powerful email protection
DESCRIPTION
Does your business deal with confidential information? Filter incoming mails, hide and encrypt your emails, block leaks, communicate in private, and keep your secrets truly secret.TRANSCRIPT
YOU COMMUNICATE –
WE PROTECTF-Secure
Messaging Security Gateway
Protection Service for Email
HOW TO PROTECT
CONFIDENTIAL DATA?
© F-Secure Confidential2
© F-Secure Confidential3
HOW TO PROTECT YOUR ORGANIZATION’S
CONFIDENTIAL DATA?
Have you ever sent an email to the wrong address?
Do you know that sending a message without the email encryption is similar to dropping a postcard?
Do you know what information must be encrypted?
Avoid big mistakes
Private personal
information (social
security number, etc)
Confidential company
data
Information related to payroll etc
Healthcare information
Banking details
Other information according to
local legislation
WHEN TO PROTECT EMAIL?
© F-Secure Confidential4
COMPLETE PROTECTION WITH A SINGLE SOLUTION
© F-Secure Confidential5
Email encryption
Virus protection
Company data
Spam detection
Global ReputationLocal Reputation Email Firewall
Recipient Verification LDAP-Integration
Data Loss Prevention
SmartSend
Reporting
Policy-basedTrusted partnerTSL
DefinitionsZero-HourOutbreak alerting
CategorizationURL-defenceSelf-management
SENDING E-CRYPTED EMAIL IS NO LONGER JUST FOR SECRET AGENTS
© F-Secure Confidential6
Sender RecipientF-Secure Protection Service for Email (PSE)F-Secure Messaging Security Gateway (MSG)
SENDING E-CRYPTED EMAIL IS NO LONGER JUST FOR SECRET AGENTS
© F-Secure Confidential7
Sender RecipientF-Secure Protection Service for Email (PSE)F-Secure Messaging Security Gateway (MSG)
SENDING E-CRYPTED EMAIL IS NO LONGER JUST FOR SECRET AGENTS
© F-Secure Confidential8
F-Secure Protection Service for Email (PSE)F-Secure Messaging Security Gateway (MSG)Sender Recipient
ELIMINATE HUMAN ERRORS
© F-Secure Confidential9
Digital Assets Module (MLX) analyzes and classifies your confidential documents and then monitors for that information (or parts of that information) in message stream.
Easy training Secure document
repository
Multiple categories
for documents
Detect all types of private datainside email and attachments
AUTOMATIC REPORTING
© F-Secure Confidential10
DETECT ATTACKS BEFORE THEY ENTER YOUR
NETWORK
© F-Secure Confidential11
CHOOSE THE SUITABLE SECURITY PACKAGE
© F-Secure Confidential12
1
2Mailboxes
Inbound protection
Protection bundle
To get started – choose your own way to get security – in the cloud or on premises
Choose the model
• Self managed(Messaging Security Gateway)
• Hardware
• Virtual appliance
• Hosted by F-Secure(Protection Service for E-mail)
Choose your own package
• Inbound protection
• Protection bundle• Inbound protection + email
encryption + DLP
INSTALL AND FORGET
© F-Secure Confidential13
Automatic reporting
Automatic synchronization with Active Directory
Automatic end-user quarantine management
Automatic updates (patches, malware/spam definitions)
Automatic, self-learning email filtering
BEST PROTECTIONIN THE WORLD
© F-Secure Confidential14
Advanced machine learning technology for unrivalled anti-spam effectiveness
Ultimate protection against latest emails
threats. Real-time reputation check for the Spam and URL’s
Email Firewall blocks senders with bad
reputation
Award winning Antivirus engine with multilayer protection
Zero-Hour Threat Detection
Unbeatable E-mail Encryption and Data
Loss Prevention
Leader in Gartner’s
Magic Quadrant
© F-Secure Confidential15
SOME REFERENCES