Technical Proposal MOCE 28042025 V1
Technical Proposal MOCE 28042025 V1
Technical Proposal
SMTP Gateway Email Protection System
FOR BPM003924
Contact Information
Sales Technical
Dhamotharan
Name Razan Kaddoura Name
Ulaganathan
Table of Contents
1. Executive Summary--------------------------------------------------------------------------------------- 3
2. Why Emirates Computers ------------------------------------------------------------------------------- 4
3. Proven Track Record ------------------------------------------------------------------------------------- 1
4. Why we’re a Trusted Partner. -------------------------------------------------------------------------- 1
Covering Page -------------------------------------------------------------------------------------------------------------------------------- 2
1. Executive Summary
This proposal is the outcome of many similar projects undertaken by Emirates Computers. An in-depth
understanding of the magnitude of this project and an understanding on how to make this project a
successful venture, this gives us a significant advantage over the competition and provides us with the
necessary experience in handling any issues that mayarise.
Please find our complete response to your requirements; you will find that, technically, our proposed
solution complies with all your requirements.
In closing, Emirates Computers looks forward to a long-term partnership with the Ministry Of Community
Empowerment based on mutual respect, understanding, and good business practices that will be
rewarding for Emirates Computers.
Emirates Computers will provide you with the best advice and most accurate information on which
hardware best suits your needs, combined with rapid, high-quality installation and reliable IT support
service to ensure your IT system remains up and running.
Whether you’re looking for new equipment or need to upgrade existing equipment, Emirates Computers
can provide your business with the most cost-effective and reliable IT hardware and software for your
needs.
• Early adopters of new and complex technologies (Data Centers, IP NextGeneration Network,
Physical Security, Unified Computing System, Cyber Security, Managed Services, Cloud Technology,
and Digital Transformation…)
• ISO 14001:2015, 9001:2015, 45001:2018 based Managed Services offering inclusive of 24x7 NOCISO
• Established ITIL and ISO 20001 ITSM Certified NOC (Network OperationCentre) to provide 24 X 7
Operations and Support.
Advantages Years.
• Successful realization of the project leveraging on
Emirates Computes know-how in this domain.
Covering Page
Kind Attention,
Thanks for the inquiry. With reference to the above, please find attached our technical proposal with all the
required details.
We hope you will find everything as per your requirement. Should you have any queries regarding the
above please do not hesitate to contact the undersigned.
Thanking you and always assuring you of the best services and attention.
+971 504641530
5. Customer Requirements
MOCE is seeking to purchase SMTP Gateway (Email Security Solution) Ensuring Comprehensive
Protection for Our Email Infrastructure.
The solution should offer advanced email security features, including but not limited to spam
filtering, malware detection, phishing protection, and email encryption. The solution must be
scalable, reliable, and able to integrate with our existing infrastructure.
The Ministry of Community Empowerment (MOCE) requires the supply, installation, configuration,
and support of a comprehensive Email Security Solution that ensures the protection, continuity, and
compliance of its email infrastructure for over 900 mailboxes.
6. Proposed Solution
Based on the customer requirement, the Emirates Computers team carefully considered all the
requirements and proposed the below best-fit solution (Technically and commercially), Below is
the summary of the proposed solution, followed by the detailed product specification.
Prerequisites
Email Gateway On-Premises Deployment:
Network Setup:
The following are required network setup configurations:
Ports:
The following are required network ports to be accessible:
Port Source Destination Explanation
Existing
Solution Proofpoint Server
Mail Server Required to send and
25 (SMTP)
receive emails
Proofpoint Mail Server
Sever Existing Solution
Proofpoint Required for license
443 (HTTPS) Internet
Sever activation and updates
Proofpoint Internet or Internal DNS
53 (DNS) Required for DNS
Server Server
Internal
22 (SSH) Required for
Network Proofpoint Server
management
10000 (HTTPS) (Administrator)
• Filtering modules - the Spam Detection, Virus Protection, and Email Firewall Modules filter
SMTP messages for envelope criteria, connection criteria, virus infections, spam, and
message content.
• The Targeted Attack Protection (TAP) Module consists of URL Rewrite, Message Defense,
and the Dashboard. This module protects your organization from malicious email attacks
and provides additional visibility into phishing and spear phishing.
• The Threat Response Auto-Pull (TRAP) server - responsible to remove threats from the
mailboxes of the end users.
Spam Detection
The Proofpoint Protection Server includes Proofpoint's proprietary MLX technology, the latest
Machine Learning system developed by scientists at the Proofpoint Anti-spam Laboratory.
Proofpoint laboratory scientists and engineers analyze a dynamic corpus of millions of spam
messages that represent the universe of spam messages entering corporate email environments.
Using sophisticated tools and experience, they distill hundreds of thousands of spam and non-
spam attributes. This method anticipates future spam attacks by exposing the underlying
characteristics of current spam attacks, as well as identifying emerging techniques.
The characteristics are fed into sophisticated classifiers, such as Bayesian and Logistical
Regression classifiers that output a set of balanced weights for those attributes. The weights are
a statistical representation of how likely each attribute indicates spam during the final message
classification process. This information - classifiers, attributes, and weights - which concisely
represent Internet spam, is then packaged in the form of Proofpoint's MLX Engine and
automatically delivered to Proofpoint customers. Laboratory scientists are constantly updating
the MLX Engine by discovering new spam attributes, optimizing weights to fit the changing nature
of Internet email, and exploring new classifier methodologies.
At each deployed Proofpoint Protection Server, local processing by the MLX Engine detects
occurrences of the previously distilled spam attributes in each message - from the IP layer,
through the envelope and header layers, and into the message body. The MLX Engine then utilizes
the message's detected attributes and the appropriate classifiers to calculate the probability that
the message is spam. This final probability, or spam score, ranges from 0 to 100 (0 signifying that
the email is valid, 100 signifying that the email is spam). Based on an enterprise custom-built
policy, the score determines what final category applies to each message and what actions to
take based on that categorization. For example, messages that score above 80 are discarded,
messages that score above 50 are quarantined, and messages with score greater than or equal
to zero are delivered to the intended recipient.
• Examines every aspect of incoming email - the sender's IP address, the message
envelope, headers, structure, and the message content and formatting.
• Applies thousands of tests to determine the likelihood that a message is spam and
enables messages to be uniquely processed depending on the results.
• Applies Proofpoint's frequent updates to the MLX Engine, either automatically or manually
by the administrator.
Using the spam attributes generated by all of these tests, the MLX Engine calculates a spam score
and determines the final disposition for the email. On its own, no single rule classifies a message
as spam - each rule contributes to the spam score according to a predefined weight. To optimize
spam detection for your environment, you can fine-tune the weights assigned to some of the tests
or disable certain tests.
The Spam Detection Module uses policies and rules to filter and classify messages for containing
spam. The Module applies a comprehensive set of rules to each message to determine a spam
score for the message. It includes a default spam classification policy named Organizational
Spam Policy that includes rules that administrators can change or expand with additional rules.
Administrators can create unique policies and rules to handle messages that contain spam and
apply them to different Sub-Orgs or Groups in an Organization. Spam policies are configured as a
Filtering attribute for the Organization, for Sub-Orgs, Groups, or individual Users. See About
Attributes and Filtering Attributes for more information.
The rules of the Spam Detection Module rules detect and are not limited to the following:
• Malware
• Impostor (BEC)
• Phish
• Adult
• Spam
• Bulk
Our integrated platform uses Advanced BEC Defense, which is powered by our latest artificial
intelligence (AI)-driven BEC detection engine, Supernova. This cutting-edge technology has
resulted in an increase of 17 times more threats identified, expanding our detection to a wide
variety of email fraud attacks.
Advanced BEC Defense conducts in-depth analysis on various message attributes, including:
• Whether a sender has ever been seen by the users of the company
These signals strengthen the detection stack and enable new use cases. As a result, the detection
engine now catches other advanced email threats, like ransomware, credential phishing and
compromised third-party accounts.
Advanced BEC Defense detects display-name spoofing and lookalike domains. It even blocks the
most sophisticated supplier fraud attacks by dynamically analyzing messages for tactics
associated with supplier invoicing fraud. It uses machine-learning to adjust and learn in real time
and aims for low false-positive rates.
Virus Protection
Antivirus protection is a key component of the Proofpoint Protection Server. The Proofpoint
Protection Server provides this functionality by integrating optional antivirus engines from
several leading antivirus vendors.
The virus engine uses a number of virus signatures or identity files that identify specific known
viruses, as well as a heuristic engine to detect previously unknown strains.
Email Firewall
The Email Firewall Module provides the following methods to control, filter, and manage email
traffic in your organization:
• Filters messages by connection and message attributes and applies rules for disposition
of these messages.
• Uses trusted and blocked lists to apply an authoritative disposition to messages from
senders on these lists without further processing by the Proofpoint Protection Server.
• Uses dictionaries to filter messages for content and apply rules for disposition of these
messages.
• Provides an SMTP Rate Control feature to restrict email traffic per IP address.
The Email Firewall Module filters messages by both connection and message attributes. The
connection and message attributes are contained in the envelope information and are analyzed
by the Email Firewall Module as soon as the message is passed from sendmail to the Proofpoint
Protection Server through the Milter interface.
Many organizations today are concerned with the potential liabilities caused by transmitting email
with inappropriate content through their messaging systems. You can create dictionaries
containing inappropriate words with associated weights that correspond to determining whether
or not the message is inappropriate. You can then create rules with dispositions based on the
score of the message. The Email Firewall already includes an Offensive Language dictionary, and
you can also obtain other preconfigured dictionaries from Proofpoint Support or Professional
Services.
The Email Firewall Module enforces email flow policies by shaping SMTP traffic dynamically in
real time. The Proofpoint Protection Server MLX Dynamic Reputation technology is integrated into
the Email Firewall - it constantly inspects SMTP connections at the IP address level, monitoring
the number of connections and analyzing the content of the messages. The MLX Dynamic
Reputation engine assigns a reputation score to each IP address based upon observed behaviors.
Based on the scores, the SMTP Rate Control feature of the Email Firewall Module takes corrective
action according to the defined policies. For example, if 75 percent of the messages sent from a
specific IP address over a specified time period contain spam, the Proofpoint Protection Server
applies a policy to refuse or restrict messages from that specific IP address.
The SMTP Rate Control traffic shaping policies improve the network bandwidth utilization for your
organization, reduce the overhead for sending messages to the Quarantine, and reduce server
storage requirements as well as CPU resources.
Dynamic Reputation
Proofpoint Dynamic Reputation is a connection management and email reputation service that
uses Proofpoint NetMLX machine-learning technology to block incoming connections from
malicious IP addresses. The system provides enterprises with an accurate first line of defense
against spam, directory harvest attacks, denial of service attacks, snowshoe spamming, and
other email-borne threats while delivering substantial bandwidth savings.
The Proofpoint Attack Response Center collects information for millions of IP addresses using
data from Proofpoint honeypots, customer sites, and other sources. Proofpoint NetMLX machine-
learning algorithms continually parse hundreds of data points for all IP addresses in real-time to
generate extremely timely, accurate network reputation scores.
Proofpoint NetMLX creates the industry's most accurate and up-to-date database of reputation
for IP addresses sending email across the Internet, allowing each customer site to benefit from
the network effect provided by Proofpoint's real-time, machine-learning analysis of world-wide
sender behavior. Each minute hundreds of data points for all IP addresses are parsed with
advanced machine-learning algorithms to generate a score that represents the sender's
reputation, whether positive or negative. Proofpoint Dynamic Reputation uses these scores
combined with local behavioral data to make intelligent decisions about accepting, throttling, or
rejecting incoming email connections.
Smart Search
The Proofpoint Smart Search module allows administrators to trace and analyze information
about messages once they have been processed by the Proofpoint Messaging Security Gateway
(appliance).
Administrators can quickly trace what happened to messages to solve email delivery problems
and analyze overall email infrastructure behavior. Detailed information about a message once it
has been processed provides administrators with the ability to quickly answer email transaction
questions from the business email community, help desk, and customer support staff.
The Targeted Attack Protection Module consists of URL Rewrite, Message Defense, and the
Dashboard. The module protects your organization from phishing, spear phishing, and other
malicious attacks.
URL Rewrite
When you enable URL Rewrite, URLs in a message may be rewritten and directed to Proofpoint's
cloud-based service for reputation analysis.
URL Rewrite rewrites the URL and redirects the URL to Proofpoint's Cloud service when a user
clicks a URL in an email message. If the URL is not known to be malicious, the user will be
redirected to the original URL. Once redirected, the URL Rewrite service is no longer in the traffic
flow between the user and the web site. If the URL is malicious, the user will see a warning
message and the site is blocked in the browser. This protects other users from clicking the
malicious URL. However, if the first victim clicks a malicious URL before its reputation is known,
administrators can mitigate the situation using the Targeted Attack Protection Dashboard.
Message Defense
Message Defense protects your organization from being infected with malware by temporarily
delaying messages that contain attachments or URLs with unknown reputations.
Message Defense uploads unknown attachments to the Proofpoint Attachment Scorer service to
the cloud sandboxing environment of Proofpoint.
After scan results are returned, if all attachments are known to be clean, the message and its
attachments continue through the filtering engines and if no other rules are triggered, the
message is delivered to the email infrastructure. If any attachment has a malicious reputation,
the message is quarantined.
The Dashboard alerts administrators of email attacks and provides the detail they need to search
for targeted attack information, triage to reduce potential damage, submit feedback to Proofpoint,
and create detailed reports for security and executive personnel.
It provides very detailed SoC reporting including the Very Attacked People (VAP) report.
When malicious email is detected, detecting systems send an alert to Threat Response with
information about the message. Threat Response then goes into Exchange, O365, or Gmail to
move the message into quarantine. Auto-Pull will also then look for forwarded copies of the
message in other mailboxes on the same server and move those to quarantine as well.
Once TRAP has received the security alert it will take the following actions:
• TRAP will collect the alerts, normalize the information, and prioritize the alerts by
assigning a threat score and grouping similar messages by recipient and known
malware campaigns.
• TRAP will take the IP/Host names, URLs and MD5 hashes that are sent in a forensics
report from the alert sources, search reputation and intelligence repositories and identify
if any of these repositories contain related threat intelligence information.
• TRAP can connect to Active Directory via an LDAP call and collect information about the
user associated with the email address. The LDAP attributes that are collected provide
insight into who’s being targeted/impacted by email attacks.
• TRAP will relocate the identified message(s) from the recipients and place them in a
quarantine mailbox where they can be reviewed and examined but where the end user
can’t access them.
• Once the message is located TRAP can identify if the message was forwarded to
someone else. If it was, then TRAP can search associated mailboxes for the forwarded
messages. If those messages are located, they will be quarantined as well. TRAP will
continue to take these tracking actions until all copies within the environment have been
quarantined.
Proofpoint’s Email Fraud Defence (EFD) is the only proactively managed authentication solution
that can assist Customer in not just identifying and authenticating its third-party senders
across the consumer and enterprise, but goes beyond DMARC capabilities to address the
multiple tactics bad actors use to impersonate a brand/domain/employee/business partner.
EFD prevents Business Email Compromise (BEC) attacks by helping Customer identify who is
sending emails using Customer domains, ensuring all valid senders are properly authenticated,
and blocking the rest. EFD will also provide visibility into who is sending you email and how they
are authenticating. This helps protect your customers, trusted partners, and your own users
from identity deception.
Addressing Customer requirements for enhancing and expanding the current DMARC position in
order to achieve a strong email authentication posture requires several phases, and must
address the multiple tactics used to create identity deception. Having the data and experience
in supporting such an initiative is critical. Proofpoint has helped thousands of enterprises on
their DMARC journeys, securing more domains than our competitors combined. In the Fortune
1000 alone Proofpoint has secured more enterprises in the last 3 years (295) than all our
competitors combined (184). Our methodology is proven, our technical advantages validated,
and the roadmap has been aligned to delivering the greatest value beyond DMARC. One thing
we hear from every CISO is the fact they are looking to minimize the number of point solutions,
lower their OpEx and look for a platform to leverage from a trusted partner. Very direct reasons
why our customers choose EFD are publicly available stats that speak to our strength with this
solution:
• Our nearest competitor has ~135,000 domains with their DMARC records in DNS, we
have ~420,000, which means that we have almost three times the reporting surface for
the free-to-air reporting from the ISPs and Gmail.
• We have ~220,000 domains at p=reject, almost 100,000 more than our nearest
competitor has in total at all p=values.
• Our nearest competitor is present in the records of 11% of the Fortune 1,000, whereas
we are in 29%
Through this document we will highlight many of the key differentiators between our EFD
solution and other DMARC vendors, but one of the biggest and most relevant is the breadth of
data we have access to, and therefore provide to Customer. Anyone can publish a record to DNS
and receive feedback reports from webmail providers, but only Proofpoint can also provide data
about messages sent to business gateways and non-DMARC compliant ISPs. This is because of
the global scale of our email gateway business, and relationships cultivated or acquired. This
additional visibility allows you to go beyond solving consumer-based spoofing; It provides the
visibility to solve B2B & supplier spoofing as well.
For Customer, the solution proposed in this document is more than just a reporting tool. An EFD
project comes with an assigned Professional Services consultant to assist the organisation with
interpreting the results and will provide actionable instructions. The consultant is vital for a
successful deployment as DMARC is nuanced and interpreting the data can be difficult. The
sheer volume of data that is generated can be overwhelming and many projects never reach
completion because the resulting lack of confidence that all DMARC issues have been correctly
addressed often means that they never reach Reject status. Having an expert that can do the
triage, heavy lifting with interpreting the data and guiding you through your DMARC project leads
to the fastest and safest method of reaching Reject status.
Email Fraud Defence protects your organization from all phishing and impostor attacks that
spoof your domains. Visibility into who is sending email on your behalf allows you to authorize
all legitimate senders and block fraudulent emails before they reach your employees, business
partners, and customers. EFD gives you visibility across your email ecosystem by not only
analysing and interpreting DMARC reports, but also enriching them with robust message
samples. Understand who is sending email on your behalf with a full view into the email traffic
coming into and going out of your organization.
In addition, when you deploy Email Fraud Defence with other Proofpoint solutions, you can
nullify an entire class of impostor email fraud:
Solution Overview
Proofpoint’s Email Fraud Defence is a cloud-based solution that makes it easy to implement email
authentication to protect your employees, partners and customers from email fraud. As a domain
owner, EFD receives DMARC reports on a customers behalf and layers on intelligence that quickly
identifies authentication issues among legitimate email, offers troubleshooting advice, and
recommends when blocking policies can safely be declared in DNS. As an email receiver, EFD can
also provide the visibility necessary for you to confidently enforce DMARC on your inbound email,
without the risk of blocking legitimate messages.
Customer run a complex supply chain and has numerous partner relationships. This requires a
significant focus on not just identifying third-party senders for Marketing purposes but also
Business to Business (B2B) third-party sender relationships. Thus, in looking to determine those
legitimate third-party organisations that may send on your behalf, most organisations are blind
to the full extent of the emails in circulation in their name. Thinking that they have captured all
emails because of the observed data in the free-to-air ISP generated RUA reports, they move to
p=reject too soon, and then later find that their DMARC deployment has interfered with their
business.
Proofpoint owns numerous data sources from the use of their Secure Email Gateway, in addition
to acquisitions and industry cooperation’s adding to a broad range of proprietary data sources
used in assessing the origin of emails. These, along with the two RUA/RUF publicly available
data sets, are combined to provide a comprehensive and accurate diagnosis of email
authentication.
As can be seen from the table above, data sources 1-7 are only available with EFD. Other
solutions on the market will be ingesting data from sources 8-9 and presenting them in a way
that Customer would be fully able to do themselves, should they wish too, however a DMARC
solution that relied solely on publicly available data will not give full visibility in to critical B2B
authentication data.
As the Email Fraud Defence team was a founding member of the DMARC.org, and has been
helping clients implement email authentication practices five years before DMARC was a public
standard, we are well versed in the analysis of DMARC/email authentication data, the
implementation of SPF/DKIM/DMARC, identifying and accounting for false positives, dealing
with change management windows, and understanding possible paths forward when dealing
with exceptions.
The EFD solution compromises:
• Access to a web-based application over standard and secure communication channels:
• Monitor email activity from your domains and subdomains, including non-sending
and defensively registered domains.
• Save time diagnosing, prioritizing, and fixing authentication issues related to your
domains.
• View email activity using your domains received by consumer mailbox providers,
business gateways and your own gateway.
• Block malicious emails leveraging your domains from reaching your customer’s and
partner’s inboxes.
• Understand which receivers are honouring your DMARC policies and which aren’t.
• Identify, authorize, and log legitimate IP addresses and forwarders sending mail on
your behalf.
• Gain visibility into server configuration problems.
• Investigate headers and Uniform Resource Identifier (URI) information to identify
suspicious activity impacting your brand.
• Receive real-time alerts concerning issues about phishing, spoofing, and blocked
legitimate messages.
A dedicated Professional Services consultant – our experienced team helps you reduce the risk
of blocking legitimate mail by providing:
• Continuous monitoring to optimize your DMARC implementation
• A dedicated extension of your team to help you identify legitimate email streams
• Ongoing support as your business email practices evolve
Domain Discover - Lack of visibility into your domains/subdomains (brand and defensive
registrations) as well as lookalike domains increases your threat landscape. This functionality
will:
• Continually scan over 400 million domains for threats
• Automatically classify domains and identify the most urgent threats
• Provide full lookalike domain detection
• Provide detailed intel around registrant info, email traffic, web content
• Support domain takedown and gateway blocking of offending domains
• Support virtual takedown for faster/easier remediation
Hosted SPF - Incorrect or misconfigured SPF records are a major source of authentication
failures and maintaining accurate records can be a time-consuming process so Hosted SPF will:
• Manage customer SPF records for accuracy and efficacy
• Ensure third-party sending IPs are continually updated to maintain authentication
• Enable customers to permit/de-permit senders in real-time through the EFD portal
• Take the time and guesswork out of maintaining the SPF record
BIMI - Lack of confidence in sender validity and risk of display-name spoofing reduces the
likelihood of email opens/clicks, lowering the value of email marketing. BIMI support will:
• Insert a corporate logo within the display picture of all authenticated emails
• Provide a visual check for valid emails – protecting the company and its consumers
• Help prevent a variety of consumer-based fraud
Go beyond a standard DMARC implementation by gaining visibility into your supplier risk. The
Nexus Supplier Risk Explorer feature will:
• Automatically identify suppliers from email traffic
• Assess level of risk your suppliers pose to your organization
• Reveal lookalikes of your suppliers’ domain
• Validate suppliers’ DMARC record
• Reveal the message volume and the messages delivered from the lookalikes of your
suppliers’ domain
• Prioritise each supplier’s domain’s risk level and help you focus on the most critical
incidents
EFD is provided as Software as a Service (Saas) using Amazon Web Services, along with
consulting services to implement the solution. Proofpoint has implemented several security
controls to ensure the protection and privacy of consumer Personal Data and to prevent
inadvertent access, exposure or theft of Personal Data and client data.
As part of the proposed solution Customer would gain access to:
• A platform that uses HTTPS for access and TLS 1.2 for all external communications.
Data is encrypted with AES-256 in the database. All passwords are hashed with salt.
• A simple, browser-accessible user interface and API with nothing for customers to
install, therefore there is no requirements for any local installations or maintenance of
any hardware or software by Customer.
• A GUI that support role-based access controls for delegation that does not introduce risk
of unauthorised changes taking place. The roles are:
o Admins will have complete control of configuring the account with Domains, IPs,
Creating Users, and Updating policy for a domain
o Read-only access will be able to access all data, and export data. However, the
user will not be able to make changes to domains, add IP addresses, or create
end-user access
• Multifactor authentication can be implemented for end-users to access the portal.
Proofpoint supports both a physical YubiKey OTP method and using a mobile app,
Google Authenticator
• IP Based Access Restriction is also available so GUI access can be restricted to the
addresses provided by Customer
• The same GUI will be used to manage the solution for all domains, so information is
reusable, and duplication made obvious
• The underpinning technology powering the system is API based so fully scalable and
flexible, and can be imported in to Customer’s own tools should it be required.
Proofpoint supports Transport Layer Security (TLS); all transmissions of data to Proofpoint’s
infrastructure can be encrypted through the TLS protocol. DMARC reports are sent to us in
whatever state the mailbox provider deems appropriate, but should they decide to send data in
encrypted format, we can support that. Once we receive DMARC data from the mailbox provider,
all data in transit within Proofpoint’s infrastructure is encrypted. Email Fraud Defence
infrastructure is deployed in AWS, all data stored in the cloud is encrypted at rest and only
Proofpoint has access to the key.
EFD Deliverables
Once your DMARC record is in place, participating mailbox providers will send daily aggregate
reports to the destination you defined in the RUA tag. DMARC aggregate reports provide
information about which emails are authenticating against SPF (Sender Policy Framework),
DKIM (DomainKeys Identified Mail) and DMARC, and which are not. This data is provided in
XML format and shows each message sent from a domain, such asCustomer.co.uk, to the
mailbox provider, for example gmail.com. The aggregate report also shows each message
source IP and if this was authenticated against the published SPF record, and whether the DKIM
check passed or failed. While aggregate reports do not provide much information about the
email messages themselves, they can provide valuable visibility into the health of your email
program by helping you identify potential authentication issues and/or malicious activity.
The other DMARC record placed in DNS requests participating mailbox providers to send
forensic reports to the destination you defined in the RUF tag. These reports are sent in real
time, and in addition to providing information about which emails are authenticating against
SPF, DKIM, and DMARC (as aggregate reports do), forensic reports include additional
information such as the subject line and header information as well as, most importantly any
URLs (URIs) included in the message.
It is worth noting that forensic reports are not generated by all DMARC compliant gateways and
as such account for a very small amount of DMARC traffic. Our portal makes the data available
for additional threat context, but also does a large amount of data augmentation via the other
threat intelligence sources that we operate which goes way beyond what the other standalone
DMARC portals can achieve. This additional data can provide the insight required to
differentiate a legitimate versus illegitimate email.
See attached “What is DMARC data.pdf” for more information on what the forensic and
aggregate reports contain and how they will be used as part of the project.
With the data feeds above, and our unique proprietary feeds, the EFD portal will begin to
populate with actionable data. Empowered with visibility in to the use of 21 Customer domains,
the dedicated Professional Services consultant will be able to audit the health of your domains
to identify which of your mail streams are not authenticating properly, help you understand your
email program’s current level of risk, and offer best practices for improving authentication or
defeating phishing and spoofing. This allows Customer to more confidently deliver and execute
a detailed documented project plan to harden SPF, DKIM and DMARC policies for all 21 email
domains detailed in the WO.
The project plan will provide steps to publish SPF, DKIM and DMARC records to DNS, first in
data gathering (monitoring) mode, to migrate through DMARC quarantine to ultimately
implement DMARC reject mode. This transition will be documented and approved as per
Customer governance and change management processes to reduce the risk of any legitimate
messages being blocked. The project plan will define resource allocation and expected tasks to
be completed between sessions to ensure tasks are managed, and milestones are reached on
time. The process to add new domains to the portal for DMARC visibility, monitoring and
management is straightforward and well documented within our help pages, however the
consultant will train Customer colleagues in the process during interactive sessions. They will
also be able to provide RFC and industry documentation to train Customer colleagues in
management of DNS records for authenticating email (SPF, DKIM and DMARC), within
Customer’s own DNS and external third-party as required.
1. Domain by domain SPF, DKIM and DMARC pass rates and alignments:
2. Permitted (known/trusted) sender by SPF, DKIM and DMARC pass rates and alignment:
The system is tuned to group senders in to known services (such as Salesforce) to easily
identify known trusted senders:
The grouping can be split to show mail flow and authentication stats on individual IPs owned by
the vendor:
And a who is link will provide additional DNS registry information such as domain owner:
Once mail from these services has been authenticated it will move from an unauthorised to
authorised section within the portal to provide a deeper view on authentication trends:
Should the need arise to migrate DMARC or email gateway data the consultant will be able to
provide documentation and instructions to reduce mail flow risk.
All data in the dashboards and portal is available through a REST API for integration in to
Customer systems, such as SIEM, for reporting visibility and alerting Customer governance and
SOC teams. For reference, API documentation including the data fields available, can be found
here: https://data.emaildefense.proofpoint.com/docs/index.html
Email alerts can also be configured in the portal to flag changes such as:
The EFD portal also includes Domain Discover, which automatically identifies lookalikes of your
domains (figure 8 above). Proofpoint dynamically detect newly registered domains posing as
your brand in email attacks or by phishing websites, by analysing millions of domains and
connect registration data with our own data on email activity and active attacks. Customer can
receive instant alerts when suspicious domains move from parked to a live, weaponized state.
This module also includes the Virtual Takedown service, you can quickly reduce consumer,
business partner and employee exposure to malicious lookalike domains. And you can pursue
removal of the domain with the registrar or hosting provider.
For the duration of the project, the Proofpoint Professional Services consultant will:
On top of this and at all times, further resources are available to Customer colleagues:
The EFD Help Centre is available in the upper right-hand corner of the Main EFD UI Screen. This
includes:
Web-based training. This training is recommended for project team members prior to the start
of the engagement. The course is broken into 6 chapters that can be taken in any order and
includes:
7. Bill Of Materials
Sno Product Details Qty
PFPT-B-P0M-V-A
Proofpoint Core Email Protection - V, Provides inbound
email protection
1 against threats that target organizations. - Virtual 900
PP-SUP-PS
2 Platinum Level Support 1
PFPT-M-EFDBC-S-A
PFPT EFD Commercial Basic (up to 1 sending domain)
3 12 Months 900
8. Scope Of Work
In connection with this Scope of Work, Emirates Computers will perform the Services as
specifically described below.
Emirates Computers will comply with the RFP terms mentioned in the Scope of Work Section.
Project Kickoff
Project Design
• Review and validate high-level requirements and planned use of features and functions.
• Provide input into the customer’s project plan as needed.
• Review change control requirements.
Solution Supply
• Provide Proofpoint Core Email Protection (Virtual Appliance) for 900 mailboxes.
• Provide Proofpoint Email Fraud Defense Basic (up to 1 domain).
• 12 months of licensing and Platinum Support (24x7x365).
• Install and configure Proofpoint Core Email Protection Virtual Appliance on MOCE’s on-
premises infrastructure.
• Configure Proofpoint EFD for domain protection and DMARC enforcement.
• Validate the security of emails based on the MX validation with Proofpoint services.
• Ensure DMARC is working as expected.
• Enable SFP validation based on the Proofpoint solution.
• UAT and fine-tuning based on the available Proofpoint licenses.
Assist the customer with the configuration of product features included with Proofpoint
Protection:
Assist with configuration of purchased product modules included with Proofpoint Targeted
Attack Protection:
Assist the customer with the configuration of product features included with Proofpoint Threat
Response Auto Pull (TRAP)
Note: This does not include assisting with the configuration/customization of the customer’s
SIEM for report production
• Assist with the configuration of Basic Proofpoint Encryption (TLS) and Basic Email Data
Loss Prevention (DLP)
• Assist customer with the integration of CLEAR (Closed-Loop Email Analysis & Response)
• Create a new TRAP Abuse Mailbox Monitor and configure the Abuse Mailbox Monitor.
• Configure Match Conditions
Note: If PhishAlarm and/or PhishAlarm Analyzer have not been deployed we will work with
Customer to deploy the PhishAlarm plug-in to customer’s Outlook, Exchange, or Gmail
environment(s) and ensure provisioning within the Security Education Platform.
Production Cutover
• Execute Test Plan and assist customer with inbound and/or outbound email cutover.
• Validate Proofpoint instance is functioning within expected parameters.
Project Closure
Customer Responsibilities
Project Design
• Provide at least one technical resource with system administration responsibilities and
appropriate system access privileges.
• Provide network architecture and email flow diagram of the Customer’s environment.
Implementation
• Ensure all relevant resources are available for kick-off, planning, configuration, and status
meetings.
• Ensure vendors and third parties are accessible as necessary during implementation
services.
• Assume all responsibility for network connectivity, performance, and configuration issues
within the Customer environment.
Production Cutover
Project Closure
9. Compliance Matrix
SN Description Comply Comment
1 To install, configure and Compliant
implement solution hosted
fully on-premises
2 The Solution must adopt Compliant
Operation Centric approach
3 Combat ransomware hidden in Compliant
attachment.
4 Supports Advanced Malware Compliant Traditional anti-spam solutions evaluate a
Protection (AMP) limited number of attributes and are
unable to decisively classify spam, which
leads to a low rate of effectiveness and a
high rate of false positives. Proofpoint
MLX™ technology leverages patent-
pending machine learning techniques to
provide a revolutionary threat detection
system. The Proofpoint solution employs
a full range of classification methods,
from legacy approaches such as
23 Graymail detection and safe Compliant Bulk mail can be treated separately from
unsubscribe feature: other types of spam – some users may
classifies and monitors want to receive their Bulk mail (per policy),
graymail entering the and others may not.
organization.
Protection against malicious
threats masquerading as
unsubscribe links.
A uniform interface for
managing all subscriptions
24 Outbreak filters features: - Compliant
Defend against emerging
threats and blended attacks. -
issue rules on any
combination of six
parameters, including file type,
file name, file size, and URLs in
a
message
25 Highly accurate threat Compliant
classification with minimal
false positives and false
negatives, ensuring that
legitimate emails are not
unnecessarily blocked.
26 Scalable architecture designed Compliant
to support MOCE's growth and
increasing email traffic
volumes without
performance degradation
27 The Email Security Gateway Compliant
should be able to consume
external threat information in
STIX format
communicated over TAXII
protocol.
28 The following is a list of STIX Compliant
Indicators of Compromise
(IOCs) should be supported: -
File Hash Watchlist (describes
a set of hashes for suspected
malicious files) - - -
IP Watchlist (describes a set
of suspected malicious IP
addresses)
Domain Watchlist (describes a
set of suspected malicious
domains)
• Edge Group
• ADNOC
• ADIA
• Mubadala Group
• Etihad
• NCEMA
• ENOC
• Dubai Police
• Dubai Airports
• Fly Dubai
• ADCB, ENBD, RAK Bank, CBD, DIB, CBI, Arab Bank, UAB
Network Engineer
CV's.pdf