Messaging Policy Management



Similar documents
Osterman Research Executive Summary

Top 10 Features: Clearswift SECURE Gateway

MAILGUARD LIVE. Continuity. Trust the innovator to simplify cloud security

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

FortiMail Filtering Course 221-v2.2 Course Overview

The Leading Security Suites

Sendmail and PostX: Simplifying HIPAA Compliance. Providing healthcare organizations with secure outbound, inbound and internal

Migration Project Plan for Cisco Cloud Security

Mimecast Security

Quick Reference. Administrator Guide

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

The Guardian Digital Control and Policy Enforcement Center

Securing enterprise collaboration through and file sharing on a unified platform

Cisco IronPort X1070 Security System

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

MXSweep Hosted Protection

Chapter 6: ScanMail emanager

Do you need to... Do you need to...

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

Visendo Suite a reliable solution for SMBs

Security 8.0 User Guide

Protect Your Enterprise With the Leader in Secure Boundary Services

Mail-SeCure for virtualized environment

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION

Let us take care of your protection so you can focus on your business.

Securing enterprise collaboration through and file sharing on a unified platform

Trend Micro Hosted Security Stop Spam. Save Time.

Outbound Security and Content Compliance in Today s Enterprise, 2005

Mailwall Remote Features Tour Datasheet

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

Introduction. How does filtering work? What is the Quarantine? What is an End User Digest?

Stop Spam. Save Time.

SPECIAL REPORT ENTERPRISE-CLASS SPAM SOLUTIONS A Q&A SESSION WITH GARTNER

Mod 08: Exchange Online FOPE

In-House Vs. Hosted Security. 10 Reasons Why Your is More Secure in a Hosted Environment

Trend Micro Healthcare Compliance Solutions

THE INFOCROSSING SECURE BOUNDARY SERVICE

INSTANT MESSAGING SECURITY

FTA Computer Security Workshop. Secure

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Using Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education

anomaly, thus reported to our central servers.

Trend Micro Hosted Security Stop Spam. Save Time.

Filtering Service

ediscovery Solution for Archiving

Guideline on Auditing and Log Management

Better protection for customers, and recurring revenue for you!

AVG AntiVirus. How does this benefit you?

FortiMail Filtering. Course 221 (for FortiMail v4.2) Course Overview

FortiMail Filtering. Course for FortiMail v4.0. Course Overview

Osterman Research Executive Summary

COLUMBIA UNIVERSITY USAGE POLICY

PROOFPOINT CLOUD SERVICES WHAT S INSIDE: 1 OVERVIEW 2 FEATURES 3 OVERVIEW 4 ARCHIVING FEATURES

Intercept Anti-Spam Quick Start Guide

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Google Data Loss Prevention for work

PureMessage for Microsoft Exchange Help. Product version: 4.0

Guardian Digital Secure Mail Suite Quick Start Guide

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY Systems Managed Service.

SESA Securing with Cisco Security Appliance Parts 1 and 2

SurfControl Filter for SMTP

100% Malware-Free A Guaranteed Approach

Anti-SPAM Solutions as a Component of Digital Communications Management

Why Content Filters Can t Eradicate spam

Technology Blueprint. Protecting Intellectual Property in . Guarding against information-stealing malware and outbound data loss

SonicWALL Security Quick Start Guide. Version 4.6

MDaemon configuration recommendations for dealing with spam related issues

PureMessage for Microsoft Exchange Help. Product version: 3.1

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Powerful and reliable virus and spam protection for your GMS installation

How To Use Puremessage For Microsoft Exchange

Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Security. Titus White Paper

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Consolidated Hygiene and Encryption Service E-Hub. Slide 1

Osterman Research Executive Summary

Best Practices for Choosing a Content Control Solution

Evaluation Guide. eprism Messaging Security Suite V8.200

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.

DLP Quick Start

AlwaysMail. Sector 5. Cloud

Using SaaS to Reduce the Costs of Security

IronPort C350 for Medium-Sized Enterprises and Satellite Offices

Bizo Filter. Service Description

Barracuda Spam&Virus Firewall v5.1 a Web Filter v5.0 Nové funkce, pluginy a uživatelská vylepšení. Jiří Blažek, Product Manager

Security and Availability: A Holistic Solution to a Critical Problem

Configuration Information

WHITE PAPER SPON. Why Should You Encrypt and What Happens if You Don t? Published July An Osterman Research White Paper.

Securing the Messaging Infrastructure: Reduce Cost and Risk With a Comprehensive Strategy

Osterman Research Executive Summary

Selecting Your Essential Cloud Services

Symantec Hosted Mail Security Getting Started Guide

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

The Cost Effective Migration to Integrated Hybrid SaaS Security

BrightVisions Spam Filter User Guide

Secure Messaging Overview

Eiteasy s Enterprise Filter

PROTECTING AND OPTIMIZING EXCHANGE ENVIRONMENTS:

Transcription:

Introduction Topic Definition & Scope Risk Analysis Primary Obstacles Task Breakdown Inbound Drew Burdsall President - Espion International Outbound Closing Solution Road Map Our Area Q&A

Definition & Scope -Digital Corporate Communications -Email -IM -Other -Policies driven by: -Internal usage rules -Government regulations -Presentation Scope: -General Overview -Excluding Mobile/Web -Focus on Email While 32% of organizations have detailed and thorough email policies in place, only 12% of organizations have detailed IM policies in place. However, even more striking is the fact that while virtually all companies have an email policy, about one-half of organizations do not have an IM policy.**

Risk Analysis -Inbound -Offensive material -Malicious content -Unwanted information -Information retention & analysis -Outbound -Intellectual property -Customer information -Employee information -Quality control (ex. Marketing, legal) -Information retention & analysis Three out of four organizations are at risk for losing important business records contained in messaging systems that must be retained on a long-term basis. This is because a majority of organizations have no policies or systems in place to prevent the loss of this content.**

Primary Obstacles -Cost -Risk mitigation vs. profit increase -Initial expenses -Reoccurring expenses -Difficult ROI until too late -Complexity -Scoping policy depth -Internal ownership -Business to technology solution translation -Total costing analysis -Internal resources -Unique for each company Most organizations have a need to implement specific policies that are unique to their business or industry. Nearly three-quarters of organizations would prefer to scan messages based on their content and would prefer to archive them based on this content.**

Policy Breakdown -Inbound -Network security -Connection level checks -Sender authentication -Recipient authentication -Content filtering -Company rules -Regulatory compliance -Actions -Pass, Drop, Reject, Flag, Archive, Alert -End-User involvement -Training -Support Cost -Administration -Monitoring -Audits -Adjustments Inbound content issues are the primary drivers for creating and managing corporate messaging policies. Most organizations are on their second or later generation of both anti-virus and anti-spam systems.**

Policy Breakdown Continued -Outbound -Documented Corporate Policies -Outgoing Message Analysis -Employee to employee -Employee to external source -Content filtering -Company rules -Regulatory compliance -Actions -Pass, Drop, Reject, Flag, Archive, Alert -End-User & Receipt Involvement -Training -Support Cost -Administration -Monitoring -Audits -Adjustments Only about one-third of organizations have deployed automated systems that can scan outbound messaging content for policy violations. **

Solutions Road Map -Messaging Policy Documentation -Risk Analysis Rating -Business Solution Statements -Prioritized by Risk Rating -Employee Training -Procedures -Technology Solution Analysis -Adaptability -Scalability -Implementation Plan -Business & IT Audits -Post roll out -Reoccurring -Policy Adjustments Two-thirds of organizations believe that there could a better internal understanding of company messaging policies and improved compliance with them.**

Market Information Most organizations want to use messaging policies to: Prevent against inappropriate use of email and IM systems Protect against the loss of intellectual property and sensitive content Regulations also figure into organizations' policy management systems Only about one-third of organizations consider their current email policy to be detailed and thorough. Current policies designed to protect organizations against the leakage of sensitive information, or those that are designed to encrypt content that is sensitive or confidential, are not considered effective by the majority of organizations. About two in five organizations are dependent upon employee training to ensure their messaging policy. However, a significantly greater proportion of organizations depend upon automated technologies to ensure policy compliance. Automated technologies are perceived as significantly more effective at ensuring email policy compliance than training.

INBOUND EMAIL A.I. Engine A.I. ANTI-SPAM 95%+ SURE of SPAMMER PATTERNS QUARANTINE LEARN PATTERN SPAM EMAIL < 95% SURE of SPAMMER PATTERNS A.I.% CERTAINTY HEURISTIC RULES COMBINED SCORE GOOD EMAIL PASS to EMAIL SERVER

OUTBOUND EMAIL A.I. Engine A.I. Encryption 95%+ SURE of PHI PATTERNS EMAIL TAGGED for SECURE DELIVERY LEARN PATTERN PHI EMAIL < 95% SURE of PHI PATTERNS A.I.% CERTAINTY TERMS and RULES COMBINED SCORE REGULAR EMAIL SEND as NORMAL