Overview of Services
The GoSecure Email Security product delivers next-generation services that protect your business with comprehensive end-to-end solutions. The email security services defend against internal and external threats, assure continuous mail stream flow, protect against data loss, and help fulfill regulatory compliance requirements, while assuring fast, accurate delivery of business-critical email.
GoSecure takes the complexity out of operating its products and removes the administrative burden from email security. The platform is simple and easy to use. The Email Security product provides two primary services:
|
•
|
Hosted: With the hosted solution, you do not install any client software, modify servers, or train staff. You enjoy lower bandwidth costs, lower mail server utilization, and lower archival capacity demands. |
|
•
|
Appliance: TheEmail Security product offers a full family of appliances that leverages the resources of the GoSecure Security Operations Center to provide redundancy and managed service. |
Email Filtering (EMF)
The Email Security product provides email defense against internal and external threats such as spam, viruses, spyware, phishing schemes, identity theft, and other dangerous or offensive content. Services include inbound/outbound spam and antivirus filtering, policy categorization, and automated seamless directory integration. GoSecure technical experts provide proactive monitoring and management designed to stop threats before they get near your internal servers.
|
•
|
Both Inbound and Outbound Protection: Protecting outbound email is critical to preventing dangerous botnet attacks that can turn infected computers into zombie networks. Our award-winning filtering offers protection from spam, viruses, and criminal malware on both inbound and outbound mail streams. The Email Security product’s kernel technology is a proprietary message defense system that eliminates spam, viruses, spyware, phishing schemes, and offensive content. It also stops Directory Harvest Attacks (DHA) and Distributed Denial of Service (DDoS) attacks. |
|
•
|
No-Touch Email Security: GoSecure hosts the applications and infrastructure required to protect your organization in a fully managed solution requiring zero administration. |
|
•
|
Disaster recovery protection: GoSecure Email Security spools all email for up to 320 hours, in case of unexpected events, so you never lose your business-critical email. |
|
•
|
Proactive monitoring: GoSecure engineers continually monitor email processes to assure they are performing at peak efficiency. |
|
•
|
Zero Minute Defense: As soon as an emerging threat is identified, GoSecure engineers deploy a specific rule to block it. |
|
•
|
TLS Encryption: This feature establishes private email networks linking you with your business-critical partners via the use of certificates. Every email sent or received by these networks is fully and securely encrypted while the encryption remains completely transparent to both sender and recipient. |
|
•
|
Technical Support - GoSecure’s Security Operations Center (SOC) is staffed around the clock with email experts and security specialists for 24/7/365 support. They provide proactive monitoring of any email threats to assure continuous service for all of your domains and users. |
|
•
|
The service offers the option of a Spam Digest for mailbox holders. The Spam Digest is an emailed version of a quarantine report that enables users to review blocked spam messages and release them to their email inbox. |
The Email Security product’s behavior-based perimeter defense system uses real-time awareness of spam campaigns to implement a merit-based response while providing defenses at each step of the SMTP connection and session layer. GoSecure does not rely on IP Real-time Blackhole Lists (RBLs) to defend against spammers, and uses a variety of patent-pending techniques to deal with spam and attacks originating from botnets. The product employs a combination of techniques to protect email domains and to filter spam email that does not conform to the common techniques used within the industry. Key differentiators of the Email Security product are:
|
•
|
A managed appliance solution or a hosted solution, to meet your organization's specific needs |
|
•
|
Industry-leading block rate without any IT staff maintenance |
|
•
|
Dynamic resource allocation and service redundancy |
Archive
The Email Security product offers secure email archiving that is scalable to fit the requirements of any size organization. This archiving retains your email in an unalterable state to help you meet requirements for regulatory compliance, litigation issues, and storage management needs or to fulfill business best practices guidelines. The Archiving Services are in-the-cloud, so scalability is assured. And GoSecure's secure data collection technology provides comprehensive interoperability with all email systems.
Continuity
The Continuity service enables continuous web-based email access, management, and use during planned or unplanned mail server outages. Continuity is enabled via a simple admin checkbox, giving your users access to their mail so that they can manage messaging and avoid any disruption in the flow of critical, legitimate business communications. In case of an outage, end users access the Web 2.0 email client allowing them to manage their email and perform the following tasks:
|
•
|
Know that any sent messages in limbo as a result of an outage will not be lost because they are Bcc’d and will be delivered when the mail server is back online. Rules on the mail server can be implemented to take those messages and divert them to the users’ Sent Mail folders to complete the activity synchronization. |
|
•
|
Read, compose, reply to, forward and delete messages. |
|
•
|
Upload and download attachments. |
|
•
|
Perform full text searches of all the messages in their mailboxes. |
For more information on configuring Email Continuity, see Email Continuity. For details on setting up a domain with Email Continuity, see Routing and Session Management.
Encryption
Encryption services assure the secure delivery of your email in accordance with your organization’s Security Policy, and provide confirmation of message delivery. Comprehensive reporting offers message tracking and an audit trail to support regulatory and other requirements.
For more information on configuring Encryption, see Special Routing and Encryption. For details on how messages are routed, see Outbound Filtering Options.
Data Loss Protection (DLP)
DLP, also referred to as Email Data Compliance, is a content analysis and policy engine that uses proprietary technology to protect private information transmitted via outgoing email. This data protection technology analyzes information being sent out of your network to detect private content in data in motion and prevent sensitive and confidential data from leaving your network. The Email Security's DLP gives you the powerful tools you need to comply with government regulations,
such as HIPAA and GLBA, and prevents the outbound communication of all types of sensitive or objectionable material, including:
|
•
|
Patient healthcare information |
|
•
|
Social Security numbers |
Personal Health Information
Personal health information includes both health terms and personal identifying information. Both must be present in an email to produce a match.
Health terms include words and phrases such as:
|
•
|
aggressive fibromatosis |
Health personal identifiers include words or phrases such as:
|
•
|
Social Security Number or SSN followed by a valid Social Security number |
|
•
|
Date of Birth, DOB, Birth Date, etc., followed by a date in any of several formats |
|
•
|
Patient followed by an ID (alphanumeric first character followed by five or more digits) |
|
•
|
Account, Member, Record, etc., followed by a number |
Examples
Match
|
Date of Birth 10/02/74 and the word fractures both detected in the file.
The word convulsions and the phrase Patient D832915 both detected in the file.
|
No match
|
Date of Birth 10/2/74 with no health terms detected in the file.
The word convulsions with no personal identifiers detected in the file.
|
Personal Financial Information
Personal financial information includes both financial terms and personal identifying information. Both must be present in an email to produce a match.
Financial terms include words and phrases such as:
Financial personal identifiers include words or phrases such as:
|
•
|
Social Security Number or SSN followed by a valid number |
|
•
|
Account, Loan, Customer, Certificate, etc., followed by a name or number |
Examples
Match
|
Date of Birth 10/02/74 and the word routing number both detected in the file.
SSN 480-80-0058 and the phrase account balance both detected in the file.
The word ATM and the phrase Customer A35521 both detected in the file.
|
No Match
|
The phrase account balance with no personal identifiers detected in the file.
The phrase Customer John Doe with no financial terms detected in the file.
|
For more information on configuring DLP, see Outbound Filtering Categories.
ThreatTest
ThreatTest is a service that enables advanced real-time detection and prevention of Phishing, Ransomware, and other malicious email-based threats. Suspect messages are sent for analysis to GoSecure's Hybrid Threat Detection Center, which combines iGuard URL analysis, email threat detection, and advanced anti-Phishing technology. ThreatTest analyzes and removes malicious messages, alerting end users on message status with reports and notifications.