290 likes | 496 Views
Complete Messaging Security: More than Spam Protection. November 15, 2014. Agenda. Today’s messaging security requirements Including content security & outbound email risks Proofpoint Solutions Introduction to Proofpoint Case Studies Wrap-up and Q & A. Multiple Threats to Email Security.
E N D
Complete Messaging Security: More than Spam Protection November 15, 2014
Agenda • Today’s messaging security requirements • Including content security & outbound email risks • Proofpoint Solutions • Introduction to Proofpoint • Case Studies • Wrap-up and Q & A Proofpoint Confidential
Multiple Threats to Email Security Enterprise Email Threats • Threats are both inbound and outbound • Spam is gaining: 300% growth in past 18 months • Spam costs $1,943** in lost productivity per employee per year • 43% of large companies employ staff to monitor outbound email* • Companies estimate that nearly 25% of emails contain content that poses a legal, financial, or regulatory risk* • 27% of companies terminated an employee for violating email policies in past year* Firewall Internet Spam, virus, phishing Firewall Proprietary info, corporate memos, regulatory compliance NetworkThreats Content Security Risks Directory harvest, DoS, hacking *Source: Forrester Resarch study **Source: Nucleus Research Proofpoint Confidential
Top Outbound Email Concerns Source: Proofpoint/Forrester Survey 2005 Proofpoint Confidential
What’s Occurred in Last 12 Months Source: Proofpoint/Forrester Survey 2005 Proofpoint Confidential
Enforce Internal Governance • Comply with internal policy • Protect internal memos, plans • Monitor for sexual harassment, hostile work environments • Control financial reportingfor Sarbanes-Oxley “75% of executives were very concerned or concerned about compliance with internal email policies” • Business risks • PR/brand damage, decreased shareholder value • Employee litigation • Regulatory penalties Source: Proofpoint/Forrester survey 2005 Proofpoint Confidential
Protect Privacy • Comply with privacy regulations • HIPAA, GLBA, CA-SB1386 • Protect customers’ private data • Prevent identity theft “Failure to comply with HIPAA can result in civil penalties of up to $25,000 per year, and criminal penalties of up to $250,000 plus imprisonment” • Business risks • Loss of customers & trust • Regulatory penalties • PR/brand damage, decrease in shareholder value Source: American Medical Association Proofpoint Confidential
Secure Intellectual Property • Protect the crown jewels • IP is different for every organization • Product designs, source code • Secure classified data “Over 1/3 of those surveyed had investigated a suspected loss of proprietary information over email in past year” • Business risks • Loss of business and competitive advantage • PR/brand damage, decrease in shareholder value • Decrease in national security Source: Proofpoint/Forrester survey 2005 Proofpoint Confidential
Information gathering Policy creation Policy Application Controls Access controls Communication Controls Risk Mitigation Starts with Policy Business, departments, industry, intellectual property, corporate data, regulations, audit Email Controls Source: Modified from Institute of Internal Auditors Proofpoint Confidential
Agenda • Today’s messaging security requirements • Including content security & outbound email risks • Proofpoint Solutions • Introduction to Proofpoint • Case Studies • Wrap-up and Q & A Proofpoint Confidential
Digital Asset Security Regulatory Compliance Anti-virus Anti-spam Email Firewall Secure Messaging Content Compliance Anti-virus Anti-spam Email Firewall Digital Asset Security Content Compliance Regulatory Compliance Secure Messaging Proofpoint MTA Proofpoint Messaging Security Console The Proofpoint Solution • Comprehensive, future-proof content security suite • Patent-pending Proofpoint MLX content classification • Can prevent infractions, report and secure email • Enterprise-grade architecture for outbound security Proofpoint Confidential
Proofpoint Spam Detection Module Powered by Proofpoint MLX Machine Learning • 3rd generation technology is more advanced than Bayesian and signature techniques • Detects 100,000+ spam attributes • Commercial spam • Adult or pornographic spam • Phishing attacks • Zero administration • Automatic updates every week • No need to custom rules • No decay in effectiveness “98.9%: The highest spam blocking rate we’ve ever seen = 9.0 out of 10.0” “What sets Proofpoint apart is that it combines SVM with other detection approaches.” Emerging Technology Showcase Award Proofpoint Confidential
Industry Leading Anti-virus • Employ anti-virus at the gateway • “Defense in depth” strategy • Automatic virus updates • Push to production or receive alerts • Fastest production-ready updates • Centralized management • Proofpoint Messaging Security Console • One interface for spam, virus, email firewall • Flexible virus handing • Full virus reporting # of unique viruses 1986 1988 1990 1992 1994 1996 1998 2000 2002 Source: F-Secure Proofpoint Confidential
Proofpoint Content Compliance Module Internal governance and control • Compliance with internal policy • Monitor 400+ standard file types • File Type Profiler for custom types • Add custom footers/disclaimers • Monitoring for inappropriate business communication • Prevent hostile work environments • Audit for sexual harassment • Installed with offensive language dictionary Proofpoint Confidential
Internet 3 1 Block or quarantine based on policy Train Proofpoint MLX Proprietary and Confid DAS 2 Filter outbound email and attachments Proofpoint Digital Asset Security Module Detects and prevents leaks of sensitive information • Employed to: • Enforce internal governance • Protect privacy • Secure intellectual property • Enterprise Data Connector • Allows business users to secure content • Links to file shares, web servers, content management systems Proofpoint Confidential
Proofpoint Regulatory Compliance Module HIPAA compliance for email • Secure protected health information (PHI) • Preloaded with Proofpoint-managed code sets • Common procedure names • Disease names • Drug classes, drug dosage • Drug names • Secure PHI with encryption Security rule: April 2005 General penalty: to $25,000 Wrongful disclosure penalty: $50,000 to $250,000 + imprisonment Proofpoint Confidential
Proofpoint Secure Messaging Module (powered by Voltage™ IBE) Proofpoint MessagingSecurity Gateway or Protection Server • Policy-driven secure messaging • Easy to administer • Easy to use • Low total cost of ownership Sender Proofpoint Secure Messaging Module Recipient Proofpoint Confidential
FTP Proofpoint Network Content Sentry HTTP and FTP Proofpoint Network Content Sentry™ • Monitor HTTP, FTP traffic • Leverage existing policy management, reporting, quarantine Proofpoint Messaging Security Gateway or Protection Server Proofpoint Messaging Security Console Proofpoint Confidential
Agenda • Today’s messaging security requirements • Including content security & outbound email risks • Proofpoint Solutions • Introduction to Proofpoint • Case Studies • Wrap-up and Q & A Proofpoint Confidential
Company Overview The leading provider of messaging security solutions for large enterprises, universities, and government agencies HQ’d in Cupertino, CA; Offices in NA, Europe, Asia 24x7 global support organization Global Reach World-class Team Experts in messaging and security, inventors of messaging Best-of-breed Partners Protecting hundreds of customers, millions of mailboxes 100% reference-able Customer Success Proofpoint Confidential
The Company We Keep Financial Services Telecomm Technology Retail, Services Manufacturing Distribution Healthcare and Pharmaceuticals Public Sector Education Proofpoint Confidential
3rd Generation “Some learning methods - such as Bayesian filtering - have proved to be unreliable for spam filtering in the enterprise environment.” Technologies 2nd Generation Technologies Proofpoint MLX™: Logistic Regressionand Support Vector Machines Heuristics; Bayesian; Cocktail of 1st and 2nd generations Limitations 1st Generation Limitations Technologies • Solve Limitations: • Immune to randomness • Not reliant onexternal party • Fully automated machine learning • Smarter than Bayesian Only man-made rules; Assumes all independent attributes Signatures; RBLs Summary Limitations Higher False Positives Thwarted by randomness; RBLsrely on inaccurate3rd parties Summary Time BOTH high effectivenessand low false positive Summary Lower Effectiveness The Most Confident Content Inspection Proofpoint MLX – a 3rd Generation Solution Proofpoint Confidential
Agenda • Today’s messaging security requirements • Including content security & outbound email risks • Proofpoint Solutions • Introduction to Proofpoint • Case Studies • Proofpoint architecture and deployment • Q & A Proofpoint Confidential
Case Study: Protection of Privacy—HIPAA Healthcare provider • Company • 3,800 email users • Provides community healthcare services • Key content security concerns • Protect patient privacy • Detect and secure both PHI and payment/claim information for HIPAA and GLBA compliance • Solution • Proofpoint Messaging Security Gateway • Proofpoint Regulatory Compliance module • Proofpoint Digital Asset Security module • PGP Universal Server™ Proofpoint Confidential
Case Study: Protection of Privacy—GLBA Large regional bank in Northeast USA • Company • 8,600 employees • Provider of personal banking services • Key content security concerns • Protect customer privacy • Detect financial informationfor GLBA compliance • Solution • Proofpoint Messaging Security Gateway • Proofpoint Regulatory Compliance module Proofpoint Confidential
Case Study: Secure Intellectual Property Major automobile manufacturer • Company • 12,000 employees • Automotive design centers acrossthe country • Key content security concerns • Protect intellectual property • Stop car designs (CAD files)from leaving through email • Solution • Proofpoint Messaging Security Gateway • Proofpoint Digital Asset Security module Proofpoint Confidential
Case Study: Secure Intellectual Property Software gaming and entertainment • Company • 5,400 employees • Game design in California and Asia • Key content security concerns • Protect intellectual property • Stop game source code from leaving through email • Solution • Proofpoint Protection Server (software) • Proofpoint Digital Asset Security module Proofpoint Confidential
Agenda • Today’s messaging security requirements • Including content security & outbound email risks • Proofpoint Solutions • Introduction to Proofpoint • Case Studies • Wrap-up and Q & A Proofpoint Confidential
Why Proofpoint? • Focused on largest risk – outbound email • Enforces internal governance, protects privacy, secures intellectual property • Prevents breaches from occurring • Low total cost of ownership • Centralized security platform: inbound and out, encryption • Low administration: Proofpoint MLX, managed code sets, smart identifiers • Full visibility: Audit, reporting and forensics • Evolves along with policy & business: Business and IT user interface Proofpoint Confidential