Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment



Similar documents
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

IC L05: Security.cloud Configuring DLP on to your flow & Applying security to your Office 365 or Google Apps deployment Hands-On Lab

Quick Reference. Administrator Guide

Services Deployment. Administrator Guide

Setting up Microsoft Office 365

Setting up Microsoft Office 365

Policy Based Encryption Essentials. Administrator Guide

Migration Project Plan for Cisco Cloud Security

Better Together: Microsoft Office 365 & Symantec Office 365

On and off premises technologies Which is best for you?

Secure Your Mobile Workplace

Unified Security, ATP and more

Symantec Enterprise Vault.cloud Giovanni Alberici

Mod 08: Exchange Online FOPE

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

Cisco Cloud Security Interoperability with Microsoft Office 365

Risk and threats everywhere, all the time

Core Filtering Admin Guide

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Track and Trace. Administration Guide

How To Get A Cloud Service For A Small Business

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

V1.4. Spambrella Continuity SaaS. August 2

Encryption. Administrator Guide

T E C H N I C A L S A L E S S O L U T I O N

Core Protection Suite

Exchange Online Protection In-Depth

Deploying Layered Security. What is Layered Security?

Web Protection for Your Business, Customers and Data

Boundary Encryption.cloud Deployment Process Overview

Microsoft Exchange 2003

CA Technologies Data Protection

Portal Administration. Administrator Guide

Xerox Multifunction Devices. Network Configuration. Domain 2. Domino Server 2. Notes. MIME to Notes. Port. Domino. Server 1.

Securing OS Legacy Systems Alexander Rau

Secure Your with Encryption as a Service

Your is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner

INFORMATION PROTECTED

Symantec Mobile Security

AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Office 365 Exchange Online Protection Administration Guide

INLINE INGUARD GUARDIAN

Protecting the Infrastructure: Symantec Web Gateway

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

The Leading Security Suites

Symantec Protection Suite Add-On for Hosted and Web Security

DLP Quick Start

Countering Insider Threats Jeremy Ho

ITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009

Solutions IT Ltd Virus and Antispam filtering solutions

Spam Manager. User Guide

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Service Launch Guide (US Customer) SEG Filtering

Configuration Information

SR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Trustwave SEG Cloud Customer Guide

Comprehensive protection. Streamlined administration console

Symantec Hosted Mail Security Getting Started Guide

Websense Security Transition Guide

Service Schedule for Business Lite powered by Microsoft Office 365

Evaluation Guide. eprism Messaging Security Suite V8.200

Serial Deployment Quick Start Guide

Mimecast Unified Management

Feature Comparison Guide

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

SESA Securing with Cisco Security Appliance Parts 1 and 2

WEBSENSE SECURITY SOLUTIONS OVERVIEW

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Policy Based Encryption Z. Administrator Guide

Trend Micro Hosted Security. Best Practice Guide

Service Schedule for BT Business Lite Web Hosting and Business Lite powered by Microsoft Office 365

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

Public, Private, Hybrid:

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

#ITtrends #ITTRENDS SYMANTEC VISION

Finding Security in the Cloud

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

/Endpoint Security and More Rondi Jamison

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Configuring a single-tenant BIG-IP Virtual Edition in the Cloud

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Mimecast Security

Cyber Security Services: Data Loss Prevention Monitoring Overview

Data Protection. Administrator Guide

A NATURAL FIT. Microsoft Office 365 TM and Zix TM Encryption. By ZixCorp

Transcription:

Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment Phil Walters Principal Learning Consultant, Technical Field Enablement Email Security.cloud Configuring DLP on to your email flow 1

Session Agenda 1 Email Data Loss Prevention.cloud 2 Support for Hosted Email Platforms 3 Self-serve Domains 4 Support for Sender Policy Framework 5 Introduction to the Lab Exercises 2

Disclaimer Any information regarding pre-release Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently available. 3

Email Data Loss Prevention.cloud 4

Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute Negligent insiders and malicious attacks are the main causes of data breach. Thirty nine percent of organizations say that negligence was the root cause of the data breaches. 5

Two Approaches to Data Loss Prevention Enterprise DLP Single solution for the discovery, detection, enforcement, and remediation across all data channels. Includes data at-rest, data inmotion and end-point security. Complex to install and manage. Channel DLP DLP over a single data channel e.g. email or web. Simple policies. Simple deployment. Ideally suited for a cloudbased solution. 6

Email Data Loss Prevention A Cloud Based Solution Outbound Email Traffic Inbound Email Traffic 7

Introducing Email Data Loss Prevention.cloud Built upon the Email Security.cloud service with 100% SLA for availability. Easy policy builder in the cloud-based management portal. Pre-built policy templates for quick policy deployment. Pre-built regular expressions for common data types e.g. credit card numbers, social security numbers etc. Ability to create regular expressions to match content. Detailed reports to view rules matched and matched text. 8

Details of the New Service This service should go live this Summer. This is a replacement for the existing Content Control service. New customers will be provisioned onto Email Data Loss Prevention.cloud service. Existing customers will be migrated from the Content Control service to Email Data Loss Prevention.cloud service at no cost. All existing functionality in the Content Control service is mapped to the Email Data Loss Prevention.cloud service. Some new functionality is also available e.g. the ability to create regular expressions to pattern match content. 9

Support for hosted email platforms 10

Growth of Hosted Email Providers 300 Hosted Email Business Users (M) 250 200 150 100 Hosted Email Business Users (M) 50 0 2012 2013 2014 2015 2016 Hosted Email and Collaboration Market, 2012-2016 Radicati Group 11

By the end of the decade we believe cloud email adoption will comprise about 65% of the enterprise email market. Matthew W. Cain, Tom Austin Gartner Group 12

What have we been able to do in the past? Inbound Email Traffic Clean Email Traffic 13

What was missing? Scanning of outbound email for viruses and spam. Controlling and/or monitoring outbound email. Preventing information leaks through data loss prevention. Scanning outbound emails for offensive images. Scanning outbound emails for malware. 14

Scanning of Outbound Email from Hosted Email Providers Outbound Email Traffic 15

Self-serve Domains 16

Adding new domains with the Symantec.cloud Management Portal In the past new domains could only be added by the Symantec.cloud Provisioning Team. Now you can add domains using the Symantec.cloud Management Portal. For each domain we still need to confirm: That you own the domain That the Internet mail infrastructure passes various technical tests From later this quarter you should be able to remove domains from scanning using the Delete Domain wizard. 17

Process Overview Name of domain Validate Domain Ownership Inbound Route Configuration Service Settings Configuration Address Registration Wait until technical tests are complete Change MX Records 18

Support for Sender Policy Framework 19

What is Sender Policy Framework? Sending IP Address SMTP DNS Server DNS check will determine whether sending IP address matches the address for any MX record Sending Server To: John.Smith@abc.com From: Jane.Jones@example.com Receiving Server Configured to examine SPF records 20

How to configure Spoofed Sender Detection Configured as part of the anti-spam settings in the Management portal. Will block emails if a domain publishes a hard-fail Sender Policy Framework policy. 21

Introduction to the Lab Exercises 22

Lab Setup CloudtrainX.com Inbound email diana.palmer@cloudtrainx.com 1. Send some emails from your personal webmail account. 2. Examine the settings for outbound email scanning from hosted email providers. 3. Create some DLP policies. Outbound email Webmail Client 4. Examine whether the emails sent at the beginning of the lab matched any DLP policies. 23

Any questions? Email Security.cloud Configuring DLP on to your email flow 24

Thank you! Phil Walters phil_walters@symantec.com +44 (0)7785456838 Copyright 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Email Security.cloud Configuring DLP on to your email flow 25