Copyright 2024 GBS Europa GmbH
Malware is the ultimate way to gain control of corporate data and/or resources. As part of our package, we provide, a built-in malware scanning engine that ensures the standard level of protection is in place. But our customers can enhance that further and add up to 3 scanning engines in a cascaded mode.
In many cases, business files are sent via email and left in the user’s inbox. Our solution helps customers automate the process of storing files in a corporate space, allowing them to improve their internal processes and reduce the size of the mailboxes without compromising user experience. In addition, companies can also store emails in a third-party location for archiving purposes.
Some data leakage scenarios cannot be identified just by the content. People are supposed to use, exchange and transfer data, but based on their behavior patterns, suspicious activities can be detected and appropriate action taken. With this email flow analytics feature, we are also introducing the 4-eye principle to enable customers to configure a “higher authority” that can decide when the algorithm is uncertain.
Some encryption technologies and the ability to sign emails require managing security certificates. This is typically a nightmare for most organizations, but with our centralized Key Management feature you can do that in an easy and centralized manner.
There are occasions when we treat communication with several external partners as confidential. This requires that all emails sent to and coming from such entities are encrypted. Such responsibility should not be left to the end users, so we can set up Server-to-Server encryption. Depending on the other party, this could be PGP or S/MIME, both of which we support.
Email has become a business-critical system over the past few years. Very often, in order to ensure that email flow is not disrupted, we “trust” external parties, removing most of the protection mechanisms we enforce. This opens a huge and uncontrollable gap in the email security. Our solution can help by identifying active content in such communication and delivering it safely to our internal users.
Encryption is a powerful method to prevent unauthorized access to personal, sensitive or financial data. Unfortunately, it is relatively difficult to configure and maintain or to use by the end users. Our solution provides customers with an easy-to-setup, easy-to-use, intuitive encryption mechanism that can be user-initiated or data-initiated or both, based on the customer’s policies and requirements.
It often happens that people forget to enable O-O-O in their emails. This could lead to missed business opportunities, decrease in customer satisfaction, failing to comply with partner/customer expectations and many more implications. The ability to activate this in a more centralized way, with option to do it “On behalf” allows our customers to avoid negative consequences. They can even activate it retro-actively for emails already received by the absentee.
Email signatures/disclaimers are often used for legal purposes, but our solution enables customers to achieve much more. You can define multiple signatures depending on whether this is internal or external communication, whether you have a campaign-driven content you need to include, etc. And all this is configured by the user or a specific team (e.g. Marketing) without the need to involve IT.
Our approach to identifying unwanted content (SPAM) is a combination of proven SPAM detection engines and our powerful content-recognition technology. As part of our package, we provide one SPAM detection engine as built-in, but customers can also decide to use our second option to get higher protection.
Data is the new gold, and the first step in deciding how to use is to be able to identify it. We can find sensitive, classified, personal, financial or other custom-defined data and track its flow, define DLP policies, and perform many other actions that are content-oriented and content-driven.
Define the file-types that are allowed to be transferred over email in all communication directions – incoming, outgoing and internal – and apply your company policy. We use intelligent methods to identify the file-type, regardless of the file extension. Based on that information, different policies can be applied, including saving the attachment to SharePoint.
Text
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus semper tempor nisl, sit amet vehicula velit malesuada in. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Ut gravida lorem a est blandit blandit. Praesent vel mauris placerat, dignissim justo non, maximus lacus. Vivamus semper lacus nec nibh luctus, vitae congue neque aliquet. Donec et sapien varius, sodales risus eget, maximus nibh. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus eget placerat mauris, in viverra ligula. Donec vestibulum pharetra nisl. Vivamus id purus commodo, interdum risus laoreet, euismod odio. Nunc blandit, ante vitae dictum feugiat, velit nibh accumsan arcu, vitae vulputate libero felis eget diam. Proin sed pharetra odio, et consequat lacus. Praesent non volutpat augue. Quisque id ultricies lectus. Quisque consequat lacus in diam faucibus placerat a et sapien.
Sed mollis nulla eros, quis efficitur sem venenatis ullamcorper. Duis dapibus, sapien sit amet placerat interdum, purus urna elementum elit, sit amet consectetur velit purus sed felis. Suspendisse magna orci, posuere non neque a, aliquet condimentum ipsum. Ut fermentum diam sed leo laoreet volutpat. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia curae; Vestibulum non justo nisl. Donec ac ligula orci. Interdum et malesuada fames ac ante ipsum primis in faucibus. Proin gravida ultricies eros, sit amet vulputate dui consequat eu. Nulla rhoncus mattis ligula, ac rhoncus purus tempor ac. Suspendisse ullamcorper porttitor augue in efficitur.
15.10.2022