Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Glasswall solutions

Posted on 2017-09-06
2
High Priority
?
64 Views
Last Modified: 2017-12-06
I got the task of researching the Glasswall solutions.  has anyone have any experienced with this product?  how does this product compare with Barracuda email spam/filter product?  Thanks.
0
Comment
Question by:Thanh Tran
  • 2
2 Comments
 
LVL 65

Accepted Solution

by:
btan earned 3000 total points (awarded by participants)
ID: 42372274
Glasswall key capability is to only allow the ‘known good’ within document and file structures. By analysing, enabling policy or standards to be applied and regenerating files in real-time. This is the differentiator compared to most email/spam product (including Barracuda) which either if filtering using MIME file type and block as required. They do not allow content to pass through the moment it is suspiciously having any traces of malicious content.

Also Glasswall has a sandbox environment for malware analysis and check as part of the email inspection, most other tends to partner other party or otherwise still let through the traffic even not totally clean
Some organisations operate their sandbox environments in a type of ‘pass-through’ mode, whereby traffic is passed immediately to end users for expediency while the sandbox analyses the attachments ‘off-line’.

Although this mode ensures that important business correspondence is not held up, it transfers an amount of risk onto its end users. If something is subsequently determined to be malicious the organisation is already into incident response mode. Glasswall can greatly assist here also by sanitising traffic leaving the sandbox before being sent to the end users, taking a vast amount of risk off the
table.
0
 
LVL 65

Expert Comment

by:btan
ID: 42393824
For consideration
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ITIL has an elaborate incident management framework. This article serves as a starter for those who'd like to know more or need to suss out the baseline elements in a typical incident response execution plan on the "need to have" and the "good to ha…
Spectre and Meltdown, how it affects me and my clients?
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Whether it be Exchange Server Crash Issues, Dirty Shutdown Errors or Failed to mount error, Stellar Phoenix Mailbox Exchange Recovery has always got your back. With the help of its easy to understand user interface and 3 simple steps recovery proced…

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question