Security and Compliance - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

Security and Compliance

Description:

Archiving and encryption adds costs. Frequent message discovery requests drain IT productivity ... Most mail servers implement encryption on 'best effort' basis ... – PowerPoint PPT presentation

Number of Views:37
Avg rating:3.0/5.0
Slides: 24
Provided by: sund81
Category:

less

Transcript and Presenter's Notes

Title: Security and Compliance


1
Security and Compliance
  • Prramhod Shetty Product Manager _at_ FVC

2
Todays Agenda
Customer ChallengesWhat are the recent security
threats?
Googles Innovative ApproachHow do we address
it?
SecurityThe Google Solution and critical
differentiators
3
Customer Challenges
  • Message based threats are growing
  • External threats (spam, virus, malware)
  • Internal threats (data leak risk)
  • Compliance requirements are increasing
  • Archiving and encryption adds costs
  • Frequent message discovery requests drain IT
    productivity
  • Complex messaging architecture
  • Frequent upgrades and patches for point products
  • Costs escalate with more message volume and
    threats

4
Growing External Threats Drain Productivity
  • Spam volumes are extremely high and growing
  • 95 of email traffic is spam in Postini data
    centers
  • We block 1 billion messages and 2 Terabytes of
    spam every day!
  • Spammers are using very sophisticated techniques
  • Example IRS notice that cross links to a web
    site (creating a disruptive bot-net)

5
Emerging Enterprise Security Vulnerability
Publicly Reported Data Breaches
350
  • 68 of organizations experience 6 cases of data
    leaks every year1
  • Top 2008 threat to enterprises inadvertent
    sensitive information disclosure via employee
    email2
  • 44 of organizations experienced data loss
    incidents through email3

300
250
200
150
100
50
0
2000
2001
2002
2003
2004
2005
2006
  • Source datacompliance.org
  • IT Policy Compliance Group, 2. Aberdeen Group,
    3. IDC

6
Point Solutions to Point Problems Dont Scale
Spam filters
Mobile accessserver
Security servers
Operating system
Archive storage servers
Email servers
DB
Database to SupportContent Repositories
Tape backup
Collaboration Servers
7
Cloud Computing Approach
8
Google Apps
Works with any email server
Google Apps Platform
9
Message Security Offerings
  • Google Message Security
  • Highly effective spam filtering
  • Multiple layers of virus protection
  • Flexible content policy management
  • Secure mail server connection
  • SAS 70 Type II, WebTrust
  • Google Web Security
  • Moderates or blocks web site access
  • Scans for malicious content

Security
10
How Google Message Security Works
  • Simple MX record change to activate, no
    hardware/software required
  • Messages are analyzed in real-time, spam
    viruses are removed
  • Security and compliance policies are
    automatically applied
  • Mail is not stored, and delivery assurance
    ensures valid messages are never lost

Message flow
Valid Messages
11
Content Policy Management Reduces Risk
  • Use pre-defined policies
  • Social security and credit card numbers
  • Create custom rules to inspect messages and
    attachments
  • Apply policy disposition
  • Block, quarantine, log and deliver, etc.

11
12
Use Case PCI DSS Compliance
  • Problem Major financial multi-national company
    needs to address PCI DSS compliance for all
    inbound and outbound messages.
  • Solution Content policy management is enabled.
    Customized content rules are used to
    automatically block PCI DSS regulated content.

Unprotected PCI DSS data automatically bounced
13
Use Case Block Offensive Message Content
  • Problem Major retail organization is concerned
    about lawsuits resulting from offensive email
    messages.
  • Solution Content policy management is enabled.
    Customized content rules are used to
    automatically block profanity.

Messages with profane terms (and their
obfuscations) are bounced with a policy violation
message
14
Secure Mail Server Connection Protects Message
Transmission
  • Most mail servers implement encryption on best
    effort basis
  • Google ensures secure mail server connection
    (TLS) is enforced as per policy
  • Network effect
  • No hardware, software to install or maintain

15
Google Web Security Blocks Web Based Threats
  • Web Filtering
  • Blocks access to websites based on URL, content,
    and file type
  • Web Scanning
  • Scans web pages for malicious and inappropriate
    content
  • Blocks web based viruses, spyware, phishing

16
Customer Case Study LSI
  • We tend to err on the conservative side when
    implementing something as sensitive as email
    usage that touches everyone in the company.
  • When youve got a highly visible issue such as
    spam affecting our workforce productivity, you
    want to make sure you get the outcome you
    expect. Were very satisfied with the Postini
    solution.
  • Bruce Decock VP CIO, LSI Logic

17
Customer Case Study Harb, Levy Weiland
We found our IT department would spend hours if
not days to find information from tape back-up
devices. We did have a software service and that
wasnt reliable, we were spending 75 of time
trying to filter the right information. We
wanted to have our users have information at
their fingertips. In a blink of an eye, we
were no longer inundated with unwanted emails.
We also implemented archiving. That turned out to
be as straightforward as security. Postini
provides a confidence level and security net our
clients and our firm need. Karina
Evans, Systems Administrator, Harb, Levy and
Weiland
18
Google Approach Lowers Costs

Google
Legacy approach
Google Confidential
18
19
Customers Agree Google Approach Is Better
Total hours spent per week per 1,000 users
managing email system
  • 58 lower IT resource requirements for service
    versus appliance
  • Represents savings of over 10,300 per year for
    1,000 user company

9.0
3.7
Source Comparing Postini and Leading Messaging
Security Solutions, Osterman Research, 2007
20
How does this Transform Your Business?
  • Productive workers
  • Less time maintaining systems, more time for
    strategic projects
  • Lower IT cost and complexity
  • Scalable, reliable cloud computing with less
    maintenance
  • Reduced security and compliance risks
  • Move the business forward while ensuring youre
    protected

21
Resources and Next Steps
  • White Papers - http//www.postini.com/whitepapers/
  • White Paper 1 details
  • White Paper 1 details
  • Webinars - http//www.postini.com/webinars/
  • Webinar 1 details
  • Webinar 1 details
  • Contact Google - http//www.google.com/a/security
  • US/Canada 1-866-767-8461
  • Europe 44 20 7082 2000
  • Germany Toll Free 0800 67 37 97 6
  • Other 1-650-486-8100

22
Next Steps
23
Thank You
Write a Comment
User Comments (0)
About PowerShow.com