Cisco Cisco Email Security Appliance X1070 Guía De Información
Customer Case Study
© 2010 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 2 of 3
Figure 1. Cisco IronPort Image Analysis
—Advanced Technology for Monitoring Incoming and Outgoing Email
The Cisco IronPort Advantage
The distribution of problematic images via email, particularly offensive graphics, jeopardizes organizations worldwide.
Cisco
IronPort Image Analysis has emerged to help ensure enterprises’ enforcement of acceptable-use policies and
ultimately to preserve the integrity of their reputation in the marketplace.
Integrated into the award-winning Cisco IronPort C-Series Email Security Appliance, the Cisco IronPort Image
Analysis solution has enabled EBS to prevent illicit images from entering its network. EBS has been able to identify
traffickers and dramatically reduce the amount of time spent protecting the network from such threats.
The system draws on 11 different detection methods to render a verdict on suspect attachments. It has easily
configurable settings that give administrators full control to determine what actions to take on a particular message.
Additionally, embedded image scanning enables a rigorous inspection of attached and embedded files, including
JPEG, BMP, PNG, TIFF, GIF, TGA, ICO and PCX Files. The Cisco IronPort scanning engine can extract images from
more than 400 file types, including Microsoft Word, Excel, and PowerPoint.
Cisco IronPort Image Analysis is easily aligned with message and content filters to allow policy-based filtering and
reporting on senders and recipients. When an illicit image is detected within email, a variety of actions can be taken,
including stripping the attachment from the message or stamping it with a company policy message. EBS was
particularly pleased with the technology’s ability to remove a suspect image from a message, while still allowing the
message’s text to be delivered to its intended recipient.
particularly pleased with the technology’s ability to remove a suspect image from a message, while still allowing the
message’s text to be delivered to its intended recipient.
“Overall, Cisco IronPort Image Analysis has been a very useful product.
Prior to deployment, we relied on manual detection of unwanted
attachments. This was a major drain on productivity and continually
posed the risk of allowing inappropriate content to breach the internal
network. Cisco has enabled a significantly more robust monitoring
process.
Prior to deployment, we relied on manual detection of unwanted
attachments. This was a major drain on productivity and continually
posed the risk of allowing inappropriate content to breach the internal
network. Cisco has enabled a significantly more robust monitoring
process.
”
— David Cahill, Information Security Specialist, EBS Building Society