22
OVERVIEW

The need to monitor email messages for dangerous, offensive or confidential content has never been more evident. The most deadly viruses, able to cripple your email system and corporate network in minutes, are being distributed worldwide via email in a matter of hours. Products that perform single vendor anti-virus scanning do not provide sufficient protection. Worse still, email has become the means for installing backdoors (Trojans) and other harmful programs to help potential intruders break into your network. Products restricted to a single anti-virus engine will not protect against email exploits and attacks of this kind.

Your only defense is to install a comprehensive email content checking and anti-virus solution to safeguard your mail server and network. Mega-Byte's anti-virus software acts as an email firewall and protects you from email viruses, exploits and threats, as well as email attacks targeted at your organization.

Multiple Virus Engines

Mega-Byte's network anti-virus software uses multiple virus scanners to scan inbound mail. Using multiple scanners drastically reduces the average time to obtain virus signatures which combat the latest threats, and therefore greatly reduces the chances of an infection. The reason for this is that a single anti-virus company can never ALWAYS be the quickest to respond. For each outbreak, virus companies have varying response times to a virus, depending on where the virus was discovered, etc. By using multiple virus engines, you have a much better chance of having at least one of your virus engines up-to-date and able to protect against the latest virus. In addition, since each engine has its own heuristics and methods, one virus engine is likely to be better at detecting a particular virus and its variants, while another virus engine would be stronger at detecting a different virus. Overall, more virus engines means better protection.

Trojans and Executables

Mega-Byte's network anti-virus software detects unknown malicious executables by analyzing what an executable does. Trojans are dangerous as they can enter a victim's computer undetected, granting an attacker unrestricted access to the data stored on that computer. Anti-virus software will NOT catch unknown Trojans because it is signature-based. Mega-Byte's anti-virus software includes a trojan and executable scanner which takes a different approach by using built-in intelligence to rate an executable's risk level. The scanner quarantines any files which are suspected of being dangerous (for example, executables which access the modem, make network connections, or access the address book).

Spyware and Adware

Mega-Byte's anti-virus software can also recognize spyware and adware threats. An extensive, updatable database of known spyware, adware, and Trojans will keep your computer out of harms way.

HTML Security

Mega-Byte's anti-virus software checks for script code in an email message body and disables malicious commands before sending the "cleaned" HTML mail to the recipient.

Email Exploitation

The email exploit detection safeguards you from future email viruses and attacks that use known application or operating system exploits. Email exploit detection updates are downloaded automatically to keep your system secure.

Attachment Protection

Mega-Byte's anti-virus software allows administrators to quarantine unsafe attachments based on user and file type. The software can also scan attachments for information leaks, for example, an employee emailing a database. Administrators can also choose to automatically delete attachments with specified extensions, for example, .mp3 or .mpg files.

Email Scanning

Administrators can set the software to scan emails for keywords and automatically quarantine files for administrator approval. This allows for potentially dangerous and/or offensive emails to be approved by the administrator.

Quarantine Filtration System

A custom quarantine filter allows you to configure where quarantined files will be placed. For example, you can organize quarantined files by whether or not they were quarantined by the anti-virus checker or attachment checker, allowing you to prioritize which quarantined files you examine first.

Remote Management

The web based configuration allows you to manage the system remotely from any computer with a browser.

Approve/Reject Quarantined Mail

The software comes with the ability to manage quarantined files a moderator client, a Windows interface. You can also manage quarantined files anywhere in the world through a web browser. Mega-Byte's software also allows you to automatically forwarded quarantined files to other email addresses, enabling you to distribute files to other administrators.

Search Within Quarantined Emails

Mega-Byte's software allows you to search through inbound or outbound emails by user, sender, recipient, and quarantine reason. Searches free the administrator from the need to go through all quarantined emails one by one.

Full Threat Reports

When an email is quarantined a full threat report detailing all threats identified is created.