powerful email protection

Post on 18-Nov-2014

697 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

Does your business deal with confidential information? Filter incoming mails, hide and encrypt your emails, block leaks, communicate in private, and keep your secrets truly secret.

TRANSCRIPT

YOU COMMUNICATE –

WE PROTECTF-Secure

Messaging Security Gateway

Protection Service for Email

HOW TO PROTECT

CONFIDENTIAL DATA?

© F-Secure Confidential2

© F-Secure Confidential3

HOW TO PROTECT YOUR ORGANIZATION’S

CONFIDENTIAL DATA?

Have you ever sent an email to the wrong address?

Do you know that sending a message without the email encryption is similar to dropping a postcard?

Do you know what information must be encrypted?

Avoid big mistakes

Private personal

information (social

security number, etc)

Confidential company

data

Information related to payroll etc

Healthcare information

Banking details

Other information according to

local legislation

WHEN TO PROTECT EMAIL?

© F-Secure Confidential4

COMPLETE PROTECTION WITH A SINGLE SOLUTION

© F-Secure Confidential5

Email encryption

Virus protection

Company data

Spam detection

Global ReputationLocal Reputation Email Firewall

Recipient Verification LDAP-Integration

Data Loss Prevention

SmartSend

Reporting

Policy-basedTrusted partnerTSL

DefinitionsZero-HourOutbreak alerting

CategorizationURL-defenceSelf-management

SENDING E-CRYPTED EMAIL IS NO LONGER JUST FOR SECRET AGENTS

© F-Secure Confidential6

Sender RecipientF-Secure Protection Service for Email (PSE)F-Secure Messaging Security Gateway (MSG)

SENDING E-CRYPTED EMAIL IS NO LONGER JUST FOR SECRET AGENTS

© F-Secure Confidential7

Sender RecipientF-Secure Protection Service for Email (PSE)F-Secure Messaging Security Gateway (MSG)

SENDING E-CRYPTED EMAIL IS NO LONGER JUST FOR SECRET AGENTS

© F-Secure Confidential8

F-Secure Protection Service for Email (PSE)F-Secure Messaging Security Gateway (MSG)Sender Recipient

ELIMINATE HUMAN ERRORS

© F-Secure Confidential9

Digital Assets Module (MLX) analyzes and classifies your confidential documents and then monitors for that information (or parts of that information) in message stream.

Easy training Secure document

repository

Multiple categories

for documents

Detect all types of private datainside email and attachments

AUTOMATIC REPORTING

© F-Secure Confidential10

DETECT ATTACKS BEFORE THEY ENTER YOUR

NETWORK

© F-Secure Confidential11

CHOOSE THE SUITABLE SECURITY PACKAGE

© F-Secure Confidential12

1

2Mailboxes

Inbound protection

Protection bundle

To get started – choose your own way to get security – in the cloud or on premises

Choose the model

• Self managed(Messaging Security Gateway)

• Hardware

• Virtual appliance

• Hosted by F-Secure(Protection Service for E-mail)

Choose your own package

• Inbound protection

• Protection bundle• Inbound protection + email

encryption + DLP

INSTALL AND FORGET

© F-Secure Confidential13

Automatic reporting

Automatic synchronization with Active Directory

Automatic end-user quarantine management

Automatic updates (patches, malware/spam definitions)

Automatic, self-learning email filtering

BEST PROTECTIONIN THE WORLD

© F-Secure Confidential14

Advanced machine learning technology for unrivalled anti-spam effectiveness

Ultimate protection against latest emails

threats. Real-time reputation check for the Spam and URL’s

Email Firewall blocks senders with bad

reputation

Award winning Antivirus engine with multilayer protection

Zero-Hour Threat Detection

Unbeatable E-mail Encryption and Data

Loss Prevention

Leader in Gartner’s

Magic Quadrant

© F-Secure Confidential15

SOME REFERENCES

top related