Email Security and Encryption

In today’s electronic world, email has become a critical business application.   An enterprise email protection strategy should incorporate multiple layers of real-time intelligence and visibility while simultaneously enforcing active policy controls and defenses.

Critical components to a complete email security solution encompass:

Spam Defense

Internet criminals constantly evolve techniques to penetrate an organization’s defenses. Email threats have expanded beyond simply annoying spam to dangerous phishing and fraudulent spam that can lead to malware delivery and data loss.  A comprehensive spam defense solution will use multiple defense mechanisms to combat spam delivery and threats, including the use of Reputation and Context-Based Scoring and Dynamic Automatic Update functionality.

Virus Defense

The scale and complexity of recent virus attacks have highlighted the importance of a robust, secure messaging platform to protect your network perimeter. The traditional approach of being able to identify and block known viruses is no longer enough.

Pattern Matching detects viruses and other potentially unwanted software by specific code sequences known to be present within a virus. The patterns are created to ensure that the engine catches not only the original virus but derivatives within the same virus family.

Advanced emulation technology is used to detect encrypted and polymorphic viruses. If the solution suspects that a file contains a virus, it creates an artificial environment in which the virus can run harmlessly until it decodes itself and its true form becomes visible. The engine then identifies the virus by scanning for a virus signature. The robust engine supports multiple scanning modes to optimize performance.

Heuristic analysis is utilized to ensure that variants of viruses are caught with minimal information available about virus code patterns. Heuristic analysis is based on the fact that programs, documents or email messages that carry a virus often have distinctive features. They might attempt unprompted modification of files, invoke mail clients, or use other means to replicate themselves. The engines analyze the program code to detect these kinds of computer instructions. The engines also search for legitimate non-virus-like behavior before taking anti-virus action to avoid raising false alarms.

Policy Enforcement

As with all enterprise applications, the ability to enforce usage and access policies is a critical component to a successful and secure email solution.

Email Authentication

DomainKeys identified mail (DKim) and DomainKeys verification and signing digitally process messages to establish and protect identities with email senders and receivers on the Internet.

Email Encryption

Email Encryption enables organizations to enforce compliance requirements and to ensure that confidential information is delivered securely.

More Information:

Cisco IronPort Solutions