Competitive Comparison: Proofpoint Enterprise vs. Google Message Security (Formerly Postini) A Proofpoint White Paper
|
|
|
- Kimberly Newton
- 10 years ago
- Views:
Transcription
1 Competitive Comparison: Proofpoint Enterprise vs. Google Message Security (Formerly Postini) A Proofpoint White Paper Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA P F [email protected]
2 CONTENTS Executive Summary 2 The Evolution of Spam: From Annoyance to Targeted Attacks 2 Security Requirements in Vendor Comparison: Google (Postini) vs. Proofpoint 4 Vendor Overviews 4 Google (Postini) 4 Proofpoint 4 Effective Defenses against Spam, Phishing, Malware, and Other -borne Attacks 4 Comparing Defenses against Phishing Attacks and Other Blended Threats 4 Technical Strengths: Defenses Against Targeted Attacks, Traditional Attacks and Outbound Threats 5 Tools and Organizational Readiness for Responding to Attacks 7 Comparing and Technical Support Expertise 7 Comparing Real-time Analysis Tools 7 Comparing Historical Forensics Tools 8 Securing Outbound Communications: Blocking Spam and Preventing Data Leaks 8 Comparing Protection against Outbound Spam 9 Comparing Protection of Confidential Information (Inbound and Outbound) 9 Comparing Filtering Of Attachments 10 Comparing Encryption Technology 10 Summary: Google vs. Proofpoints Scorecard 10 Conclusion 11 About Proofpoint 11
3 EXECUTIVE SUMMARY is unquestionably the primary form of business communications. Unfortunately, it is also one of the most vulnerable channels for security attacks, data leakage, and fraud. This white paper compares how two security solutions protect organizations from the risks associated with -borne threats: Google Postini Services and Proofpoint Enterprise. In mid-2011, has resurfaced as the biggest focal point for security and compliance risk, as hackers and criminal syndicates are continually evolving their tactics and creating ever more effective, malicious, and costly attacks. Now they are sending highly customized and targeted spear-phishing attacks that include personalized information gained from social networks or data from other breaches. Their success rate? High enough to have compromised the secure keyfob technology at IT security leader RSA and to have purloined millions of addresses from marketing giant Epsilon, whose clients include Best Buy, Citibank, L.L. Bean, and Walgreens. If a security leader was breached, all organizations are at risk. security and compliance products currently in place, especially those from Google, must be re-evaluated to ensure they can effectively protect end users, corporate data, and customer data from these new types of threats. Adequate protection against these targeted attacks includes the ability to uniquely handle phishing messages versus other types of annoying and less dangerous spam. security services must provide zero-day protection and reporting, must automate as much protection as possible, and must leave as little as possible to chance or human error. Google Postini Services were originally developed by a company named Postini, which Google acquired in At the time, Postini was highly rated by analysts as a market leader that introduced regular innovations to its service. But since the acquisition, Google has done little to develop Postini s security technology (now called Google Message Security), so now leave enterprises vulnerable to phishing and spear-phishing attacks. Google s quarantine structure and the workflow end users employ to manage their Junk Folder has not been updated since the acquisition by Google. As a result of this lack of investment, Google quarantines all types of blocked (false positives, newsletters, spam, phishing) into a single Junk Folder accessible through the Message Center. As phishing s use social engineering to appear legitimate, end-users are likely to release the s from their quarantine using either the daily Quarantine Summary or end-user accessible Message Center. This out-dated approach repeatedly exposes users to the wiles of hackers and increases the risk that enterprises will fall prey to security attacks that can result in lost data, lost productivity, damage to brand and reputation and applicable regulatory penalties and fines. Google s out-dated technology further exposes organizations, as their service lacks real-time tools and reporting that security officers need on a daily basis to investigate these attacks. In contrast, Proofpoint Enterprise detects and stops phishing attacks using advanced machine-learning techniques. Furthermore, phishing s are securely kept away from end users in a separate quarantine, that only administrators can view or access. This is an example of how Proofpoint s defenses evolve continuously to identify and stop the latest attacks, providing enterprises with 24/7 protection while also relieving end users of the burden of making critical security decisions that can lead to costly mistakes. Proofpoint s innovative approach also enables security officers to follow a real-time action plan to investigate phishing attacks in case they, a customer, or a company in the same industry is publically notified of a threat. Page 2 THE EVOLUTION OF SPAM: FROM ANNOYANCE TO TARGETED ATTACKS Spam is changing, and enterprises need to take notice. The original definition of spam included bulk mail and described that was more annoying than malicious. Now hackers are using more sophisticated, targeted, and personalized spear-phishing attacks to trick users into opening malicious attachments or clicking on Web links that surreptitiously download malware. That malware, in turn, can shut down IT defenses and create a back-door for hackers to access an enterprise s internal systems. Because of these new attacks, enterprises are losing intellectual property and customer data to hackers. In some cases, even the customers of attacked enterprises are finding themselves under attack. Phishing attacks are effective because they re plausible. That plausibility makes them harder to detect. The s are targeted to end users and contain addresses and subject lines that are relevant to the recipient. A phishing message might appear to be a message from the recipient s bank, requesting that he or she log in to address a security issue or to receive a special offer. Or it might appear as an from a friend or colleague, delivering an unexpected (and rigged) Microsoft Office file as an attachment.
4 Enterprises should assume that they are under attack, and they should continuously examine their stream for instances of spear-phishing. By mid-2011, there have been at least six high-profile and very successful spear-phishing attacks that were publicly announced: Feburary 2011: Spear-phishing attacks gave hackers access to internal systems at the Canadian Finance Ministries; the ministries shut off Internet access in response 1 March 2011: Hackers spear-phish and infiltrate the French Ministry of Finances 2 March 2011: A breach at RSA was the result of spear-phishing attacks on a small group of high-level employees 3 ; as a result of the breach, RSA warned customers of its keyfob security service to be extra careful 4 ; the breached keyfob security service were laterused to hack into defense contractors L-3 Communications and Northrup Grumman 5 April 2011: A spear-phishing attack initiated a data breach at Epsilon, a firm that manages information for over 2,500 businesses; for several months, hackers had access to internal systems, including systems managing lists for brands such as Best Buy, Citibank, Chase, Target, Walgreens, and Verizon 6 June 2011: A breach at the global financial organization International Monetary Fund was triggered by a spear-phishing attack 7 July 2011 and April 2011: Two spear-phishing attacks shut down services and internet access at The Department of Energy s Pacific Northwest National Laboratory and Oak Ridge National Labs 8 These attacks show just how effective spear-phishing can be. When security companies and government agencies fall prey to attacks, one can assume that all enterprises are at risk. The attack on Epsilon alone will likely fuel more successful attacks against enterprises and consumers. Epsilon is one of the world s largest service providers. Breaching Epsilon s IT defenses gave hackers access to the names and addresses of millions of customers of major brands. Hackers can use this information to create believable messages purportedly sent from banks and other trusted organizations. Because addresses are so useful for spear-phishing attacks, hackers are stealing addresses from a wide variety of organizations. In addition to the Epsilon attack, other recent thefts include: February 2011: Hackers steal 400,000 addresses from an Irish job site 9 July 2011: Hackers steal 1.27 Million addresses from the Washington Post 10 July 2011: Hackers steal 90,000 military s 11 Now that hackers and criminal syndicates have access to more addresses than ever before, it s all but certain they ll use this data to unleash new, ever-more-effective phishing attacks. Enterprises need to be ready. They need security solutions that go beyond filtering out ads and viruses. Enterprises must be prepared with an security solution to stop phishing now and in years to come. Let s look at a complete list of enterprise security requirements, including anti-phishing defenses. SECURITY REQUIREMENTS IN 2011 Spam fell in 2011 after police broke up criminal networks responsible for two major botnets (Maripoas in 2010 and Rustock in 2011), but spam volumes alone don t convey the danger inherent in . A few highly targeted, carefully designed attacks can cause much more damage than high volumes of cheesy advertisements. Enterprises must guard against all forms of -borne attacks. security requirements include the following: Ability to defend against a targeted blended threat, including phishing attacks A blended threat is a threat that combines and some other technology, such as a Web page or a YouTube video. Many phishing attacks are blended threats; for example, messages that direct users to click on a link for a bank s Web site. Blended threats can be difficult to detect because they might not contain any spam keywords or malware themselves. To be effective, security needs to be able to detect and stop all these types of threats as soon as they appear. Ability to respond to an attack Comprehensive security solutions deliver more than effective technology. They also provide prompt service around the clock for customers under attack. And they provide tools that administrators and security officers can use to monitor activity in real time in order to resolve problems as quickly as possible. Page 3
5 Ability to defend against outbound threats Inbound threats aren t the only type of threats facing enterprises. Enterprises also have to guard against outbound spam from internal, malware-infected systems. They also need to guard against that leaks confidential data, such as customer records, intellectual property, and confidential data (such as healthcare records) that is protected by industry regulations. Security is not Google s focus I think about our products in three separate categories. First, there is Search in our Ads products, the core driver of revenue for the company. Next, we have products that are employing high consumer success: YouTube, Android and Chrome. Then we have our new products, Google+ in commerce and local. We are investing in them to drive innovation and adoption. - Quote from Larry Page, Google CEO and co-founder Security is Proofpoint s focus Proofpoint continues to lead the market with a focus on security, innovation and customer satisfaction, delivering solutions for security, encryption, data loss prevention and archiving that help organizations reduce costs while making safe, secure, compliant and easier to manage. - Quote from Gary Steele, Proofpoint CEO VENDOR COMPARISON: GOOGLE (POSTINI) VS. PROOFPOINT Now that we ve described the requirements for security in 2011, let s examine how two major vendors in the security market measure up against these requirements. In this paper, we ll compare Google and its Postini services and Proofpoint and its Proofpoint Enterprise services. Vendor Overviews Google (Postini) Google Postini services comprise four SaaS security services for Message Security, Message Continuity, Message Discovery, and Message Discovery (Extended). These services provide a layer of security and compliance services for an enterprise s existing services, such as Microsoft Exchange servers running on premises, or for SaaS services, such as Google s own Gmail service. Google Message Security provides a base level of security common to all four services. It filters inbound for spam and viruses, filters outbound for viruses and content that might violate content rules, and provides support for transport layer and ad-hoc encryption.. Message Continuity and Message Discovery extends Message Security with failover services and archiving, but are not discussed in this white paper. Google Postini services were originally developed by a company called Postini, which was founded in Google bought the company in Since then, Google has done little to develop the services. In a recent earnings call with investors, Google s CEO Larry Page listed three priorities for the company, and enterprise IT (including enterprise IT services) wasn t one of them. 12 Proofpoint Proofpoint provides SaaS and on-premises solutions for security and compliance, including inbound security, outbound security and data loss prevention, privacy protection, encryption, archiving, and ediscovery. The company was founded in 2002 by Eric Hahn, the former CTO of Netscape, and now provides security and archiving solutions for enterprises around the world. Proofpoint Enterprise, the company s security and compliance solution, provides anti-spam, anti-virus, antiphish detection, policy enforcement, message tracing and encryption for both inbound and outbound . Proofpoint Enterprise uses Proofpoint MLX machine learning technology to detect new forms of -borne threats as soon as they appear. Proofpoint Enterprise also filters outbound messages for spam and provides data loss prevention and native encryption to protect confidential and sensitive data. Proofpoint Enterprise is available as a SaaS service, an on-premises physical or virtual appliance, or a hybrid configuration combining SaaS and on-premises services. Effective Defenses against Spam, Phishing, Malware, and Other -borne Attacks Google s spam filtering forces end users to make split-second security decisions againts targeted and malicious messages twice - first through their Quarantine Summary and second within their Junk Folder accessible through the Message Center. Comparing Defenses against Phishing Attacks and Other Blended Threats Bottom Line: Google s outdated Bulk category filters leaves end users and corporate data vulnerable. End users are required to make a split-second security decision by manually performing the filtering that Google ignores. Proofpoint performs the security decision and alleviates this burden from end-users. Page 4
6 Since Google acquired Postini in 2007, Google has not made any improvements to the core Postini antispam service. Despite the variety and sophistication of new attacks, such as phishing, Google still characterizes all threats and spam as Bulk Mail, which it divides into four categories: Sexually Explicit ( sexually-oriented messages ) Get Rich Quick ( money-making offers ) Special Offers ( too-good-to-be-true offers ) Racially Insensitive ( hate-oriented topics ) For each category, administrators can select a level of enforcement from completely lenient (turning filtering for that category off) to aggressive. This coarse handling of incoming turns out to be dangerous. The Google solutions mixes bulk such as legitimate newsletters with spam, such as ads, and threats, such as phishing attacks. To sort the good from the bad, users end up sorting through their Quarantine Summaries and their Junk Folders daily, making split-second decision about which messages to open. A phishing attack with a legitimatesounding subject line is likely to be pass muster with end users and be opened. The anti-spam defenses themselves make no critical judgment about phishing and pass this increasingly critical screening work and security decision off to end users themselves. Proofpoint Enterprise, in contrast, automatically detects phishing messages and quarantines them in a folder accessible only to administrators. If administrators choose, users can still have the ability to review other, less malicious forms of spam in quarantine folders, such as bulk and with adult content. (In the Proofpoint solution, all quarantine workflows are configurable by the administrators.) The recent security breach at RSA happened because an end user released a dangerous message from their Junk Folder, and then clicked on a Microsoft Excel attachment titled 2011 Recruitment plan. 13 The breach became serious enough that some part of the proprietary security technology behind RSA s SecurID keyfobs may have been compromised. 14 (For more information about how Proofpoint granularly detects spam and threats, including phishing attacks, see the white paper Proofpoint MLX: Machine Learning to Beat Spam Today and Tomorrow.) Question to ask Google: How does your filtering technology handle targeted attacks, such as phishing? Are you comfortable putting the security decision in the hands of end-users? Technical Strengths: Defenses Against Targeted Attacks, Traditional Attacks and Outbound Threats Varied threats require varied defenses, whether the threat is a new inbound threat, a traditional inbound threat, or a bi-directional threat. Proofpoint Enterprise offers a number of features that are not available Page 5
7 from Google. As the matrix below shows, Proofpoint Enterprise is a more complete security and compliance platform with better defenses against new, highly targeted attacks, traditional spam and virus attacks, and other types of inbound and outbound threats. Proofpoint also supports better administrative and self-service tools, as well as comprehensive SLAs to ensure industry-leading effectiveness. Technical Comparison between Google Message Security and Proofpoint Enterprise Defenses Against Targeted Attacks (Phishing) Google Proofpoint Granular and configurable policies for phishing messages Separate quarantine for phishing messages Real-time notification and alerting of phishing messages Automated delivery of reports for phishing messages Defenses Against Traditional Threats (Spam and Virus) Google Proofpoint Separate policies for spam, virus, bulk, and adult Partial Separate quarantine for spam, virus, bulk, and adult 99% spam effectiveness and 1:350,000 false positive SLA 100% anti-virus SLA Reputation-based spam detection connection throttling and termination Machine learning technology for accurate content analysis Zero-Hour Anti-Virus detection for zero-day protection Defenses Against Other Threats Google Proofpoint Outbound spam detection Partial Policy-based encryption Partial Content filtering within Office 2007, Office 2010, and PDF attachments Pre-configured compliance policies for SSNs and all CCs Partial Pre-configured compliance policies for HIPAA, GLBA, PCI Smart Identifiers algorithmic checks of structured data Managed Dictionaries pre-defined and updated libraries Advanced proximity and correlation analysis Content rules based on regular expressions Document fingerprinting for protecting digital assets Flexible encrypted message delivery (including mobile devices) End-user triggered encryption for sensitive data Per-message encryption keys DLP incident dashboard for administrative remediation Management and Reporting Google Proofpoint Zero-hour message tracing, with ability to find phishing messages Zero-day reporting, with summary of phishing messages Automated publishing, scheduling, and delivery of reports DLP Dashboard consolidated view of compliance activity End User Controls Google Proofpoint Self-remediation for outbound spam and DLP violations End-user revocation controls for encrypted messages Streamlined reporting and auditing of spam messages Deployment Options Google Proofpoint Public cloud Hybrid deployment options Dedicated instances for segregation of data and downtime Page 6
8 Tools and Organizational Readiness for Responding to Attacks Bottom Line: Google lacks the expertise and tools to investigate threats such as phishing. attacks never stop. Spammers and hackers have declared war on governments and the world s largest corporations, healthcare organizations, and financial institutions. Their primary attack vector is . Enterprises must be prepared to withstand these attacks. Every enterprise should have a preparedness checklist or action plan in place for responding to attacks and minimizing their damage. The action plan should identify who to contact for technical support and which tools to use to investigate attacks and phishing messages in real time. The plan should also include historical reports of past attacks to help administrators analyze new phishing attacks as quickly as possible. Administrators should also have the flexibility to tune or customize the phishing policy depending on the threat level. For example, enterprises might want their security solution to take different actions based on the probability that a message constitutes an attack (e.g. delete obvious phish, quarantine and review probable phish). As the next section will make clear, Google Postini services fall short in these key areas. Google leaves administrators and their enterprises without the tools they need to mount the most effective defenses when they re under attack. Comparing and Technical Support Expertise Bottom Line: security vendors must be experts in security and attack patterns in order to help enterprises under attack. Google falls short in this area. When an attack occurs, whether the attack is directed at one s own organization or another organization in the same industry, the first step in any corporate action plan should be to engage the enterprise s security vendor for assistance. In the case of Google, this typically means relying on self-service tools such as public forums and FAQs not a satisfactory response for most organizations during an emergency. Reaching a live support engineer at Google won t necessarily make things better. Former Google customers, along with numerous posts on their forums, report having encountered Google support engineers with only limited and product expertise. These customers also report that the quality of Google s support services has declined over time. This isn t surprising, since Google acquired Postini four years ago, and many of the original engineers have been reassigned or have left the company. Today, security and compliance accounts for less than 1% of Google s total revenue. As Google s CEO Larry Page recently pointed out in an earnings call, Google is focused on advertising, consumer applications, and new products such as Google+, not enterprise IT. 15 Proofpoint has been focused on security since the company was founded in Recognizing that is the most common vector for IT security attacks, Proofpoint ensures that its support engineers, product engineers, and threat analysts are ready to help customers who come under attack or who require any kind of help with security planning. Third-party organizations and industry analysts have praised Proofpoint s support services for their knowledge and responsiveness. Question to ask Google: Who do I telephone for help me when my company is under attack? What is your SLA for support responsiveness? Message Log Search data is available within approximately 3 hours of message processing (sent or delivered through the message security service)... - Text from Google Message Security Administration Guide Page 7 Comparing Real-time Analysis Tools Bottom Line: Google is missing zero-hour message tracing and zero-day reporting so it cannot help administrators and security officers investigate attacks when they occur. In contrast, Proofpoint provides detailed real-time reporting. Self-service tools can be used by security officers and administrators to investigate attacks as they occur or to show management the value and effectiveness of the security and compliance solution. However, some of Google s largest customers are reporting that the self-service tools included with the Google Postini service are extremely deficient, and do not provide real-time information that is useful to their customers when they need it most, such as during an attack. Message tracing, sometimes referred to as log searching, is a tool administrators use to track the messages that flow through an security service. Google s message tracing tool, called Message Log
9 Report data is based on data from the previous day. The report shown is the latest report available. Generally reports for the previous day are available around noon (or earlier) Pacific Time the next day. The exact time of availability fluctuates with quantity of traffic processed. - Text from Google Message Security Administration Guide Search does not allow administrators to search logs in real-time. Instead, weakness in the underlying architecture means that s remain invisible to Log Search for three hours, leaving administrators blind during attacks. A three-hour delay can be the difference between an effective defense and a disastrous data breach. (Imagine giving hackers who have installed a rootkit three hours of unfettered access to file servers.) Google also fails to provide real-time reporting, so administrators cannot produce detailed reports for upper management and security teams when attacks are taking place. Such reports are available only after 24 hours a full day after an attack has begun. This is too late for some forms of targeted attacks, as the phishing s that targeted RSA happened over the course of two days. 16 Proofpoint supports real-time investigation into attacks and real-time reporting. Proofpoint s Smart Search functionality consolidates logs as they pass through the service, so that SaaS subscribers have the immediate reporting typically found only in on-premises solutions. Proofpoint also enables administrators to publish reports each morning that show the attack patterns of the previous day; these daily reports enable administrators to fine-tune defenses and plan effectively for the future. Question to ask Google: How will I know when we are being targeted by phishing attack? How can I investigate this in real-time? Comparing Historical Forensics Tools Bottom Line: Google lacks a specific report for phishing messages and is unable to streamline delivery of reports, so security officers are left unaware of the danger or threat level to their organization. Google also lacks tools to perform historical forensics, such as publishing a report on the number of phishing messages during a specific period of time. Administrators are not able to run historical reports that will help determine or assess the risk of an attack, or if phishing attacks have been ongoing over a long period of time. For example, if another company within in the same industry has announced that they have been breached and that the attack has been occurring for the last month (such as the breach at Epsilon), an enterprise will want to assess its own risk level. A natural first step would be to examine the types of attacks that have been recently detected. Not counting Blatant Spam, a report from Google will show 98% of threats as Bulk Mail. It won t distinguish phishing attacks from other types of spam, leaving administrators with no visibility into the precise types of attacks being waged against their infrastructure. Google Report: Inbound Spam by Filter Name (Inbound) - From to (42 Days) Filter Name Spam Special Offers 0 Bulk Mail 2,931,012 Get Rich Quick 0 Sexually Explicit 5,409 Blocked Senders 42,897 Blocked Servers 2,452 Racially Insensitive 0 Blatant Spam Blocked 6,398,793 Grand Total 9,380,563 Figure 3: Google s spam filter report does not show the number of phishing messages. In contrast, Proofpoint provides tools for organizations to view the number of phishing messages captured by the service, whether it is over the last month or the last 24 hours. Proofpoint also supports automated reporting, so administrators are able to schedule or publish report deliver and view the reports on a daily basis within their inbox. Question to ask Google: Can I receive an automated report for -borne threats? Securing Outbound Communications: Blocking Spam and Preventing Data Leaks Bottom Line: Google has limited features that address outbound threats, whether it is spam or leakage of confidential data. security and compliance services should be able to address both inbound threats (such as phishing) and outbound threats (such as spam or leakage of confidential data). They should also offer flexible de- Page 8
10 ployment options so that customers have the option to deploy outbound threat protection closer to their network if they so choose. Comparing Protection against Outbound Spam Bottom Line: Failure to accurately detect outbound spam will ruin your organizations brand and could stop delivery of legitimate . Outbound spam spam sent inadvertently by an enterprise s employees, spam sent from compromised systems within the enterprise, or spam sent from compromised accounts at universities can seriously damage a company or university reputation. Once servers across the Internet identify the organization as a source of spam, they may block or drop legitimate from the organization, disrupting business communications and cutting the organization off from its customers and partners. Up until 2011, Google did not support outbound spam detection. Google recently provided an update to support outbound spam detection, but does not allow administrators to configure the outbound spam-filtering settings. This inflexibility could end up disrupting legitimate business communications, as Google s aggressive Bulk Mail filters may block business communications to an enterprise s customers or partners. Google also does not support proper self-remediation tools for end users, so end-users are forced to call on IT to troubleshoot issues with outbound mail that has been flagged as spam. Proofpoint does detect outbound spam. Applying its robust, patent-pending machine-learning technology that evaluates hundreds of thousands of message attributes, Proofpoint several years ago became the first vendor that was able to accurately detect outbound spam. Proofpoint s outbound spam detection was a key reason why one of the largest publishers in the United States and some of the largest universities have switched from Google to Proofpoint. In 2011, Proofpoint also added Smart Send, which provides users with the ability to self-remediate outbound messages that have flagged as spam or possibly violating compliance policies. This functionality streamlines business communications and takes the burden off IT staff to investigate delivery issues. Comparing Protection of Confidential Information (Inbound and Outbound) Bottom Line: Limited compliance policies will leave your organization at risk of data leakage that result in fines, penalties, and a damaged brand. To ensure compliance with industry regulations such as HIPAA and PCI-DSS, and to protect against data leaks that transmit confidential data to unauthorized parties, security solutions should include advanced policies for accurately detecting and protecting confidential data. The next sections examine the effectiveness of Google s compliance policies and the limitations associated when encryption is an OEM from a third party and then describes the benefits of native encryption technology. Google Postini Services come pre-configured with only two pre-built compliance rules, and Google offers encryption only through an OEM relationship. Google s two basic compliances rules also have surprising limitations that can leave customers vulnerable to data leakage and fines. It is unclear whether these rules are actively maintained by Google. What is clear, however, is that these rules were introduced in November of and since then, there have been no other updates or additions to the policies that are provided by Google. Google customers who fail to update and maintain these policies leave themselves vulnerable to data leaks and regulatory fines. For example, the Social Security Administration changed its SSN issuance rules in July 2011, but Google s Social Security Numbers compliance policies do not support the new SSN formats. Google customers may inadvertently leak data with new SSNs if they rely on Google s default policies. Google s other compliance policy for credit card numbers also has a severe limitation that can result in data leakage, as the policy cannot detect 15-digit account numbers, such as those used by American Express or Diner s Club. These credit cards are common in industries such as finance, retail, and hospitality. Google s credit card policy also does not perform the Luhn algorithm check, so is prone to high false positive rates. Unlike Google Postini Services, Proofpoint Enterprise offers advanced social security and credit card policies, its policies are more up-to-date, supports the latest SSN formats, supports 15-digit account numbers and performs the Luhn algorithm check. Proofpoint Enterprise also comes pre-configured with more advanced policies that support regulatory compliance, such as a pre-configured HIPAA policy using medical dictionaries and medical record number lexicons. Proofpoint s policies combine Smart Identifiers and Managed Dictionaries with proximity detection to provide the most accurate identification of messages that violate compliance policies. Google s limited compliance policies give administrators and compliance officers a false sense of security, because confidential and private data can leave enterprise networks undetected. To make things Page 9
11 worse, there are also other limitations to Google s filtering technology that can result in data leakage, as we ll see below. Question to ask Google: How can my organization prevent confidential data from leaving my network if I am required to create policies for regulations, such as HIPAA or PCI-DSS? Content Manager does not scan attachments that are: ZIP or other types of compressed files Microsoft 2007 Office documents Over 100 MB PDF files - Text from Google Message Security Administration Guide Comparing Filtering Of Attachments Bottom Line: Limited attachment filtering will leave your organization at risk of data leakage that result in fines, penalties, and a damaged brand. Google s content-filtering technology, called Content Manager, is used for both outbound and inbound s for compliance. Unfortunately, it s outdated. The technology supports only cursory scanning of the attachments most commonly used by businesses and end users. Even now, according to Google s online help pages, Content Manager filters only Office 2003 files, not Microsoft Office 2007, Microsoft Office 2010, compressed files, or PDF files, even though these files are ubiquitous in business today. Because these files are ignored, enterprise compliance policies end up being only partially enforced. In fact, Google s content manager policies trigger only when rules match the text included in an message. They don t trigger when sensitive data, such as social security numbers or credit card numbers (or keywords from other manually created content rules), appears in attachments. In an age of increasing regulation, these glaring gaps in content-filtering leave enterprises vulnerable to compliance violations, costly penalties, and lost business. Proofpoint s content-filtering provides much more thorough coverage than Google does, detecting keywords in a broad range of attachments and minimizing the risk of compliance violations. Proofpoint supports scanning and filtering of document types that Google ignores, including Office 2007, Office 2010, compressed files, and Adobe PDF files. Enterprises can be confident that Proofpoint Enterprise is monitoring and protecting all their communications, not just their communications that involve a subset of file types available in Question to ask Google: How can my organization prevent confidential data from leaving my network if they are contained within a Microsoft Office 2007 document? Comparing Encryption Technology Bottom Line: Native and tightly integrated technology for encryption simplifies management and lowers total cost of ownership. encryption solutions can protect sensitive and confidential data during transmission and at rest. Common examples include encrypting a doctor s correspondence with a patient or a business partner, or a loan officer s correspondence with a client or business. encryption and decryption should be quick and easy regardless of the device used, whether it is a desktop, a laptop, or even a mobile device. Google uses encryption technology from Zix, so their security and compliance solution is a separate solution than their encryption solution, with two separate interfaces. This creates challenges for administrators when they try to configure or troubleshoot encryption. For example, in order for an administrator to track the status of an encrypted message, he or she would first need to wait three hours before using Google s Log Search functionality. Then they would need to log into a separate interface provided by Zix to further troubleshoot the message. Quite possibly they would need to contact two different support organizations. Proofpoint s encryption technology is tightly integrated with Proofpoint Enterprise and enables end-users by providing one-click access to encrypted s from any mobile device. Compliance officers have access to a compliance dashboard that provides a view of activity and sensitive information leaving through . Administrators also have access to tools on a single user interface that can be easily used to search for and troubleshoot encrypted s from a single interface, saving time and money. Question to ask Google: How much control do you have over the technology used by your encryption services? Page 10
12 Summary: Google vs. Proofpoint Scorecard The table below summarizes the capabilities of Google s Message Security services and Proofpoint Enterprise according to the security categories outlined earlier in this paper. Security Requirement #1 Adequate defenses against attacks Google Proofpoint Unique handling of targeted phishing attacks Flexible, policy-based responses to attacks Security Requirement #2 Ability to respond to an attack Google Proofpoint Expertise in enterprise security and technical support Tools for real-time analysis and historical forensics Security Requirement #3 Effective protection from other threats Google Proofpoint Configurable protection for outbound spam, with end-user remediation Protection of confidential data (inbound and outbound) Ability to defend against a targeted blended threat, including phishing attacks Google puts end users on the front line of defenses against phishing attacks. End users, rather than automated defenses, are expected to make the security decision and distinguish between malicious phishing messages and legitimate . Proofpoint Enterprise applies 24/7 defense monitoring and machine-learning to detect and stop all kinds of -borne. Proofpoint gives administrators more fine-grained controls over security, while reducing their security risks and workloads. Ability to respond to an attack Google does not have the necessary support coverage or investigative tools to aid their customers if and when they are attacked. Without adequate zero-hour or zero-day tools to investigate attacks, administrators are not able to investigate attacks in real-time, such as when they are notified that companies in their sector have been breached or targeted. Proofpoint gives administrators and security teams access to real-time and historical reporting, along with fine-grained policy controls for fine-tuning responses to threats and possible threats. Proofpoint support teams and threat analysts are experts in their fields and always just a phone call away from Proofpoint customers. Ability to defend against outbound threats Google does provide configurable protection for outbound spam, and does not include end-user remediation tools to ensure business communications. Google also does not provide adequate protection against the outbound leakage of confidential data. In contrast, Proofpoint provides leading-edge DLP capabilities that enable enterprises to guard their confidential data and their reputations. CONCLUSION More than five years ago, Postini was one of the first cloud-based security platforms. After the acquisition by Google a company focused on advertising and consumers more than enterprise software and security product innovation has come to a halt, leaving Google customers vulnerable to targeted attacks and data leakage. It seems unlikely that Google can turn things around, given that they are starting to integrate the features from Postini onto the Google Apps infrastructure. Momentum has been lost, leaving users and corporate data vulnerable to spear-phishing and other new forms of -borne attacks. Not surprisingly, many customers are seeking alternatives. Having grown disillusioned with Google Postini services, some of the nation s largest corporations are switching to Proofpoint Enterprise to meet their security and compliance requirements. Since it was founded in 2002, Proofpoint has remained focused on security and compliance. Unlike Google, Proofpoint continues to innovate, introducing new features and products, especially around threat detection of targeted attacks (such as phishing and spear-phishing), security and compliance, and encryption. Proofpoint s roster of major enterprise customers which includes industry leaders in finance, healthcare, manufacturing, and retail, as well as major government agencies testifies to the success and viability of Proofpoint s technology and services. Page 11
13 ABOUT PROOFPOINT Proofpoint focuses exclusively on the art and science of cloud-based security, ediscovery and compliance solutions. Organizations around the world depend on Proofpoint s dedication, expertise, patented technologies and on-demand delivery system to protect against spam and viruses, safeguard privacy, encrypt sensitive information, and archive messages for easier management and discovery. Proofpoint s enterprise solutions mitigate the challenges and amplify the benefits of enterprise messaging. Learn more at RSA Secure IDs Hacked; What To Do, Riva Richmond, New York Times, March 18, 2011, Link: 10 Link: 11 Link: 12 Google has 3 priorities, and enterprise IT isn t one of them, Jon Brodkin, Network World, July 15, 2011, 13 Article from that states The was crafted well enough to trick one of the employees to retrieve it from their Junk mail folder, and open the attached excel file Link: Article from that states The attacker in this case sent two different phishing s over a two-day period Page 12
14 US Worldwide Headquarters Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA United States Tel US Federal Office Proofpoint, Inc Coppermine Road Suite 203 Herndon, VA United States Tel Asia Pacific Proofpoint APAC Suntec Tower 2, 9 Temasek Boulevard, 31F Singapore Tel EMEA Proofpoint, Ltd. 200 Brook Drive Green Park Reading, UK RG2 6UB Tel +44 (0) Japan Proofpoint Japan K.K. BUREX Kojimachi Kojimachi 3-5-2, Chiyoda-ku Tokyo, Japan Tel Canada Proofpoint Canada 210 King Street East, Suite 300 Toronto, Ontario, M5A 1J7 Canada Tel Mexico Proofpoint Mexico Salaverry 1199 Col. Zacatenco CP México D.F. Tel: Proofpoint focuses exclusively on the art and science of cloud-based security, ediscovery and compliance solutions. Organizations around the world depend on Proofpoint s expertise, patented technologies and on-demand delivery system to protect against spam and viruses, safeguard privacy, encrypt sensitive information, and archive messages for easier management and discovery. Proofpoint s enterprise solutions mitigate the challenges and amplify the benefits of enterprise messaging Proofpoint, Inc. Proofpoint and Proofpoint Enterprise Archive are trademarks or registered trademarks of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 09/11 Rev A
Proofpoint Enterprise vs. McAfee Email Gateway (Formerly IronMail from CipherTrust and Secure Mail from Secure Computing)
Proofpoint Enterprise vs. McAfee Email Gateway (Formerly IronMail from CipherTrust and Secure Mail from Secure Computing) Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 P 408 517 4710 F 408 517 4711
The New Phishing Threat: Phishing Attacks. A Proofpoint White Paper. A Proofpoint White Paper
The New Phishing Threat: Phishing Attacks A Proofpoint White Paper A Proofpoint White Paper Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 P 408 517 4710 F 408 517 4711 [email protected] www.proofpoint.com
Spam 2011: Protection Against Evolving Threats A Proofpoint White Paper
Spam 2011: Protection Against Evolving Threats A Proofpoint White Paper Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 P 408 517 4710 F 408 517 4711 [email protected] www.proofpoint.com The very
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
Defending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW
WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked
Technology Blueprint. Protect Your Email. Get strong security despite increasing email volumes, threats, and green requirements
Technology Blueprint Protect Your Email Get strong security despite increasing email volumes, threats, and green requirements LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
What security and compliance challenges exist with the move to Microsoft Office 365?
PROOFPOINT FOR OFFICE 365: ENABLES ADVANCED SECURITY AND COMPLIANCE FOR YOUR ENTERPRISE UNDERSTAND THE SOLUTION BY ROLE: IT & SECURITY What security and compliance challenges exist with the move to Microsoft
A Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
WEBSENSE TRITON SOLUTIONS
WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
Managing PHI in the Cloud Best Practices
Managing PHI in the Cloud Best Practices Executive Whitepaper Recent advances in both Cloud services and Data Loss Prevention (DLP) technology have substantially improved the ability of healthcare organizations
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
2012 North American Email Content Security Product Differentiation Excellence Award
2012 2012 North American Email Content Security Product Differentiation Excellence Award 2012 Frost & Sullivan 1 We Accelerate Growth Product Differentiation Excellence Award Email Content Security North
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
anomaly, thus reported to our central servers.
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1
Reviewer s Guide PureMessage for Windows/Exchange Product tour 1 REVIEWER S GUIDE: SOPHOS PUREMESSAGE FOR LOTUS DOMINO WELCOME Welcome to the reviewer s guide for Sophos PureMessage for Lotus Domino, one
In-House Vs. Hosted Email Security. 10 Reasons Why Your Email is More Secure in a Hosted Environment
In-House Vs. Hosted Email Security 10 Reasons Why Your Email is More Secure in a Hosted Environment Introduction Software as a Service (SaaS) has quickly become the standard delivery model for critical
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description
UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe
INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered
Outbound Email Security and Content Compliance in Today s Enterprise, 2005
Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,
Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
Email Compliance in 5 Steps
Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Email security Cloud vs. On-premise solutions
GFI White Paper Email security Cloud vs. On-premise solutions Choosing whether to put your email security in the cloud or host it on premise is a major decision. Hopefully this white paper will help. Contents
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide
Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide. Four steps for success Implementing a Data Loss Prevention solution to address PCI requirements may be broken into four key
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
10 Building Blocks for Securing File Data
hite Paper 10 Building Blocks for Securing File Data Introduction Securing file data has never been more important or more challenging for organizations. Files dominate the data center, with analyst firm
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
Deploying DLP and Encryption
case study Deploying DLP and Encryption in Financial, Government, Healthcare, and Insurance Verticals Proven DLP Results in the Banking Industry 1 A company with two hundred distributed offices which offers
HIPAA DATA SECURITY & PRIVACY COMPLIANCE
HIPAA DATA SECURITY & PRIVACY COMPLIANCE This paper explores how isheriff Cloud Security enables organizations to meet HIPAA compliance requirements with technology and real-time data identification. Learn
Top 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE Contents How to Buy Cloud-to-Cloud Backup...................... 4 Wait What is Cloud-to-Cloud Backup?.....................
Securing Microsoft Office 365
Securing Microsoft Office 365 Critical Information Protection for Hosted Email Services Microsoft Office 365 has captured the corporate imagination, but can you be sure that its security features are delivering
Websense Data Security Solutions
Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting
Trend Micro Healthcare Compliance Solutions
How Trend Micro s innovative security solutions help healthcare organizations address risk and compliance challenges WHITE Worry-Free Business Security Fast, effective, and simple protection against viruses
Email Archiving: To SaaS or not to SaaS?
Proofpoint Email Archiving Whitepaper: A look at the pros and cons of Software-as-a- Service and how they apply to email archiving Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 P 408 517 4710 F 408
Features and benefits guide for partners and their customers
and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.
STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński 1 Agenda Spear-Fishing the new CEO Fear How to Fight Spear-Fishing It s All About the Data Evolution of the bad guys
What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails
2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed
Best Practices for DLP Implementation in Healthcare Organizations
Best Practices for DLP Implementation in Healthcare Organizations Healthcare organizations should follow 4 key stages when deploying data loss prevention solutions: 1) Understand Regulations and Technology
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Email Router and Vetting G-Cloud Service Definition
Email Router and Vetting G-Cloud Service Definition 2013 General Dynamics Information Technology. All rights reserved 1 In partnership with Government and industry-leading technology partners, General
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
