SlideShare a Scribd company logo
1 of 10
Download to read offline
I N F O R M A T I O N


S ECURITY
                                                                            ÂŽ




     BUYER’S
    GUIDE TO
Messaging
 Security
 Messaging security options
  aren’t clear cut any more.
       We’ll help you decide
        when an on-premise
    solution is right for your
organization, or when cloud-
based SaaS is the way to go.


                                     INSIDE
                                 3   Sort Your Messaging Security Choices
                                 8   Messaging Security Vendor Listing

 INFOSECURITYMAG.COM
SORT YOUR
                        MESSAGING SECURITY
   SORT YOUR
   MESSAGING
SECURITY CHOICES



  MESSAGING
   SECURITY
PRODUCT LISTING
                        CHOICES
                                                                                      Companies face complicated
    SPONSOR
                                                                                      buying decisions when it
   RESOURCES                                                                          comes to buying messaging
                                                                                      security, the most important
                                                                                      being whether to go with an
                                                                                      on-premise solution, a SaaS
                                                                                      offering in the cloud, or both.
                                                                                      BY KAR E N H O B E RT AN D D IANA KE LLEY



                                                                                      PROTECTING MESSAGING SERVICES (e.g., email, instant
                                                                          messaging, texting) is an important part of any
                                                                          business messaging strategy. Vulnerabilities abound
                                                                          when you allow messaging traffic for delivery over
                                   the Internet. Messaging system administrators are charged with preventing data leaks,
                                   warding off system attacks such as spam, and guarding against malicious programs.
                                   Messaging security tools provide protection against spam and phishing, malware (both
                                   embedded and as attachments), as well as provide privacy policy enforcement (e.g.,
                                   encryption for transport) to ensure compliance and data protection.
                                       Choosing a solution requires looking at messaging security from two important
                                   aspects: the type of messaging security: perimeter security and message security; and the
                                   delivery of the service: on-premise or SaaS. As with any important security package, the
                                   choices depend on the individual business and what it feels it needs to protect. Although
                                   some messaging security solutions focus on other messaging traffic, many solutions that
                                   provide email security include modules for IM and other types of messaging traffic. Thus
                                   the scope of this guide will focus on email security although many of these concepts also
                                   apply to other types of messaging.


     3         I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
MESSAGING SECURITY COMPONENTS
                                   The best way to consider email messaging security is to look at it from two major
                                   functional aspects:
                                       • Perimeter security: preventing incoming attacks and securing the hygiene
                                   of the messaging system, such as antivirus, antispam and antimalware protection.
                                       • Message security: preventing the accidental or malicious release of informa-
                                   tion that would compromise user privacy or corporate data through message
   SORT YOUR
   MESSAGING                       encryption, digital signatures, rules-based filtering and policy-enforced actions.
SECURITY CHOICES
                                       Most hosted services and on-premise solutions offer these basic functions: anti-
                                   spam and antiphishing; attachment scanning; and rules-based filtering. Additional
  MESSAGING                        features include: DRM policy enforcement; keyword scanning and blocking;
   SECURITY                        encrypt on-send; tagging; digital signing; moving attachments to a secure repository;
PRODUCT LISTING
                                   as well as archiving, message logging and journaling. Recent email platform updates
                                   include basic capabilities such as user generated whitelists and blacklists, adminis-
                                   trator-managed policies that perform actions based on message contents (e.g.,
    SPONSOR
   RESOURCES                       encrypt a message that contains personal data such as a Social Security number
                                   [SSN]), and auto-filtering to prevent virus and phishing attempts.
                                       Email messages traverse many layers of the system to get to their destination,
                                   including in the cloud (over the Internet), gateway, network, service (e.g., email
                                   server, archive server), mailbox file, and email client. Messaging security tools can
                                   be applied to many parts of the system depending on business needs. In some cases
                                   the integrated messaging security capabilities of email platforms are enough for the
                                   needs of the business, however there are many reasons to extend messaging security
                                   beyond native email platform security tools. Third-party messaging security solu-
                                   tions can be used to secure messages as they traverse system layers.

                                       Bottom Line: Messaging security includes securing the messaging service from
                                   attacks as well as securing message content. Recent email platform upgrades now
                                   include perimeter and message security capabilities as native functionality. Message
                                   security enforced at different layers of the system is possible using third-party options.
                                   Organizations need to consider their messaging security requirements and where the
                                   system is most vulnerable.


                                   HOW TO DECIDE: ON-PREMISE VS. SAAS/CLOUD?
                                   The messaging security market is robust with many vendors offering packages that
                                   support different aspects of messaging security. Some products are specialized for
                                   securing messages in support of specific industries, such as logging messages in an
                                   online service for legal verification of messages. Other packages focus on perimeter
                                   security or message security but not both. Whereas others support all messaging
                                   security features in different parts of the system, such as cloud-based perimeter
                                   security that filters out spam and malware before the messages cross the firewall.
                                       Essentially there are three options for deploying messaging security: SaaS mes-
                                   saging security, on-premise messaging security, or a combination. Choosing one


     4         I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
option over another is as varied as the needs of the company. Generally SaaS email
                                   security services focus on perimeter security services (although some offer message
                                   security as well) whereas on-premise solutions offer both perimeter and message
                                   security capabilities.

                                        Promise of SaaS: reduce, re-use. SaaS-based services have become a popular
                                   option for many enterprises looking to reduce costs for IT services. Actually many
   SORT YOUR                       customers have relied on hosted email perimeter security for some time and until
   MESSAGING
SECURITY CHOICES                   recently, the only option for message content security was to purchase a third-party
                                   solution. Online spam and virus filtering services have grown to become reliable
                                   resources for protecting messaging systems from spam and other malicious email
  MESSAGING
                                   content. According to some reports, 90 percent to 95 percent of incoming traffic is
   SECURITY                        crud (e.g., spam, phishing, malware). Stopping that traffic before it makes it to the
PRODUCT LISTING                    internal message transfer agent (MTA) server not only improves the overall per-
                                   formance of the messaging service but also has a compliance impact; if the bad
                                   message never makes it to the internal network/server then the organization doesn’t
    SPONSOR                        have to save it.
   RESOURCES
                                       SaaS messaging security providers offer highly reliable services with up-to-date
                                   blacklists and virus tables. Pricing is a leasing
                                   model usually based on users or usage where cus-
                                   tomers pay for only what’s used (not always a good
                                                                                            SaaS messaging security
                                   deal, think about cellphone overage charges). One        providers offer highly
                                   of the more attractive aspects of hosted services is
                                   that they can lower capital expenses for utilities,      reliable services with
                                   hardware, software and personnel. Not only are
                                   hosted services effective, but they can keep costs
                                                                                            up-to-date blacklists
                                   and capital expenditures under control.                  and virus tables.
                                       On-Premise benefits. Some organizations need more control or have strict
                                   policies for ensuring information privacy and preventing data leaks. Regulatory and
                                   business policies may require greater control over messages. On-premise messaging
                                   security solutions offer customers more granular control and options for securing
                                   their information and messaging systems than SaaS offerings. On-premise messag-
                                   ing security systems can mitigate insider threat by preventing breaches at various
                                   layers of the system. In some cases, overall cost for on-premise solutions may be
                                   lower than SaaS depending on the services used and whether native email platform
                                   security capabilities can support the business security requirements.

                                        Weighing the pros and cons: on-premise vs.cloud. Overall, choosing a SaaS
                                   messaging security service over on-premise depends on how and where the security
                                   needs to be applied. If cloud-based filtering is most important, then a SaaS solution is
                                   likely a worthwhile option. If the organization needs more internal coverage as well as
                                   protection from external threats, on-premise options are a likely candidate. However,
                                   if a customer is looking to get the benefits of both cloud-based filtering and internal
                                   managed layers, then a hybrid of both SaaS message security and on-premises message
                                   security is probably the most beneficial combination for the organization.


     5         I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
Bottom Line: Message security delivery depends on what is of greatest concern to the
                                   organization. SaaS message security is best for filtering messages in the cloud, and pre-
                                   venting a lot of crud from entering the messaging system. On-premise message security
                                   systems offer more flexibility and options for controlling against internal threats. Many
                                   organizations use a combination on SaaS and on-premise message security services to
                                   get the most robust solution.

   SORT YOUR
   MESSAGING
SECURITY CHOICES                   LOGGING, ARCHIVING, REPORTING
                                   AND COMPLIANCE CONSIDERATIONS
                                   Many regulations include protection requirements for information sent via email.
  MESSAGING                        The PCI-DSS requires encryption for cardholder data such as PANs (the 16 digit
   SECURITY
PRODUCT LISTING                    primary account number) sent in email or as an email attachment. Data breach
                                   laws, such as SB1386, and the recent HITECH Act offer “safe harbors” from notifi-
                                   cation if the information was encrypted. Messaging encryption is available as an
    SPONSOR                        integrated feature, or can be purchased as an add-on. Before purchase, consider
   RESOURCES                       what needs to be encrypted: email message content; file attachments; or both? Are
                                   there regulatory requirements for a certain type of encryption algorithm? And what
                                   kinds of policy controls need to be applied?
                                   Mature messaging encryption solutions can
                                   encrypt based on individual or group sender and
                                                                                            Changes made to the
                                   recipient, type of file, and by keyword or data          Federal Rules of Civil
                                   type. For example, if the solution is configured
                                   to encrypt when SSNs are present, outgoing               Procedure (FRCP) in
                                   messages will be scanned for nine-digit numbers
                                   and encrypted if a match is detected.
                                                                                            2006 expanded legal
                                       Logging and archiving are a critical part of IT
                                   audit and compliance programs. Changes made
                                                                                            discovery efforts to
                                   to the Federal Rules of Civil Procedure (FRCP)           include electronic
                                   in 2006 expanded legal discovery efforts to
                                   include electronic messaging. Organizations              messaging.
                                   should look at the archival capacity of their pro-
                                   posed messaging solution. Consider the storage capacity of the product as well as
                                   the tools available to help search for and recover exchanges of interest. Retrieval
                                   and holds during an audit or legal e-discovery can be time limited—make sure the
                                   archival solution enables for multiple holds, fast searching, and recovery against the
                                   most common requirements: keywords; user; and date/time. Log data from the
                                   messaging system may also need to be archived for compliance purposes or as part
                                   of a larger security information and event management initiative.
                                       If your company has a spoliation policy in place that calls for deletion of logs or
                                   email conversations after a certain time, look for a solution with complete wipe-out
                                   capabilities. Consider what kind of reports will be required and review how flexible
                                   the solution is. Are pre-formatted templates for common reporting available? How
                                   customizable is the reporting tool? For example, auditors may want to see data leak
                                   report that shows no personal health information (PHI) was sent out of the organi-


     6         I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
zation via email or the CIO may want to see usage statistics during a network
                                   resizing exercise—can the reporting be adjusted easily for these user needs?
                                        A special consideration for the off-premise solutions—what kind of reporting
                                   is in place regarding access to their data center and messaging servers? Are there
                                   physical controls such as badge access and cameras? Are unique IDs and hierarchical
                                   administrative duties in place? Are logs protected with encryption, file integrity
                                   monitoring, and tamper proofing/tamper evidence protection? What is the SaaS
   SORT YOUR                       providers’ policy for producing log and archive data to the company or its agents?
   MESSAGING
SECURITY CHOICES                   Make sure the provider shows proof of the exact certifications they have received to
                                   ensure they match the regulatory requirements of the business. The off-premise
                                   solution should meet or exceed all compliance and reporting requirements of an
                                   in-house one.
  MESSAGING
   SECURITY
PRODUCT LISTING                         Bottom Line: Email communications are the lifeblood of today’s business. Legal and
                                   regulatory policies and standards require organizations to protect, archive, and report
                                   on email activity. Look for solutions that provide policy-based encryption and robust
    SPONSOR                        activity logging. Reporting often serves many different groups; make sure the messaging
   RESOURCES
                                   solution can provide the reporting the business needs. Finally, don’t forget compliance
                                   and protection needs when opting for an off-premise solution. Confirm that the
                                   provider has appropriate logging, access control, and monitoring in place.w


                                   Karen Hobert is an IT industry research analyst who focuses on communication, collaboration,
                                   content management, and social software technologies. She offers over 20 years of hands-on and
                                   market expertise to enterprises planning, designing, and deploying shared information systems.
                                       Diana Kelley is founder of consultancy SecurityCurve and former vice president and service
                                   director for the security and risk management strategies service at Burton Group.




     7         I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
VEN D O RS


                            Messaging Security
                            Here is a representative list of some vendors offering messaging security products
                            that are either on-premise or offered as a service. Compiled by SearchSecurity.com editors


                            Aladdin Knowledge Systems                     Gordano                         Sendmail
   SORT YOUR                www.aladdin.com                               www.gordano.com                 www.sendmail.com
   MESSAGING
SECURITY CHOICES            AppRiver                                      IBM Internet Security Systems   Sigaba
                            www.appriver.com                              www.iss.net                     www.sigaba.com
                            Astaro Networks                               Mailprotector                   Somansa
  MESSAGING                 www.astaro.com                                www.mailprotector.net           www.somansatech.com
   SECURITY
PRODUCT LISTING             Barracuda Networks                            Marshal8e6                      SonicWALL
                            www.barracuda.com                             www.m86security.com             www.sonicwall.com
                            BitDefender                                   McAfee                          Sophos
    SPONSOR                 www.bitdefender.com                           (Secure Computing, SafeBoot)    www.sophos.com
   RESOURCES                                                              www.mcafee.com
                            WatchGuard (BorderWare)                                                       St. Bernard Software
                            www.borderware.com                            MxLogic (McAfee)                www.stbernard.com
                                                                          www.mxlogic.com
                            CA                                                                            Sunbelt Software
                            www.ca.com                                    MessageGate                     www.sunbeltsoftware.com
                                                                          www.messagegate.com
                            Cisco Systems (IronPort)                                                      Symantec
                            www.ironport.com                              MessageLabs (Symantec)          www.symantec.com
                                                                          www.messaglabs.com
                            Clearswift                                                                    Trend Micro
                            www.clearswift.com                            Microsoft                       www.trendmico.com
                                                                          www.microsoft.com
                            Clearwell Systems                                                             Tumbleweed (Axway)
                            www.clearwellsystems.com                      Microworld                      www.tumbleweed.com
                                                                          www.mwti.net
                            Cloudmark                                                                     Vircom
                            www.cloudmark.com                             Mirapoint                       www.vircom.com
                                                                          www.mirapoint.com
                            ESET                                                                          Voltage
                            www.eset.com                                  MXLogic (McAfee)                www.voltage.com
                                                                          www.mxlogic.com
                            eSoft                                                                         Webroot
                            www.esoft.com                                 PGP                             www.webroot.com
                                                                          www.pgp.com
                            Fortinet                                                                      Websense
                            www.fortinet.com                              PineApp                         www.websense.com
                                                                          www.pineapp.com
                            F-Secure                                                                      ZixCorp
                            www.f-secure.com                              Process Software                www.zixcorp.com
                                                                          www.process.com
                            GFI
                            www.gfi.com                                   Proofpoint
                                                                          www.proofpoint.com
                            Google (Postini)
                            www.google.com/postini                        RedCondor
                                                                          www.redcondor.com




     8         I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
TECHTARGET SECURITY MEDIA GROUP
                            Information                                    I N F O R M A T I O N                            VICE PRESIDENT AND GROUP PUBLISHER
                              Security                                                                                      Doug Olender

                          magazine offers                                 S ECURITY                                     ÂŽ

                                                                                                                            PUBLISHER Josh Garland


                           comprehensive                                EDITORIAL DIRECTOR Kelley Damore                    DIRECTOR OF PRODUCT MANAGEMENT
                                                                                                                            Susan Shaver

                           Buyer’s Guides                               EDITOR Michael S. Mimoso

                                                                        SENIOR TECHNOLOGY EDITOR Neil Roiter
                                                                                                                            DIRECTOR OF MARKETING Kristin Hadley


                          on the following                              FEATURES EDITOR Marcia Savage
                                                                                                                            SALES MANAGER, EAST Zemira DelVecchio

                                                                                                                            SALES MANAGER, WEST Dara Such
                               topics:                                  ART & DESIGN
                                                                                                                            CIRCULATION MANAGER Kate Sullivan
                                                                        CREATIVE DIRECTOR Maureen Joyce
   SORT YOUR
   MESSAGING                        Antimalware                         COLUMNISTS                                          ASSOCIATE PROJECT MANAGER
SECURITY CHOICES                                                        Jay G. Heiser, Marcus Ranum, Bruce Schneier         Suzanne Jackson
                               Application Security                                                                         PRODUCT MANAGEMENT & MARKETING
                                                                        CONTRIBUTING EDITORS
                                                                        Michael Cobb, Eric Cole, James C. Foster,           Corey Strader, Jennifer Labelle, Andrew McHugh
                                   Authentication                       Shon Harris, Richard Mackey Jr., Lisa Phifer,
                                                                                                                            SALES REPRESENTATIVES
  MESSAGING                                                             Ed Skoudis, Joel Snyder
   SECURITY                                                                                                                 Eric Belcher ebelcher@techtarget.com
PRODUCT LISTING                           DLP                           TECHNICAL EDITORS
                                                                        Greg Balaze, Brad Causey, Mike Chapple, Peter       Patrick Eichmann peichmann@techtarget.com
                                   Email Security                       Giannacopoulos, Brent Huston, Phoram Mehta,
                                                                        Sandra Kay Miller, Gary Moser, David Strom,         Jason Olson jolson@techtarget.com
                                                                        Steve Weil, Harris Weisman
    SPONSOR                                                                                                                 Jeff Tonello jtonello@techtarget.com
                                Identity and Access
   RESOURCES                       Management                           USER ADVISORY BOARD
                                                                        Edward Amoroso, AT&T                                Nikki Wise nwise@techtarget.com
                                                                        Anish Bhimani, JPMorgan Chase
                                                                                                                            TECHTARGET INC.
                                    Intrusion                           Larry L. Brock, DuPont
                                                                                                                            CHIEF EXECUTIVE OFFICER Greg Strakosch
                               Detection/Prevention                     Dave Dittrich
                                                                        Ernie Hayden, Seattle City Light
                                                                        Patrick Heim, Kaiser Permanente                     PRESIDENT Don Hawk
                               Mobile Data Security                     Dan Houser, Cardinal Health
                                                                                                                            EXECUTIVE VICE PRESIDENT Kevin Beam
                                                                        Patricia Myers, Williams-Sonoma
                                                                        Ron Woerner, TD Ameritrade
                             Network Access Control                                                                         CHIEF FINANCIAL OFFICER Eric Sockol
                                                                        SEARCHSECURITY.COM
                                                                        SENIOR SITE EDITOR Eric Parizo                      EUROPEAN DISTRIBUTION
                                 Network Firewalls                                                                          Parkway Gordon Phone 44-1491-875-386
                                                                        NEWS EDITOR Robert Westervelt                       www.parkway.co.uk
                                  Policy and Risk                                                                           LIST RENTAL SERVICES
                                                                        ASSOCIATE EDITOR William Hurley
                                   Management                                                                               Julie Brown
                                                                        ASSISTANT EDITOR Maggie Wright                      Phone 781-657-1336 Fax 781-657-1100
                                   Remote Access                                                                            REPRINTS
                                                                        ASSISTANT EDITOR Carolyn Gibney
                                                                                                                            FosteReprints Rhonda Brown
                                         SIEM                           INFORMATION SECURITY DECISIONS                      Phone 866-879-9144 x194
                                                                        GENERAL MANAGER OF EVENTS Amy Cleary                rbrown@fostereprints.com

                                         UTM                            EDITORIAL EVENTS MANAGER Karen Bagley

                           Vulnerability Management

                             Web Security Gateways

                                 Wireless Security
                                                                                                                            INFORMATION SECURITY (ISSN 1096-8903) is pub-
                                                                                                                            lished monthly with a combined July/Aug., Dec./Jan.
                          For more information, contact:                                                                    issue by TechTarget, 117 Kendrick St., Suite 800,
                                                                                                                            Needham, MA 02494 U.S.A.; Phone 781-657-1000;
                            jgarland@techtarget.com                                                                         Fax 781-657-1100.

                                                                                                                            All rights reserved. Entire contents, Copyright Š
                                                                                                                            2009 TechTarget. No part of this publication may be
                                                                                                                            transmitted or reproduced in any form, or by any
                                                                                                                            means without permission in writing from the pub-
                                                                                                                            lisher, TechTarget or INFORMATION SECURITY.



     9         I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
SPONSOR RESOURCES



                       Proofpoint, Inc.
                       See ad page 2
                       • Discover the dramatic cost savings that companies can realize by adopting a SaaS
                         (Software-as-a-Service) model for email security versus an on-premises approach.

   SORT YOUR           • Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use
   MESSAGING             policy-based email encryption solution.
SECURITY CHOICES
                       • Learn how Proofpoint MLX technology provides unrivalled defense against spam.

  MESSAGING
   SECURITY
PRODUCT LISTING        About Proofpoint, Inc.
                       Proofpoint secures and improves enterprise email infrastructure with solutions
    SPONSOR
                       for email security, archiving, encryption and data loss prevention. Proofpoint
   RESOURCES           solutions defend against spam and viruses, prevent leaks of confidential and
                       private information, encrypt sensitive emails and archive messages for retention,
                       e-discovery and easier mailbox management. Proofpoint solutions can be
                       deployed on-premises (appliance), on-demand (SaaS) or in a hybrid architec-
                       ture for maximum flexibility and scalability. For more information, please visit
                       http://www.proofpoint.com




     10        I N F O R M AT I O N S E C U R I T Y • BUYER’S GUIDE • Messaging Security

More Related Content

What's hot

Axoss Security Awareness Services
Axoss Security Awareness ServicesAxoss Security Awareness Services
Axoss Security Awareness ServicesBulent Buyukkahraman
 
Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidrackAID Support
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...IBM India Smarter Computing
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...IBM India Smarter Computing
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Ds security
Ds securityDs security
Ds securityServium
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security ProgramSeccuris Inc.
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnualfinance40
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeKrisValerio
 
STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsShahar Geiger Maor
 
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, GiuxIBMSSA
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
 
Paper id 2120145
Paper id 2120145Paper id 2120145
Paper id 2120145IJRAT
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape WebinarJoseph Schorr
 
Microsoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Private Cloud
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response HeadersUSENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response HeadersAditya K Sood
 

What's hot (20)

Axoss Security Awareness Services
Axoss Security Awareness ServicesAxoss Security Awareness Services
Axoss Security Awareness Services
 
Mc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaidMc afee saas inbound filtering-rackaid
Mc afee saas inbound filtering-rackaid
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Ds security
Ds securityDs security
Ds security
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
 
STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services Trends
 
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Paper id 2120145
Paper id 2120145Paper id 2120145
Paper id 2120145
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape Webinar
 
Microsoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server Datasheet
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response HeadersUSENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers
 

Similar to Buyers Guide To Messaging Security Dec 2009

SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...VOROR
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxDebmalyaSingha
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gatewayijsrd.com
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
What is Cyber security.pdf
What is Cyber security.pdfWhat is Cyber security.pdf
What is Cyber security.pdfchanduvarma019
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | SecloreSeclore
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfseoteameits
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityHari Kumar
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdfonline Marketing
 

Similar to Buyers Guide To Messaging Security Dec 2009 (20)

SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
 
COMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptxCOMPUTER AND NETWORK SECURITY.pptx
COMPUTER AND NETWORK SECURITY.pptx
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gateway
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
What is Cyber security.pdf
What is Cyber security.pdfWhat is Cyber security.pdf
What is Cyber security.pdf
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
information security technology
information security technologyinformation security technology
information security technology
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 

More from Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

More from Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Buyers Guide To Messaging Security Dec 2009

  • 1. I N F O R M A T I O N S ECURITY ÂŽ BUYER’S GUIDE TO Messaging Security Messaging security options aren’t clear cut any more. We’ll help you decide when an on-premise solution is right for your organization, or when cloud- based SaaS is the way to go. INSIDE 3 Sort Your Messaging Security Choices 8 Messaging Security Vendor Listing INFOSECURITYMAG.COM
  • 2.
  • 3. SORT YOUR MESSAGING SECURITY SORT YOUR MESSAGING SECURITY CHOICES MESSAGING SECURITY PRODUCT LISTING CHOICES Companies face complicated SPONSOR buying decisions when it RESOURCES comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both. BY KAR E N H O B E RT AN D D IANA KE LLEY PROTECTING MESSAGING SERVICES (e.g., email, instant messaging, texting) is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. Messaging system administrators are charged with preventing data leaks, warding off system attacks such as spam, and guarding against malicious programs. Messaging security tools provide protection against spam and phishing, malware (both embedded and as attachments), as well as provide privacy policy enforcement (e.g., encryption for transport) to ensure compliance and data protection. Choosing a solution requires looking at messaging security from two important aspects: the type of messaging security: perimeter security and message security; and the delivery of the service: on-premise or SaaS. As with any important security package, the choices depend on the individual business and what it feels it needs to protect. Although some messaging security solutions focus on other messaging traffic, many solutions that provide email security include modules for IM and other types of messaging traffic. Thus the scope of this guide will focus on email security although many of these concepts also apply to other types of messaging. 3 I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
  • 4. MESSAGING SECURITY COMPONENTS The best way to consider email messaging security is to look at it from two major functional aspects: • Perimeter security: preventing incoming attacks and securing the hygiene of the messaging system, such as antivirus, antispam and antimalware protection. • Message security: preventing the accidental or malicious release of informa- tion that would compromise user privacy or corporate data through message SORT YOUR MESSAGING encryption, digital signatures, rules-based filtering and policy-enforced actions. SECURITY CHOICES Most hosted services and on-premise solutions offer these basic functions: anti- spam and antiphishing; attachment scanning; and rules-based filtering. Additional MESSAGING features include: DRM policy enforcement; keyword scanning and blocking; SECURITY encrypt on-send; tagging; digital signing; moving attachments to a secure repository; PRODUCT LISTING as well as archiving, message logging and journaling. Recent email platform updates include basic capabilities such as user generated whitelists and blacklists, adminis- trator-managed policies that perform actions based on message contents (e.g., SPONSOR RESOURCES encrypt a message that contains personal data such as a Social Security number [SSN]), and auto-filtering to prevent virus and phishing attempts. Email messages traverse many layers of the system to get to their destination, including in the cloud (over the Internet), gateway, network, service (e.g., email server, archive server), mailbox file, and email client. Messaging security tools can be applied to many parts of the system depending on business needs. In some cases the integrated messaging security capabilities of email platforms are enough for the needs of the business, however there are many reasons to extend messaging security beyond native email platform security tools. Third-party messaging security solu- tions can be used to secure messages as they traverse system layers. Bottom Line: Messaging security includes securing the messaging service from attacks as well as securing message content. Recent email platform upgrades now include perimeter and message security capabilities as native functionality. Message security enforced at different layers of the system is possible using third-party options. Organizations need to consider their messaging security requirements and where the system is most vulnerable. HOW TO DECIDE: ON-PREMISE VS. SAAS/CLOUD? The messaging security market is robust with many vendors offering packages that support different aspects of messaging security. Some products are specialized for securing messages in support of specific industries, such as logging messages in an online service for legal verification of messages. Other packages focus on perimeter security or message security but not both. Whereas others support all messaging security features in different parts of the system, such as cloud-based perimeter security that filters out spam and malware before the messages cross the firewall. Essentially there are three options for deploying messaging security: SaaS mes- saging security, on-premise messaging security, or a combination. Choosing one 4 I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
  • 5. option over another is as varied as the needs of the company. Generally SaaS email security services focus on perimeter security services (although some offer message security as well) whereas on-premise solutions offer both perimeter and message security capabilities. Promise of SaaS: reduce, re-use. SaaS-based services have become a popular option for many enterprises looking to reduce costs for IT services. Actually many SORT YOUR customers have relied on hosted email perimeter security for some time and until MESSAGING SECURITY CHOICES recently, the only option for message content security was to purchase a third-party solution. Online spam and virus filtering services have grown to become reliable resources for protecting messaging systems from spam and other malicious email MESSAGING content. According to some reports, 90 percent to 95 percent of incoming traffic is SECURITY crud (e.g., spam, phishing, malware). Stopping that traffic before it makes it to the PRODUCT LISTING internal message transfer agent (MTA) server not only improves the overall per- formance of the messaging service but also has a compliance impact; if the bad message never makes it to the internal network/server then the organization doesn’t SPONSOR have to save it. RESOURCES SaaS messaging security providers offer highly reliable services with up-to-date blacklists and virus tables. Pricing is a leasing model usually based on users or usage where cus- tomers pay for only what’s used (not always a good SaaS messaging security deal, think about cellphone overage charges). One providers offer highly of the more attractive aspects of hosted services is that they can lower capital expenses for utilities, reliable services with hardware, software and personnel. Not only are hosted services effective, but they can keep costs up-to-date blacklists and capital expenditures under control. and virus tables. On-Premise benefits. Some organizations need more control or have strict policies for ensuring information privacy and preventing data leaks. Regulatory and business policies may require greater control over messages. On-premise messaging security solutions offer customers more granular control and options for securing their information and messaging systems than SaaS offerings. On-premise messag- ing security systems can mitigate insider threat by preventing breaches at various layers of the system. In some cases, overall cost for on-premise solutions may be lower than SaaS depending on the services used and whether native email platform security capabilities can support the business security requirements. Weighing the pros and cons: on-premise vs.cloud. Overall, choosing a SaaS messaging security service over on-premise depends on how and where the security needs to be applied. If cloud-based filtering is most important, then a SaaS solution is likely a worthwhile option. If the organization needs more internal coverage as well as protection from external threats, on-premise options are a likely candidate. However, if a customer is looking to get the benefits of both cloud-based filtering and internal managed layers, then a hybrid of both SaaS message security and on-premises message security is probably the most beneficial combination for the organization. 5 I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
  • 6. Bottom Line: Message security delivery depends on what is of greatest concern to the organization. SaaS message security is best for filtering messages in the cloud, and pre- venting a lot of crud from entering the messaging system. On-premise message security systems offer more flexibility and options for controlling against internal threats. Many organizations use a combination on SaaS and on-premise message security services to get the most robust solution. SORT YOUR MESSAGING SECURITY CHOICES LOGGING, ARCHIVING, REPORTING AND COMPLIANCE CONSIDERATIONS Many regulations include protection requirements for information sent via email. MESSAGING The PCI-DSS requires encryption for cardholder data such as PANs (the 16 digit SECURITY PRODUCT LISTING primary account number) sent in email or as an email attachment. Data breach laws, such as SB1386, and the recent HITECH Act offer “safe harbors” from notifi- cation if the information was encrypted. Messaging encryption is available as an SPONSOR integrated feature, or can be purchased as an add-on. Before purchase, consider RESOURCES what needs to be encrypted: email message content; file attachments; or both? Are there regulatory requirements for a certain type of encryption algorithm? And what kinds of policy controls need to be applied? Mature messaging encryption solutions can encrypt based on individual or group sender and Changes made to the recipient, type of file, and by keyword or data Federal Rules of Civil type. For example, if the solution is configured to encrypt when SSNs are present, outgoing Procedure (FRCP) in messages will be scanned for nine-digit numbers and encrypted if a match is detected. 2006 expanded legal Logging and archiving are a critical part of IT audit and compliance programs. Changes made discovery efforts to to the Federal Rules of Civil Procedure (FRCP) include electronic in 2006 expanded legal discovery efforts to include electronic messaging. Organizations messaging. should look at the archival capacity of their pro- posed messaging solution. Consider the storage capacity of the product as well as the tools available to help search for and recover exchanges of interest. Retrieval and holds during an audit or legal e-discovery can be time limited—make sure the archival solution enables for multiple holds, fast searching, and recovery against the most common requirements: keywords; user; and date/time. Log data from the messaging system may also need to be archived for compliance purposes or as part of a larger security information and event management initiative. If your company has a spoliation policy in place that calls for deletion of logs or email conversations after a certain time, look for a solution with complete wipe-out capabilities. Consider what kind of reports will be required and review how flexible the solution is. Are pre-formatted templates for common reporting available? How customizable is the reporting tool? For example, auditors may want to see data leak report that shows no personal health information (PHI) was sent out of the organi- 6 I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
  • 7. zation via email or the CIO may want to see usage statistics during a network resizing exercise—can the reporting be adjusted easily for these user needs? A special consideration for the off-premise solutions—what kind of reporting is in place regarding access to their data center and messaging servers? Are there physical controls such as badge access and cameras? Are unique IDs and hierarchical administrative duties in place? Are logs protected with encryption, file integrity monitoring, and tamper proofing/tamper evidence protection? What is the SaaS SORT YOUR providers’ policy for producing log and archive data to the company or its agents? MESSAGING SECURITY CHOICES Make sure the provider shows proof of the exact certifications they have received to ensure they match the regulatory requirements of the business. The off-premise solution should meet or exceed all compliance and reporting requirements of an in-house one. MESSAGING SECURITY PRODUCT LISTING Bottom Line: Email communications are the lifeblood of today’s business. Legal and regulatory policies and standards require organizations to protect, archive, and report on email activity. Look for solutions that provide policy-based encryption and robust SPONSOR activity logging. Reporting often serves many different groups; make sure the messaging RESOURCES solution can provide the reporting the business needs. Finally, don’t forget compliance and protection needs when opting for an off-premise solution. Confirm that the provider has appropriate logging, access control, and monitoring in place.w Karen Hobert is an IT industry research analyst who focuses on communication, collaboration, content management, and social software technologies. She offers over 20 years of hands-on and market expertise to enterprises planning, designing, and deploying shared information systems. Diana Kelley is founder of consultancy SecurityCurve and former vice president and service director for the security and risk management strategies service at Burton Group. 7 I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
  • 8. VEN D O RS Messaging Security Here is a representative list of some vendors offering messaging security products that are either on-premise or offered as a service. Compiled by SearchSecurity.com editors Aladdin Knowledge Systems Gordano Sendmail SORT YOUR www.aladdin.com www.gordano.com www.sendmail.com MESSAGING SECURITY CHOICES AppRiver IBM Internet Security Systems Sigaba www.appriver.com www.iss.net www.sigaba.com Astaro Networks Mailprotector Somansa MESSAGING www.astaro.com www.mailprotector.net www.somansatech.com SECURITY PRODUCT LISTING Barracuda Networks Marshal8e6 SonicWALL www.barracuda.com www.m86security.com www.sonicwall.com BitDefender McAfee Sophos SPONSOR www.bitdefender.com (Secure Computing, SafeBoot) www.sophos.com RESOURCES www.mcafee.com WatchGuard (BorderWare) St. Bernard Software www.borderware.com MxLogic (McAfee) www.stbernard.com www.mxlogic.com CA Sunbelt Software www.ca.com MessageGate www.sunbeltsoftware.com www.messagegate.com Cisco Systems (IronPort) Symantec www.ironport.com MessageLabs (Symantec) www.symantec.com www.messaglabs.com Clearswift Trend Micro www.clearswift.com Microsoft www.trendmico.com www.microsoft.com Clearwell Systems Tumbleweed (Axway) www.clearwellsystems.com Microworld www.tumbleweed.com www.mwti.net Cloudmark Vircom www.cloudmark.com Mirapoint www.vircom.com www.mirapoint.com ESET Voltage www.eset.com MXLogic (McAfee) www.voltage.com www.mxlogic.com eSoft Webroot www.esoft.com PGP www.webroot.com www.pgp.com Fortinet Websense www.fortinet.com PineApp www.websense.com www.pineapp.com F-Secure ZixCorp www.f-secure.com Process Software www.zixcorp.com www.process.com GFI www.gfi.com Proofpoint www.proofpoint.com Google (Postini) www.google.com/postini RedCondor www.redcondor.com 8 I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
  • 9. TECHTARGET SECURITY MEDIA GROUP Information I N F O R M A T I O N VICE PRESIDENT AND GROUP PUBLISHER Security Doug Olender magazine offers S ECURITY ÂŽ PUBLISHER Josh Garland comprehensive EDITORIAL DIRECTOR Kelley Damore DIRECTOR OF PRODUCT MANAGEMENT Susan Shaver Buyer’s Guides EDITOR Michael S. Mimoso SENIOR TECHNOLOGY EDITOR Neil Roiter DIRECTOR OF MARKETING Kristin Hadley on the following FEATURES EDITOR Marcia Savage SALES MANAGER, EAST Zemira DelVecchio SALES MANAGER, WEST Dara Such topics: ART & DESIGN CIRCULATION MANAGER Kate Sullivan CREATIVE DIRECTOR Maureen Joyce SORT YOUR MESSAGING Antimalware COLUMNISTS ASSOCIATE PROJECT MANAGER SECURITY CHOICES Jay G. Heiser, Marcus Ranum, Bruce Schneier Suzanne Jackson Application Security PRODUCT MANAGEMENT & MARKETING CONTRIBUTING EDITORS Michael Cobb, Eric Cole, James C. Foster, Corey Strader, Jennifer Labelle, Andrew McHugh Authentication Shon Harris, Richard Mackey Jr., Lisa Phifer, SALES REPRESENTATIVES MESSAGING Ed Skoudis, Joel Snyder SECURITY Eric Belcher ebelcher@techtarget.com PRODUCT LISTING DLP TECHNICAL EDITORS Greg Balaze, Brad Causey, Mike Chapple, Peter Patrick Eichmann peichmann@techtarget.com Email Security Giannacopoulos, Brent Huston, Phoram Mehta, Sandra Kay Miller, Gary Moser, David Strom, Jason Olson jolson@techtarget.com Steve Weil, Harris Weisman SPONSOR Jeff Tonello jtonello@techtarget.com Identity and Access RESOURCES Management USER ADVISORY BOARD Edward Amoroso, AT&T Nikki Wise nwise@techtarget.com Anish Bhimani, JPMorgan Chase TECHTARGET INC. Intrusion Larry L. Brock, DuPont CHIEF EXECUTIVE OFFICER Greg Strakosch Detection/Prevention Dave Dittrich Ernie Hayden, Seattle City Light Patrick Heim, Kaiser Permanente PRESIDENT Don Hawk Mobile Data Security Dan Houser, Cardinal Health EXECUTIVE VICE PRESIDENT Kevin Beam Patricia Myers, Williams-Sonoma Ron Woerner, TD Ameritrade Network Access Control CHIEF FINANCIAL OFFICER Eric Sockol SEARCHSECURITY.COM SENIOR SITE EDITOR Eric Parizo EUROPEAN DISTRIBUTION Network Firewalls Parkway Gordon Phone 44-1491-875-386 NEWS EDITOR Robert Westervelt www.parkway.co.uk Policy and Risk LIST RENTAL SERVICES ASSOCIATE EDITOR William Hurley Management Julie Brown ASSISTANT EDITOR Maggie Wright Phone 781-657-1336 Fax 781-657-1100 Remote Access REPRINTS ASSISTANT EDITOR Carolyn Gibney FosteReprints Rhonda Brown SIEM INFORMATION SECURITY DECISIONS Phone 866-879-9144 x194 GENERAL MANAGER OF EVENTS Amy Cleary rbrown@fostereprints.com UTM EDITORIAL EVENTS MANAGER Karen Bagley Vulnerability Management Web Security Gateways Wireless Security INFORMATION SECURITY (ISSN 1096-8903) is pub- lished monthly with a combined July/Aug., Dec./Jan. For more information, contact: issue by TechTarget, 117 Kendrick St., Suite 800, Needham, MA 02494 U.S.A.; Phone 781-657-1000; jgarland@techtarget.com Fax 781-657-1100. All rights reserved. Entire contents, Copyright Š 2009 TechTarget. No part of this publication may be transmitted or reproduced in any form, or by any means without permission in writing from the pub- lisher, TechTarget or INFORMATION SECURITY. 9 I N F O R M AT I O N S E C U R I T Y • BUYE R’S GUIDE • Messaging Security
  • 10. SPONSOR RESOURCES Proofpoint, Inc. See ad page 2 • Discover the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach. SORT YOUR • Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use MESSAGING policy-based email encryption solution. SECURITY CHOICES • Learn how Proofpoint MLX technology provides unrivalled defense against spam. MESSAGING SECURITY PRODUCT LISTING About Proofpoint, Inc. Proofpoint secures and improves enterprise email infrastructure with solutions SPONSOR for email security, archiving, encryption and data loss prevention. Proofpoint RESOURCES solutions defend against spam and viruses, prevent leaks of confidential and private information, encrypt sensitive emails and archive messages for retention, e-discovery and easier mailbox management. Proofpoint solutions can be deployed on-premises (appliance), on-demand (SaaS) or in a hybrid architec- ture for maximum flexibility and scalability. For more information, please visit http://www.proofpoint.com 10 I N F O R M AT I O N S E C U R I T Y • BUYER’S GUIDE • Messaging Security