Securing Microsoft Office 365



Similar documents
Top 10 Features: Clearswift SECURE Gateway

Critical Information Protection & Security Questions for the Board to ask. January 2016

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Clearswift SECURE Gateways

Clearswift Adaptive Redaction

ARgon: The Foundation of an Adaptive Data Loss Prevention Strategy

Has the enforcer become the enabler?

SECURE Web Gateway Sizing Guide

Clearswift SECURE Gateways

management solutions

Cloud Services. Cloud Control Panel. Admin Guide

Clearswift SECURE Gateways

Clearswift SECURE File Gateway

Securing your critical information with Clearswift. Product & Solution Overview

Policy Based Encryption Gateway. Administration Guide

Cloud Services. Anti-Spam. Admin Guide

MIMEsweeper for SMTP

A NATURAL FIT. Microsoft Office 365 TM and Zix TM Encryption. By ZixCorp

Mailwall Remote Features Tour Datasheet

Policy Based Encryption Gateway. Administration Guide

Stop Spam. Save Time.

W H I T E PA P E R. Providing Encryption at the Internal Desktop

Powerful and reliable virus and spam protection for your GMS installation

White paper. Why Encrypt? Securing without compromising communications

Evaluation Guide. eprism Messaging Security Suite V8.200

eprism Security Appliance 6.0 Release Notes What's New in 6.0

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Quick Reference. Administrator Guide

Migration Project Plan for Cisco Cloud Security

Service Schedule for Business Lite powered by Microsoft Office 365

Frequently Asked Questions

Policy Based Encryption Z. Administrator Guide

Selecting Your Essential Cloud Services

Table of Contents. Chairman s Foreword 4. Clearswift at a Glance 5. CEO Review 6. From Product to the Clearswift Aneesya Platform 8

Securing enterprise collaboration through and file sharing on a unified platform

Mimecast Security

Secure Inside the Corporate Network: INDEX 1 INTRODUCTION 2. Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR DESKTOP ENCRYPTION 3

Trend Micro Hosted Security Stop Spam. Save Time.

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

Service Schedule for BT Business Lite Web Hosting and Business Lite powered by Microsoft Office 365

Configuration Information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Quick Heal Exchange Protection 4.0

Deploying Layered Security. What is Layered Security?

Next Generation Data Loss Prevention

Data Protection. Administrator Guide

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Technology Blueprint. Protecting Intellectual Property in . Guarding against information-stealing malware and outbound data loss

Websense Security Transition Guide

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

T E C H N I C A L S A L E S S O L U T I O N

Secure User Guide

anomaly, thus reported to our central servers.

Better protection for customers, and recurring revenue for you!

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.

Mod 08: Exchange Online FOPE

AVG AntiVirus. How does this benefit you?

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

Finding Security in the Cloud

Exchange Online Protection In-Depth

WEBSENSE SECURITY SOLUTIONS OVERVIEW

SAFEGUARD HOSTEDMAIL. Trust the innovator to simplify cloud security

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version /12/13. Product Information. Version & Platform SGOS 6.

Simple security is better security Or: How complexity became the biggest security threat

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

IBM Express Managed Security Services for Security. Anti-Spam Administrator s Guide. Version 5.32

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

MAILGUARD LIVE. Continuity. Trust the innovator to simplify cloud security

Cloud App Security. Tiberio Molino Sales Engineer

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Securing enterprise collaboration through and file sharing on a unified platform

Microsoft Exchange 2003

Trend Micro Encryption (TMEE) Delivering Secure . Veli-Pekka Kusmin Pre-Sales Engineer

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Security. Titus White Paper

- CIO/Technology Director

Symantec Protection Suite Add-On for Hosted and Web Security

Image Control. Administrator Guide

How To Protect From The Internet With Mailmarshal Smt And Mailmper For Exchange

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.

Avira Managed Security AMES FAQ.

TRITON APX. Websense TRITON APX

Security Solutions

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Four reasons to upgrade from MIMEsweeper for SMTP to the Clearswift SECURE Gateway

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.5

ExchangeDefender. Understanding the tool that can save and secure your business

Secure Your with Encryption as a Service

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Web Protection for Your Business, Customers and Data

Selecting Your Essential Cloud Services

How To Secure Mail Delivery

Transcription:

Securing Microsoft Office 365 Critical Information Protection for Hosted Email Services Microsoft Office 365 has captured the corporate imagination, but can you be sure that its security features are delivering on the content scanning front?

Table of Contents Securing Microsoft Office 365 3 Critical Information in the Cloud 4 How Office 365 security stacks up 4 It s all about content 5 A zero compromise enterprise 5 The adaptive enhancement to Office 365 security 6 Integrating Office 365 and Clearswift SECURE Email Gateway Deployment options 7

Securing Microsoft Office 365 Microsoft Office 365 has captured the corporate imagination, but can you be sure that its security features are delivering on the content scanning front? If you have already implemented Microsoft s Office 365, your organization has Microsoft Office 365 bought into the benefits of a comprehensive collaborative software and communications suite. And you may be satisfied by Microsoft s assertions that Office 365 addresses security at every level of the stack. Certainly at the time of its release in 2011, its attention to detail made headlines. However, that was in 2011. And since then there have been myriad legislations passed in regards to sensitive data handling and repercussions of non compliance and subsequent breaches. Not to mention the accompanying non legislated reputational damage that such a breach often leads to. Also, since 2011 the use of email has grown exponentially, becoming the primary business collaboration tool, where organizations need to ensure that the content and information they send and receive is both appropriate and permitted to enter or leave the organization. 4

Critical Information in the Cloud Cloud suites and applications continue to cause concern for IT security professionals who see them as a potential catalyst for end users to operate beyond the jurisdiction of the IT department. Within an independent survey, research consultancy Loudhouse asked IT decision makers about their worries about internal security threats. The cross-sector response was consistent: More than 50% said the use of cloud applications beyond the IT department s control was a concern, and more than 10% said it had already, directly or indirectly, caused a security breach in their organization. How Office 365 security stacks up If you are an Office 365 customer, you are automatically protected by a anti-virus and anti-spam service. The level of protection depends on the package. While it comes with all the benefits of a hosted service with financially-backed SLAs, there are some concerns. There can be a delay in the application of outbound mail policy changes that you make to the service Does not provide a means to quarantine outbound email; only reject, sender release override or redirect to administrator Can only block file types (by signature)if they are executable Limited number of notification options (sender, recipient or admin) No re-use of existing lists (profanities, expressions) 50% No means to duplicate rules, forcing new rules to be created from scratch with different rule criteria (e.g. sender or recipient or violation action) Complex customer configurations may make managing policy difficult Spam policy appears to only have a single default setting, so enabling the source and language settings could be disastrous in a multinational organization More than 50% said the use of cloud applications beyond the IT department s control was a concern Unable to define new custom file format types (by signature) Unhelpful or misleading error messages Reporting is poor with either reports failing to be generated or timed out

It s all about content Email is considered the second most common source of data leakage after removable storage. Forrester estimates that one in five emails contains data that presents a legal, financial or regulatory risk. You need to be sure that your security tools will scan deep into the message and any attachments identify any critical information before it leaves the business. Office 365 is good for dealing with spam and malware and does offer organizations the basic email security, such as tools to deal with regulatory control through archiving and basic encryption. Template rule sets are provided to get you started with policies, but these typically do not provide the deep content inspection required to remain secure as an organization and may also be subject to additional charges. A zero compromise enterprise Through implementing Clearswift technologies, in conjunction with the benefits provided by your Office 365 implementation, you will have the missing piece of the security structure you ultimately require. And, with the additional benefit of Adaptive Redaction you can be sure that your organization critical information remains secure within the Office 365 framework in the knowledge your organization won t have to compromise collaboration for security. The Clearswift SECURE Email Gateway covers these bases comprehensively. Its Deep Content Inspection engine deals with message headers, senders and recipients, subject lines, message bodies, attachments and contents, document headers and footers, and even meta data accompanying documents. This maximizes the chances of capturing sensitive content such as credit card numbers and banking codes, confidentiality clauses and profanity, as well as customer-defined and regular expressions, and Boolean and positional operator-based expressions. The adaptive enhancement to Office 365 security If you are an Office 365 for Enterprise Customer, and concerned about the security of your organization s critical information or sensitive data that exists within this environment, it would make sense to introduce the adaptive data loss prevention technology, only available from Clearswift: Granular policy rules from senders, recipients, domains and departments Full and partial document fingerprinting Adaptive Redaction functionality* Data redaction of Word, Excel, Powerpoint, PDF files and email messages to remove sensitive data Document sanitization (including Tracking and Property removal) Structural sanitization of documents to remove active content and other potentially malicious components from files such as APTs Policy-based encryption using PGP, S/MIME, Password and Portal A simple configuration of rules for different users and groups policies, especially with lots of rules to apply to different user group combinations A customizable Missing Manager policy, which allows an administrator to define a manager for each user and inspects CC and TO fields for their email address The ability to define custom file type detection to block files that are too sensitive to rely on extension based controls The ability to save a copy of policy or rollback to a previous one if a change doesn t do what you expected Clearswift offers a more comprehensive, secure solution than a hosted option alone - a must for any IT security professional, balancing critical information protection and control with an increasingly cloud-centric infrastructure. * standalone Adaptive Redaction functionality can be implemented into any environment with ARgon for Email 6

Integrating Office 365 and Clearswift SECURE Email Gateway or ARgon for Deployment options Clearswift can be deployed alongside Office 365 in a number of ways, ensuring that the information that is of most value to your organization remains secure - wherever it resides, even in the cloud : 1. Can scan inbound email traffic 2. Can scan outbound email traffic Microsoft Office 365 offers a comprehensive hosted email and Sharepoint solution, with a good, but basic security offering. However, for today s Enterprise to have confidence that their critical information is secure and that their most valuable or sensitive data will not be subject to a breach - enhancing that functionally with an adaptive approach to security is the only viable option. 3. Management of web traffic - required if using browser based client for mail access 4. As a hybrid configuration (where organizations are using both Office 365 and an on-premise email solution) 5. Can manage end point security - although Office 365 has Sharepoint management, further egress points such as USBs, external storage etc need to be managed to ensure critical information protection Office 365 Hosted Exchange Mailbox in Cloud Scanned and routed to Cloud Outbound to be scanned SECURE Email Gateway or ARgon for Email Inbound Email On-premise or remote user Scanned and delivered onwards

Clearswift is trusted by organizations globally to protect their critical information, giving them the freedom to securely collaborate and drive business growth. Our unique technology supports a straightforward and adaptive data loss prevention solution, avoiding the risk of business interruption and enabling organizations to have 100% visibility of their critical information 100% of the time. As a global organization, Clearswift has headquarters in the United States, Europe, Australia and Japan, with an extensive partner network of more than 900 resellers across the globe. United Kingdom Clearswift Ltd 1310 Waterside Arlington Business Park Theale Reading, RG7 4SA UK Germany Clearswift GmbH Landsberger Straße 302 D-80 687 Munich GERMANY United States Clearswift Corporation 309 Fellowship Road Suite 200 Mount Laurel, NJ 08054 UNITED STATES Japan Clearswift K.K Shinjuku Park Tower N30th Floor 3-7-1 Nishi-Shinjuku Tokyo 163-1030 JAPAN Australia Clearswift (Asia/Pacific) Pty Ltd 5th Floor 165 Walker Street North Sydney New South Wales, 2060 AUSTRALIA