SlideShare a Scribd company logo
1 of 5
Download to read offline
Cloud email demystified:
                                              making the move with
                                              confidence




C   W   S   D   Whitepaper        Corporate Headquarters | Perimeter E-Security| 440 Wheelers Farms Rd.| Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax
                             ©2011 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners

                                                                    Page 1
CLOUD EMAIL DEMYSTIFYIED:
                                        making the move with confidence
                                        EXECUTIVE OVERVIEW
                                        Most organizations know that the trend is to take email to the cloud. However, evaluating whether
                                        it makes sense for your organization is often a daunting task, full of mixed messages and
                                        unknowns. The market still lacks a clearly defined outline for evaluating such a mission-critical
                                        decision; the goal of this white paper is to address the most common myths and realities of
                                        cloud-based email.

                                        During the adoption of in-house email infrastructure, most companies and their IT departments
                                        are under the impression that this investment is just like any other capital expenditure, that
                                        depreciates over five to ten years. They did not consider that an email system has growing
                                        management requirements and new email technology releases come out before full depreciation
                                        of past investments. Also, many organizations have become dependent on email as their main
                                        form of business communication, causing storage needs to exponentially surpass all initial
                                        projections.

                                        Because of this, combined with the increasing complexity of compliance regulations over
                                        electronic communications and the rise of email security vulnerabilities and attacks, many
                                        companies find themselves in a predicament over how best to meet their email needs.
                                        Compounding the issue, security threats have grown to become increasingly sophisticated,
                                        requiring the most specialized skills to protect and secure the sensitive information assets that
                                        flow through corporate email.

                                        Working with an experienced cloud-based email provider removes the liabilities of constantly
                                        staffing and training IT departments to have the skills to manage and secure corporate email, a
                                        system that is costly and cuts away at the bottom line.




                                        MYTH: cloud email is less secure and less private
                                        First to cross the minds of IT directors and management when considering “the cloud” for their
                                        email needs is security. They want their data to be safe, and they don’t want to work with a service
                                        provider who might be a target for hackers.

                                        When your email is in the cloud, it is more secure and in better hands with a service provider who
                                        specializes in email management and email threat prevention. Email contains a company’s most
                                        sensitive information, and threats to these messages, such as hacking (to message data in transit
                                        or at rest), viruses, spam, malware, etc. are growing in sophistication and complexity with each
                                        day. This makes it harder to combat attacks and keep email clean without making email security a
                                        specialization within your organization’s IT department. Under these circumstances, a cloud-based
                                        service provider, particularly one that takes both email hosting and email security seriously,
                                        becomes your most trusted partner. Your service provider will likely have more experience and
                                        exposure to every possible email security threat and concern and as a result will have email
                                        security experts and veterans on staff to make sure your messages are always protected from the
                                        most current vulnerabilities.

                                        Another common myth that companies have about email security in the cloud is the perception
                                        that they will not be able to maintain compliance with internal company policies and regulations
                                        as they were before moving to the cloud. This perception originates from the belief that once their




C   W   S   D   Whitepaper       Corporate Headquarters | Perimeter E-Security | 440 Wheelers Farms Rd. | Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax
                             ©2010 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners

                                                                    Page 2
CLOUD EMAIL DEMYSTIFYIED:
                                        making the move with confidence

                                        email infrastructure is no longer on-site they will lose the granular controls over their email
                                        system they once had. In the case of cloud-based email, your entire email infrastructure and email
                                        data might be in the cloud, but you still have access to the applications and servers and can
                                        configure them just like you would if your email were in-house. The only difference is that you
                                        configure everything from the cloud. Also, many cloud email service providers offer proprietary
                                        and compliance-specific cloud applications, pre-integrated with your email service. These
                                        proprietary services are easier to use and more efficient for meeting compliance regulations than
                                        the stand-alone email systems you would otherwise be using in-house.

                                        The last major security concern about cloud-based email is that the company will not have the
                                        same types of access controls as they would in an on-site scenario. Access controls include the
                                        ability to limit or restrict user access to email systems and features based on role within the
                                        organization. This could not be further from the truth. Even though your email is in the cloud, you
                                        still have complete and granular control over user access rights to the email system. Most cloud
                                        services come with a web-based administrative console where you can configure things such as
                                        limiting administrator access to only a select group of employees’ email inboxes and allowing
                                        third-party access.

                                        MYTH: MOVING TO THE CLOUD MEANS GIVING UP CONTROL
                                        Brokers, RIA’s and Hedge Funds are required to build a security information program framework
                                        With cloud-based email, your email infrastructure and entire corporate email corpus might be in
                                        the cloud, yet you still have complete control over and access to your data.

                                        While your data is stored on your service provider’s servers, it is your data; you own it and have
                                        access to it at all times. A cloud-based email solution provides a complete set of administrative
                                        tools so that you can configure your email to meet your needs, just as you would if you kept your
                                        email in-house. You have as many or more granular configuration options. The only difference is
                                        the benefit you gain from no longer having to spend tiresome hours and extra budget to manage
                                        and maintain in-house server hardware.

                                        MYTH: loss of end-user functionality
                                        When organizations envision their email as a cloud service, they worry that they are one of
                                        thousands of customers for a given service provider. And if one service provider has so many
                                        customers, organizations fear that cloud-based email only provides a generic feature set.

                                        This is another misconception about email in the cloud. Even though your email is in the cloud,
                                        with the advanced technologies and configuration capabilities available today, a cloud-based email
                                        customer can access features and solutions they never realized were available. Keep in mind that
                                        a cloud-based email service provider has years of experience managing the email needs of
                                        organizations just like yours. As a result, your service provider likely has email experts on staff
                                        who have the most up-to-date knowledge about today’s email needs. Further, when your email is
                                        in the cloud, this does not mean that each customer is limited to the same cookie-cutter feature
                                        set. Each customer has complete control and administration of their end-user email features.




C   W   S   D   Whitepaper       Corporate Headquarters | Perimeter E-Security | 440 Wheelers Farms Rd. | Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax
                             ©2010 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners

                                                                    Page 3
CLOUD EMAIL DEMYSTIFYIED:
                                        making the move with confidence
                                        REALITY: YOU ONLY PAY FOR WHAT YOU NEED AND USE
                                        One of the biggest perks of email in the cloud is that you only pay for the email needs of your
                                        current employee base; there are no extra infrastructure investments that sit around unused. As
                                        your organization grows and hires new employees, you simply add more email boxes with your
                                        cloud service provider.

                                        Under this per-user, per-month business model, your bottom line is further maximized, leaving
                                        your organization operationally efficient. Also, not only is the expenditure on corporate email
                                        needs more predictable, but the time commitment is shorter with month-to-month, one-year, and
                                        three-year service contract options, which are shorter than the depreciation period of an in-house
                                        email investment.



                                        REALITY: Predictability of costs
                                        The increasing cost and complexity of modern email systems and the rapid evolution of
                                        technology have made meeting email needs as an in-house capital expenditure an economically
                                        unpredictable route. Not only does this route drain corporate resources, with constant
                                        maintenance and patch requirements, but it also leaves the company running its business on
                                        dated technology. When you use dated technology while waiting for its full depreciation, you could
                                        fall behind competitors leveraging the most advanced technology for greater efficiency and
                                        employee productivity.

                                        With a cloud-based email service you benefit from a predictable cost for meeting your email
                                        needs. When email is in the cloud, it becomes an operational expenditure instead of a capital
                                        expenditure on your balance sheet. Organizations benefit from the convenience, predictability,
                                        and stability of paying a consistentmonthly fee for their email service.

                                        Instead of managing your email hardware in-house and dealing with constantly keeping staff
                                        trained and up-to-date on the latest email and email security needs, all you have to do is rely on
                                        your trusted service provider. When you take your email to the cloud, your chosen service
                                        provider becomes your highly specialized, trusted partner. This partnership allows you to focus on
                                        your core business activities while your service provider takes care of your email security needs,
                                        keeping your organization at its highest efficiency, productivity, and profitability.



                                        REALITY: No capacity concerns

                                        Services that can evaluate your current security posture, identify gaps and recommend solutions
                                        Organizations that manage their email in-house are challenged with system maintenance issues
                                        and the need to keep up with security. They also must ensure that their email infrastructure is at
                                        the right volume and right price for their current and future needs. Regardless of the current
                                        economic environment, organizations require a range of options for investing their capital. An
                                        organization does not want to be in a situation where they must purchase email servers and
                                        infrastructure beyond their current capacity needs. Under these circumstances, unused email
                                        infrastructure becomes a sunk cost, draining organizational expenses that could otherwise be
                                        used for more mission-critical activities. Alternatively, organizations don’t want to be in a




C   W   S   D   Whitepaper       Corporate Headquarters | Perimeter E-Security | 440 Wheelers Farms Rd. | Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax
                             ©2010 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners

                                                                    Page 4
CLOUD EMAIL DEMYSTIFYIED:
                                        making the move with confidence
                                        situation where they have to wait until their existing email infrastructure is fully depreciated
                                        before they can invest in new infrastructure needed to support recent growth. In this case, the
                                        organization could find themselves not only below capacity but technologically inferior to their
                                        competition, limiting their ability to harness their most recent growth.

                                        Organizations want to grow and scale their investments in expenditures such as email quickly, in
                                        parallel with market and organizational volatility, and with economic leanness. Cloud-based email
                                        allows an organization to leverage the latest email technology, even for an organization with the
                                        smallest email capacity requirements, while also continuously allowing scalability. They want to
                                        provision mailboxes for new employees one at a time or in quantities as needed. With your email
                                        in the cloud, the smallest organization has access to the latest email technology and experiences
                                        faster patching and upgrades, in addition to being able to grow their email needs in line with their
                                        business growth. All of this can be done without having to invest in expensive servers and lengthy
                                        depreciation schedules. Email will be a simple operational expense, allowing you to sign up for
                                        what you need and nothing more.

                                        REALITY: FASTER UPGRADES
                                        The market for corporate email is experiencing a rapid technological evolution, with new releases
                                        coming out faster than existing email infrastructure investments depreciate. Under these
                                        circumstances, many businesses find themselves waiting out a five- to ten-year depreciation
                                        schedule before they can take advantage of the productivity and efficiency enhancements
                                        afforded by an upgrade.

                                        A cloud-based email service provider experiences extensive economies of scale. With tens of
                                        thousands of customers, a cloud-based email service provider can offer a state-of-the-art email
                                        solution for an extremely low price, lower than the cost most companies could achieve by doing it
                                        in-house. The access to more advanced email technologies is particularly important for smaller
                                        companies that would otherwise not be able to achieve any economies of scale with an in-house
                                        email solution. Cloud-based email allows an organization to stay operationally lean while
                                        leveraging the latest email technology to maximize business productivity and efficiency.



                                        ABOUT PERIMETER E-SECURITY

                                        Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely
                                        on. Our advanced technology, expert intelligence, and superior scale makes our clients’
                                        information more secure, more highly available, compliant with regulations and less costly to
                                        manage. By using our solutions, our customers can focus on their core businesses and take
                                        advantage of new opportunities. Our growing customer base includes 6,000 organizations in the
                                        financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For
                                        more information, visit www.perimeterusa.com.




C   W   S   D   Whitepaper       Corporate Headquarters | Perimeter E-Security | 440 Wheelers Farms Rd. | Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax
                             ©2010 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners

                                                                    Page 5

More Related Content

What's hot

Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012itandlaw
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudcloudresearcher
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Web 2.0
Web 2.0Web 2.0
Web 2.0gypsy
 
Colocation Basics for Small to Medium Sized Businesses
Colocation Basics for Small to Medium Sized BusinessesColocation Basics for Small to Medium Sized Businesses
Colocation Basics for Small to Medium Sized BusinessesOnline Tech
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...HyTrust
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
The Growing Email Archiving Dilemma
The Growing Email Archiving DilemmaThe Growing Email Archiving Dilemma
The Growing Email Archiving Dilemmagkfletch
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataHybrid Cloud
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 

What's hot (20)

Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012Cloud Computing Webinar: Legal & Regulatory Update for 2012
Cloud Computing Webinar: Legal & Regulatory Update for 2012
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Cloud risk management
Cloud risk managementCloud risk management
Cloud risk management
 
Ccsw
CcswCcsw
Ccsw
 
04812167
0481216704812167
04812167
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Colocation Basics for Small to Medium Sized Businesses
Colocation Basics for Small to Medium Sized BusinessesColocation Basics for Small to Medium Sized Businesses
Colocation Basics for Small to Medium Sized Businesses
 
489 493
489 493489 493
489 493
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
The Growing Email Archiving Dilemma
The Growing Email Archiving DilemmaThe Growing Email Archiving Dilemma
The Growing Email Archiving Dilemma
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Data Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud ComputingData Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud Computing
 

Viewers also liked

Helpdesk
HelpdeskHelpdesk
Helpdeskdmrpoly
 
Seminario De Mercadotecnia
Seminario De MercadotecniaSeminario De Mercadotecnia
Seminario De Mercadotecniapublished
 
Soporte TèCnico Diapositivas
Soporte TèCnico DiapositivasSoporte TèCnico Diapositivas
Soporte TèCnico Diapositivasguestfe3d71c
 
Servis desk ejemplo con ITIL
Servis desk  ejemplo con ITILServis desk  ejemplo con ITIL
Servis desk ejemplo con ITILCésar Ocampo
 
Manual de Procedimientos Soporte Tecnico
Manual de Procedimientos Soporte TecnicoManual de Procedimientos Soporte Tecnico
Manual de Procedimientos Soporte Tecnicosoportecmg123
 
Implementación de una mesa de ayuda
Implementación de una mesa de ayudaImplementación de una mesa de ayuda
Implementación de una mesa de ayudaEmilio
 
Capacitacion atención al cliente
Capacitacion atención al clienteCapacitacion atención al cliente
Capacitacion atención al clienteMarketing TI
 

Viewers also liked (10)

Helpdesk
HelpdeskHelpdesk
Helpdesk
 
Seminario De Mercadotecnia
Seminario De MercadotecniaSeminario De Mercadotecnia
Seminario De Mercadotecnia
 
Mesa de ayuda
Mesa de ayudaMesa de ayuda
Mesa de ayuda
 
Mesa de ayuda
Mesa de ayudaMesa de ayuda
Mesa de ayuda
 
Soporte TèCnico Diapositivas
Soporte TèCnico DiapositivasSoporte TèCnico Diapositivas
Soporte TèCnico Diapositivas
 
Servis desk ejemplo con ITIL
Servis desk  ejemplo con ITILServis desk  ejemplo con ITIL
Servis desk ejemplo con ITIL
 
Manual de Procedimientos Soporte Tecnico
Manual de Procedimientos Soporte TecnicoManual de Procedimientos Soporte Tecnico
Manual de Procedimientos Soporte Tecnico
 
Implementación de una mesa de ayuda
Implementación de una mesa de ayudaImplementación de una mesa de ayuda
Implementación de una mesa de ayuda
 
Taller Servicio Al Cliente
Taller Servicio Al ClienteTaller Servicio Al Cliente
Taller Servicio Al Cliente
 
Capacitacion atención al cliente
Capacitacion atención al clienteCapacitacion atención al cliente
Capacitacion atención al cliente
 

Similar to Cloud email security and control demystified

Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
2009 Brochure Csk Finance
2009 Brochure Csk Finance2009 Brochure Csk Finance
2009 Brochure Csk FinanceMarco Marazzini
 
ILTA Mobile Security Gap
ILTA Mobile Security GapILTA Mobile Security Gap
ILTA Mobile Security GapGes Ray
 
The Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackThe Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackBen Jones
 
Ds security
Ds securityDs security
Ds securityServium
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration Protected Harbor
 
Authentication in cloud computing
Authentication in cloud computingAuthentication in cloud computing
Authentication in cloud computingvidhya dharmarajan
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskCloudMask inc.
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...Mithi SkyConnect
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet yonifine
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 

Similar to Cloud email security and control demystified (20)

Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
2009 Brochure Csk Finance
2009 Brochure Csk Finance2009 Brochure Csk Finance
2009 Brochure Csk Finance
 
SkyConnect
SkyConnectSkyConnect
SkyConnect
 
ILTA Mobile Security Gap
ILTA Mobile Security GapILTA Mobile Security Gap
ILTA Mobile Security Gap
 
Security threat in cloud computing
Security threat in cloud computingSecurity threat in cloud computing
Security threat in cloud computing
 
The Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses BackThe Myths of the Cloud are Holding Businesses Back
The Myths of the Cloud are Holding Businesses Back
 
Ds security
Ds securityDs security
Ds security
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration
 
Authentication in cloud computing
Authentication in cloud computingAuthentication in cloud computing
Authentication in cloud computing
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Cloud Based Email
Cloud Based EmailCloud Based Email
Cloud Based Email
 
What to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mailWhat to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mail
 
Case study
Case studyCase study
Case study
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Cloud email security and control demystified

  • 1. Cloud email demystified: making the move with confidence C W S D Whitepaper Corporate Headquarters | Perimeter E-Security| 440 Wheelers Farms Rd.| Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax ©2011 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners Page 1
  • 2. CLOUD EMAIL DEMYSTIFYIED: making the move with confidence EXECUTIVE OVERVIEW Most organizations know that the trend is to take email to the cloud. However, evaluating whether it makes sense for your organization is often a daunting task, full of mixed messages and unknowns. The market still lacks a clearly defined outline for evaluating such a mission-critical decision; the goal of this white paper is to address the most common myths and realities of cloud-based email. During the adoption of in-house email infrastructure, most companies and their IT departments are under the impression that this investment is just like any other capital expenditure, that depreciates over five to ten years. They did not consider that an email system has growing management requirements and new email technology releases come out before full depreciation of past investments. Also, many organizations have become dependent on email as their main form of business communication, causing storage needs to exponentially surpass all initial projections. Because of this, combined with the increasing complexity of compliance regulations over electronic communications and the rise of email security vulnerabilities and attacks, many companies find themselves in a predicament over how best to meet their email needs. Compounding the issue, security threats have grown to become increasingly sophisticated, requiring the most specialized skills to protect and secure the sensitive information assets that flow through corporate email. Working with an experienced cloud-based email provider removes the liabilities of constantly staffing and training IT departments to have the skills to manage and secure corporate email, a system that is costly and cuts away at the bottom line. MYTH: cloud email is less secure and less private First to cross the minds of IT directors and management when considering “the cloud” for their email needs is security. They want their data to be safe, and they don’t want to work with a service provider who might be a target for hackers. When your email is in the cloud, it is more secure and in better hands with a service provider who specializes in email management and email threat prevention. Email contains a company’s most sensitive information, and threats to these messages, such as hacking (to message data in transit or at rest), viruses, spam, malware, etc. are growing in sophistication and complexity with each day. This makes it harder to combat attacks and keep email clean without making email security a specialization within your organization’s IT department. Under these circumstances, a cloud-based service provider, particularly one that takes both email hosting and email security seriously, becomes your most trusted partner. Your service provider will likely have more experience and exposure to every possible email security threat and concern and as a result will have email security experts and veterans on staff to make sure your messages are always protected from the most current vulnerabilities. Another common myth that companies have about email security in the cloud is the perception that they will not be able to maintain compliance with internal company policies and regulations as they were before moving to the cloud. This perception originates from the belief that once their C W S D Whitepaper Corporate Headquarters | Perimeter E-Security | 440 Wheelers Farms Rd. | Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax ©2010 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners Page 2
  • 3. CLOUD EMAIL DEMYSTIFYIED: making the move with confidence email infrastructure is no longer on-site they will lose the granular controls over their email system they once had. In the case of cloud-based email, your entire email infrastructure and email data might be in the cloud, but you still have access to the applications and servers and can configure them just like you would if your email were in-house. The only difference is that you configure everything from the cloud. Also, many cloud email service providers offer proprietary and compliance-specific cloud applications, pre-integrated with your email service. These proprietary services are easier to use and more efficient for meeting compliance regulations than the stand-alone email systems you would otherwise be using in-house. The last major security concern about cloud-based email is that the company will not have the same types of access controls as they would in an on-site scenario. Access controls include the ability to limit or restrict user access to email systems and features based on role within the organization. This could not be further from the truth. Even though your email is in the cloud, you still have complete and granular control over user access rights to the email system. Most cloud services come with a web-based administrative console where you can configure things such as limiting administrator access to only a select group of employees’ email inboxes and allowing third-party access. MYTH: MOVING TO THE CLOUD MEANS GIVING UP CONTROL Brokers, RIA’s and Hedge Funds are required to build a security information program framework With cloud-based email, your email infrastructure and entire corporate email corpus might be in the cloud, yet you still have complete control over and access to your data. While your data is stored on your service provider’s servers, it is your data; you own it and have access to it at all times. A cloud-based email solution provides a complete set of administrative tools so that you can configure your email to meet your needs, just as you would if you kept your email in-house. You have as many or more granular configuration options. The only difference is the benefit you gain from no longer having to spend tiresome hours and extra budget to manage and maintain in-house server hardware. MYTH: loss of end-user functionality When organizations envision their email as a cloud service, they worry that they are one of thousands of customers for a given service provider. And if one service provider has so many customers, organizations fear that cloud-based email only provides a generic feature set. This is another misconception about email in the cloud. Even though your email is in the cloud, with the advanced technologies and configuration capabilities available today, a cloud-based email customer can access features and solutions they never realized were available. Keep in mind that a cloud-based email service provider has years of experience managing the email needs of organizations just like yours. As a result, your service provider likely has email experts on staff who have the most up-to-date knowledge about today’s email needs. Further, when your email is in the cloud, this does not mean that each customer is limited to the same cookie-cutter feature set. Each customer has complete control and administration of their end-user email features. C W S D Whitepaper Corporate Headquarters | Perimeter E-Security | 440 Wheelers Farms Rd. | Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax ©2010 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners Page 3
  • 4. CLOUD EMAIL DEMYSTIFYIED: making the move with confidence REALITY: YOU ONLY PAY FOR WHAT YOU NEED AND USE One of the biggest perks of email in the cloud is that you only pay for the email needs of your current employee base; there are no extra infrastructure investments that sit around unused. As your organization grows and hires new employees, you simply add more email boxes with your cloud service provider. Under this per-user, per-month business model, your bottom line is further maximized, leaving your organization operationally efficient. Also, not only is the expenditure on corporate email needs more predictable, but the time commitment is shorter with month-to-month, one-year, and three-year service contract options, which are shorter than the depreciation period of an in-house email investment. REALITY: Predictability of costs The increasing cost and complexity of modern email systems and the rapid evolution of technology have made meeting email needs as an in-house capital expenditure an economically unpredictable route. Not only does this route drain corporate resources, with constant maintenance and patch requirements, but it also leaves the company running its business on dated technology. When you use dated technology while waiting for its full depreciation, you could fall behind competitors leveraging the most advanced technology for greater efficiency and employee productivity. With a cloud-based email service you benefit from a predictable cost for meeting your email needs. When email is in the cloud, it becomes an operational expenditure instead of a capital expenditure on your balance sheet. Organizations benefit from the convenience, predictability, and stability of paying a consistentmonthly fee for their email service. Instead of managing your email hardware in-house and dealing with constantly keeping staff trained and up-to-date on the latest email and email security needs, all you have to do is rely on your trusted service provider. When you take your email to the cloud, your chosen service provider becomes your highly specialized, trusted partner. This partnership allows you to focus on your core business activities while your service provider takes care of your email security needs, keeping your organization at its highest efficiency, productivity, and profitability. REALITY: No capacity concerns Services that can evaluate your current security posture, identify gaps and recommend solutions Organizations that manage their email in-house are challenged with system maintenance issues and the need to keep up with security. They also must ensure that their email infrastructure is at the right volume and right price for their current and future needs. Regardless of the current economic environment, organizations require a range of options for investing their capital. An organization does not want to be in a situation where they must purchase email servers and infrastructure beyond their current capacity needs. Under these circumstances, unused email infrastructure becomes a sunk cost, draining organizational expenses that could otherwise be used for more mission-critical activities. Alternatively, organizations don’t want to be in a C W S D Whitepaper Corporate Headquarters | Perimeter E-Security | 440 Wheelers Farms Rd. | Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax ©2010 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners Page 4
  • 5. CLOUD EMAIL DEMYSTIFYIED: making the move with confidence situation where they have to wait until their existing email infrastructure is fully depreciated before they can invest in new infrastructure needed to support recent growth. In this case, the organization could find themselves not only below capacity but technologically inferior to their competition, limiting their ability to harness their most recent growth. Organizations want to grow and scale their investments in expenditures such as email quickly, in parallel with market and organizational volatility, and with economic leanness. Cloud-based email allows an organization to leverage the latest email technology, even for an organization with the smallest email capacity requirements, while also continuously allowing scalability. They want to provision mailboxes for new employees one at a time or in quantities as needed. With your email in the cloud, the smallest organization has access to the latest email technology and experiences faster patching and upgrades, in addition to being able to grow their email needs in line with their business growth. All of this can be done without having to invest in expensive servers and lengthy depreciation schedules. Email will be a simple operational expense, allowing you to sign up for what you need and nothing more. REALITY: FASTER UPGRADES The market for corporate email is experiencing a rapid technological evolution, with new releases coming out faster than existing email infrastructure investments depreciate. Under these circumstances, many businesses find themselves waiting out a five- to ten-year depreciation schedule before they can take advantage of the productivity and efficiency enhancements afforded by an upgrade. A cloud-based email service provider experiences extensive economies of scale. With tens of thousands of customers, a cloud-based email service provider can offer a state-of-the-art email solution for an extremely low price, lower than the cost most companies could achieve by doing it in-house. The access to more advanced email technologies is particularly important for smaller companies that would otherwise not be able to achieve any economies of scale with an in-house email solution. Cloud-based email allows an organization to stay operationally lean while leveraging the latest email technology to maximize business productivity and efficiency. ABOUT PERIMETER E-SECURITY Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients’ information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit www.perimeterusa.com. C W S D Whitepaper Corporate Headquarters | Perimeter E-Security | 440 Wheelers Farms Rd. | Suite 202 | Milford, CT 06461 | 800-234-2175 | 203-878-1284 Fax ©2010 Perimeter E-Security. The trademarks used herein are either trademarks of Perimeter E-Security, or trademarks of their respective owners Page 5