SlideShare a Scribd company logo
NetGains Mail & Application Server
Confidentiality & Security – Layered Approach
Layered approach for securing NetGains Mail & Application
Servers.
It is a technical strategy, espousing adequate measures be put
in
place at different levels within the network infrastructure.
It is also an organizational strategy, requiring participation
from the clients, users, administrators & business owners.
The layered-security approach centers on maintaining
appropriate security measures and procedures at five different
levels within the IT environment
NetGains Mail & Application Server
Confidentiality & Security – Layered Approach
Security level

Applicable security measures

1. Perimeter

• Firewall
• Network-based anti-virus

2. Network

• Intrusion detection /prevention system
• Vulnerability management system
• Endpoint security compliance
• Access control /user authentication

3. Host

Host

4. Application

• Host IDS & Host VA
• Access control/user authentication
• Input validation

5. Data

• Encryption
• Access control/user authentication

IDS & Host VA
Endpoint security compliance
Anti-virus
Access control/user authentication
NetGains Mail & Application Server
Confidentiality & Security – Layered Approach

LEVEL 1: PERIMETER SECURITY




The perimeter is the first line of defense from outside,
un-trusted networks.
The perimeter acts as the first and last point of contact for security
defenses protecting the network.
It is the area where your network ends and the Internet begins.

Sonic FireWALL PRO 3060







Real-Time Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention.
Powerful Content Filtering.
Deep Packet Inspection Firewall

Real-Time Blacklist Spam Filtering
Policy-based NAT
NetGains Mail & Application Server
Confidentiality & Security – Layered Approach

LEVEL 2: NETWORK SECURITY
The network level of the layered-security model refers to internal LAN and WAN.
•
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs)
•
Vulnerability management - Vulnerability management systems perform two
related functions:
(1) they scan the network for vulnerabilities and
(2) they manage the process of repairing the vulnerabilities found.
•
Endpoint security compliance (for VPN & RAS devices)
•
Access control/authentication (Network Level access)

Answer: The Network level done administration is done by the ISP
NetGains Mail & Application Server
Confidentiality & Security – Layered Approach

LEVEL 3: HOST SECURITY
In the layered-security model, the host level pertains to the servers
configurable parameters that, when set inappropriately, can create
exploitable security holes. These parameters include registry settings,
services (applications) operating on the device, or patches to the operating
system or important applications.

Host-based intrusion detection systems (IDSs)

Host-based vulnerability assessment (VA)

Endpoint security compliance

Anti-virus

Access control/authentication
Answer:
* For this we use Trend Micro Interscan Messaging Security Suite which
gives protection against Viruses, Spam and FTP traffic.
NetGains Mail & Application Server
Confidentiality & Security – Layered Approach

LEVEL 4: APPLICATION SECURITY
Application-level security is currently receiving a great deal of attention.









Poorly protected applications can provide easy access to confidential data
and records.
The hard truth is that most programmers don’t code with security in
mind.
Application shield - application-level firewall.
Access control/authentication - only authorized users are able to access the
application.
Input validation - Input validation measures verify that
application input traveling across your network is safe to process.
NetGains Mail & Application Server
Confidentiality & Security – Layered Approach

LEVEL 5: DATA SECURITY
Data-level security entails a blend of policy and encryption.
Encrypting data where it resides and as it travels across your network is a
recommended best practice because, if all other security measures fail, a
strong encryption scheme protects your proprietary data.
Encryption
Important Customer data is stored in the SQL Server Database and is
completely encrypted.
Access control / authentication
There is a role based access to data. Eg

A programmer has access only to Application files.

Important Customer data & Profile is stored in Database and only DBA
can access it.

An Administrator of the system can only administer the data and has no
access to database & applications.

RAID 10 for Hard-disk redundancy.

TAPE backup
NetGains Mail & Application Server
Confidentiality & Security – Layered Approach

Thank You !
NetGains Technologies
708/709, Corporate Avenue,
Sonawala Lane,
Goregaon(E)
Mumbai – 400 063.
Sales: +91-22-6525 7000 / +91-22-6139 7000
Mobile : 9820089256 / 989200782

More Related Content

PPTX
Automating for NERC CIP-007-5-R1
PDF
Fighting The Top 7 Threats to Cloud Cybersecurity
PPTX
F secure Radar vulnerability scanning and management
PDF
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
DOC
Shashikant Chavan_Resume
PPTX
6 Steps to Secure Network Devices
PDF
Internet gatekeeper
PPT
CDM….Where do you start? (OA Cyber Summit)
Automating for NERC CIP-007-5-R1
Fighting The Top 7 Threats to Cloud Cybersecurity
F secure Radar vulnerability scanning and management
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Shashikant Chavan_Resume
6 Steps to Secure Network Devices
Internet gatekeeper
CDM….Where do you start? (OA Cyber Summit)

What's hot (20)

PPTX
Critical Controls Of Cyber Defense
PDF
Powerful email protection
PPTX
FCI-company profile
PDF
Willard_Grayson_2015
PPT
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
PDF
Enterprise firewalls feature and benefits
PDF
Protection Service for Business
PPT
GDI Product Presentation
PPTX
PPSX
Cloud monitoring - An essential Platform Service
PDF
Business Suite - Gain control of your IT security
PDF
F-Secure E-mail and Server Security
PDF
Attachment 1 – mitigation measures for two factor authentication compromise
PPTX
Inside forti os-v524-r5
PDF
Virtual Security
PDF
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
PDF
F-Secure Policy Manager - onsite security management with superior control
PDF
5 Important Secure Coding Practices
PPTX
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
PPTX
Hyper Secure Converged Infrastructure solves architectural challenges
Critical Controls Of Cyber Defense
Powerful email protection
FCI-company profile
Willard_Grayson_2015
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
Enterprise firewalls feature and benefits
Protection Service for Business
GDI Product Presentation
Cloud monitoring - An essential Platform Service
Business Suite - Gain control of your IT security
F-Secure E-mail and Server Security
Attachment 1 – mitigation measures for two factor authentication compromise
Inside forti os-v524-r5
Virtual Security
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
F-Secure Policy Manager - onsite security management with superior control
5 Important Secure Coding Practices
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
Hyper Secure Converged Infrastructure solves architectural challenges
Ad

Similar to NetGains Infrastructure Security (20)

PPT
Essentials Of Security
 
PPT
Emea Corporate Presentation 0709 Lin
PPS
Application Security Review 5 Dec 09 Final
PPTX
Cyber Security # Lec 4
PPTX
Computer Security.pptx
PDF
Barbed Wire Network Security Policy 27 June 2005 7
PPTX
Web security
PPT
Material best practices in network security using ethical hacking
DOCX
Discuss how a successful organization should have the followin.docx
DOCX
Discuss how a successful organization should have the followin.docx
PPT
Cisco Managed Security
PDF
Implementing Application Security
PPT
Partner Zymbian & Fortinet webinar on Web2.0 security
PPTX
Product Overview Nov 2010 V1
PPT
Information Security
PDF
The application security controller
PPT
Network Security Tools and applications
PPTX
Security on a budget
PPT
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
PPTX
7-Layers-of-Security-Protecting-Your-Digital-Fortress (1).pptx
Essentials Of Security
 
Emea Corporate Presentation 0709 Lin
Application Security Review 5 Dec 09 Final
Cyber Security # Lec 4
Computer Security.pptx
Barbed Wire Network Security Policy 27 June 2005 7
Web security
Material best practices in network security using ethical hacking
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
Cisco Managed Security
Implementing Application Security
Partner Zymbian & Fortinet webinar on Web2.0 security
Product Overview Nov 2010 V1
Information Security
The application security controller
Network Security Tools and applications
Security on a budget
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
7-Layers-of-Security-Protecting-Your-Digital-Fortress (1).pptx
Ad

More from NetGains Technologies Pvt. Ltd. (11)

PPTX
Successful employees
PPSX
Multi channel communication center M3C
PPSX
Email + social marketing
PPSX
Office connect hybrid microsoft exchange
PPTX
PPT
Email deliverability
PPT
Demystifying email deliverability
PPTX
M3C email-marketing_sms_platform
PPTX
Website redesign tips-tricks_1
PPTX
Digital signature & certificate
PPT
eSigner.NET - Digital Signing and Encryption the easy way
Successful employees
Multi channel communication center M3C
Email + social marketing
Office connect hybrid microsoft exchange
Email deliverability
Demystifying email deliverability
M3C email-marketing_sms_platform
Website redesign tips-tricks_1
Digital signature & certificate
eSigner.NET - Digital Signing and Encryption the easy way

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
The AUB Centre for AI in Media Proposal.docx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Big Data Technologies - Introduction.pptx

NetGains Infrastructure Security

  • 1. NetGains Mail & Application Server Confidentiality & Security – Layered Approach Layered approach for securing NetGains Mail & Application Servers. It is a technical strategy, espousing adequate measures be put in place at different levels within the network infrastructure. It is also an organizational strategy, requiring participation from the clients, users, administrators & business owners. The layered-security approach centers on maintaining appropriate security measures and procedures at five different levels within the IT environment
  • 2. NetGains Mail & Application Server Confidentiality & Security – Layered Approach Security level Applicable security measures 1. Perimeter • Firewall • Network-based anti-virus 2. Network • Intrusion detection /prevention system • Vulnerability management system • Endpoint security compliance • Access control /user authentication 3. Host Host 4. Application • Host IDS & Host VA • Access control/user authentication • Input validation 5. Data • Encryption • Access control/user authentication IDS & Host VA Endpoint security compliance Anti-virus Access control/user authentication
  • 3. NetGains Mail & Application Server Confidentiality & Security – Layered Approach LEVEL 1: PERIMETER SECURITY    The perimeter is the first line of defense from outside, un-trusted networks. The perimeter acts as the first and last point of contact for security defenses protecting the network. It is the area where your network ends and the Internet begins. Sonic FireWALL PRO 3060      Real-Time Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention. Powerful Content Filtering. Deep Packet Inspection Firewall Real-Time Blacklist Spam Filtering Policy-based NAT
  • 4. NetGains Mail & Application Server Confidentiality & Security – Layered Approach LEVEL 2: NETWORK SECURITY The network level of the layered-security model refers to internal LAN and WAN. • Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) • Vulnerability management - Vulnerability management systems perform two related functions: (1) they scan the network for vulnerabilities and (2) they manage the process of repairing the vulnerabilities found. • Endpoint security compliance (for VPN & RAS devices) • Access control/authentication (Network Level access) Answer: The Network level done administration is done by the ISP
  • 5. NetGains Mail & Application Server Confidentiality & Security – Layered Approach LEVEL 3: HOST SECURITY In the layered-security model, the host level pertains to the servers configurable parameters that, when set inappropriately, can create exploitable security holes. These parameters include registry settings, services (applications) operating on the device, or patches to the operating system or important applications.  Host-based intrusion detection systems (IDSs)  Host-based vulnerability assessment (VA)  Endpoint security compliance  Anti-virus  Access control/authentication Answer: * For this we use Trend Micro Interscan Messaging Security Suite which gives protection against Viruses, Spam and FTP traffic.
  • 6. NetGains Mail & Application Server Confidentiality & Security – Layered Approach LEVEL 4: APPLICATION SECURITY Application-level security is currently receiving a great deal of attention.      Poorly protected applications can provide easy access to confidential data and records. The hard truth is that most programmers don’t code with security in mind. Application shield - application-level firewall. Access control/authentication - only authorized users are able to access the application. Input validation - Input validation measures verify that application input traveling across your network is safe to process.
  • 7. NetGains Mail & Application Server Confidentiality & Security – Layered Approach LEVEL 5: DATA SECURITY Data-level security entails a blend of policy and encryption. Encrypting data where it resides and as it travels across your network is a recommended best practice because, if all other security measures fail, a strong encryption scheme protects your proprietary data. Encryption Important Customer data is stored in the SQL Server Database and is completely encrypted. Access control / authentication There is a role based access to data. Eg  A programmer has access only to Application files.  Important Customer data & Profile is stored in Database and only DBA can access it.  An Administrator of the system can only administer the data and has no access to database & applications.  RAID 10 for Hard-disk redundancy.  TAPE backup
  • 8. NetGains Mail & Application Server Confidentiality & Security – Layered Approach Thank You ! NetGains Technologies 708/709, Corporate Avenue, Sonawala Lane, Goregaon(E) Mumbai – 400 063. Sales: +91-22-6525 7000 / +91-22-6139 7000 Mobile : 9820089256 / 989200782