SED Email Security Cloud PB100
SED Email Security Cloud PB100
SED Email Security Cloud PB100
cloud
Complete Email Security for the Cloud
Generation
Critical and Challenging Role of Email Security
Why is email today’s No. 1 threat vector? Email is the most common
way for cyber criminals to launch and distribute threats. According to
At A Glance the 2020 Data Breach Investigations Report, Verizon, most malware is
• Accurately defend against delivered through email, with 46% of organizations getting almost all their
ransomware, BEC and emerging malware this way. In the 2019 Internet Crime Report, the FBI shows that
threats. business email compromise (BEC) accounted for half the reported losses
Stop new and sophisticated experienced from all cyber crime ($1.77B).1
threats such as ransomware, spear
phishing, and business email As the volume of these attacks has increased, so has the level of
compromise with the most effective sophistication. Advanced and zero-day threats are much more difficult to
and accurate email security. detect and stop than traditional malware, while standard signature-based
• Stop spear phishing with
antimalware tools have proven largely ineffective against them. Attackers
comprehensive defense. now favor targeted spear phishing, especially in the form of BEC scams.
Shield your organization from spear These elusive and dangerous targeted attacks use sophisticated methods
phishing through a comprehensive including domain spoofing and obfuscation of malicious links embedded in
defense that includes multiple email messages. The losses from these attacks amounted to $26B in July
layers of protection, strong 2019, over double the losses reported in May 2018.
isolation, deep visibility, and
dynamic security awareness. At the same time, businesses are migrating their email from on-premises
servers to cloud-based systems such as Microsoft Office 365 and Google
• Accelerate your threat response G Suite. Unfortunately, the basic, built-in security of these systems cannot
with Integrated Cyber Defense.
fully protect against email threats. Traditional email security solutions
Contain attacks and orchestrate
do not work either. Their rudimentary defenses fail to block new and
response across endpoint security
sophisticated attacks, and their siloed approach to security allows
and web gateways by remediating
advanced threats to slip through the cracks. Both types of security give
attacks, block-listing threats, and
organizations limited visibility and provide only basic analytics, which
correlating security analytics.
makes it harder to respond to threats.
• Ensure safe cloud adoption with
the industry’s strongest controls. Further complicating the landscape, vendors offer myriad point products
Fully secure Office 365 and G Suite that address only part of the security problem. These disjointed products—
through Symantec Email for email security, data loss prevention (DLP), endpoint protection,
Security.cloud, Cloud Access web security, and more—require costly, custom integrations and high
Security Broker (CASB), and Data management overhead. And again, a patchwork defense is leaky. Add in
Loss Prevention solutions. a shortage of trained IT security personnel and organizations end up with
increased operational complexity and greater vulnerability.
1. FBI, Public Service Announcement,Alert Number: I-071218-PSA, https://www.ic3.gov/Media/Y2018/PSA180712, July 2018, and
FBI, Public Service Announcement, Alert Number: I-091019-PSA, https://www.ic3.gov/Media/Y2019/PSA190910, September 2019
Email Security.cloud
Product Brief
Shut Down the No. 1 Threat Vector sophisticated email attacks such as ransomware, spear
phishing, and BEC with multiple, advanced detection
Symantec™ Email Security.cloud is a complete email technologies and telemetry from the Symantec Global
security solution that safeguards cloud email such as Intelligence Network. It also improves user productivity
Office 365 and G Suite and on-premises email such as by blocking spam and other unwanted email such as
Microsoft Exchange. It blocks new and sophisticated newsletters and marketing emails.
email threats such as ransomware, spear phishing, and
BEC with a multilayered defense and insights from the
world’s largest civilian global intelligence network. Emerging Threat Prevention
• Sandboxing uncovers targeted and advanced attacks
Email Security.cloud repels spear phishing attacks
by executing unknown files in physical and virtual
with comprehensive defense that includes protection,
environments. This helps catch ‘virtual machine-
isolation, visibility, sender authentication and user
aware’ attacks, which are threats that do not exhibit
awareness. It also accelerates attack response with
suspicious behavior in virtual environments. The
analytics that provide deep visibility into targeted
Symantec sandbox mimics human behavior to
attack campaigns. Symantec Information Centric
draw out attacks that appear malicious only in the
Analytics correlates email, other security streams, and
presence of humans. In addition, our sandbox uses
user behavior analytics to give even deeper visibility.
machine learning to detect stealthy, persistent threats
Finally, Email Security.cloud is part of the Symantec by analyzing code for suspicious characteristics. And
Integrated Cyber Defense Platform, which covers it utilizes network traffic analysis to identify malware
endpoint and web security, threat analytics, security that call command-and-control servers.
orchestration and automation, and more. • Behavior analysis blocks new, crafted, and hidden
ransomware by examining all email characteristics
Prevent including delivery behavior, message attributes,
attachments, and social engineering tricks. It also
Email Security.cloud supercharges the built-in security blocks new ransomware variants by determining if an
of cloud and on-premises email systems by preventing email contains reused malicious code. Finally, it uses
the most malware and email threats with the fewest file decomposition techniques to spot and extract
false positives. This cloud-based solution repels hidden ransomware within attachments.
Email Security.cloud
Product Brief
• Threat Isolation prevents ransomware and other • Prevent ransomware and other malware from
malware from infecting users by isolating suspicious infecting users by isolating email attachments
email attachments. This technology also isolates risky
or unknown email links which host malware, keeping Respond
users and devices safe from infected downloads. Email Security.cloud accelerates attack response
with analytics that provide the deepest visibility
Symantec Global Intelligence Network into targeted and advanced attack campaigns. This
Threat Intelligence from the world’s largest civilian intelligence includes insights into both clean and
network provides global visibility into the threat malicious emails, and provides more Indicators of
landscape and helps ensure better security outcomes. Compromise (60+ data points including URLs, file
The GIN helps ensure better security outcomes through hashes, and targeted attack information) than any
telemetry distilled from over 175 million endpoints, 80 other vendor. This can all be streamed to your Security
million Web proxy users, and 57 million attack sensors Operations Center through API integration with third-
in 157 countries and by analyzing 8 billion threats every party Security Information and Event Management
day. (SIEM) systems,Symantec Information Centric Analytics
or Symantec Integrated Cyber Defense Exchange.
Email Security.cloud
Product Brief
Email Security.cloud
Product Brief
For product information and a complete list of distributors, visit our website at: broadcom.com
Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom.
SED-email-security-cloud-PB100 November 24, 2020