protect digital business with a unique email security …€¦ · nnmove email security systems to...

2
SOLUTION BRIEF PROTECT DIGITAL BUSINESS WITH A UNIQUE EMAIL SECURITY APPROACH Verizon found that 49% of all malware was actually installed via an age-old avenue: email. 1 Fortinet Email Security consistently earns top ratings in independent testing like ICSA Labs, NSS Labs, and Virus Bulletin. INTRODUCTION Digitalization of today’s businesses is creating new opportunities, but also opening new avenues of attack. Ever the entrepreneurs, many cyber criminals are quick to exploit new portions of the attack surface like IoT, cloud surfaces, and more. However, they also stick with proven methods until they are no longer profitable. In fact, in the 2018 Data Breach Investigations Report, 1 Verizon found that 49% of all malware was actually installed via an age-old avenue: email. So it’s not surprising that leading analyst firm Gartner asserts, “Advanced threats (such as ransomware and business email compromise) are easily bypassing the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used.” 2 That’s why Fortinet Email Security provides the latest security technologies to deal with an evolving set of email attack classes: spear phishing, ransomware, business email compromise, and more. But, stopping only incoming attacks leaves organizations constantly on the defensive. Fortinet Email Security goes further to uncover the full threat life cycle (and supporting cyber-criminal ecosystem) intended to follow the initial attack. This unique approach enables organizations to proactively secure their digital businesses. And it’s available in a range of easy-to-use form factors, for organizations short on specialized cybersecurity skills and staff. ADVANCED EMAIL SECURITY FOR ADVANCED THREATS New capabilities from FortiGuard Labs (more than 230 threat researchers across more than 10 disciplines) help Fortinet Email Security keep pace with the very latest email attack techniques. These include: n Click Protect to identify websites that are weaponized after email delivery. n Content Disarm & Reconstruction that removes embedded active code to deliver safe files. n FortiSandbox to identify brand-new malicious attacks, attachments, and websites. n Impersonation Analysis to detect spoofing and other indicators of email fraud. These techniques complement the established features of our full-featured secure email gateway solution. Re-write (and Re-rate) embedded URLs Remove active content from files Sandbox URLs and attachments Detect impersonation

Upload: others

Post on 09-Apr-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PROTECT DIGITAL BUSINESS WITH A UNIQUE EMAIL SECURITY …€¦ · nnMove email security systems to public or private cloud environments. nnDeploy plug-and-play appliances in their

SOLUTION BRIEF

PROTECT DIGITAL BUSINESS WITH A UNIQUE EMAIL SECURITY APPROACH

Verizon found that 49% of all malware was actually installed via an

age-old avenue: email.1

Fortinet Email Security consistently earns top ratings in independent testing like ICSA Labs, NSS Labs, and Virus Bulletin.

INTRODUCTION

Digitalization of today’s businesses is creating new opportunities, but also opening new avenues of attack. Ever the entrepreneurs, many cyber criminals are quick to exploit new portions of the attack surface like IoT, cloud surfaces, and more.

However, they also stick with proven methods until they are no longer profitable. In fact, in the 2018 Data Breach Investigations Report,1 Verizon found that 49% of all malware was actually installed via an age-old avenue: email. So it’s not surprising that leading analyst firm Gartner asserts, “Advanced threats (such as ransomware and business email compromise) are easily bypassing the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used.”2

That’s why Fortinet Email Security provides the latest security technologies to deal with an evolving set of email attack classes: spear phishing, ransomware, business email compromise, and more. But, stopping only incoming attacks leaves organizations constantly on the defensive. Fortinet Email Security goes further to uncover the full threat life cycle (and supporting cyber-criminal ecosystem) intended to follow the initial attack.

This unique approach enables organizations to proactively secure their digital businesses. And it’s available in a range of easy-to-use form factors, for organizations short on specialized cybersecurity skills and staff.

ADVANCED EMAIL SECURITY FOR ADVANCED THREATS New capabilities from FortiGuard Labs (more than 230 threat researchers across more than 10 disciplines) help Fortinet Email Security keep pace with the very latest email attack techniques.

These include:

nn Click Protect to identify websites that are weaponized after email delivery.

nn Content Disarm & Reconstruction that removes embedded active code to deliver safe files.

nn FortiSandbox to identify brand-new malicious attacks, attachments, and websites.

nn Impersonation Analysis to detect spoofing and other indicators of email fraud.

These techniques complement the established features of our full-featured secure email gateway solution.

Re-write (and Re-rate) embedded URLs

Remove active content from files

Sandbox URLs and attachments

Detect impersonation

Page 2: PROTECT DIGITAL BUSINESS WITH A UNIQUE EMAIL SECURITY …€¦ · nnMove email security systems to public or private cloud environments. nnDeploy plug-and-play appliances in their

SOLUTION BRIEF: PROTECT DIGITAL BUSINESS WITH A UNIQUE EMAIL SECURITY APPROACH

Copyright © 2018 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.

GLOBAL HEADQUARTERSFortinet Inc.899 Kifer RoadSunnyvale, CA 94086United StatesTel: +1.408.235.7700www.fortinet.com/sales

EMEA SALES OFFICE905 rue Albert Einstein06560 ValbonneFranceTel: +33.4.8987.0500

APAC SALES OFFICE300 Beach Road 20-01The ConcourseSingapore 199555Tel: +65.6513.3730

LATIN AMERICA HEADQUARTERSSawgrass Lakes Center13450 W. Sunrise Blvd., Suite 430Sunrise, FL 33323Tel: +1.954.368.9990

1 “Verizon 2018 Data Breach Investigations Report,” Verizon, April 10, 2018. 2 Neil Wynne, “Market Guide for Secure Email Gateways,” Gartner, May 3, 2017.

EASING THE BURDEN ON SECURITY TEAMS This proactive approach through automated intelligence generation and sharing is critical for organizations impeded by a shortage of skilled cybersecurity professionals and too many other business-enabling projects clamoring for time and attention. Fortinet Email Security is offered in flexible form factors.

Organizations have the option to:

nn Outsource email security systems to a managed security provider or Fortinet.

nn Move email security systems to public or private cloud environments.

nn Deploy plug-and-play appliances in their own data center.

ADVANCED PROTECTION WITH FORTINET EMAIL SECURITY

Fortinet Email Security can help address the latest email threats and reduce the time required for security administration, incident investigation, and response. These make the business case for advanced protection from costly email threats—like business email compromise, ransomware, targeted attacks, and more—even stronger.

Fortinet is the only vendor with email security as part of an integrated and automated fabric architecture, enabling it to automatically generate and share intelligence to address advanced threats across all major attack vectors. This intelligence sharing is a critical component that helps organizations move from a reactive to more proactive security posture, enabling protection across multiple avenues of attack.

MOVING TO A PROACTIVE SECURITY APPROACH

That said, incoming email is often only the first stage in a multistage attack that may include communication to other websites, download of additional components, and more. With the help of FortiSandbox (as well as FortiGuard Labs), organizations are able to uncover the stages, components, and associated cyber-criminal infrastructure that extends beyond what is seen and blocked by your email security.

Further, new threat intelligence can be automatically generated and distributed throughout your security infrastructure, creating a security fabric.

This enables organizations to move from reactive to proactive security, across multiple avenues of attack.