SlideShare a Scribd company logo
Balancing Cloud-Based Email
Benefits With Security
White Paper
BalancingCloud-BasedEmail
BenefitsWithSecurity
Balancing Cloud-Based Email
Benefits With Security
CONTENTS
• Trouble Spots in Cloud Email Security........................................................................................................................2
• What to Look for in Cloud Email Security...................................................................................................................3
• Symantec and Cloud Email Security..........................................................................................................................4
A TECHTARGET WHITE PAPER
Brought to you compliments of As organizations try to take advantage of the business
benefits and cost savings afforded by cloud offerings,
email software as a service (SaaS) stands as one of
the easiest first paths toward cloud adoption. Generally
simple to set up and maintain, cloud email often is the
first win for organizations that may not yet have the
wherewithal for more complex cloud deployments.
Unsurprisingly, statistics show that 58% of businesses today have already migrated to cloud email.1
And the enterprise is also quickly catching up. Gartner estimates that between 2014 and 2017, the
percent of email seats based on a cloud or SaaS model will triple.2
Many reputable cloud email providers do offer some fundamental security controls bundled into
their services. Nevertheless, organizations struggle to find the right balance of ease of use for
their employees and cloud cost savings. After all, they must still maintain the same level of
security their organization came to expect when email was hosted on internal infrastructure in
their on-premises environments.
Trouble Spots in Cloud Email Security
Whether delivered on-premises or through the cloud, or a hybrid model email these days is ground
zero in the struggle to manage corporate risk. Its ubiquity as a business communication tool and
the stability of its presence in the business environment over the last two decades makes it a prime
candidate for abuse. Cybercriminals and fraudsters of all types set their sights on email as the first
line of attack when working criminal campaigns online. And internally, uneducated or fraudulent
users further add risk to the equation by using email to share or even steal some of the most sensitive
information a business cares for—at least when proper protections aren’t in place.
The statistics bear out the fact that email is usually the Achilles’ heel of cybersecurity today:
Phishing: According to Symantec’s research, one in 965 emails sent today is a phishing email
attempting to steal user credentials. These emails use various forms of bait, such as promises to view
juicy news videos after logging into a social account or even posing as fake security updates that
require logging into corporate accounts before loading.
Malware and malicious URLs: Even more troubling is the fact that one in 244 emails sent today
contain some form of malware. Approximately 12% of those are delivered as malicious links, with
attackers frequently using URL shortening services to mask their fraudulence. The link then redirects,
to bounce from a legitimate site to a bad URL.
Targeted and advanced attacks: Symantec security researchers report that attackers are continually
upping their game to single out specific high-value victims and try to infect them using sneakier, more
1 “State of IT,” Spiceworks, 2014
2 “Gartner Says Cloud Office Systems Total 8 Percent of the Overall Office Market and Will Rise to 33 Percent by 2017,” Gartner, June 2013
3
targeted emails, tricking spear phishing victims into divulging information or downloading malicious
malware. For example, attackers frequently use stolen email accounts from one corporate victim to
spear phish their next corporate victim. The number of active spear phishing campaigns online has
nearly doubled since 2012.
Insider threats: Email can be a veritable sieve for sensitive corporate information. One recent survey
showed that 84% of employees today are using personal email to send classified or confidential
information as attachments.
With all of these email attack trends coming to a head, the increased adoption of cloud email
can further complicate data protection if security is not appropriately designed into the cloud
email architecture.
Many cloud email services are simple by design. That’s what makes these systems so attractive
to organizations, as this simplicity is what makes cloud email so easy to deploy and maintain.
But cloud email’s biggest selling point can also be one of its biggest security downfalls.
Simplistic design means it is difficult to offer controls over when and how emailed data is
encrypted. Similarly, it is difficult to keep tabs on data as it flows in and out of corporate bounds.
In many instances, there simply aren’t enough controls available to administrators to offer a way to
consistently manage what kind of data goes to whom via cloud email accounts.
Additionally, cloud email can seriously limit security visibility. Many organizations also find that, from
a visibility perspective, once email goes to the cloud it is much more difficult to keep tabs on security
incidents that start with email. This means that all of those phishing attempts, targeted attacks,
malicious links and advanced malware fly under the radar much more easily through cloud email
accounts than on-premises accounts. Without the context offered up by advanced email monitoring,
it is much more difficult to act early within the attack kill chain and catch attacks before they do
real damage.
What to Look for in Cloud Email Security
This is why it is so important for organizations large and small to evaluate hosted email services not
just from a convenience perspective, but also from a security point of view. Cloud email has evolved a
great deal over the past several years and it is possible to find services that still extend the benefits of
easy deployment and use without compromising on data protection and security compliance.
4
As an organization considers potential hosted email providers, it should be prepared to evaluate based
on several critical criteria. First and foremost, an organization should seek a platform that can offer
protection against advanced malware attacks and phishing. Even more than just protecting within
email, an organization should seek a provider that can also connect email intelligence into threat
analytics for better security visibility across the organization. For good measure, it might also be
important to evaluate how well the platform handles gray mail like newsletters, in addition to whether
it can effectively stop spam with a low false-positive rate.
Additionally, it will be important to find out how well the email provider can help prevent sensitive
information from being accidentally or intentionally shared through email. Data loss prevention can
provide a key barrier to costly insider threat incidents through the email channel.
Another crucial point to consider is how well the platform enables encryption policy enforcement. With
regulatory demands increasingly requiring encryption for important classes of sensitive information,
it is critical for organizations to be able to automatically ensure that users are applying encryption to
email in all the right situations.
There are other considerations regarding compliance: is the email provider certified by third-party
organizations such as ISO to prove its security processes? This question bears answering.
Finally, organizations need to come at the evaluation with the understanding that the migration to the
cloud is a gradual process. The cloud email provider should be able to support a gradual transition
from on-premises systems to cloud systems.
Symantec™
and Cloud Email Security
As a global leader in information security, Symantec™
is a natural partner to help organizations
overcome security challenges when migrating to hosted email. Symantec Email Security.cloud provides
the perfect balance between security and convenience in the cloud email environment.
The Email Security.cloud platform is designed from the ground-up with data protection in mind. This
includes data loss prevention (DLP) capabilities baked into the system, customizable policy templates
and the ability to block messages that violate policy. It also offers encryption through TLS from the get-
go, along with the option to add on policy-based encryption that will force users to encrypt data when
corporate policies dictate that data be protected in this way.
5
Not only do all of these features offer added security and peace of mind, but they can also help
keep auditors at bay. Email Security.cloud is designed to help organizations comply with numerous
regulatory demands, including PCI and HIPAA requirements.
Meanwhile, Symantec’s intelligence backs up Real-Time Link Following to help ensure that users are
protected from advanced attacks and malicious links.
Symantec Email Security.cloud is both highly scalable and flexible, giving organizations the option
to use it with mailboxes in the cloud, on-premises or a hybrid model as cloud adoption progresses.
All of this is easily managed from the Web, and more importantly it is designed to work together with
a host of other security products to provide greater context about the entire corporate environment’s
security posture.
6
More Information
Visit our website
www.symantec.com/email-security-cloud
To speak with a Product Specialist
North America: +1(866) 893-6565 or +1(520) 477-3135; SSL_EnterpriseSales_NA@symantec.com
To speak with a Product Specialist outside the U.S.
To speak with additional product specialists around the world, visit our website for specific offices and
contact numbers.
About Symantec
Symantec protects the world’s information and is the global leader in security, backup, and availability
solutions.Our innovative products and services protect people and information in any environment –
from the smallest mobile device to the enterprise data center to cloud-based systems.Our industry
leading expertise in protecting data, identities, and interactions gives our customers confidence in a
connected world.More information is available at www.symantec.com or by connecting with Symantec
at: go.symantec.com/socialmedia.
Symantec World Headquarters
350 Ellis Street
Mountain View, CA 94043 USA
1-866-893-6565
www.symantec.com
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the checkmark Circle Logo and the Norton Secured Logo are trademarks or registered trademarks
of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

More Related Content

PDF
Email Security Threats: IT Manager's Eyes Only
PPTX
Email: still the favourite route of attack
PDF
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
PDF
Adallom_Cloud_Risk_Report-Nov14
PDF
Is Cloud the new home for Cyber Criminals? How to be Safe?
PDF
Account Takeover: The Best Practices for Full Protection
PDF
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
DOC
Data security
Email Security Threats: IT Manager's Eyes Only
Email: still the favourite route of attack
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Adallom_Cloud_Risk_Report-Nov14
Is Cloud the new home for Cyber Criminals? How to be Safe?
Account Takeover: The Best Practices for Full Protection
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Data security

What's hot (20)

PDF
beyond_the_firewall_0103
PPTX
Top Risks of Enterprise Mobility
PDF
Hiroshima University Information Security & Compliance 2018
PDF
Hiroshima University Information Security & Compliance 2018
PDF
Hiroshima University Information Security & Compliance 2018
PPT
Understanding SaaS Concepts
PDF
Ten Top Tips on Keeping Your Business Secure
PDF
Ssl tls-beginners-guide
PPTX
20181110 sps leicester connect protecting your data in office 365
PDF
Corporate Cybersecurity: A Serious Game
PDF
B istr main-report_v18_2012_21291018.en-us
PPT
Bright talk intrusion prevention are we joking - henshaw july 2010 a
DOCX
What you need to know about cyber security
PDF
Cybersecurity Powerpoint Presentation Slides
PPTX
Security Awareness Training from KnowBe4
PDF
The top 5 basics fundamentals of network security cyberhunter solutions
PDF
Implementing security on android application
PDF
White paper-diligent-cybersecurity
PDF
Dealing with Data Breaches Amidst Changes In Technology
PDF
A novel way of integrating voice recognition and one time passwords to preven...
beyond_the_firewall_0103
Top Risks of Enterprise Mobility
Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018
Hiroshima University Information Security & Compliance 2018
Understanding SaaS Concepts
Ten Top Tips on Keeping Your Business Secure
Ssl tls-beginners-guide
20181110 sps leicester connect protecting your data in office 365
Corporate Cybersecurity: A Serious Game
B istr main-report_v18_2012_21291018.en-us
Bright talk intrusion prevention are we joking - henshaw july 2010 a
What you need to know about cyber security
Cybersecurity Powerpoint Presentation Slides
Security Awareness Training from KnowBe4
The top 5 basics fundamentals of network security cyberhunter solutions
Implementing security on android application
White paper-diligent-cybersecurity
Dealing with Data Breaches Amidst Changes In Technology
A novel way of integrating voice recognition and one time passwords to preven...
Ad

Viewers also liked (16)

PDF
Article Petroleum Economist Feb 2015
PDF
PDF
Feature-itis Agile 2014 Orlando
PPT
Public-Private Partnerships In Ocean Sustainability: Industry Leadership and...
PPTX
Press release & zayed university where i taught
PDF
Sbs 2008 one_care
PDF
Design Portfolio
PPT
Gerunds and infinitives
DOCX
Guion escuela
PPTX
Modelos de Integração Moodle - Sistemas de Gestão Acadêmicos e Administrativos
PDF
Hudební trh v roce 2015
PPT
DDive11 - Novità Lotus Notes e Domino 8.5.3
PPTX
Jak může vypadat kampaň s youtubery v segmentu beauty (Tomáš Vaněk, L'oréal)
PPT
Dalroad Norslo - Industrial Equipment - Timer training level 1 inc. Din rail ...
PPTX
More Data Visualization
Article Petroleum Economist Feb 2015
Feature-itis Agile 2014 Orlando
Public-Private Partnerships In Ocean Sustainability: Industry Leadership and...
Press release & zayed university where i taught
Sbs 2008 one_care
Design Portfolio
Gerunds and infinitives
Guion escuela
Modelos de Integração Moodle - Sistemas de Gestão Acadêmicos e Administrativos
Hudební trh v roce 2015
DDive11 - Novità Lotus Notes e Domino 8.5.3
Jak může vypadat kampaň s youtubery v segmentu beauty (Tomáš Vaněk, L'oréal)
Dalroad Norslo - Industrial Equipment - Timer training level 1 inc. Din rail ...
More Data Visualization
Ad

Similar to Balancing Cloud-Based Email Benefits With Security (20)

PDF
Email Security Market : Global Industry Trends and Forecast (2023-2032)
PDF
What You Don’t Know about Email Security Protocols_ Could Cost You Millions.pdf
PDF
E book Elevate Your Email To The Cloud
DOCX
UNIT-3.docx
PDF
Law firms keep sensitive client data secure with CloudMask
PPTX
Email Security Solutions | Seclore
PDF
PPTX
Chapter 2 System Security.pptx
PDF
Measure To Avoid Cyber Attacks
PDF
Measures to Avoid Cyber-attacks
PDF
How LLM-Powered Email Protection Are the Ultimate Defense Against Phishing.pdf
PPTX
What Is Cloud Email Security – Check Point Software.pptx
PPTX
What Is Cloud Email Security – Check Point Software.pptx
PDF
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
PDF
What to Look for in Cloud-based E-mail
PDF
Cloud Based Email
PDF
Cloud Computing
PDF
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
PPTX
Best Practices to Protect Customer Data Effectively
PDF
The Rising Importance of Email Security in a Digital-First World.pdf
Email Security Market : Global Industry Trends and Forecast (2023-2032)
What You Don’t Know about Email Security Protocols_ Could Cost You Millions.pdf
E book Elevate Your Email To The Cloud
UNIT-3.docx
Law firms keep sensitive client data secure with CloudMask
Email Security Solutions | Seclore
Chapter 2 System Security.pptx
Measure To Avoid Cyber Attacks
Measures to Avoid Cyber-attacks
How LLM-Powered Email Protection Are the Ultimate Defense Against Phishing.pdf
What Is Cloud Email Security – Check Point Software.pptx
What Is Cloud Email Security – Check Point Software.pptx
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
What to Look for in Cloud-based E-mail
Cloud Based Email
Cloud Computing
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Best Practices to Protect Customer Data Effectively
The Rising Importance of Email Security in a Digital-First World.pdf

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PDF
Symantec Mobile Security Webinar
PDF
Symantec Webinar Cloud Security Threat Report
PDF
Symantec Cloud Security Threat Report
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
PDF
Symantec Webinar: GDPR 1 Year On
PDF
Symantec ISTR 24 Webcast 2019
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Enterprise Security Products are now part of Broadcom
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Mobile Security Webinar
Symantec Webinar Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: GDPR 1 Year On
Symantec ISTR 24 Webcast 2019
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Modernizing your data center with Dell and AMD
Agricultural_Statistics_at_a_Glance_2022_0.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Unlocking AI with Model Context Protocol (MCP)

Balancing Cloud-Based Email Benefits With Security

  • 1. Balancing Cloud-Based Email Benefits With Security White Paper BalancingCloud-BasedEmail BenefitsWithSecurity
  • 2. Balancing Cloud-Based Email Benefits With Security CONTENTS • Trouble Spots in Cloud Email Security........................................................................................................................2 • What to Look for in Cloud Email Security...................................................................................................................3 • Symantec and Cloud Email Security..........................................................................................................................4 A TECHTARGET WHITE PAPER Brought to you compliments of As organizations try to take advantage of the business benefits and cost savings afforded by cloud offerings, email software as a service (SaaS) stands as one of the easiest first paths toward cloud adoption. Generally simple to set up and maintain, cloud email often is the first win for organizations that may not yet have the wherewithal for more complex cloud deployments.
  • 3. Unsurprisingly, statistics show that 58% of businesses today have already migrated to cloud email.1 And the enterprise is also quickly catching up. Gartner estimates that between 2014 and 2017, the percent of email seats based on a cloud or SaaS model will triple.2 Many reputable cloud email providers do offer some fundamental security controls bundled into their services. Nevertheless, organizations struggle to find the right balance of ease of use for their employees and cloud cost savings. After all, they must still maintain the same level of security their organization came to expect when email was hosted on internal infrastructure in their on-premises environments. Trouble Spots in Cloud Email Security Whether delivered on-premises or through the cloud, or a hybrid model email these days is ground zero in the struggle to manage corporate risk. Its ubiquity as a business communication tool and the stability of its presence in the business environment over the last two decades makes it a prime candidate for abuse. Cybercriminals and fraudsters of all types set their sights on email as the first line of attack when working criminal campaigns online. And internally, uneducated or fraudulent users further add risk to the equation by using email to share or even steal some of the most sensitive information a business cares for—at least when proper protections aren’t in place. The statistics bear out the fact that email is usually the Achilles’ heel of cybersecurity today: Phishing: According to Symantec’s research, one in 965 emails sent today is a phishing email attempting to steal user credentials. These emails use various forms of bait, such as promises to view juicy news videos after logging into a social account or even posing as fake security updates that require logging into corporate accounts before loading. Malware and malicious URLs: Even more troubling is the fact that one in 244 emails sent today contain some form of malware. Approximately 12% of those are delivered as malicious links, with attackers frequently using URL shortening services to mask their fraudulence. The link then redirects, to bounce from a legitimate site to a bad URL. Targeted and advanced attacks: Symantec security researchers report that attackers are continually upping their game to single out specific high-value victims and try to infect them using sneakier, more 1 “State of IT,” Spiceworks, 2014 2 “Gartner Says Cloud Office Systems Total 8 Percent of the Overall Office Market and Will Rise to 33 Percent by 2017,” Gartner, June 2013 3
  • 4. targeted emails, tricking spear phishing victims into divulging information or downloading malicious malware. For example, attackers frequently use stolen email accounts from one corporate victim to spear phish their next corporate victim. The number of active spear phishing campaigns online has nearly doubled since 2012. Insider threats: Email can be a veritable sieve for sensitive corporate information. One recent survey showed that 84% of employees today are using personal email to send classified or confidential information as attachments. With all of these email attack trends coming to a head, the increased adoption of cloud email can further complicate data protection if security is not appropriately designed into the cloud email architecture. Many cloud email services are simple by design. That’s what makes these systems so attractive to organizations, as this simplicity is what makes cloud email so easy to deploy and maintain. But cloud email’s biggest selling point can also be one of its biggest security downfalls. Simplistic design means it is difficult to offer controls over when and how emailed data is encrypted. Similarly, it is difficult to keep tabs on data as it flows in and out of corporate bounds. In many instances, there simply aren’t enough controls available to administrators to offer a way to consistently manage what kind of data goes to whom via cloud email accounts. Additionally, cloud email can seriously limit security visibility. Many organizations also find that, from a visibility perspective, once email goes to the cloud it is much more difficult to keep tabs on security incidents that start with email. This means that all of those phishing attempts, targeted attacks, malicious links and advanced malware fly under the radar much more easily through cloud email accounts than on-premises accounts. Without the context offered up by advanced email monitoring, it is much more difficult to act early within the attack kill chain and catch attacks before they do real damage. What to Look for in Cloud Email Security This is why it is so important for organizations large and small to evaluate hosted email services not just from a convenience perspective, but also from a security point of view. Cloud email has evolved a great deal over the past several years and it is possible to find services that still extend the benefits of easy deployment and use without compromising on data protection and security compliance. 4
  • 5. As an organization considers potential hosted email providers, it should be prepared to evaluate based on several critical criteria. First and foremost, an organization should seek a platform that can offer protection against advanced malware attacks and phishing. Even more than just protecting within email, an organization should seek a provider that can also connect email intelligence into threat analytics for better security visibility across the organization. For good measure, it might also be important to evaluate how well the platform handles gray mail like newsletters, in addition to whether it can effectively stop spam with a low false-positive rate. Additionally, it will be important to find out how well the email provider can help prevent sensitive information from being accidentally or intentionally shared through email. Data loss prevention can provide a key barrier to costly insider threat incidents through the email channel. Another crucial point to consider is how well the platform enables encryption policy enforcement. With regulatory demands increasingly requiring encryption for important classes of sensitive information, it is critical for organizations to be able to automatically ensure that users are applying encryption to email in all the right situations. There are other considerations regarding compliance: is the email provider certified by third-party organizations such as ISO to prove its security processes? This question bears answering. Finally, organizations need to come at the evaluation with the understanding that the migration to the cloud is a gradual process. The cloud email provider should be able to support a gradual transition from on-premises systems to cloud systems. Symantec™ and Cloud Email Security As a global leader in information security, Symantec™ is a natural partner to help organizations overcome security challenges when migrating to hosted email. Symantec Email Security.cloud provides the perfect balance between security and convenience in the cloud email environment. The Email Security.cloud platform is designed from the ground-up with data protection in mind. This includes data loss prevention (DLP) capabilities baked into the system, customizable policy templates and the ability to block messages that violate policy. It also offers encryption through TLS from the get- go, along with the option to add on policy-based encryption that will force users to encrypt data when corporate policies dictate that data be protected in this way. 5
  • 6. Not only do all of these features offer added security and peace of mind, but they can also help keep auditors at bay. Email Security.cloud is designed to help organizations comply with numerous regulatory demands, including PCI and HIPAA requirements. Meanwhile, Symantec’s intelligence backs up Real-Time Link Following to help ensure that users are protected from advanced attacks and malicious links. Symantec Email Security.cloud is both highly scalable and flexible, giving organizations the option to use it with mailboxes in the cloud, on-premises or a hybrid model as cloud adoption progresses. All of this is easily managed from the Web, and more importantly it is designed to work together with a host of other security products to provide greater context about the entire corporate environment’s security posture. 6
  • 7. More Information Visit our website www.symantec.com/email-security-cloud To speak with a Product Specialist North America: +1(866) 893-6565 or +1(520) 477-3135; SSL_EnterpriseSales_NA@symantec.com To speak with a Product Specialist outside the U.S. To speak with additional product specialists around the world, visit our website for specific offices and contact numbers. About Symantec Symantec protects the world’s information and is the global leader in security, backup, and availability solutions.Our innovative products and services protect people and information in any environment – from the smallest mobile device to the enterprise data center to cloud-based systems.Our industry leading expertise in protecting data, identities, and interactions gives our customers confidence in a connected world.More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia. Symantec World Headquarters 350 Ellis Street Mountain View, CA 94043 USA 1-866-893-6565 www.symantec.com Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the checkmark Circle Logo and the Norton Secured Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.