3com Email Firewall 3CR3MFA-92-ME Fiche De Données
Codes de produits
3CR3MFA-92-ME
3
3 C O M
®
E M A I L F I R E WA L L
Features
, continued
Common Criteria for
Information Technology
Security Testing
Information Technology
Security Testing
INTEGRATED ANTISPAM, ANTIVIRUS, & ATTACHMENT CONTROLS
Multi-tier spam controls
•
Trusted Senders Whitelist
•
Realtime Blackhole List (RBL) via DNS
•
Distributed Checksum Clearinghouse (DCC) for bulk mail detection
•
Bayesian filtering and advanced heuristics
•
Objectionable Content Filtering, including keyword blocking
•
Statistical Token Analysis (STA) and specific access patterns
•
Pattern-Based Message Filtering and Blacklisting
•
User-Configured Whitelist and Quarantine
Robust antivirus engine
•
Industry-leading Kaspersky network antivirus application
•
Fast scanning of all inbound/outbound traffic
•
Scans compressed attachments down 20 levels
•
Automatically quarantines or deletes suspicious and attachments
Early detection of new viruses
Automated updates from BorderWare SecurityConnection
TM
service help protect against the latest virus
signatures
Content-aware filtering
•
Headers
•
Body
•
Keywords
•
Attachments, including those masquerading as allowable file types
EASY INSTALLATION AND ADMINISTRATION
Fast deployment
Installs between your perimeter firewall or gateway and SMTP email server in less than 30 minutes
Detailed reporting and auditing
Monitor and manage all firewall features from a single, web-based interface:
• Firewall performance
• Network performance
• Usage statistics
• Spam metrics
• Antivirus performance
• Email usage
• Inbound/outbound traffic
• System health
• Top mailbox usage
• Spam performance
• Virus reports
BorderWare SecurityConnection
User license includes one-year subscription to BorderWare Mail Security Service; automatically polls
at 15-minute intervals for:
at 15-minute intervals for:
• Filter updates
• Software versions
• Virus signature files
• System upgrades
The Common Criteria for Information
Technology Security Evaluation, often
referred to as simply “Common Criteria,” is
accepted by security standards bodies
worldwide. Common Criteria version 2.1—
also known as the international standard ISO
15408—is designed to provide consumers
with a consistent means of evaluating
network security systems and products.
Technology Security Evaluation, often
referred to as simply “Common Criteria,” is
accepted by security standards bodies
worldwide. Common Criteria version 2.1—
also known as the international standard ISO
15408—is designed to provide consumers
with a consistent means of evaluating
network security systems and products.
Common Criteria rankings are defined by a
series of hierarchal Evaluation Assurance
Levels (EALs). Although EAL5 through
series of hierarchal Evaluation Assurance
Levels (EALs). Although EAL5 through
EAL7 have been described theoretically, the
highest rating currently achievable by an IT
security product is EAL4. To be certified as
Common Criteria EAL4, security product
must undergo in-depth analyses and extensive
testing at an independent, third-party
testing lab. For more information on
Common Criteria standards, certified IT
products, and testing methodologies, you
can visit a number of websites, including
www.commoncriteria.org,
www.cesg.gov.uk, and http://niap.nist.gov.
highest rating currently achievable by an IT
security product is EAL4. To be certified as
Common Criteria EAL4, security product
must undergo in-depth analyses and extensive
testing at an independent, third-party
testing lab. For more information on
Common Criteria standards, certified IT
products, and testing methodologies, you
can visit a number of websites, including
www.commoncriteria.org,
www.cesg.gov.uk, and http://niap.nist.gov.