your email channel – the chink in your armor
TRANSCRIPT
Email is part of Everything We Do
Email as Identity
Email as Project work flow
Email as Storage
Email as Sharing/Collaboration Tool
Email as Search
Email Security6 hours a day and 30 hours per work week
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
PWC 2015 InformaFon Security Survey Key Findings • Security breaches are inevitable
– 90% of companies surveyed reported a breach compare to 81% in 2014
• Rising significantly in Europe; 41% jump in the number of incidents detected over 2013
• EU regula5on in 2017 should mandate security incident disclosure
• Financial impacts of security incidents is increasing • Do companies invest enough in IT Security
– Investment in informaFon security drop by 4% compare to 2013
– Board of Directors remain uninvolved in criFcal iniFaFves such as security strategy
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
Messaging Landscape • Email remains the go-‐to-‐form communicaFon in the business world (6% YOY since 2013)
• Social engineering becomes the primary vector for e-‐mail cyber-‐threats
• Successful threats are resulFng in greater impacts to end users – Stolen credenFals – Fraud – IdenFty the_
Source: Cloudmark and MAAWG Email Metrics Report #15
95% of Global E-‐Mail Traffic is Malicious
90% of advance threats start with a phishing email.
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
Business Email Compromise (BEC) Causing Massive Losses Goes far beyond individual risk…
Spear Phishing is the igni9on in highly orchestrated and targeted campaigns
LUUUK: In less than one week the the_ of € 500,000 from one bank by enabling illicit, automaFc transfer of funds in amounts from €1,700 to €39,000 from 190 vicFms based in Italy and Turkey
Crouching Ye5: Steals confidenFal data, including intellectual property and other strategic informaFon via special modules that collect data from specific industrial IT environments US-‐Asia-‐Europe
Darkhotel: Targets travelling business execuFves staying at hotels abroad to steal confidenFal data; operaFng for almost a decade -‐ Asia
FBI Findings: 7,500 vicFms of BEC that led to $1.2 billion in global losses since October 2013 UbiquiF Networks, a U.S. technology company $47 million in lost funds
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
What Makes a Beker Messaging Security SoluFon? • Breadth of capabiliFes and effecFveness against all messaging borne threats – Spam – Phishing / Spear Phishing – Malware
• Understand the akackers strategy – IdenFfy how the akack is built and act on the elements of it such as domains names, landing pages, hacked accounts
– Cloudmark’s world-‐class research team understands the threat landscape to stay one step ahead of the bad guys
• Build predicFve defenses: Stop the akack when it starts not a_er it starts
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
What Makes a Beker Messaging Security SoluFon?
• Akackers will evolve so we need to be designed to evolve – We have extended our soluFon to other key protocols such as DNS
• Adjacencies to other security technologies – Email security soluFons do not operate alone; must correlate threats across adjacent security technologies
– Integrate with backend security informaFon and event management (SIEM) plaoorms
• Scalability and availability – Carrier-‐grade efficiency and scalability – InterrupFon of service due to influxes of spam and other cyber-‐akacks can cripple your business
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
What Makes a Beker Messaging Security SoluFon?
Threat Intelligence
Security PlaKorm
Predic5vely Blocks Threats DNS
Detects Malicious Behavior
Provides Real-‐Time Visibility ?
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
Internet
End Users Cloudmark MTA + AS Inbound
Cloudmark MTA + AS Outbound
Webmail
IMAP
POP 3
MDA/ Back End MDA/ Back End
LDAP
High Level Messaging Architecture Simple and Fast to Deploy
EMAIL EMAIL
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
What Makes a Beker Messaging Security SoluFon? • Breadth of capabiliFes and effecFveness against all messaging borne threats – Spam – Phishing / Spear Phishing – Malware
• Understand the akackers strategy – IdenFfy how the akack is built and act on the elements of it such as domains names, landing pages, hacked accounts
– Cloudmark’s world-‐class research team understands the threat landscape to stay one step ahead of the bad guys
• Build predicFve defenses: Stop the akack when it starts not a_er it starts
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
What Makes a Beker Messaging Security SoluFon?
• Akackers will evolve so we need to be designed to evolve – We have extended your soluFon to other key protocols such as DNS
• Adjacencies to other security technologies – Email security soluFons do not operate alone; must correlate threats across adjacent security technologies
– Integrate with backend security informaFon and event management (SIEM) plaoorms
• Scalability and availability – Carrier-‐grade efficiency and scalability – InterrupFon of service due to influxes of spam and viruses failure of gateway soluFons to provide service conFnuity, can cripple your business
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
What Makes a Beker Messaging Security SoluFon?
Threat Intelligence
Security PlaKorm
Predic5vely Blocks Threats DNS
Detects Malicious Behavior
Provides Real-‐Time Visibility ?
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.
• Messaging Security at the top of your business agenda
• Assure a best of breed soluFon that can adapt to an evolving threat environment
• Select a security partner with relevant roadmap and that meets your security assessment requirements
RecommendaFon
Merci beaucoup & Danke Schön Stop by our booths to learn more! [email protected] | frank.hoberg@open-‐xchange.com
Cloudmark ConfidenFal. Do not copy, repurpose, or distribute.