Secure Computing unveiled a new initiative called Seven Technologies for Advanced Mail Protection (STAMP) and introduced the latest version of its Secure Mail solution during separate briefings with clients and partners in Dubai.
During the briefings, Secure Computing discussed how email risk has evolved in 2008 and what to expect in the future, and why organizations should be more aware of blended web and email threats. The gateway security provider also explored current activities against email attacks, the effectiveness of these efforts, and new technologies needed to fight these threats. It finally talked about how ‘software as a service’ and virtualization provide new opportunities for more agile and scalable email security. Secure Computing’s October 2008 Major Spam Trends report confirms that spam attacks are on the rise, averaging 20 to 25 per cent as the international holiday seasons approach, thus increasing the need for enhanced email protection.
“The Middle East has emerged as the fastest internet use growth area in the world, posting a phenomenal usage growth rate of 1,176.8 per cent between 2000 and 2008. Unfortunately, this achievement has made our region, particularly upscale and progressively IT-enabled areas such as Dubai, a favorite haunt for hackers and malware developers. As a leading business and technological hub, Dubai and the greater UAE is promoting broader awareness of internet-bourne threats, which Secure Computing commits to fully support,” said Nimer Ghazal, Regional Sales Manager – Middle East, Secure Computing.
An International Data Corp. (IDC) study found that while inbound threats have evolved, only a few organizations are well protected. Unfortunately, 60 percent of organizations were found to be performing dismally and allowing more than 5 percent of email spam into the network. Additionally, nearly half of the organizations suffered email data leaks, and while most organizations were very concerned about this, only 28 per cent have taken steps to alleviate risk. Finally, organizations are looking for better ways of delivering email security, and over half of the respondents believed that a hybrid solution approach would deliver the best email security against inbound and outbound threats.
Based on the IDC study, extensive customer experience, and global threat data from TrustedSource.org, Secure Computing has identified the core security components and architecture necessary to effectively combat spam, data leakage and blended threats. The company’s objective is to leverage its security expertise and ongoing research to help businesses implement a proactive security architecture that can protect their environments as existing messaging threats increase and new threats arise.
Secure Computing’s seven key messaging threat protection requirements include real-time, multi-protocol reputation-based messaging security; multi-tiered inbound defenses; complete content detection; robust encryption and other compliance actions based upon policy; an integrated inbound and outbound protection solution; a hybrid security application delivery architecture; and an enterprise-ready, best-of-breed solution approach, combining scalability with stability, ease of administration and robust reporting capabilities to maximize and prove Return-of-Investment to management.
Secure Computing’s new Secure Mail 6.7.1 messaging gateway appliance provides a STAMP-compliant next-generation email environment. Among its key features are 99 percent spam detection accuracy; best-practice real-time dynamic spam classifier and threat response updates; 200 percent performance improvement over previous versions of Secure Mail; and the first delivery of Secure Computing's Hybrid Delivery Architecture for Email;
Secure Computing Product Marketing Manager Mike Smart will further promote the company’s web security strategies and solutions at the IDC IT Security, Storage and Business Continuity Roadshow 2008 slated for November 5, 2008 at the Jumeirah Beach Hotel in Dubai, UAE. Smart will discuss Secure Computing SWAT Initiative and the new generation of multi-layered security that adds inbound and outbound protection, reputation-based filtering, and multi-function security appliances at the network gateway to address Web 2.0 threats and technologies that are not resolved by Web 1.0 security measures.