ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
1-2
Introduction
v1.0, September 2009
In addition to scanning HTTP, HTTPS, FTP, SMTP, POP3, and IMAP traffic, the STM protects
networks against spam phishing attacks and unwanted Web use. The STM is a plug-and-play
device that can be installed and configured within minutes.
What Can You Do with an STM?
The STM combines robust protection against malware with ease of use and advanced reporting
and notification features to help you deploy and manage the device with minimal effort.
Here are some of the things that you can do with the STM:
•
Protect the network instantly
. The STM is a plug-and-play security solution that can be
instantly added to networks without requiring network reconfiguration.
•
Scan network traffic for malware
. Using the patent-pending Stream Scanning technology,
you can configure the STM to scan HTTP, SMTP, POP3, HTTPS, IMAP, and FTP protocols.
Unlike traditional batch-based scan engines that need to cache the entire file before they can
scan, this scan engine checks traffic as it enters the network, ensuring unimpeded network
performance.
•
Set access policies for individual users or groups
. You can configure Web and e-mail access
access policies for individual users and groups based on the STM’s local database, on group IP
address, on LDAP domain, group, or user, or on RADIUS VLAN.
•
Receive real-time alerts and generate comprehensive reports
. You can configure the STM
to send alerts when a malware or an outbreak is detected on the network. Real-time alerts can
be sent by e-mail, allowing you to monitor malware events wherever you are.
By configuring the STM to send malware alerts, you can isolate and clean the infected
computer before the malware incident can develop into a full-blown outbreak. The STM also
provides comprehensive reports that you can use to analyze network and malware trends.
•
Manage through SNMP support
. You can enable and configure the STM’s SNMP settings to
receive SNMP traps through a supported MIB browser.
•
Allow automated component updates
. Downloading components regularly is the key to
ensuring updated protection against new threats. The STM makes this administrative task
easier by supporting automatic malware pattern, program, and engine updates.
DRAFT