1 / 23

SECURE Exchange Gateway

SECURE Exchange Gateway. Sales Training. Agenda. Email solution family How can clients use the SXG?. SECURE Exchange Gateway. Email solution family. Email Solution family. Boundary. Detect Malware Data Leakage Prevention Adaptive Redaction Keyword search Control file types and sizes

sage
Download Presentation

SECURE Exchange Gateway

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SECURE Exchange Gateway Sales Training

  2. Agenda • Email solution family • How can clients use the SXG?

  3. SECURE Exchange Gateway Email solution family

  4. Email Solution family Boundary • Detect Malware • Data Leakage Prevention • Adaptive Redaction • Keyword search • Control file types and sizes • Prevent Inappropriate content – abuse; pornography SECURE Email Gateway • Anti-malware and anti-spam • DLP/Adaptive Redaction (AR) • Internet email • On-box encryption Internal SECURE Exchange Gateway • Anti-malware • DLP/Adaptive Redaction (AR) • Internal Exchange 2007/2010/2013 support • Integration with Gateway solution

  5. How can the Gateways work together? Microsoft Exchange Server Deploy a boundary gateway (optional) Install Interceptor module on Exchange server Peer Users Users Users Deploy internal processing servers Clearswift SECURE Email Gateway Clearswift SECURE Exchange Gateway Peer gateways together

  6. How does it differ from the SEG? • No anti-spam features • No email encryption • No Transport Layer Security (TLS) • No Missing Manager features • Informs to manager still available • English management UI only • Pricing • Starts at same price point as SEG • No AV as standard • Quote a minimum of 2 instances

  7. SECURE Exchange Gateway How can clients use the SXG?

  8. Collaboration is vital • Email-based attacks and security concerns remain among the very top issues facing corporate IT security professionals and organizations in general • Their Exchange infrastructure is mission critical • Their business information is traversing their internal infrastructure and is vital to their business • Just scanning for malware is not enough anymore

  9. Information Protection Beware ‘The Enemy Within’ the threats are real & growing Of respondents were struggling to keep up with the changing security landscape Of organizations experienced some form of data security incident in the last year Of threats came from within the extended enterprise; employees, ex-employees, contract staff & trusted partners Source: The Enemy Within, Loudhouse, UK Report 2013

  10. Use cases • Ring-fencing (e.g. retail/investment banks) • Military contractors in multiple regions (e.g. export controls) • Hygiene (e.g. education) • Internal conduct (e.g. sexual harassment)

  11. Choice of Anti-virus Structural Sanitisation File type controls Pornographic content Content aware engine Clearswift SECURE Exchange Gateway • Granular policies • Integration with Directory servers • Workflow for Admins, Users and Auditors • Monitor mode • Adaptive redaction • Document sanitisation • File type controls • Keyword search • PCI/PII Templates

  12. Why scan internal mail? Problem • There are often email conversations that contain content that shouldn’t be sent • Visibility of content is very limited with built-in Exchange • Email is mission critical, so scanning can’t delay email Solution • Software solutions that have minimal impact to allow scanning • Prevents data loss, malware and non-business files being communicated • Provides detailed reporting on sender, recipients and content being sent

  13. Exchange Message Scanning How • SXG processes messages between users on Exchange servers • Flexible polices for all sizes of organization • Enables business unit separation • Ensures appropriate content is distributed internally and externally Sent Interceptor Blocked Exchange Server Clearswift SECURE Exchange Gateway Delivered

  14. Flexible Policies Problem • Groups of users may need to be separated from each other • Large geographically dispersed organizations may require control of messages by content Solution • Integration with AD to allow differentrules for different users • Policy model that makes the definition of rules easy • Facilitates the modern business

  15. Flexible Policies How • Being able to create actions and reactions based upon sender, recipients and content is also becoming more and more important • SXG policy options permit scanning • Internal email • Inbound email • Outbound email • Active Directory integration permits scanning between different organizational units • Sales, Marketing, Researchers, Traders, etc.

  16. Easy Policy Model • “Policy Routes” define different email communication channels • “Content Rules” define the rules to be applied to a particular policy route • Integrate Boundary and Internal policies in same UI

  17. Data Loss Prevention Problem • More concern than ever on the use of data in an organization • Who has it? • Where is it going? • Filtering must be in real-time, not after the fact Solution • Solution must allow searches for sensitive information in messages and attachments • Remediation must be possible to deal with detections and false positives • Adaptive Redaction options to facilitate data sharing in safety

  18. Data Loss Prevention How • Deep scan messages and attachment contents • Adaptive Redaction on internal mail • Powerful, customizable key word search • Expressions: Simple, regular expressions and comprehensive operators • User-defined tokens • Text-entities: Credit Cards, IBAN, Identity (US, UK, DE, AU) • Dictionaries: PCI, PII, SOX and many more • Check file types using binary signatures • Registered file and file fragments when used with the IG Server

  19. Inbound Threats Problem • Malware has evolved, how do you protect yourself from targeted attacks from APT’s • How do you detect and control non-business file types and content that can cause your organization problems? Solution • Solution can inspect messages without impacting mail flow • Can enhance incumbent AV solution

  20. Inbound Threats How • Controls who is sending what to whom • Choice of anti-malware engines (Kaspersky and/or Sophos) • Structural Sanitization* • True file type detection • File size limits • Offensive messages • Pornographic image scanning • File structure validation * Part of the Adaptive Redaction suite of add-ons

  21. SECURE Exchange Gateway Summary

  22. Summary • Robust DLP solution, protecting the organization, its employees and its intellectual property • Provides more depth of features compared to standard built-in Exchange offerings for DLP • Facilitates hybrid layered security for clients using managed services for hygiene and have DLP needs • Integrates with other Clearswift solutions

  23. Questions? www.clearswift.com Nick Hogg

More Related