Your Email Channel – The Chink in your Armor

17
It’s all history Yahoo.com Oct. 1996 1 st email 1972 Google Wave 2009

Transcript of Your Email Channel – The Chink in your Armor

It’s  all  history  

Yahoo.com Oct. 1996

1st email 1972

Google Wave 2009

25  Years  A  

source: http://www.lireo.com/celebrating-44-years-email-infographic/!

25  Years  A  

source: http://blogs.smartertools.com/2011/08/29/the-value-of-email/!

Email  is  part  of  Everything  We  Do  

Email as Identity

Email as Project work flow

Email as Storage

Email as Sharing/Collaboration Tool

Email as Search

Email Security6 hours a day and 30 hours per work week

How  do  we  make  Email  Efficient  and  Secure?  

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

PWC  2015  InformaFon  Security  Survey  Key  Findings    •  Security  breaches  are  inevitable    

–  90%  of  companies  surveyed  reported  a  breach  compare  to  81%  in  2014  

•  Rising  significantly  in  Europe;  41%  jump  in  the  number  of  incidents  detected  over  2013  

 •  EU  regula5on  in  2017  should  mandate  security  incident  disclosure  

 

•  Financial  impacts  of  security  incidents  is  increasing      •  Do  companies  invest  enough  in  IT  Security    

–  Investment  in  informaFon  security  drop  by  4%  compare  to  2013  

–  Board  of  Directors  remain  uninvolved  in  criFcal  iniFaFves  such  as    security  strategy  

 

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

Messaging  Landscape    •  Email  remains  the  go-­‐to-­‐form  communicaFon  in  the  business  world  (6%  YOY  since  2013)  

•  Social  engineering  becomes  the  primary  vector  for  e-­‐mail  cyber-­‐threats    

•  Successful  threats  are  resulFng  in  greater  impacts  to  end  users  –  Stolen  credenFals  –  Fraud  –  IdenFty  the_  

 Source:  Cloudmark  and  MAAWG  Email  Metrics  Report  #15    

95%  of  Global  E-­‐Mail  Traffic  is  Malicious    

90%  of  advance  threats  start  with  a  phishing  email.    

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

Business  Email  Compromise  (BEC)  Causing  Massive  Losses  Goes  far  beyond  individual  risk…  

Spear  Phishing  is  the  igni9on  in  highly  orchestrated  and  targeted  campaigns  

LUUUK:  In  less  than  one  week  the  the_  of  €  500,000  from  one  bank  by  enabling  illicit,  automaFc  transfer  of  funds  in  amounts  from  €1,700  to  €39,000  from  190  vicFms  based  in  Italy  and  Turkey  

Crouching  Ye5:  Steals  confidenFal  data,  including  intellectual  property  and  other  strategic  informaFon  via  special  modules  that  collect  data  from  specific  industrial  IT  environments  US-­‐Asia-­‐Europe  

Darkhotel:  Targets  travelling    business  execuFves  staying  at  hotels  abroad  to  steal  confidenFal  data;  operaFng  for  almost  a  decade  -­‐  Asia  

FBI  Findings:  7,500  vicFms  of  BEC  that  led  to  $1.2  billion  in  global  losses  since  October  2013  UbiquiF  Networks,  a  U.S.  technology  company  $47  million  in  lost  funds  

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

What  Makes  a  Beker  Messaging  Security  SoluFon?  •  Breadth  of  capabiliFes  and  effecFveness  against  all  messaging  borne  threats      –  Spam  –  Phishing  /  Spear  Phishing  –  Malware  

•  Understand  the  akackers  strategy  –  IdenFfy  how  the  akack  is  built  and  act  on  the  elements  of  it  such  as  domains  names,  landing  pages,  hacked  accounts  

–  Cloudmark’s  world-­‐class  research  team  understands  the  threat  landscape  to  stay  one  step  ahead  of  the  bad  guys    

•  Build  predicFve  defenses:  Stop  the  akack  when  it  starts  not  a_er  it  starts    

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

What  Makes  a  Beker  Messaging  Security  SoluFon?  

•  Akackers  will  evolve  so  we  need  to  be  designed  to  evolve      – We  have  extended  our  soluFon  to  other  key  protocols  such  as  DNS      

•  Adjacencies  to  other  security  technologies  –  Email  security  soluFons  do  not  operate  alone;  must  correlate  threats  across  adjacent  security  technologies    

–  Integrate  with  backend  security  informaFon  and  event  management  (SIEM)  plaoorms    

•  Scalability  and  availability    –  Carrier-­‐grade  efficiency  and  scalability  –  InterrupFon  of  service  due  to  influxes  of  spam  and  other  cyber-­‐akacks  can  cripple  your  business  

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

What  Makes  a  Beker  Messaging  Security  SoluFon?  

Threat    Intelligence  

Security  PlaKorm  

Predic5vely  Blocks  Threats  DNS  

EMAIL  

Detects  Malicious  Behavior  

Provides  Real-­‐Time  Visibility      ?  

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

Internet  

End  Users  Cloudmark    MTA  +  AS  Inbound  

Cloudmark    MTA  +  AS  Outbound  

Webmail  

IMAP  

POP  3  

MDA/  Back  End   MDA/  Back  End  

LDAP  

High  Level  Messaging  Architecture  Simple  and  Fast  to  Deploy  

EMAIL  

EMAIL   EMAIL  

EMAIL  

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

What  Makes  a  Beker  Messaging  Security  SoluFon?  •  Breadth  of  capabiliFes  and  effecFveness  against  all  messaging  borne  threats      –  Spam  –  Phishing  /  Spear  Phishing  –  Malware  

•  Understand  the  akackers  strategy  –  IdenFfy  how  the  akack  is  built  and  act  on  the  elements  of  it  such  as  domains  names,  landing  pages,  hacked  accounts  

–  Cloudmark’s  world-­‐class  research  team  understands  the  threat  landscape  to  stay  one  step  ahead  of  the  bad  guys    

•  Build  predicFve  defenses:  Stop  the  akack  when  it  starts  not  a_er  it  starts    

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

What  Makes  a  Beker  Messaging  Security  SoluFon?  

•  Akackers  will  evolve  so  we  need  to  be  designed  to  evolve      – We  have  extended  your  soluFon  to  other  key  protocols  such  as  DNS      

•  Adjacencies  to  other  security  technologies  –  Email  security  soluFons  do  not  operate  alone;  must  correlate  threats  across  adjacent  security  technologies    

–  Integrate  with  backend  security  informaFon  and  event  management  (SIEM)  plaoorms    

•  Scalability  and  availability    –  Carrier-­‐grade  efficiency  and  scalability  –  InterrupFon  of  service  due  to  influxes  of  spam  and  viruses  failure  of  gateway  soluFons  to  provide  service  conFnuity,  can  cripple  your  business  

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

What  Makes  a  Beker  Messaging  Security  SoluFon?  

Threat    Intelligence  

Security  PlaKorm  

Predic5vely  Blocks  Threats  DNS  

EMAIL  

Detects  Malicious  Behavior  

Provides  Real-­‐Time  Visibility      ?  

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.  

•  Messaging  Security  at  the  top  of  your  business  agenda  

•  Assure  a  best  of  breed  soluFon  that  can  adapt  to  an  evolving  threat  environment  

•  Select  a  security  partner  with  relevant  roadmap  and  that  meets  your  security  assessment  requirements  

RecommendaFon  

Merci  beaucoup  &  Danke  Schön  Stop  by  our  booths  to  learn  more!  [email protected]            |          frank.hoberg@open-­‐xchange.com    

Cloudmark  ConfidenFal.    Do  not  copy,  repurpose,  or  distribute.