Professional Documents
Culture Documents
E-mail Security
incognito security services
Quick Wins
• Protection against 98% of spam, 100% known viruses
• Intuitive, secure web-based administration offers complete vis-
ibility & control.
• File-type, inbound, outbound scanning
• Integrate with Cognito E-mail Archiving services, Deep Content
Scanning & Business Continuity Services
• Lower Total Costs of Ownership (TCO)
• No hardware or software required
• Improve IT efficiency
• 24x7 Support
cognito
threats. Webroot Email Security Service incorporates multiple
Improve Manageability guaranteed protection against 100% of known and unknown virus
Eliminate concerns over fast-spreading email viruses with datasheet
Antivirus QUARANTINE / LOG
with Webroot Security SaaS SENT TO SPAM
INFECTED EMAIL E-mail Security
help preserve your organization’s reputation.
ENGINE BLACKLIST
machines from sending spam through the company network to EXPLICIT SERVER
data centers.
t 4DBMFTSBQJEMZUPNFFUDIBOHJOHCVTJOFTTOFFET tspam.
(SBOVMBSTFUUJOHTBMMPXHSPVQPSVTFSMFWFMQPMJDJFT
And unlike other reputation services that provide
Webroot Global only a
Security
Global Security DataData Center
Center Network
Network
breed email filters, Webroot guarantees elimination of 98% of all ANALYSIS ANALYSIS
Zero-hour, Signature-based,
Improve Manageability
Reputation SCANNING in-boxes.
Keep spam off your network and out of corporate SCANNING
With SCANNING SCANNING
=gmcif=HhYUaghfYhW\YXhcch\]b3 7UbmcifgYWif]hm]bZfUghfiWhifY
Antispam INCOMING EMAIL highly accurate spam detection.
analysis enginesis more to ensure accurate
EMAIL IN
Today’s threat environment complex than ever, requiring ei]W_`mUXUdhhcW\Ub[Y3
Features DATA LOGS AND QUARANTINE Figure 1 Advanced analyses ensure
multiple point product solutions: Firewall, IPS/IDS, VPN, anti-
spam detection.
malware gateway, plus separate appliances for email security
Webroot Security
While conventional security appliances and software cannot keep
with
up with the pace of change, SaaS delivers a fast-deployingWEB
SaaS
secu-
ONLY LEGITIMATE EMAIL
REACHES IN-BOXES
ACCESS
and URL filtering. Managing all of these applications will rity packageOUTGOING
that is scalable
EMAIL and flexible. Granular control settings
3. quickly
Combination oftime
drain any IT team’s multiple
and budget.virus scan, allow administrators to enforce web and messaging policies at a
heuristic scan and zero-hour scansAUbU[YaYbh6YbYÑhg
for group or user level, and new policies or user changes take effect
Webroot Security SaaS is a comprehensive security approach that within seconds. Detailed logs and reports provide immediate
viruses.
provides complete and easy-to-manage protection. Administra- t *ODSFBTFT*5DBQBDJUZBOEFGmDJFODZ
access to real-time data, allowing administrators t
to #SPXTFSCBTFEDPOTPMFTUSFBNMJOFTNBOBHFNFOU
gauge
tors can still maintain control over settings and policies throught &BTJFSBOEGBTUFSUPEFQMPZBOENBJOUBJO
current effectiveness. t 3FBMUJNFSFQPSUJOHBJETTUSBUFHJDQMBOOJOH
4. Webroot’s
Clean browser-based
e-mail delivered to e-mail
console. But time-draining servers.
details liket 4DBMFTSBQJEMZUPNFFUDIBOHJOHCVTJOFTTOFFET t (SBOVMBSTFUUJOHTBMMPXHSPVQPSVTFSMFWFMQPMJDJFT
upgrades, patches and individual user setups will be eliminated. OUTGOING EMAIL
Infected e-mail is logged.
Without the burden of managing multiple solutions across the
Additional services can be added at any time, allowing businesses
WEB ACCESS
to create a customized security package to meet specific needs. REACHES IN-BOXES
ONLY LEGITIMATE EMAIL
By using Bounce Address Tag Validation (BATV), timestamp and unique cryptographic signature that cannot be
WWW.WEBROOT.COM
duplicated. Any failed delivery messages that do not reference
ZERO HOUR
SCANNING
E-mail Security timestamps each mail and provides this signature are then marked as spam and blocked from entering
INFECTED EMAIL
SENT TO VIRUS LOG
the user’s mailbox.
a unique cryptographic key to protect against A Web-based administration console streamlines management.
Security SaaS.
strategic developments that add value to the business. ity would be to add Webroot Archive Service to Webroot E-Mail
entire company, IT teams can focus their time and energy on For example, a fast and easy way to enhance business continu-
Without the burden of managing multiple solutions across the
upgrades, patches and individual user setups will be eliminated.
to create a customized security package
ADDtoON E-mail Encryption
meet specific needs.
Additional services can be added at any time, allowing businesses
Webroot’s browser-based console. But time-draining details like
current effectiveness. Automatically encyrpt e-mailWWW.WEBROOT.COM
traffic to meet legal
Image Protection
tors can still maintain control over settings and policies through
provides complete and easy-to-manage protection. Administra- and/or compliance requirements. E-mail encryption
access to real-time data, allowing administrators to gauge
Webroot Security SaaS is a comprehensive security approach that within seconds. Detailed logs and reports provide immediate
Scan images with a filter that scans for exposure to enhances Data Loss Prevention (DLP). Admins can
group or user level, and new policies or user changes take effect
quickly drain any IT team’s time and budget.
inappropriate imagesBy setup policy-based and/or on-demand encryption.
allow administrators to enforce web and messaging policies at a
and URL filtering. Managing all of using Bounce
these applications will Address Tag rity package that is scalable and flexible. Granular control settings
cogn o
allow administrators to enforce web and messaging policies at a
Webroot Security SaaS
quickly drain any IT team’s time and budget.
with and URL filtering. Managing all of these applications will rity package that is scalable and flexible. Granular control settings
Improve Manageability malware gateway, plus separate appliances for email security
www.
up with the pace of change, SaaS delivers a fast-deploying secu- it.com
multiple point product solutions: Firewall, IPS/IDS, VPN, anti- While conventional security appliances and software cannot keep
Today’s threat environment is more complex than ever, requiring ei]W_`mUXUdhhcW\Ub[Y3
=gmcif=HhYUaghfYhW\YXhcch\]b3 7UbmcifgYWif]hm]bZfUghfiWhifY
support information contact
support@cognitoit.com www.cognitoit.com info@cognitoit.com
twitter.com/c_noc blog.cognitoit.com twitter.com/cognitoit
t 4DBMFTSBQJEMZUPNFFUDIBOHJOHCVTJOFTTOFFET t (SBOVMBSTFUUJOHTBMMPXHSPVQPSVTFSMFWFMQPMJDJFT
skype c_noc
t &BTJFSBOEGBTUFSUPEFQMPZBOENBJOUBJO cognitoit.com/news skype cognitoit
t 3FBMUJNFSFQPSUJOHBJETTUSBUFHJDQMBOOJOH
t *ODSFBTFT*5DBQBDJUZBOEFGmDJFODZ t #SPXTFSCBTFEDPOTPMFTUSFBNMJOFTNBOBHFNFOU
AUbU[YaYbh6YbYÑhg