IT Security - Jan 17, 2022
Stay protected against ransomware, malware and spam: Managed e-mail security from the cloud.

by Christian Heckmann

Reports about cyber attacks on companies or authorities are in the news regularly these days. Blackmail trojans, spyware and other malware find their way onto computers and into networks again and again-and the consequences are often catastrophic. One click is enough and financial damage, data leaks and paralysed IT infrastructures become inevitable. In addition, the reputation of the company concerned suffers in the long term.

written by

Christian Heckmann
Manager Transition, Transformation & Portfolio

E-Mail: Christian.Heckmann@bechtle.com

But it's not only large companies that are affected by this. More and more SMEs are also falling victim to these attacks, which are carried out by e-mail in the vast majority of cases. The attackers are becoming increasingly professional, and the AI-based creation of phishing emails or Phishing as a Service offers give them powerful tools with which, for example, effective spear phishing can be carried out.

Comprehensive e-mail security for all.

The criminals often focus on companies that cannot effectively defend themselves against these attacks with their existing resources and financial means. Often there is a lack of the required skilled workers to ensure the continuous maintenance and reconfiguration of the deployed security solution. So what options do such companies have to protect themselves effectively? The answer is Managed Anti-Spam, which Bechtle offers as a managed service in cooperation with its vendor partner, NoSpamProxy.

With Managed Anti-Spam, Bechtle provides customers with a highly available platform made in Germany that combines the latest technical developments and ease of use in one solution. In using this platform, customers place the protection of their entire e-mail communication in the hands of experienced email security experts-and save themselves the expense of personnel, IT infrastructure, installation or training.

Strong partnership as a basis for professional security services.

Managed Anti-Spam is now available via the Bechtle Clouds portal, building on the strong partnership between Bechtle and NoSpamProxy. The two companies have been offering reliable IT services together since 2010 and can thus look back on an intensive and successful cooperation.

With Managed Anti-Spam, you can add a flexible and highly scalable solution for secure e-mail communication to your portfolio. It has never been so easy to protect electronic communication from attacks and at the same time ensure legal security and GDPR compliance-uncomplicated and flexibly bookable as a managed service.

Stay protected against ransomware, malware and spam.

Among other things, Managed Anti-Spam ensures the best possible security by evaluating the sender's reputation by checking the SPF, DKIM and DMARC entries as well as the intelligent attachment and URL management. Malicious links in e-mails and documents are safely detected and defused. Currently popular attacks such as CEO fraud-also known as whaling-or the distribution of malicious code in infected Office documents are also recognised and the attacks are repelled.

Customers can always be sure that they are optimally protected, as the configuration is kept up-to-date by a team of experts. The latest features are also automatically imported and are immediately available and usable. With Managed Anti-Spam, however, the focus is not only on security features but also on ease of use and operation:

  • The solution is immediately available and usable without installation. Customers benefit directly from effective spam protection, secure e-mail encryption and easy sending of large files by e-mail
  • Configuration and maintenance are not the responsibility of the customer. We guarantee full functionality and ongoing operations. This way, resources can be used for other projects
  • Customers avoid initial investments such as the purchase of the software and the acquisition, operation and maintenance of servers. You also save on follow-up costs that can arise from resizing your infrastructure.
Confidentiality and data protection through e-mail encryption and signature.

Industrial espionage and automated e-mail screening by intelligence agencies are the two most headline-grabbing reasons for using e-mail encryption. In many industries, encrypted communication with suppliers or external service providers is a prerequisite for awarding a contract, because encryption protects sensitive data from illegal access and at the same time provides legally secure proof of documents sent by e-mail. This also enables the GDPR-compliant exchange of information. The Encryption add-on provides customers with another building block for optimising e-mail security, allowing them to protect data from third-party access and implement corporate policies without complicated user interaction.

Managed Certificates, which is provided by the manufacturer, also eliminates the time-consuming organisation and administration of certificates. The connection to the corresponding Active Directory group allows the certificates to be created automatically and renewed before expiry. This centralisation leads to a drastic reduction in administrative work. But not only that, the solution already supports the future S/MIME 4.0 standard, making e-mail communication not only secure, but also future-proof.

The next step for e-mail security.

Together with our partner NoSpamProxy, we are able to offer our customers professionally managed security services with a high degree of flexibility and modularisation. Simple and quick-to-use service packages with the excellent combination of functionality paired with a professional managed service.

IT Security @ Bechtle

Share article

Published on Jan 17, 2022.
13Dec
Critical vulnerability in Log4j - What you should do now.
A vulnerability dubbed CVE-2021-44228 and affecting Apache Log4j 2 versions 2.0 through 2.14.1 was announced on GitHub on 9 December 2021, and was rated with the highest severity score of 10. The BSI (Federal Cyber Security Authority) has declared IT Threat Level Red. Log4j 2 is an open source Java logging library that is widely used in a number of software applications and services around the world.
Read
23Nov
Microsoft Ignite 2021 - Part I: Security.
At the beginning of November, it was that time again: Microsoft Ignite. In case you aren't familiar with the format, Ignite is an annual technology convention where the vendor present new products and existing products' new features. This year, Microsoft presented more than 90 new services and updates including for its Azure cloud platform, enterprise software Dynamics 365, collaboration solution Microsoft Teams, and productivity suite Microsoft 365.
Read
19Nov
Information Security Management Systems - A key topic.
Information security and IT security - They're essentially the same thing, right? Think again. Although both terms are often used interchangeably, there is a wealth of difference between them. IT security describes primarily the handling of technical systems, i.e. hardware and software. Information security on the other hand denotes the entire company including staff, processes and even the building's architecture, which demonstrates quite clearly that information security is a key topic and it affects every single employee. An Information Security Management System (ISMS) can help to keep an overview of these complicated factors and their interplay.
Read
09Nov
Sustainability starts with design - How HP develops resource-saving products.
Businessmen have always said that purchasing is the key to profits, but this idea falls short in today's world as surveys are increasingly showing that companies and consumers are less likely to to be motivated to make a purchase just because the price is low. Instead, sustainability is growing in importance, with consumers wanting to know how a product was manufactured, how transparent the supply chain is, what working conditions are like at production facilities, and how CO2-neutral the production process is. Modern companies think ahead, always have an eye on the big picture and face up to their sustainability responsibilities.
Read
21Oct
Prime your network for the future with SASE and SD-WAN.
The demands placed on data centres are on the rise, as are threats to corporate security. Companies need a software-based and secure wide-area network-and hence a radical rethink of their network concepts, with SASE and SD-WAN at the core.
Read
21Oct
Whaling - Phishing attacks on upper management.
Whaling is always good for controversy. In this instance, however, the whales in question aren't the aquatic marine mammals, but upper-level managers. Whaling is the name given to a specific form of phishing targeting high-profile end users. We'll be looking at how cybercriminals can cause extensive damage through whaling, how these attacks tend to unfold, and what businesses can do to protect themselves.
Read
More posts

Attachments

  • Original Link
  • Original Document
  • Permalink

Disclaimer

Bechtle AG published this content on 17 January 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 17 January 2022 15:14:10 UTC.