
Secure Email Solution
Secure email protection features provided:
> Cloud email
> SaaS email
services
> Email
Archiving
> e-Discovery
> Anti-Malware
(phishing, spam, ransomware)
|
> Anti-Virus
> Email Sandbox
> Email
Encryption
> Email
encryption for office 365
> Email DLP
(data loss prevention)
|
Software | Appliances | Virtual | Cloud Services
On-premise | Web-based | Client-based
The Challenge
> Email is one of the TOP vectors for targeted attacks.
> E-mail Is Not Secure - Start encrypting your emails today.
Secure email solution features & benefits
> Secure messaging
> Provide comprehensive protection for messaging / email infrastructure
Provides highly accurate anti-spam coverage and defends organisations from a wide variety of virus and malware threats delivered within email.
Ensure you can still send and receive emails when your primary on-premise mail server goes down.
> Hybrid email security
Keep data physically on the premises, while enjoying the benefits of cloud-based security.Ensure you can still send and receive emails when your primary on-premise mail server goes down.
> Protect mobile device & BYOD email
- Containerisation for emails, so their access is restricted to only enterprise approved apps and accounts.
- Wiping of corporate email account for stolen or lost devices.
- Leverage the users device's inbuilt email client to access corporate emails and provide a native user experience. It is fully supported on iOS, Android and Windows platforms.
- Support Office 365, Exchange On-Premise and Exchange Online.
- Setup and managed from an MDM solution.
> Send secure emails from smartphones and tablets
> Safeguard e-mail servers and the classified information transmitted through them
> Microsoft Outlook integration
Employees can search archives, send encrypted email messages and large files.> Solutions to extend and secure your data and investment in Microsoft Office 365
Anti-spam & anti-virus, advanced threat protection, data loss prevention, core service administration, archiving, eDiscovery capabilities and compliance.> Protect Exchange to Office 365 migrations
> Enable and protect on-premise to cloud archiving solutions
> Mail server security
> Lotus Notes | Microsoft Exchange | Unix | Linux
- Image control: scans emails and attachments to identify, control, and block inappropriate images from entering or leaving the organisation. Particularly well-suited to the accurate detection of pornographic images.
- Content control
> Mobility and mobile messaging / email access
- Access and secure email and corporate messaging as you would from in the office – all messages archived, indexed, and searchable.
- iPhone, iPad, Blackberry, Android phones, Windows Mobile phones
- All types of webmail apps like Gmail, Hotmail, Outlook OWA
> Cloud / Hosted / SaaS managed email security
Secure email security features & benefits
> Global security intelligence lab support
Security engines are updated by security threat labs, fed by millions of users and customers, as well as pro-active analysis for leading vendors.
Desktop and device email encryption
Automatically encrypts, decrypts, digitally signs, and verifies messages according to individual or centrally managed policies. Email is encrypted immediately at the client device, ensuring communications are secure before hitting internal networks or stored in the cloud.
Automatically encrypts, decrypts, digitally signs, and verifies messages according to individual or centrally managed policies. Email is encrypted immediately at the client device, ensuring communications are secure before hitting internal networks or stored in the cloud.
Compatible with:
- Mac OS X
- Microsoft Windows
- Apple iOS devices
- Android
Encryption solutions
- Email encryption client empowers end-users to encrypt email
- Empowers end users to encrypt email that’s not protected by gateway encryption
- Gateway email security automates policy-based encryption
- Ensures compliance with automated, policy-based encryption
- Adds a critical layer of protection that doesn’t rely on end users
- Eliminates the need for recipients to install client software
- Hosted email security offers a maintenance-free encryption service
Email encryption in-transit
- Enforce secure content delivery with Identity-Based Encryption, S/MIME, or TLS email encryption options.
- inbox to inbox - with no sender/recipient authentication necessary.
Policy-based email encryption
Encrypt outbound emails based on content, sender, and recipient.
> Large file sending
Over come Exchange and other mail system file size sending limitations and ensure corporate documents stay within secure and trackable.
If you do not address this, user will send and store sensitive information outside the corporate environment – exposing you to risk and non-compliance.
> Content filtering
Filtering unwanted messages and protecting your mailboxes from targeted attacks.
- Scan incoming, outgoing & stored mail
- Scan embedded content and attachments
- Block unwanted and malicious email content and to protect confidential business information
- Per user identity inspection
- File Scanning and image analysis
- Code scanning
- Email attachment analysis
> Content scanning
Scan embedded content and attachments.> Sandboxing
Malware analysis that sandboxes the destination URL or sandboxes suspicious attachments, to simulate a real user on a machine with a goal of observing any changes made to the system.
- Sandboxing, to stop even the most sophisticated email-borne threats
- Behavioural analysis of active content can be used to quickly maximise threat identification
- Advanced detection techniques and sandboxing to identify and block the spear-phishing emails that are the initial phase of most targeted attacks.
> Data Loss Prevention (DLP)
> Protect data leaving the organisation from desktops, servers or mobile devices (windows, Android or OSi)
> Notify users with an-screen, pop-up window or block specific actions when a policy violation is detected.
Data loss events continue to increase every year, resulting in fines, penalties and loss of revenue for companies worldwide. Many data loss events are caused by trusted employees who frequently send sensitive data into untrusted zones, either intentionally or by accident.
- Data pattern matching techniques and user identity to detect and prevent unauthorised communication of sensitive information.
- Fingerprinting of document files and document file sources.
- Inspection modes (proxy and flow-based).
- Archive finger-printed data. Archiving DLP content is useful when auditing is required by law.
> Address governance & compliance
Enable compliance with SOX, GLBA, HIPAA, PCI DSS- Data loss prevention
- Policy-based encryption
- Data archiving
- Data growth management / storage challenges
- Legal eDiscovery
- Companies need to keep emails for 7 years or more
> Anti-spam
- Spam and phishing URLs and email addresses
- Spam Object checksums – Dynamic Heuristic Rules
- Outbreak Protection
> Anti-virus
> Anti phising
Protect against targeted phishing attacks
Phishing attacks work by the scam artist sending "spoofed" emails that appear to come from a legitimate website that you have online dealings with such as a bank, credit card company or ISP - any site which requires users to have a personal identity or account. The email may ask you to reply with your account details in order to "update security" or for some other reason.
The phishing email may also direct you to a spoofed website or pop-up window which looks exactly like the real site, but has been set up for the sole purpose of stealing personal information. Unsuspecting people are then often fooled into handing over credit card numbers, passwords or other details.
> Denial-of-Service Protection (DDoS)
> Quarantine
- Centralised Quarantine.
- Improve employee productivity and cut help desk calls with end user self-service.
> Management, logging & reporting
- Role-Based Administration Accounts Per Domain.
- Comprehensive Configuration Change, activity, event and incident logging and reporting.
- Easy Data Correlation via SIEM.
> Virtual email security
Secure email on virtualised platforms e.g. VMWare / Hyper-V environments.
While Office 365 offers basic email security to help with spam and malware, there is a lack of focus and functionality around data loss prevention which is required by enterprises of all sizes today for the protection of information in the cloud.
- Does not provide a means to quarantine outbound email.
- Complex customer configurations may make managing policy difficult.
- Extends advanced protection & guaranteed email availability for Office 365, Google Apps for business and other 3rd party cloud platforms.
- Information governance and compliance.
- Enhances Office 365 with Advanced Malware Protection.
> Microsoft Lync / Skype for Business
Retain Microsoft Lync IM conversations and content in a secure, indexed and unified archive.> Protect social and collaborative content
- Discover your brand and content across Collaboration and Social Media platforms.
- Collaboration and Social Media archiving allows organisations to employ policy-based controls to capture social content so that it can be managed as any other critical information asset.
- Archive and comply with regulatory obligations.
- Seamlessly integrate social media content into many leading archiving solutions for retention and eDiscovery.
> Email archiving
Enterprise Archiving
- Stores a copy of all incoming, outgoing and internal email in a secure, encrypted repository indefinitely
- Archive messages, satisfy legal and compliance requirements.
- You need a third party archiving and eDiscovery solution, as this feature is not inherent within Office 365, but essential for regulatory compliance.
- Integrates with all other email platforms, to give a single unified archiving and discovery platform (Microsoft Exchange Server and IBM Domino emails, Box and Microsoft SharePoint Server files, instant messages, and unified communications)
- Removes need for in-house investment and burden on IT for maintaining and growing email archiving
- Access your archives from Outlook Web Access, the IBM Lotus Notes Web Client, BlackBerry devices
- Archive and search email, files, IM, and social media communications, and more
- Folder synchronisation
- Search, Anytime, Anywhere on Any Device
- Enforce mailbox quotas with attachment stubbing
Mobile
Apps
Role Based Access
|
PST
Import
Exchange Stubbing
|
Secure email deployment platforms
Software
Can be delivered as a software solution to sit on customers preferred hardware platform or on a virtual server (VMware).
Hardware
Offer a range of 'plug-and-play' appliances
Cloud / Managed Service
As a managed service 'in the cloud' on a 'pay as you go' basis
Cloud / Managed Service
As a managed service 'in the cloud' on a 'pay as you go' basis
> eDiscovery
- eDiscovery refers to the process of finding email in the active archive
- tools that empower users to perform multiple levels of live search for any email or attachment within the archive.
> Email recovery
Users can instantly recover any email or attachment from the active archive into their desktop inbox without assistance from IT.> Email continuity
- Should be a major piece of a company’s disaster recovery plan.
- continuous on-demand access to email from any location. In the event of any internal network or server outages, users can access email.
> Bandwidth savings
Because filtering takes place in the cloud, neither the antivirus software nor the blocked spam requires a single byte of your bandwidth.> Email stationery management and marketing tools
- Flexible, policy-based signature and legal notice creation and application
- Corporate branding and imagery management
- Recipient click tracking capability
- Micro-site creation and publishing
Contact us today to discuss your requirements in more detail.
![]()
P: +44(0)7714 209927
S: +44(0)1273 329753
|
![]()
info@securenetconsulting.co.uk
|