Title: Security and Compliance
1Security and Compliance
- Prramhod Shetty Product Manager _at_ FVC
2Todays Agenda
Customer ChallengesWhat are the recent security
threats?
Googles Innovative ApproachHow do we address
it?
SecurityThe Google Solution and critical
differentiators
3Customer Challenges
- Message based threats are growing
- External threats (spam, virus, malware)
- Internal threats (data leak risk)
- Compliance requirements are increasing
- Archiving and encryption adds costs
- Frequent message discovery requests drain IT
productivity - Complex messaging architecture
- Frequent upgrades and patches for point products
- Costs escalate with more message volume and
threats
4Growing External Threats Drain Productivity
- Spam volumes are extremely high and growing
- 95 of email traffic is spam in Postini data
centers - We block 1 billion messages and 2 Terabytes of
spam every day! - Spammers are using very sophisticated techniques
- Example IRS notice that cross links to a web
site (creating a disruptive bot-net)
5Emerging Enterprise Security Vulnerability
Publicly Reported Data Breaches
350
- 68 of organizations experience 6 cases of data
leaks every year1 - Top 2008 threat to enterprises inadvertent
sensitive information disclosure via employee
email2 - 44 of organizations experienced data loss
incidents through email3
300
250
200
150
100
50
0
2000
2001
2002
2003
2004
2005
2006
- Source datacompliance.org
- IT Policy Compliance Group, 2. Aberdeen Group,
3. IDC
6Point Solutions to Point Problems Dont Scale
Spam filters
Mobile accessserver
Security servers
Operating system
Archive storage servers
Email servers
DB
Database to SupportContent Repositories
Tape backup
Collaboration Servers
7Cloud Computing Approach
8Google Apps
Works with any email server
Google Apps Platform
9Message Security Offerings
- Google Message Security
- Highly effective spam filtering
- Multiple layers of virus protection
- Flexible content policy management
- Secure mail server connection
- SAS 70 Type II, WebTrust
- Google Web Security
- Moderates or blocks web site access
- Scans for malicious content
Security
10How Google Message Security Works
- Simple MX record change to activate, no
hardware/software required - Messages are analyzed in real-time, spam
viruses are removed - Security and compliance policies are
automatically applied - Mail is not stored, and delivery assurance
ensures valid messages are never lost
Message flow
Valid Messages
11Content Policy Management Reduces Risk
- Use pre-defined policies
- Social security and credit card numbers
- Create custom rules to inspect messages and
attachments - Apply policy disposition
- Block, quarantine, log and deliver, etc.
11
12Use Case PCI DSS Compliance
- Problem Major financial multi-national company
needs to address PCI DSS compliance for all
inbound and outbound messages. - Solution Content policy management is enabled.
Customized content rules are used to
automatically block PCI DSS regulated content.
Unprotected PCI DSS data automatically bounced
13Use Case Block Offensive Message Content
- Problem Major retail organization is concerned
about lawsuits resulting from offensive email
messages. - Solution Content policy management is enabled.
Customized content rules are used to
automatically block profanity.
Messages with profane terms (and their
obfuscations) are bounced with a policy violation
message
14Secure Mail Server Connection Protects Message
Transmission
- Most mail servers implement encryption on best
effort basis - Google ensures secure mail server connection
(TLS) is enforced as per policy - Network effect
- No hardware, software to install or maintain
15Google Web Security Blocks Web Based Threats
- Web Filtering
- Blocks access to websites based on URL, content,
and file type - Web Scanning
- Scans web pages for malicious and inappropriate
content - Blocks web based viruses, spyware, phishing
16Customer Case Study LSI
- We tend to err on the conservative side when
implementing something as sensitive as email
usage that touches everyone in the company. - When youve got a highly visible issue such as
spam affecting our workforce productivity, you
want to make sure you get the outcome you
expect. Were very satisfied with the Postini
solution. -
- Bruce Decock VP CIO, LSI Logic
17Customer Case Study Harb, Levy Weiland
We found our IT department would spend hours if
not days to find information from tape back-up
devices. We did have a software service and that
wasnt reliable, we were spending 75 of time
trying to filter the right information. We
wanted to have our users have information at
their fingertips. In a blink of an eye, we
were no longer inundated with unwanted emails.
We also implemented archiving. That turned out to
be as straightforward as security. Postini
provides a confidence level and security net our
clients and our firm need. Karina
Evans, Systems Administrator, Harb, Levy and
Weiland
18Google Approach Lowers Costs
Google
Legacy approach
Google Confidential
18
19Customers Agree Google Approach Is Better
Total hours spent per week per 1,000 users
managing email system
- 58 lower IT resource requirements for service
versus appliance - Represents savings of over 10,300 per year for
1,000 user company
9.0
3.7
Source Comparing Postini and Leading Messaging
Security Solutions, Osterman Research, 2007
20How does this Transform Your Business?
- Productive workers
- Less time maintaining systems, more time for
strategic projects - Lower IT cost and complexity
- Scalable, reliable cloud computing with less
maintenance - Reduced security and compliance risks
- Move the business forward while ensuring youre
protected
21Resources and Next Steps
- White Papers - http//www.postini.com/whitepapers/
- White Paper 1 details
- White Paper 1 details
- Webinars - http//www.postini.com/webinars/
- Webinar 1 details
- Webinar 1 details
- Contact Google - http//www.google.com/a/security
- US/Canada 1-866-767-8461
- Europe 44 20 7082 2000
- Germany Toll Free 0800 67 37 97 6
- Other 1-650-486-8100
22Next Steps
23Thank You