Secure Email

Secure Email

Secure Email Solution

Secure email protection features provided:



> Cloud email

> SaaS email services

> Email Archiving

> e-Discovery

> Anti-Malware (phishing, spam, ransomware)

> Anti-Virus

> Email Sandbox

> Email Encryption

> Email encryption for office 365

> Email DLP (data loss prevention)



Software | Appliances | Virtual | Cloud Services

On-premise | Web-based | Client-based





 

The Challenge

> Email is one of the TOP vectors for targeted attacks.

> E-mail Is Not Secure - Start encrypting your emails today. 





 

Secure email solution features & benefits



> Secure messaging

 


> Provide comprehensive protection for messaging / email infrastructure

Provides highly accurate anti-spam coverage and defends organisations from a wide variety of virus and malware threats delivered within email.



> Hybrid email security

Keep data physically on the premises, while enjoying the benefits of cloud-based security.

Ensure you can still send and receive emails when your primary on-premise mail server goes down.




> Protect mobile device & BYOD email

  • Containerisation for emails, so their access is restricted to only enterprise approved apps and accounts.
  • Wiping of corporate email account for stolen or lost devices.
  • Leverage the users device's inbuilt email client to access corporate emails and provide a native user experience. It is fully supported on iOS, Android and Windows platforms.
  • Support Office 365, Exchange On-Premise and Exchange Online.
  • Setup and managed from an MDM solution.

> Send secure emails from smartphones and tablets


> Safeguard e-mail servers and the classified information transmitted through them



> Microsoft Outlook integration

Employees can search archives, send encrypted email messages and large files.


> Solutions to extend and secure your data and investment in Microsoft Office 365

Anti-spam & anti-virus, advanced threat protection, data loss prevention, core service administration, archiving, eDiscovery capabilities and compliance.


> Protect Exchange to Office 365 migrations



> Enable and protect on-premise to cloud archiving solutions



> Mail server security

 

> Lotus Notes | Microsoft Exchange | Unix | Linux

  • Image control: scans emails and attachments to identify, control, and block inappropriate images from entering or leaving the organisation. Particularly well-suited to the accurate detection of pornographic images.
  • Content control


> Mobility and mobile messaging / email access

  • Access and secure email and corporate messaging as you would from in the office – all messages archived, indexed, and searchable. 
  • iPhone, iPad, Blackberry, Android phones, Windows Mobile phones 
  •  All types of webmail apps like Gmail, Hotmail, Outlook OWA

> Cloud / Hosted / SaaS managed email security






Secure email security features & benefits



> Global security intelligence lab support

Security engines are updated by security threat labs, fed by millions of users and customers, as well as pro-active analysis for leading vendors.


  
Desktop and device email encryption
Automatically encrypts, decrypts, digitally signs, and verifies messages according to individual or centrally managed policies. Email is encrypted immediately at the client device, ensuring communications are secure before hitting internal networks or stored in the cloud.
 
Compatible with: 
  • Mac OS X 
  • Microsoft Windows 
  • Apple iOS devices 
  • Android
 
Encryption solutions
  • Email encryption client empowers end-users to encrypt email
    • Empowers end users to encrypt email that’s not protected by gateway encryption
  • Gateway email security automates policy-based encryption
    • Ensures compliance with automated, policy-based encryption
    • Adds a critical layer of protection that doesn’t rely on end users
    • Eliminates the need for recipients to install client software

  • Hosted email security offers a maintenance-free encryption service

Email encryption in-transit
  • Enforce secure content delivery with Identity-Based Encryption, S/MIME, or TLS email encryption options.
  • inbox to inbox - with no sender/recipient authentication necessary.


Policy-based email encryption

Encrypt outbound emails based on content, sender, and recipient.



> Large file sending


Over come Exchange and other mail system file size sending limitations and ensure corporate documents stay within secure and trackable.

If you do not address this, user will send and store sensitive information outside the corporate environment – exposing you to risk and non-compliance.


> Content filtering


Filtering unwanted messages and protecting your mailboxes from targeted attacks.

  • Scan incoming, outgoing & stored mail
  • Scan embedded content and attachments
  • Block unwanted and malicious email content and to protect confidential business information
  • Per user identity inspection
  • File Scanning and image analysis
  • Code scanning
  • Email attachment analysis

> Content scanning

Scan embedded content and attachments.


> Sandboxing


Malware analysis that sandboxes the destination URL or sandboxes suspicious attachments, to simulate a real user on a machine with a goal of observing any changes made to the system. 
  • Sandboxing, to stop even the most sophisticated email-borne threats
  • Behavioural analysis of active content can be used to quickly maximise threat identification 
  • Advanced detection techniques and sandboxing to identify and block the spear-phishing emails that are the initial phase of most targeted attacks.


> Data Loss Prevention (DLP)


> Protect data leaving the organisation from desktops, servers or mobile devices (windows, Android or OSi)

> Notify users with an-screen, pop-up window or block specific actions when a policy violation is detected. 
Data loss events continue to increase every year, resulting in fines, penalties and loss of revenue for companies worldwide. Many data loss events are caused by trusted employees who frequently send sensitive data into untrusted zones, either intentionally or by accident.
  • Data pattern matching techniques and user identity to detect and prevent unauthorised communication of sensitive information. 
  • Fingerprinting of document files and document file sources. 
  • Inspection modes (proxy and flow-based).
  • Archive finger-printed data. Archiving DLP content is useful when auditing is required by law.


> Address governance & compliance

Enable compliance with SOX, GLBA, HIPAA, PCI DSS
  • Data loss prevention 
  • Policy-based encryption 
  • Data archiving
  • Data growth management / storage challenges
  • Legal eDiscovery
  • Companies need to keep emails for 7 years or more

> Anti-spam

  • Spam and phishing URLs and email addresses
  • Spam Object checksums – Dynamic Heuristic Rules
  • Outbreak Protection


> Anti-virus



> Anti phising


Protect against targeted phishing attacks

Phishing attacks work by the scam artist sending "spoofed" emails that appear to come from a legitimate website that you have online dealings with such as a bank, credit card company or ISP - any site which requires users to have a personal identity or account. The email may ask you to reply with your account details in order to "update security" or for some other reason.

The phishing email may also direct you to a spoofed website or pop-up window which looks exactly like the real site, but has been set up for the sole purpose of stealing personal information. Unsuspecting people are then often fooled into handing over credit card numbers, passwords or other details.

 


> Denial-of-Service Protection (DDoS)





> Quarantine

  • Centralised Quarantine.
  • Improve employee productivity and cut help desk calls with end user self-service.

 

> Management, logging & reporting

  • Role-Based Administration Accounts Per Domain.
  • Comprehensive Configuration Change, activity, event and incident logging and reporting.
  • Easy Data Correlation via SIEM.

 

> Virtual email security

Secure email on virtualised platforms e.g. VMWare / Hyper-V environments.


> Microsoft Office 365 & Google Apps


- Business Email Protection
 
While Office 365 offers basic email security to help with spam and malware, there is a lack of focus and functionality around data loss prevention which is required by enterprises of all sizes today for the protection of information in the cloud.

  • Does not provide a means to quarantine outbound email.
  • Complex customer configurations may make managing policy difficult.
- Secure your investment in cloud based collaboration.

- Extends advanced protection & guaranteed email availability for Office 365, Google Apps for business and other 3rd party cloud platforms.

- Information governance and compliance.

- Enhances Office 365 with Advanced Malware Protection.






> Microsoft Lync / Skype for Business

Retain Microsoft Lync IM conversations and content in a secure, indexed and unified archive.




> Protect social and collaborative content

  • Discover your brand and content across Collaboration and Social Media platforms.
  • Collaboration and Social Media archiving allows organisations to employ policy-based controls to capture social content so that it can be managed as any other critical information asset.
  • Archive and comply with regulatory obligations.
  • Seamlessly integrate social media content into many leading archiving solutions for retention and eDiscovery.


 


> Email archiving


Enterprise Archiving
  • Stores a copy of all incoming, outgoing and internal email in a secure, encrypted repository indefinitely
  • Archive messages, satisfy legal and compliance requirements.
  • You need a third party archiving and eDiscovery solution, as this feature is not inherent within Office 365, but essential for regulatory compliance.
  • Integrates with all other email platforms, to give a single unified archiving and discovery platform (Microsoft Exchange Server and IBM Domino emails, Box and Microsoft SharePoint Server files, instant messages, and unified communications)
  • Removes need for in-house investment and burden on IT for maintaining and growing email archiving
  • Access your archives from Outlook Web Access, the IBM Lotus Notes Web Client, BlackBerry devices
  • Archive and search email, files, IM, and social media communications, and more
  • Folder synchronisation
  • Search, Anytime, Anywhere on Any Device
  • Enforce mailbox quotas with attachment stubbing


Mobile Apps
  • for iPad, iPhone and Android

Role Based Access
  • for enhanced security


PST Import
  • Auto search and import .pst files into and eliminate the need for pst’s

Exchange Stubbing
  • Replaces attachment(s) in Outlook with a secure link to the attachment in the archive



Secure email deployment platforms


Software
Can be delivered as a software solution to sit on customers preferred hardware platform or on a virtual server (VMware).
Hardware 
Offer a range of 'plug-and-play' appliances

Cloud / Managed Service

As a managed service 'in the cloud' on a 'pay as you go' basis







> eDiscovery


  • eDiscovery refers to the process of finding email in the active archive
  • tools that empower users to perform multiple levels of live search for any email or attachment within the archive.





> Email recovery  

Users can instantly recover any email or attachment from the active archive into their desktop inbox without assistance from IT. 





> Email continuity

  • Should be a major piece of a company’s disaster recovery plan.
  • continuous on-demand access to email from any location. In the event of any internal network or server outages, users can access email.

 

> Bandwidth savings

Because filtering takes place in the cloud, neither the antivirus software nor the blocked spam requires a single byte of your bandwidth. 




> Email stationery management and marketing tools


    • Flexible, policy-based signature and legal notice creation and application
    • Corporate branding and imagery management
    • Recipient click tracking capability
    • Micro-site creation and publishing






      Contact us today to discuss your requirements in more detail.



      P: +44(0)7714 209927

      S: +44(0)1273 329753

      info@securenetconsulting.co.uk