Protect Your Users And Their Email, The Most Exploited Threat . - ESET

Transcription

SOLUTION OVERVIEWProtect your users and their email,the most exploited threat vector.

What is amail securitysolution?A mail security product is designed toprotect the email vector from threatsentering the network. Email is one ofthe most vulnerable vectors with over90% of ransomware being delivered viaemail. In addition to protecting againstthreats, it also protects against spamand phishing.ESET Mail Security provides an additionallayer of security to organizations who areinterested in stopping threats from everreaching their users – multilayered securityof the host itself.

Why a mail securitysolution?RANSOMWARESPAM PROTECTIONRansomware has been a constantconcern for industries across theworld ever since Cryptolockerin 2013. Despite ransomwareexisting for far longer, it was nevera major threat that businesseswere concerned about. However,now a single incidence ofransomware can easily render abusiness inoperable by encryptingimportant or necessary files.When a business experiences aransomware attack, they quicklyrealize that the backups they haveare not recent enough, so thebusiness feels as though they mustpay the ransom.Most organization’s users haveenough work to do without havingto sift through large amounts ofspam to find the most importantemails. In fact, over 54% of allinbound email is spam. Userswill have trouble being efficientif every other email they receivethey have to determine if it isspam or not.ESET Mail Security solutionsprovide an additional layer ofdefense to prevent ransomwarefrom ever getting to the users’mailboxes. In addition, the abilityto block certain attachment typesor all attachment types furtherlimits the organization’s exposureto ransomware.ESET Mail Security solutionsmake users’ life much easierby preventing spam from everreaching their mailbox. Leavethe decision whether somethingis good or bad to a mail securityproduct rather than the user.In addition to increasing theorganization’s efficiency it willincrease security because userswill not have the opportunity toaccidentally or purposely click linksin spam emails.The ability to block certain attachment typesor all attachment types further limits theorganization’s exposure to ransomware.

Over 54% ofall inboundemail is spam“As we say at the hospital,prevention is better than healing.”Jos Savelkoul, Team Leader ICT-Department;Zuyderland Hospital, Netherlands; 10.000 seatsESET Mail Security solutions make users’ lifemuch easier by preventing spam from everreaching their mailbox

ESET’s Mail Security solutionsESET Mail Security for Microsoft Exchange ServerESET Mail Security for Linux / FreeBSDESET Mail Security for IBM DominoESET Security for Kerio“The biggest thing that stands out is its strong technicaladvantage over other products in the marketplace. ESET offersus reliable security, meaning that I can work on any project atany time knowing our computers are protected 100%.”Fiona Garland, Business Analyst Group IT;Mercury Engineering, Ireland; 1.300 seats“Centrally managed security on all endpoints, servers and mobiledevices was a key benefit for us. Yet, monitoring capabilities,effectiveness and lower cost than other security products wasalso considered as pros.”IT Manager; Diamantis Masoutis S.A., Greece; 6.000 seats

The ESETdifferenceROBUST QUARANTINE MANAGEMENTSPEEDUsers are sent emails when messages have beenquarantined and can handle the message managementthemselves. In addition, administrators can havesummary reports sent to them on a regular basis.However, if ever someone is waiting for an emailmessage, an administrator can easily decide to delete orrelease messages from a central quarantine.Performance and stability are among the mostimportant capabilities for a mail product. Companiesneed assurances that their email is going to beprocessed without delay. ESET features a true 64-bitproduct that allows for clustering to ensure that speedis never a concern for organizations of any size.MULTILAYERED PROTECTIONHUMAN EXPERTISE, BACKEDBY MACHINE LEARNINGThe first layer works with our proprietary antispamtechnology, which filters spam messages with almost100% accuracy as shown by 3rd party testing. On thesecond layer is our antimalware scanner, which detectssuspicious attachments. An additional layer can beimplemented in the form of a cloud sandbox with ESETDynamic Threat Defense.The use of machine learning to automate decisions andevaluate possible threats is a vital part of our approach– but it is only as strong as the people who standbehind the system. Human expertise is paramountin providing the most accurate threat intelligencepossible, due to the threat actors being intelligentopponents.PROPRIETARY TECHNOLOGYWORLDWIDE PRESENCEESET Mail Security solutions use in-house developedanti-spam, anti-phishing and host server protection,combining machine learning, big data and humanexpertise into one, award-winning mail securityplatform.ESET has offices in 22 countries worldwide, R&D labs in13 and presence in over 200 countries and territories.This helps to provide us with data to stop malware priorto it spreading across the globe, as well as prioritizenew technologies based on the most recent threats orpossible new vectors.CLUSTER SUPPORTESET solutions support the ability to create clusterswhich allows products to communicate with each otherand exchange configuration, notifications, greylistingdatabase info and more. In addition, this supportsWindows Failover Clusters and Network Load Balancing(NLB) clusters to allow for Enterprise grade protection.

Use casesRansomwareRansomware tends to enter unsuspecting users’mailboxes through email.SOLUTION ESET Mail Security uses a sophisticated parser thatsearches message body and subject line to identifymalicious links. Any email containing malicious files or links isquarantined and prevented from being received bythe users. ESET Mail Security evaluates the attachment todetermine whether it is malicious, unknown or safe. ESET Mail Security evaluates whether specific emailrules were entered by an administrator to preventcertain attachment types or sizes from being sent tousers. If ESET Mail Security is unsure of the potential threat,it can forward the attachment to the additionalsolution – ESET Dynamic Threat Defense for analysis. Dynamic Threat Defense then analyzes the sample ina cloud sandbox, then submits the result back to MailSecurity within minutes. If the file was found to be malicious, ESET MailSecurity automatically destroys the email thatcontained the malicious content.Prevent businesscontinuity issuesby reducingspamA single user will not be efficient due to having tosift through whether emails are legitimate or not. Inaddition, every spam email may be forwarded to the ITdepartment to confirm legitimacy.SOLUTION ESET Mail Security analyzes email using proprietarytechnology to determine if an email is legitimate orspam.Stop phishingin its tracksUsers are constantly targeted via phishing campaignsthat may contain other malicious components.SOLUTION Early warning system such as ESET ThreatIntelligence notifies about a phishing campaign. Rules can be implemented in ESET Mail Security toprevent emails from being received from knownmalicious countries and domains. Emails that are determined to be spam arequarantined, and users are delivered a messageindicating that emails have been quarantined Administrators, in addition to the user who receivedthe email, have the ability to release emails or deletethem from being delivered.

ESET Mail Securitytechnical featuresANTISPAMUsing our own proprietary awardwinning engine, spam is preventedfrom ever reaching your users’mailboxes. Includes SPF and DKIMvalidation, backscatter protectionand SMTP protection.ANTIMALWAREOur second layer of protectionbuilt into ESET Mail Securityprovides detection of suspicious ormalicious attachments to preventusers from being infected.ANTI-PHISHINGPROTECTIONPrevents users from accessingweb pages known for phishingby parsing messages body andsubjects to identify URLs. URLs arethen compared against phishingdatabase and rules to decidewhether it is good or bad.HYBRID OFFICE 365SCANNINGSupports businesses whoutilize Microsoft Exchange ina hybrid setup.RULESESET’s comprehensive rulesystem allows administrators tomanually define email filteringconditions and actions to take withfiltered emails.WEB-BASEDQUARANTINEEmails are automatically providedto users about their spam emailsthat were quarantined.Then users have the ability to login and manage their own spamrather than solely being managedby the admin.ESET Mail Security analyzes email usingproprietary technology to determine if an emailis legitimate or spam.ESET Mail Security uses a sophisticated parser thatsearches message body and subject line to identifymalicious links.

About ESETFor more than 30 years, ESET has beenESET is privately owned. With no debtsdeveloping industry-leading IT securityand no loans, we have the freedom to dosoftware and services, delivering instant,what needs to be done for the ultimatecomprehensive protection againstprotection of all our customers.evolving cybersecurity threats forbusinesses and consumers worldwide.ESET IN NUMBERS110m usersworldwide400k businesscustomers200 countries &territories13global R&DcentersSOME OF OUR CUSTOMERSprotected by ESET since 2017protected by ESET since 2016more than 14,000 endpointsmore than 9,000 endpointsprotected by ESET since 2016ISP security partner since 2008more than 4,000 mailboxes2 million customer base

TYSCERTIFICATI OEMNSWhychoose ESETIS O/ IEC27ESET is compliant with ISO/IEC 27001:2013, an internationally recognized andapplicable security standard in implementing and managing information security.The certification is granted by the third-party accredited certification body SGSand demonstrates ESET’s full compliance with industry-leading best practices.0 01ESET AWARDSANALYST RECOGNITIONESET was named the onlyChallenger in 2019 GartnerMagic Quadrant for EndpointProtection Platforms, for thesecond year running.ESET was rated a StrongPerformer in the ForresterWave(TM): Endpoint SecuritySuites, Q3 2019.ESET was rated ‘Top Player’in the 2019 Radicati EndpointSecurity report according totwo main criteria: functionalityand strategic vision.Gartner Inc, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Lawrence Pingree, Dionisio Zumerle, Prateek Bhajanka, Paul Webber, August20, 2019. Gartner does not endorse any vendor, product or service depicted in its research publications. Gartner research publications consist of the opinions ofGartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to thisresearch, including any warranties of merchantability or fitness for a particular purpose.Gartner Peer Insights is a free peer review and ratings platform designed for enterprise software and services decision makers. Reviews go through a strictvalidation and moderation process to ensure information is authentic. Gartner Peer Insights reviews constitute the subjective opinions of individual end users basedon their own experiences, and do not represent the views of Gartner or its affiliates.

20201110

Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences, and do not represent the views of Gartner or its affiliates. ESET AWARDS ANALYST RECOGNITION ESET was named the only Challenger in 2019 Gartner Magic Quadrant for Endpoint Protection Platforms, for the second year running.