engines
With incognito e-mail security services, we provide e-mail protection including virus, heuristic &
before it reaches your network. All e-mails are filtered in the cloud, zero-hour scanning
with high-intensity scanners providing multiple layers of virus & spam
• Policy-based management
scans. With powerful add-ons like e-mail encyrption, your mail is
completely protected from data leakage. • Compliance with HIPAA,
GLBA, PCI-DSS, etc.
The best part: no additional hardware, software or personnel is
required. E-mail security is a fully managed service with complete
protection for inbound and outbound e-mails.

Quick Wins
• Protection against 98% of spam, 100% known viruses
• Intuitive, secure web-based administration offers complete vis-
ibility & control.
• File-type, inbound, outbound scanning
• Integrate with Cognito E-mail Archiving services, Deep Content
Scanning & Business Continuity Services
• Lower Total Costs of Ownership (TCO)
• No hardware or software required
• Improve IT efficiency
• 24x7 Support

Independence from variables


As always, the service is independent of your architecture,
e-mail and messaging systems or location of your users. It For more information or a
just works. free trial, reach out to us:
e-mail info@cognitoit.com
twitter @cognitoit
skype cognitoit

cognito
threats. Webroot Email Security Service incorporates multiple

Improve Manageability guaranteed protection against 100% of known and unknown virus
Eliminate concerns over fast-spreading email viruses with datasheet
Antivirus QUARANTINE / LOG
with Webroot Security SaaS SENT TO SPAM
INFECTED EMAIL E-mail Security
help preserve your organization’s reputation.
ENGINE BLACKLIST
machines from sending spam through the company network to EXPLICIT SERVER

approach. Outbound spam protection locates and blocks infected


AUbU[YaYbh6YbYÑhg scalable detection than systems that simply employ a blacklist ENGINE ENGINE
ZERO–HOUR SIGNATURE
(fig. 1). This mathematical model provides far more accurate and
1. E-mail tmessages routed through secure
t *ODSFBTFT*5DBQBDJUZBOEFGmDJFODZ
&BTJFSBOEGBTUFSUPEFQMPZBOENBJOUBJO
tbased
#SPXTFSCBTFEDPOTPMFTUSFBNMJOFTNBOBHFNFOU
tbinary
on granular trust ratings that automatically adjust over time
3FBMUJNFSFQPSUJOHBJETTUSBUFHJDQMBOOJOH
BLACKLIST ENGINE
‘good’ or ‘bad’ rating, Webroot quantifies sender reputation IP ADDRESS SIGNATURE

data centers.
t 4DBMFTSBQJEMZUPNFFUDIBOHJOHCVTJOFTTOFFET tspam.
(SBOVMBSTFUUJOHTBMMPXHSPVQPSVTFSMFWFMQPMJDJFT
And unlike other reputation services that provide
Webroot Global only a
Security
Global Security DataData Center
Center Network
Network
breed email filters, Webroot guarantees elimination of 98% of all ANALYSIS ANALYSIS

2. Combination of Bayesian, Blacklist,


BAYESIAN REPUTATIONAL

seven different levels of spam detection and multiple best


VIRUS of
SPAM CONTENT IMAGE

Zero-hour, Signature-based,
Improve Manageability
Reputation SCANNING in-boxes.
Keep spam off your network and out of corporate SCANNING
With SCANNING SCANNING
=gmcif=HhYUaghfYhW\YXhcch\]b3 7UbmcifgYWif]hm]bZfUghfiWhifY
Antispam INCOMING EMAIL highly accurate spam detection.
analysis enginesis more to ensure accurate
EMAIL IN
Today’s threat environment complex than ever, requiring ei]W_`mUXUdhhcW\Ub[Y3
Features DATA LOGS AND QUARANTINE Figure 1 Advanced analyses ensure
multiple point product solutions: Firewall, IPS/IDS, VPN, anti-
spam detection.
malware gateway, plus separate appliances for email security
Webroot Security
While conventional security appliances and software cannot keep
with
up with the pace of change, SaaS delivers a fast-deployingWEB
SaaS
secu-
ONLY LEGITIMATE EMAIL
REACHES IN-BOXES
ACCESS
and URL filtering. Managing all of these applications will rity packageOUTGOING
that is scalable
EMAIL and flexible. Granular control settings
3. quickly
Combination oftime
drain any IT team’s multiple
and budget.virus scan, allow administrators to enforce web and messaging policies at a
heuristic scan and zero-hour scansAUbU[YaYbh6YbYÑhg
for group or user level, and new policies or user changes take effect
Webroot Security SaaS is a comprehensive security approach that within seconds. Detailed logs and reports provide immediate
viruses.
provides complete and easy-to-manage protection. Administra- t *ODSFBTFT*5DBQBDJUZBOEFGmDJFODZ
access to real-time data, allowing administrators t
to #SPXTFSCBTFEDPOTPMFTUSFBNMJOFTNBOBHFNFOU
gauge
tors can still maintain control over settings and policies throught &BTJFSBOEGBTUFSUPEFQMPZBOENBJOUBJO
current effectiveness. t 3FBMUJNFSFQPSUJOHBJETTUSBUFHJDQMBOOJOH
4. Webroot’s
Clean browser-based
e-mail delivered to e-mail
console. But time-draining servers.
details liket 4DBMFTSBQJEMZUPNFFUDIBOHJOHCVTJOFTTOFFET t (SBOVMBSTFUUJOHTBMMPXHSPVQPSVTFSMFWFMQPMJDJFT
upgrades, patches and individual user setups will be eliminated. OUTGOING EMAIL
Infected e-mail is logged.
Without the burden of managing multiple solutions across the
Additional services can be added at any time, allowing businesses
WEB ACCESS
to create a customized security package to meet specific needs. REACHES IN-BOXES
ONLY LEGITIMATE EMAIL

allow for Features


entire company, IT teams can focus their time and energy on For example, a fast and easy way to enhance business continu-
5. strategic
Customizable rules
developments that engine
add value to=gmcif=HhYUaghfYhW\YXhcch\]b3
to the business.
DATA LOGS AND QUARANTINE
ity would be to add Webroot Archive Service to Webroot E-Mail
Figure 1 Advanced analyses ensure
7UbmcifgYWif]hm]bZfUghfiWhifY
Antispam highly accurate spam detection. EMAIL IN
granular control. INCOMING EMAIL
SecurityisSaaS.
Today’s threat environment more complex than ever, requiring
Keep spam off your network and out of corporate ei]W_`mUXUdhhcW\Ub[Y3
SCANNING in-boxes. With SCANNING
SCANNING SCANNING
multiple point product solutions: Firewall, IPS/IDS, VPN, anti- VIRUS
seven different levels of spam detection and multipleWhile conventional
SPAM
best of security appliances
CONTENT IMAGE and software cannot keep
malware gateway, plus separate appliances for email security
breed email filters, Webroot guarantees elimination up with of
of 98% theallpace of change, SaaS delivers a fast-deploying BAYESIAN
secu- REPUTATIONAL
and URL filtering. Managing all of these applications willWebroot Global Security
a thatData Center Network ANALYSIS ANALYSIS
rity package
spam. And unlike other reputation services that provide only is scalable and flexible. Granular control settings
quickly drain any IT team’s time and budget. allow administrators to enforce web and messaging policies at a
binary ‘good’ or ‘bad’ rating, Webroot quantifies sender reputation IP ADDRESS SIGNATURE
group
based on granular trust ratings that automatically adjust or user
over time level, and new policies or user changes take BLACKLIST
effect ENGINE

Anti-Spam & Anti-Virus Protection


Webroot Security SaaS is a comprehensive security approach that
provides complete and easy-to-manage protection. Administra-
within seconds.
(fig. 1). This mathematical model provides far more accurate
scalable detection than systems that simply employ access
and Detailed logs and reports provide immediate
to real-time data, allowing administrators to gauge ZERO–HOUR
a blacklist ENGINE
SIGNATURE
ENGINE
tors can still maintain control over settings and policies through current effectiveness.
approach. Outbound spam protection locates and blocks infected
Guaranteed protection against 98% of all spam
WWW.WEBROOT.COM
Webroot’s browser-based console. But time-draining details like
machines from sending spam through the company network to EXPLICIT SERVER
upgrades, patches and individual user setups will be eliminated. Additional services can be added at any time, allowing businesses ENGINE BLACKLIST

and all known and unknown viruses. With intelligent


help preserve your organization’s reputation.
Without the burden of managing multiple solutions across the to create a customized security package to EMAIL
INFECTED meet specific needs.
entire company, IT teams
Antivirus scanners, e-mail security quantifies sender reputation
can focus their time and energy on
SENT TO SPAM
For example, a fast and easy way toQUARANTINE
enhance /business
LOG continu-
strategic developments that add
Eliminate value over
concerns to the business. email virusesity
fast-spreading would be to add Webroot Archive Service to Webroot E-Mail
with
and incorporates
guaranteed protection against 100% of known and unknownSecurity SaaS.multiple signature, heuristic and
virus
zero-day
threats. Webroot Email Security Service engines
incorporates multiple to detect threats. Outbound
A Web-based administration console streamlines management.signature, heuristic and zero-day engines to provide unmatched
protection ensures
detection of viruses and variants (fig. 2). These powerful filters your organization’s reputation CLEAN EMAIL
seek out and block new threats beforeis they
preserved by blocking infected machines from
can infect your DELIVERED

company’s network environment. EMAIL IN


sending spam using your network.
Backscatter Protection
A Web-based administration console streamlines management.Backscatter occurs when a spammer spoofs a legitimate email VIRUS
SCANNER 1
Figure 2 Multiple engines
address to send an unsolicited message to large distribution lists, provide unmatched detection of
causing the email server to flood an unsuspecting email address VIRUS known and unknown viruses.
WWW.WEBROOT.COM
SCANNER 2
owner’s mailbox with hundreds or thousands of failed delivery
messages. To protect against this growing threat, Webroot
BackScatter Protection employs an advanced technique called Bounce Address Tag
Validation (BATV). Every sent message is marked with a
HEURISTIC
SCANNING

By using Bounce Address Tag Validation (BATV), timestamp and unique cryptographic signature that cannot be
WWW.WEBROOT.COM
duplicated. Any failed delivery messages that do not reference
ZERO HOUR
SCANNING

E-mail Security timestamps each mail and provides this signature are then marked as spam and blocked from entering
INFECTED EMAIL
SENT TO VIRUS LOG
the user’s mailbox.
a unique cryptographic key to protect against A Web-based administration console streamlines management.

Backscatter. Failed delivery messages without the


cryptographic signature are considered spamadministration
A Web-based and console streamlines management.
prevented from entering the users’ mailboxes.
CLEAN EMAIL
DELIVERED

Security SaaS.
strategic developments that add value to the business. ity would be to add Webroot Archive Service to Webroot E-Mail
entire company, IT teams can focus their time and energy on For example, a fast and easy way to enhance business continu-
Without the burden of managing multiple solutions across the
upgrades, patches and individual user setups will be eliminated.
to create a customized security package
ADDtoON E-mail Encryption
meet specific needs.
Additional services can be added at any time, allowing businesses
Webroot’s browser-based console. But time-draining details like
current effectiveness. Automatically encyrpt e-mailWWW.WEBROOT.COM
traffic to meet legal
Image Protection
tors can still maintain control over settings and policies through
provides complete and easy-to-manage protection. Administra- and/or compliance requirements. E-mail encryption
access to real-time data, allowing administrators to gauge
Webroot Security SaaS is a comprehensive security approach that within seconds. Detailed logs and reports provide immediate
Scan images with a filter that scans for exposure to enhances Data Loss Prevention (DLP). Admins can
group or user level, and new policies or user changes take effect
quickly drain any IT team’s time and budget.
inappropriate imagesBy setup policy-based and/or on-demand encryption.
allow administrators to enforce web and messaging policies at a
and URL filtering. Managing all of using Bounce
these applications will Address Tag rity package that is scalable and flexible. Granular control settings

Validation (BATV), E-mail Security timestamps


malware gateway, plus separate appliances for email security
multiple point product solutions: Firewall, IPS/IDS, VPN, anti-
each
up with the pace of change, SaaS delivers a fast-deploying secu-
While conventional security appliances and software cannot keep
mail Today’s
and provides a unique cryptographic
threat environment is more complex than ever, requiring key to
ei]W_`mUXUdhhcW\Ub[Y3
=gmcif=HhYUaghfYhW\YXhcch\]b3
protect against Backscatter. Failed delivery messages 7UbmcifgYWif]hm]bZfUghfiWhifY ADD ON E-mail Archiving
Security SaaS.
without the cryptographic signature are developments
strategic considered that add value to the business.
E-mail Archiving ity would be to add Webroot Archive Service to Webroot E-Mail
provides complete archiving of
For example, a fast and easy way to enhance business continu-
spam and prevented from enteringentire thecompany,
users’ITtteams
t 4DBMFTSBQJEMZUPNFFUDIBOHJOHCVTJOFTTOFFET
Without the burden
can focus their time and energy on
past thee-mails
(SBOVMBSTFUUJOHTBMMPXHSPVQPSVTFSMFWFMQPMJDJFT
of managing multiple solutions across anda customized
to create currentsecurity
e-mails
packageintoreal-time, along
meet specific needs.
mailboxes. t &BTJFSBOEGBTUFSUPEFQMPZBOENBJOUBJO upgrades, patchestand individual user setups will be eliminated.
3FBMUJNFSFQPSUJOHBJETTUSBUFHJDQMBOOJOH Additional services can be added at any time, allowing businesses
with advanced benefits of e-discovery and mailbox
t *ODSFBTFT*5DBQBDJUZBOEFGmDJFODZWebroot’s browser-based console. But time-draining details like
t #SPXTFSCBTFEDPOTPMFTUSFBNMJOFTNBOBHFNFOU
management, without any need for hardware or
tors can still maintain control over settings and policies through current effectiveness.
AUbU[YaYbh6YbYÑhg provides complete and easy-to-manage protection. Administra- access to real-time data, allowing administrators to gauge
software on-site.
Webroot Security SaaS is a comprehensive security approach that within seconds. Detailed logs and reports provide immediate
group or user level, and new policies or user changes take effect

cogn o
allow administrators to enforce web and messaging policies at a
Webroot Security SaaS
quickly drain any IT team’s time and budget.
with and URL filtering. Managing all of these applications will rity package that is scalable and flexible. Granular control settings

Improve Manageability malware gateway, plus separate appliances for email security
www.
up with the pace of change, SaaS delivers a fast-deploying secu- it.com
multiple point product solutions: Firewall, IPS/IDS, VPN, anti- While conventional security appliances and software cannot keep
Today’s threat environment is more complex than ever, requiring ei]W_`mUXUdhhcW\Ub[Y3
=gmcif=HhYUaghfYhW\YXhcch\]b3 7UbmcifgYWif]hm]bZfUghfiWhifY
support information contact
support@cognitoit.com www.cognitoit.com info@cognitoit.com
twitter.com/c_noc blog.cognitoit.com twitter.com/cognitoit
t 4DBMFTSBQJEMZUPNFFUDIBOHJOHCVTJOFTTOFFET t (SBOVMBSTFUUJOHTBMMPXHSPVQPSVTFSMFWFMQPMJDJFT
skype c_noc
t &BTJFSBOEGBTUFSUPEFQMPZBOENBJOUBJO cognitoit.com/news skype cognitoit
t 3FBMUJNFSFQPSUJOHBJETTUSBUFHJDQMBOOJOH
t *ODSFBTFT*5DBQBDJUZBOEFGmDJFODZ t #SPXTFSCBTFEDPOTPMFTUSFBNMJOFTNBOBHFNFOU

AUbU[YaYbh6YbYÑhg

You might also like