What security and compliance challenges exist with the move to Microsoft Office 365?



Similar documents
Addressing Legal Discovery & Compliance Requirements

anomaly, thus reported to our central servers.

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

How To Preserve Records In A Financial Institution

INTRODUCING isheriff CLOUD SECURITY

Features and benefits guide for partners and their customers

What ediscovery challenges exist with Microsoft Office 365?

What are the compliance challenges of Microsoft Office 365?

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via .

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Trend Micro Hosted Security Stop Spam. Save Time.

Comprehensive real-time protection against Advanced Threats and data theft

Mimecast Unified Management

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Migration Project Plan for Cisco Cloud Security

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

4 Critical Risks Facing Microsoft Office 365 Implementation

Mimecast Security

isheriff CLOUD SECURITY

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Veritas AdvisorMail. archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies

Stop Spam. Save Time.

INFORMATION PROTECTED

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

V1.4. Spambrella Continuity SaaS. August 2

Comprehensive protection. Streamlined administration console

Better Together: Microsoft Office 365 & Symantec Office 365

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

PROOFPOINT CLOUD SERVICES WHAT S INSIDE: 1 OVERVIEW 2 FEATURES 3 OVERVIEW 4 ARCHIVING FEATURES

AVG AntiVirus. How does this benefit you?

Targeted attacks begin with spearphishing

24/7 Visibility into Advanced Malware on Networks and Endpoints

archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies.

Veritas Enterprise Vault.cloud for Microsoft Office 365

WEBSENSE TRITON SOLUTIONS

Evaluation Guide. eprism Messaging Security Suite V8.200

RazorSafe Mail Archiving Appliances

Fast, secure and scalable archiving from Fus . Secure and easily accessible storage

IBM Global Technology Services Preemptive security products and services

Router and Vetting G-Cloud Service Definition

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Competitive Comparison: Proofpoint Enterprise vs. Google Message Security (Formerly Postini) A Proofpoint White Paper

Dispatch: A Unique Security Solution

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

Better protection for customers, and recurring revenue for you!

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Commtouch RPD Technology. Network Based Protection Against -Borne Threats

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Cisco Cloud Security Interoperability with Microsoft Office 365

TRITON APX. Websense TRITON APX

3 Tips for Your Woes: Streamline. Simplify. Cloud.

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Visendo Suite a reliable solution for SMBs

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Selecting Your Essential Cloud Services

Selecting Your Essential Cloud Services for Office 365

Intelligent, Scalable Web Security

Outlook. Sharepoint. Lync. BlackBerry. McAfee. Microsoft Hosted Exchange

Configuration Information

management solutions

IBM Internet Security Systems products and services

Advantages of Managed Security Services

Symantec Enterprise Vault for Microsoft Exchange

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Security in Law Firms. What you need to know and how you can use secure to win more clients

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Parla, Secure Cloud

IBM Security Strategy

Archiving can prevent average business cost increases of

Making Sense of Archiving for Microsoft Environments

Mailwall Remote Features Tour Datasheet

Transcription:

PROOFPOINT FOR OFFICE 365: ENABLES ADVANCED SECURITY AND COMPLIANCE FOR YOUR ENTERPRISE UNDERSTAND THE SOLUTION BY ROLE: IT & SECURITY What security and compliance challenges exist with the move to Microsoft Office 365? Defending against Targeted Threats With only Microsoft Exchange Online Protection (EOP), a legacy anti-spam engine, Office 365 is at greater risk of exposure to threats. More than 30% of today s spam conceals malware and there s also a growing number of threats that have become increasingly intelligent and targeted to specific users and roles within an organization. Targeted email attacks containing malicious links and/or malicious email attachments have quickly become the #1 threat vector in modern attacks. Some of the most common are: Phishing Longlining Watering Hole Spear-phishing Advanced Persistent Threats Spam Information Seeking Scams Hostile Attachments Securing Email Communications Policy decisions are left in users hands as Office 365 ships only with user-driven Data Loss Prevention (DLP) (e.g. users have to tag content for the DLP filter to find it) and a manually triggered encryption engine representing a significant risk of exposure. Studies have shown similar legacy user-driven schemes are often easily circumvented. Corporate email typically contains up to 70% of an enterprise s sensitive data, making email one of the key exposure points for inadvertent data loss. Proper filtering of outbound email for sensitive content, and appropriate rejection or encryption of such messages is crucial, especially in light of increasingly stringent industry and government regulations with associated penalties. Proofpoint, Inc. 2015 1

What email challenges arise with Office 365? Security Exchange Online Protection (EOP) provides basic email hygiene services, but has some security shortcomings around end-user control and the ability to address advanced attacks. EOP does provide the ability to identify and filter spam, along with filtering capabilities around malicious phishing messages. However, the phishing messages are still accessible through the end-user s quarantine. Given this access, security teams are at the mercy of end-users decisions to release malicious phishing messages that had initially been blocked and quarantined. Though EOP provides end-user access and controls for their personal quarantine, the same cannot be said for control of their encrypted messages. Encrypted message control (e.g., message revocation) requires intervention by the administrators, lengthening the time needed before these critical actions are taken. EOP also lacks the ability to effectively address advanced threats that require dynamic malware analysis, in order to detect modern polymorphic malware. While no system can be 100% effective, EOP suffers from a lack of visibility, preventing security teams from responding efficiently after an attack has been identified. Compliance Exchange Online Archiving (EOA) provides basic email archiving capabilities that some organizations may find sufficient. However, organizations that have strict retention and disposition requirements may find the policies difficult to enforce within EOA. This quickly gets even more complicated if the organization has multiple retention requirements across different geographies or business units. Specific regulations bring additional requirements that the basic archiving capabilities provided by EOA do not satisfy. For example, in the financial sector SEC 17a3-4 requires immutable storage and FINRA regulated organizations have supervisory review requirements, including review workflow, third party download capabilities and reporting that are not met by Microsoft Office 365. Legal Discovery ediscovery functionality within Microsoft Office 365 can be confusing to many users. While the basic discovery functionality exists, Office 365 relies on a batch-based search process that struggles with largescale searches. This prevents IT from being able to perform unlimited searches against concurrent matters. Keyword searches against the entire enterprise are also limited, preventing IT from effectively performing investigative searches. Organizations that have strict requirements for retention will find Office 365 is inadequate. Enforcement of retention is limited and messages are only archived after a specific period of time by default, this is 2 years. Users can delete messages at their discretion until that time. Proofpoint, Inc. 2015 2

When is third-party security necessary with Microsoft Office 365? Protection from Advanced Targeted Attacks Targeted email attacks containing malicious links and/or malicious email attachments are considered the #1 threat vector in modern attacks. The majority of recent breaches in the headlines all started with phishing emails, masking a sophisticated URL-driven attack architecture that utilized obfuscated redirects, hosted TDS systems, and polymorphic malware delivered via zero-day exploits. However, Microsoft Exchange Online Protection (EOP) struggles with basic email hygiene, and has repeatedly proven inadequate for handling targeted attacks, lacking dynamic malware analysis, per-user real-time insight and tracking. Deeper Data Loss Prevention Policy (DLP) Office 365 provides basic DLP policies via Exchange Transport Rules. Organizations that have very basic needs to identify simple instances of sensitive data may find Office 365 to be sufficient. For example, Office 365 can identify a social security number that is labeled SSN: 951-XX-4020. However, variations of this (e.g., 951-XX-4020) would not be flagged. Organizations with regulatory requirements to protect specific types of information or have the need to address more granular policies will need a third-party solution to more accurately implement DLP policies, as well as identify and classify violations. How easy is it to add advanced email security, compliance and ediscovery? Microsoft Office 365 & Data Safeguarding Adding third-party advanced email security, compliance and ediscovery capabilities to Office 365 is simple. As a SaaS-provider, Proofpoint s suite of solutions can be added quickly, without any premisebased hardware, allowing for continued adoption of cloud-based services. Cloud-Based Inbound and Outbound Email Channel Protection To start using Proofpoint Enterprise Protection, which provides protection against basic known and emerging malware, phish, email-borne viruses and more, a simple redirect of the organization s MX record is required a straightforward online change that can be made in minutes. It s entirely usertransparent, too. Users can easily add Targeted Attack Protection, Data-Loss Prevention, and Encryption from the Proofpoint Protection dashboard. Subsequent customization is also available at the user s leisure. Cloud-based Email, Social Media, Content-in-place Discovery and Control To start using Proofpoint Enterprise Archiving, which provides ediscovery, legal hold, and 20-second search time from endpoints (including mobile devices),users simply need to configure their Office 365 email instance to copy to Proofpoint s Enterprise Archive, and to add social network archiving (Social Platform for Archiving), simply add the appropriate plugin. For Content Control, download an agent to Proofpoint, Inc. 2015 3

each endpoint that needs to be monitored there s no limit to how many an organization can control. As is the case with Proofpoint Protection, it s entirely user-transparent, and subsequent customization is available at the user s leisure. When is third-party ediscovery required with Microsoft Office 365? Found in 20 Seconds: Rapid Response for Regulatory & Legal Queries For organizations that operate in a litigious or heavily regulated industry, the importance of rapid and complete response to data requests from counsel or compliance offices is critical. Both aspects of the response, speed and completeness are important. Speed can influence a regulator or litigator s impression of corporate readiness, and when counsel is able to perform their own self-service queries from their personal computers or mobile devices, it significantly reduces the turnaround time and load on IT. Similarly, completeness is crucial; a response to litigation that is missing a smoking gun can lead to billions of dollars in losses. Office 365 only does batch searches, lacks a mobile interface, and only indexes Microsoft Office content (not social, or other content forms), making it incomplete. When Hold Everything Increases Legal Risk & Exposure Counsel knows the information an organization chooses to not to retain is as important as the information they choose to retain. From a security and risk mitigation standpoint, granular retention that can vary by content curator, geographic region, function, etc. is crucial in any litigious or regulated industry. By default, Office 365 doesn t have such capabilities; legal hold is an everyone 100% or user-deletable proposition. When is third-party compliance necessary with Microsoft Office 365? When the Organization is Subject to Compliance by SEC, FINRA or Other Regulatory Bodies With Exchange Online Archiving (EOA), messages are archived after a specified period of time (by default, two years). Until that time, end-users have the capability to delete messages at their discretion. For financial services organizations, the answer is quite simple Microsoft Office 365 does not provide the functionality as outlined by SEC 17a3-4, which outlines how data must be stored immutably, or supervisory review requirements under FINRA. A third-party is necessary to address these requirements. When the Organization is Subject to Complex Retention Requirements For organizations that have complex retention requirements based on geographic or business unit needs, Microsoft Office 365 cannot be easily configured to address these needs. Organizations may end up in a situation in which they are storing much more than is necessary, which drastically increases legal risk and exposure, and could result in the failure to retain necessary information. In these situations, Proofpoint, Inc. 2015 4

organizations will need to engage with a third-party to address these requirements. Proofpoint, Inc. 2015 5