Security Crosses
  the Chasm:
Surfing in Peace

     Shane Rice
  Services Evangelist
Why Web Protection?




     “The Web has become the new threat vector of
    choice by hackers and cyber criminals to distribute
    malware and perpetrate identity theft, financial fraud
            and corporate espionage.” -- IDC




                                                    Easy. Effective. Affordable.
Why Web Protection?

• "Malware” - short for malicious software
   – Refers to any software designed to cause damage to a
     single computer, server, or computer network, whether
     it's a virus, spyware, et al.
• Malicious Web content can expose your
  company to higher costs, lower productivity and
  legal issues



 Effective Web security can safeguard employees
     against online threats and protect network
                    infrastructure


                                                             Easy. Effective. Affordable.
Avenues of Attack

 Top Five Categories for Entering Malware Networks by
 Percentage of Requests




   Source: Blue Coat Security Labs            Easy. Effective. Affordable.
Malware Threat is Growing…

 Malware Delivered by Websites is on the Rise
   •   Cumulative Malware *
       – 2007: 5.8 million
       – 2011: 65 million (as of June)
         1120% Increase

   •   Malicious URLs*
       – 7,300 new malicious URLs per day

   •   Legitimate Websites being Compromised
         80% of Websites with Malicious Code




   *Source: McAfee Labs                         Easy. Effective. Affordable.
…And Growing More Effective

                                    More Malware               Malicious
                                     Variations         133%   Code Threats
                                                               in 12 months




 80%
       Of Malware
       infections are Web               68%
       application exploits          Of top Malware          Increasing
                                        infections        Attack Success!
       Web 2.0
                                         exposed
   is the Catalyst!                 confidential data          Of Vulnerable
                                                         4%    Websites get fixed!




                                    Attack Target
    500%        Increase in
                Phishing Sites!   Users vs Machines

                                                               Easy. Effective. Affordable.
Alarming 2011 Trend

 Unique Web Malware Encounters


                                 297% Increase




   Source: Cisco ScanSafe          Easy. Effective. Affordable.
A Clear and Present Danger




   Source: AppRiver          Easy. Effective. Affordable.
A Clear and Present Danger




   Source: AppRiver          Easy. Effective. Affordable.
A Clear and Present Danger




   Source: AppRiver          Easy. Effective. Affordable.
It’s The Economy Stupid




   Source: http://s0.geograph.org.uk/photos/87/30/873046_db56f88b.jpg   Easy. Effective. Affordable.
It’s The Economy Stupid




   Source: flickr.com User: r-z   Easy. Effective. Affordable.
It’s The Economy Stupid




   Source: flickr.com User: AMagill   Easy. Effective. Affordable.
It’s The Economy Stupid




                          Easy. Effective. Affordable.
Categorization: First Line of Defense
                             Web Filter

                                                                Shopping

                                              Gambling

                                                                Business

                                                IM

                                                         Porn


                                              Security

                                                         Business

                Filtering
                Database
                                    •   Secures The Network Environment
                 Security
               Pornography          •   Enforces Business-focused Internet Access
                Hate Sites
                Gambling            •   Reduces Liability
                Shopping
                Business            •   Manages Bandwidth
                   IM


                                                                           Easy. Effective. Affordable.
Layered Security – Stronger Protection
  Signature based detection is not enough to cover today’s targeted Malware attacks

          Anti-Virus                 Intent Analysis                 Anti-Malware

  • Anti-Virus                 • Authenticode –                • Prevents OS, browser
                                 Checks for Digital              and application exploits
  • However it is only a         Signature on active             as a result of:
    single aspect of the
    complete solution
                                 code                             • Protects from known
                               • Media Type Filter -                malicious code
  • Signature based              verification via “magic          • Protects from
    detection is not
    enough to cover
    today’s targeted Web
    2.0 Malware attacks
                           +     byte” analysis not MIME
                               • Behavioral Malware
                                 detector - scans for
                                                           =        unknown malicious
                                                                    mobile code for
                                                                    which no signature
                                                                    exists
                                 malicious script intent
                                 and removes offending
                                 function calls
                               • Behavioral exploit
                                 detector – inspects
                                 code for hostile
                                 behavior like buffer
                                 overflows, etc.




                                                                         Easy. Effective. Affordable.
Why Web Protection as a Service?

• Diminishing IT Dollars and Resources for a Growing
  Problem
   – IT is constantly asked to do more with a flat budget
   – Many smaller organizations do not have adequate IT
     resources to buy and manage appliances or complex
     deployments


• Web Protection as a Service Offers
   – Lower upfront costs
   – Ease and Speed of Deployment
       • No on-site hardware or software to
         maintain, upgrade, or support
       • Simply redirect Web traffic
   – Fixed operational expense instead of a
     capital expense



                                                            Easy. Effective. Affordable.
SecureSurf Case Study

  Blocking a Keylogger Attack

  • Title company in South Florida
  • Setup SecureSurf week before Labor Day
  • Keylogger attempted to upload keystrokes
    Friday night
  • SecureSurf blocked traffic to suspicious IP
  • AppRiver analysis determined nature of
    attack and notified customer




                                                                           18
                                                  Easy. Effective. Affordable.
SecureSurf Web & Malware Protection




                                      Easy. Effective. Affordable.
SecureSurf Web & Malware Protection

 Cloud-based Web Protection & Endpoint Security

 Features & Benefits
   • Shields networks from malware, adware
     and viruses
   • Protects employees; improves productivity
   • Helps avoid legal/compliance issues
   • Deploys quickly and customizes easily
   • Allows filtering at company or workgroup
     level
   • Enforces safe search on major search
     engines
   • Easy set up and deployment
   • Intuitive browser-based Web Portal Access
     for Administrators
   • Anti-Malware/Spyware Protection –
     proactive intent-based protection that scans
     the active code on a Web site before it
     enters your network
  More details at http://www.appriver.com/services/web-protection/

                                                               Easy. Effective. Affordable.
SecureSurf Web & Malware Protection

 Cloud-based Web Protection & Endpoint Security

 Features & Benefits
  • Shields networks from malware, adware
    and viruses
  • Protects employees; improves productivity
  • Helps avoid legal/compliance issues
  • Deploys quickly and customizes easily
  • Allows filtering at company or workgroup
    level
  • Enforces safe search on major search
    engines
  • Easy set up and deployment



 AppRiver SecureSurf Agent®
  • User/device-level protection
  • Mobile workforce & off-network security
  • Compliance & enforcement at user level


                                                  Easy. Effective. Affordable.
AppRiver at a Glance

               •   Established: 2002
               •   Headquarters: Gulf Breeze, FL
               •   Employees: 150+                   Company
  Company      •   Privately Held, Debt-free, Self-funded
               •   Focus on Email & Web Security with Phenomenal CareTM
               •   Cloud-based Since Inception


               •   45,000 Customers
               •   6,000,000 Mailboxes Managed
  Customers    •   93% Customer Retention Rate
               •   Channel-centric (70% Customer base)
               •   Focus on the SMB



               •   Leading Worldwide Messaging Security SaaS Provider
               •   Named Best SMB Solution for Hosted Message Security Services
    Market     •   Recognized as a Microsoft Top 5 Hosted Exchange Provider
  Leadership   •   Tremendous Customer ROI of AppRiver’s Security Solutions
               •   Identified as Shaping the Future of Technology


                                                                  Easy. Effective. Affordable.
24/7 – The Next Level


     24/7        •   US-Based, Fully Trained AppRiver Employees
                 •                               Company
                     Available 24 Hours a Day, Every Day
  Phenomenal
                 •   By Phone, Live Chat and Email
    CareTM       •   Easy-to-use Web-based Guides & Tools




      24/7
                 • Worldwide Threat Detection System
  Spam & Virus
                 • Sophisticated, Proprietary Software
   Operations    • Real-time Threat Prevention & Instant System-wide Updates
     Center


      24/7
    Malware      • Continuous Threat Protection for SecureSurf Customers
   Protection    • Threat Data Gleaned from/shared with Spam & Virus Operations
   Operation     • >5 Billion Malicious Websites . . . and Counting
    Center

                                                                  Easy. Effective. Affordable.
AppRiver Timeline


                                                                          Company


     Introduced SecureTideTM                                Integrated First Optimized
                                                            Network for Hosted Exchange
                                                            (Akamai)
     Implemented RackSpace
     Infrastructure
         Daily Quarantine Reports                                      Hired 100th Employee             Hired 150th Employee


  2002                 2004              2006                  2008                  2010                    2012

               ARBO Launched
                                         20,000 Hosted    40,000 Hosted  50,000 Hosted        100,000 Hosted 150,000 Hosted
                                         Exchange Seats   Exchange Seats Exchange Seats       Exchange Seats Exchange Seats


                                    Launched Hosted
    Founded AppRiver                Exchange Service



                                                              Launched Email                      Launched Web & Malware
                                                              Encryption Service                  Protection Service

                                                                                                       Easy. Effective. Affordable.
Proven Track Record

• 2011, 2010, 2009, 2008, 2007 Inc. 5000 Fastest
  Growing Private Companies
• 2011, 2010, 2009 Florida Trend Best Companies
  to Work For in Florida
• 2011 CRN Top 20 Cloud Security Vendor
• 2011, 2009, 2006 Network World Fave Raves
• 2010, 2009 MSExchange.org Readers' Choice
  Award Winner
• 2010, 2009 CRN Five-Star Partner Program
• 2010 CRN Coolest Cloud Security Vendor
• 2009 CSIA International Service Excellence Award
• 2009 Deloitte Technology Fast 500™ Winner
• 2009 Business Solutions Best Channel Product
  – Email Security
• 2009 Ernst & Young Florida Entrepreneur of
  the Year - Michael Murdoch, CEO
• 2009 Business Solutions Best Channel Vendor
  – Security


                                                     Easy. Effective. Affordable.
AppRiver Application Mall

    SecureTideTM
    Spam & Virus Protection

    Exchange Hosting
    Secure Hosted Exchange

    CipherPostTM
    Email Encryption

    SecureSurfTM
    Web & Malware Protection

    Office 365
    Microsoft Cloud-based Service

    ECSTM
    Email Continuity Service

    Learn more at http://www.appriver.com/services/

                                                      Easy. Effective. Affordable.
Questions?




         Find SpiceWorld related links from
         AppRiver @ http://bit.ly/arsw2011

                                              Easy. Effective. Affordable.

More Related Content

PDF
Cyberoam: il futuro della network security!
PDF
Failed Ransom: How IBM XGS Defeated Ransomware
PPT
Security Lifecycle Management Process
PPTX
Empowering Application Security Protection in the World of DevOps
PDF
What’s the State of Your Endpoint Security?
PPTX
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
PPTX
Multi-Factor Authentication - "Moving Towards the Enterprise"
PDF
Securing Internet Payment Systems
Cyberoam: il futuro della network security!
Failed Ransom: How IBM XGS Defeated Ransomware
Security Lifecycle Management Process
Empowering Application Security Protection in the World of DevOps
What’s the State of Your Endpoint Security?
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Multi-Factor Authentication - "Moving Towards the Enterprise"
Securing Internet Payment Systems

What's hot (20)

PDF
Malware on Smartphones and Tablets: The Inconvenient Truth
PPTX
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
PPTX
Attack Autopsy: A Study of the Dynamic Attack Chain
PDF
Level Up Your Security with Threat Intelligence
PPTX
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
PPTX
2011-10 The Path to Compliance
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PPTX
Uncover What's Inside the Mind of a Hacker
PPTX
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
PPTX
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
PDF
Information Risk and Protection
PDF
Top 12 Cybersecurity Predictions for 2017
PPTX
Trend Micro - Targeted attacks: Have you found yours?
PPTX
Get the Most From Your Firewall
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PDF
How to Hack a Cryptographic Key
PPTX
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
PPTX
8 Threats Your Anti-Virus Won't Stop
PPTX
Compete To Win: Don’t Just Be Compliant – Be Secure!
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Attack Autopsy: A Study of the Dynamic Attack Chain
Level Up Your Security with Threat Intelligence
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
2011-10 The Path to Compliance
ISACA CACS 2012 - Mobile Device Security and Privacy
Uncover What's Inside the Mind of a Hacker
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Information Risk and Protection
Top 12 Cybersecurity Predictions for 2017
Trend Micro - Targeted attacks: Have you found yours?
Get the Most From Your Firewall
C0c0n 2011 mobile security presentation v1.2
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
How to Hack a Cryptographic Key
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
8 Threats Your Anti-Virus Won't Stop
Compete To Win: Don’t Just Be Compliant – Be Secure!
Ad

Viewers also liked (20)

PDF
IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...
PDF
Database Marketing Intensive
PPTX
TechExpert support_maintenance
PPTX
Historia de la Formación superior de enfermería en san luis.
PDF
Vollmacht
PDF
La revista 147 final
PPTX
On Marketing Solutions
PPTX
PPTX
803 juan david mojica
PDF
Portafolio QuickHelp
PPS
Guía de compra en lulu
PPS
Perchè Dio
PDF
REPORTAJE: Dubai señala el camino de la construcción española
PDF
Lodha parkside lodha group worli_archstones_asps_bhavik_bhatt
PDF
Gruppenreiseplaner 2015
PPTX
COMPRENSIÓN DE MENSAJES ORALES
PDF
Mercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary Care
PPTX
Zukunftsszenrios Games
PDF
One Step For Our Planet
 
IBM Information Management - Optimera er verksamhet och öka kundnyttan med nä...
Database Marketing Intensive
TechExpert support_maintenance
Historia de la Formación superior de enfermería en san luis.
Vollmacht
La revista 147 final
On Marketing Solutions
803 juan david mojica
Portafolio QuickHelp
Guía de compra en lulu
Perchè Dio
REPORTAJE: Dubai señala el camino de la construcción española
Lodha parkside lodha group worli_archstones_asps_bhavik_bhatt
Gruppenreiseplaner 2015
COMPRENSIÓN DE MENSAJES ORALES
Mercer Capital's Value Focus: Animal Health | Q3 2016 | Segment: Veterinary Care
Zukunftsszenrios Games
One Step For Our Planet
 
Ad

Similar to Spiceworld 2011 - AppRiver breakout session (20)

PPTX
Anatomy of an Attack
PPTX
Endpoint Protection
PPTX
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPTX
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
PDF
Declaration of malWARe
PDF
Battling Malware In The Enterprise
PDF
Maximize Computer Security With Limited Ressources
PPT
091005 Internet Security
PDF
Identity Theft
PPTX
Bitdefender Corporate July2011 V3
PDF
Symantec Endpoint Protection 12
PPTX
ITSolutions|Currie Network Security Seminar
PDF
“8th National Biennial Conference on Medical Informatics 2012”
PPTX
F5 - BigIP ASM introduction
PDF
How to Stop Man in the Browser Attacks
PPTX
Trend Micro - is your cloud secure
PDF
fundamentals of Cybersecurity Lesion 1.pdf
PDF
20120329 Cybercrime threats on e-world
PPT
Security Basics Webinar
Anatomy of an Attack
Endpoint Protection
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Declaration of malWARe
Battling Malware In The Enterprise
Maximize Computer Security With Limited Ressources
091005 Internet Security
Identity Theft
Bitdefender Corporate July2011 V3
Symantec Endpoint Protection 12
ITSolutions|Currie Network Security Seminar
“8th National Biennial Conference on Medical Informatics 2012”
F5 - BigIP ASM introduction
How to Stop Man in the Browser Attacks
Trend Micro - is your cloud secure
fundamentals of Cybersecurity Lesion 1.pdf
20120329 Cybercrime threats on e-world
Security Basics Webinar

Recently uploaded (20)

PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPT
Geologic Time for studying geology for geologist
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Benefits of Physical activity for teenagers.pptx
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Comparative analysis of machine learning models for fake news detection in so...
Enhancing plagiarism detection using data pre-processing and machine learning...
Geologic Time for studying geology for geologist
Custom Battery Pack Design Considerations for Performance and Safety
Module 1.ppt Iot fundamentals and Architecture
Benefits of Physical activity for teenagers.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
OpenACC and Open Hackathons Monthly Highlights July 2025
A review of recent deep learning applications in wood surface defect identifi...
Developing a website for English-speaking practice to English as a foreign la...
A contest of sentiment analysis: k-nearest neighbor versus neural network
A proposed approach for plagiarism detection in Myanmar Unicode text
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
1 - Historical Antecedents, Social Consideration.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Flame analysis and combustion estimation using large language and vision assi...
Getting started with AI Agents and Multi-Agent Systems
Comparative analysis of machine learning models for fake news detection in so...

Spiceworld 2011 - AppRiver breakout session

  • 1. Security Crosses the Chasm: Surfing in Peace Shane Rice Services Evangelist
  • 2. Why Web Protection? “The Web has become the new threat vector of choice by hackers and cyber criminals to distribute malware and perpetrate identity theft, financial fraud and corporate espionage.” -- IDC Easy. Effective. Affordable.
  • 3. Why Web Protection? • "Malware” - short for malicious software – Refers to any software designed to cause damage to a single computer, server, or computer network, whether it's a virus, spyware, et al. • Malicious Web content can expose your company to higher costs, lower productivity and legal issues Effective Web security can safeguard employees against online threats and protect network infrastructure Easy. Effective. Affordable.
  • 4. Avenues of Attack Top Five Categories for Entering Malware Networks by Percentage of Requests Source: Blue Coat Security Labs Easy. Effective. Affordable.
  • 5. Malware Threat is Growing… Malware Delivered by Websites is on the Rise • Cumulative Malware * – 2007: 5.8 million – 2011: 65 million (as of June) 1120% Increase • Malicious URLs* – 7,300 new malicious URLs per day • Legitimate Websites being Compromised 80% of Websites with Malicious Code *Source: McAfee Labs Easy. Effective. Affordable.
  • 6. …And Growing More Effective More Malware Malicious Variations 133% Code Threats in 12 months 80% Of Malware infections are Web 68% application exploits Of top Malware Increasing infections Attack Success! Web 2.0 exposed is the Catalyst! confidential data Of Vulnerable 4% Websites get fixed! Attack Target 500% Increase in Phishing Sites! Users vs Machines Easy. Effective. Affordable.
  • 7. Alarming 2011 Trend Unique Web Malware Encounters 297% Increase Source: Cisco ScanSafe Easy. Effective. Affordable.
  • 8. A Clear and Present Danger Source: AppRiver Easy. Effective. Affordable.
  • 9. A Clear and Present Danger Source: AppRiver Easy. Effective. Affordable.
  • 10. A Clear and Present Danger Source: AppRiver Easy. Effective. Affordable.
  • 11. It’s The Economy Stupid Source: http://s0.geograph.org.uk/photos/87/30/873046_db56f88b.jpg Easy. Effective. Affordable.
  • 12. It’s The Economy Stupid Source: flickr.com User: r-z Easy. Effective. Affordable.
  • 13. It’s The Economy Stupid Source: flickr.com User: AMagill Easy. Effective. Affordable.
  • 14. It’s The Economy Stupid Easy. Effective. Affordable.
  • 15. Categorization: First Line of Defense Web Filter Shopping Gambling Business IM Porn Security Business Filtering Database • Secures The Network Environment Security Pornography • Enforces Business-focused Internet Access Hate Sites Gambling • Reduces Liability Shopping Business • Manages Bandwidth IM Easy. Effective. Affordable.
  • 16. Layered Security – Stronger Protection Signature based detection is not enough to cover today’s targeted Malware attacks Anti-Virus Intent Analysis Anti-Malware • Anti-Virus • Authenticode – • Prevents OS, browser Checks for Digital and application exploits • However it is only a Signature on active as a result of: single aspect of the complete solution code • Protects from known • Media Type Filter - malicious code • Signature based verification via “magic • Protects from detection is not enough to cover today’s targeted Web 2.0 Malware attacks + byte” analysis not MIME • Behavioral Malware detector - scans for = unknown malicious mobile code for which no signature exists malicious script intent and removes offending function calls • Behavioral exploit detector – inspects code for hostile behavior like buffer overflows, etc. Easy. Effective. Affordable.
  • 17. Why Web Protection as a Service? • Diminishing IT Dollars and Resources for a Growing Problem – IT is constantly asked to do more with a flat budget – Many smaller organizations do not have adequate IT resources to buy and manage appliances or complex deployments • Web Protection as a Service Offers – Lower upfront costs – Ease and Speed of Deployment • No on-site hardware or software to maintain, upgrade, or support • Simply redirect Web traffic – Fixed operational expense instead of a capital expense Easy. Effective. Affordable.
  • 18. SecureSurf Case Study Blocking a Keylogger Attack • Title company in South Florida • Setup SecureSurf week before Labor Day • Keylogger attempted to upload keystrokes Friday night • SecureSurf blocked traffic to suspicious IP • AppRiver analysis determined nature of attack and notified customer 18 Easy. Effective. Affordable.
  • 19. SecureSurf Web & Malware Protection Easy. Effective. Affordable.
  • 20. SecureSurf Web & Malware Protection Cloud-based Web Protection & Endpoint Security Features & Benefits • Shields networks from malware, adware and viruses • Protects employees; improves productivity • Helps avoid legal/compliance issues • Deploys quickly and customizes easily • Allows filtering at company or workgroup level • Enforces safe search on major search engines • Easy set up and deployment • Intuitive browser-based Web Portal Access for Administrators • Anti-Malware/Spyware Protection – proactive intent-based protection that scans the active code on a Web site before it enters your network More details at http://www.appriver.com/services/web-protection/ Easy. Effective. Affordable.
  • 21. SecureSurf Web & Malware Protection Cloud-based Web Protection & Endpoint Security Features & Benefits • Shields networks from malware, adware and viruses • Protects employees; improves productivity • Helps avoid legal/compliance issues • Deploys quickly and customizes easily • Allows filtering at company or workgroup level • Enforces safe search on major search engines • Easy set up and deployment AppRiver SecureSurf Agent® • User/device-level protection • Mobile workforce & off-network security • Compliance & enforcement at user level Easy. Effective. Affordable.
  • 22. AppRiver at a Glance • Established: 2002 • Headquarters: Gulf Breeze, FL • Employees: 150+ Company Company • Privately Held, Debt-free, Self-funded • Focus on Email & Web Security with Phenomenal CareTM • Cloud-based Since Inception • 45,000 Customers • 6,000,000 Mailboxes Managed Customers • 93% Customer Retention Rate • Channel-centric (70% Customer base) • Focus on the SMB • Leading Worldwide Messaging Security SaaS Provider • Named Best SMB Solution for Hosted Message Security Services Market • Recognized as a Microsoft Top 5 Hosted Exchange Provider Leadership • Tremendous Customer ROI of AppRiver’s Security Solutions • Identified as Shaping the Future of Technology Easy. Effective. Affordable.
  • 23. 24/7 – The Next Level 24/7 • US-Based, Fully Trained AppRiver Employees • Company Available 24 Hours a Day, Every Day Phenomenal • By Phone, Live Chat and Email CareTM • Easy-to-use Web-based Guides & Tools 24/7 • Worldwide Threat Detection System Spam & Virus • Sophisticated, Proprietary Software Operations • Real-time Threat Prevention & Instant System-wide Updates Center 24/7 Malware • Continuous Threat Protection for SecureSurf Customers Protection • Threat Data Gleaned from/shared with Spam & Virus Operations Operation • >5 Billion Malicious Websites . . . and Counting Center Easy. Effective. Affordable.
  • 24. AppRiver Timeline Company Introduced SecureTideTM Integrated First Optimized Network for Hosted Exchange (Akamai) Implemented RackSpace Infrastructure Daily Quarantine Reports Hired 100th Employee Hired 150th Employee 2002 2004 2006 2008 2010 2012 ARBO Launched 20,000 Hosted 40,000 Hosted 50,000 Hosted 100,000 Hosted 150,000 Hosted Exchange Seats Exchange Seats Exchange Seats Exchange Seats Exchange Seats Launched Hosted Founded AppRiver Exchange Service Launched Email Launched Web & Malware Encryption Service Protection Service Easy. Effective. Affordable.
  • 25. Proven Track Record • 2011, 2010, 2009, 2008, 2007 Inc. 5000 Fastest Growing Private Companies • 2011, 2010, 2009 Florida Trend Best Companies to Work For in Florida • 2011 CRN Top 20 Cloud Security Vendor • 2011, 2009, 2006 Network World Fave Raves • 2010, 2009 MSExchange.org Readers' Choice Award Winner • 2010, 2009 CRN Five-Star Partner Program • 2010 CRN Coolest Cloud Security Vendor • 2009 CSIA International Service Excellence Award • 2009 Deloitte Technology Fast 500™ Winner • 2009 Business Solutions Best Channel Product – Email Security • 2009 Ernst & Young Florida Entrepreneur of the Year - Michael Murdoch, CEO • 2009 Business Solutions Best Channel Vendor – Security Easy. Effective. Affordable.
  • 26. AppRiver Application Mall SecureTideTM Spam & Virus Protection Exchange Hosting Secure Hosted Exchange CipherPostTM Email Encryption SecureSurfTM Web & Malware Protection Office 365 Microsoft Cloud-based Service ECSTM Email Continuity Service Learn more at http://www.appriver.com/services/ Easy. Effective. Affordable.
  • 27. Questions? Find SpiceWorld related links from AppRiver @ http://bit.ly/arsw2011 Easy. Effective. Affordable.