Solution Brief - Web & Email Security
Solution Brief - Web & Email Security
Executive Summary
Figure 1: Data Breach Report
One malicious attachment, one unknown website, or one accidental click
and you may be infected. You can mitigate some of this risk by running
best-of-breed endpoint protection on all of your network-connected Delivery Method
devices, but there will always be vulnerabilities. Whether it is that old fax
94%
machine in the corner of your office, that unpatched Windows 7 Server,
that mobile phone or a well-meaning employee, you could become
compromised. What happens next? It’s little wonder that cyberattacks are Email
the biggest Information Security concern for organizations.1 Cyberattacks
can feature targeted spear phishing, ransomware, denial of service attacks
and impersonation, which may result in direct financial loss, information
theft, lost productivity and reputational harm.
23%
Web
Web and Email are the primary attack vectors for the ever-evolving 2
What’s more, effective web and email security goes beyond advanced threats because cyberattacks aren’t the
only risk. Data fraud & theft are also a top-of-mind information security concern. Sensitive data such as customer
lists, intellectual property, confidential or personal data must also be protected. The culprit may be an employee
with malicious intent, who doesn’t follow company policy or one who accidentally sends an email to the wrong
address. It could also be a user whose device or user credentials have been compromised. Regardless of the source,
effective web and email security can also play a key role in preventing malware infiltration and data exfiltration as
part of a multi-layered data protection solution.
While malware continues to be delivered as disguised attachments through email, it’s increasingly common for
emails to reference web links hosting malware or directing users to phishing sites. This combination of using both
email and web for attacks will only continue as cyber criminals look for ways to get past both email and web
defenses and exploit security gaps to ultimately gain access to sensitive network resources. This is why it’s more
important than ever for web and email defenses to share threat intelligence and have the ability to interact and
relay threat information about specific threats targeting the organization.
1 https://www.bsigroup.com/LocalFiles/en-GB/iso-22301/case-studies/BCI-Horizon-Scan-Report-2018-FINAL.pdf
http://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf
2 https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf
Symantec Network Security
Solution Brief
SASE Framework
Existing network and security models no longer work as digital transformation, mobile devices, remote
workers, and cloud adoption have radically changed network traffic. Customer demand for simple, scalable,
fast, flexible, and secure access is driving key network security components closer to the end user, resulting
in the adoption of a Secure Access Service Edge (SASE) framework.
Figure 4: SASE Framework
Key Capabilities
Cloud and Hybrid Options
While on-premises solutions remain the primary defense mechanisms for many organizations’ data centers, the
disappearance of the traditional network security perimeter, the need for cost reduction, and support for mobile
and remote users has driven the need to move to security in the cloud. By offering email and web solutions in the
cloud, Symantec offers options for any deployment, on-premises, cloud, or a hybrid solution of both.
Content Analysis
Symantec Content Analysis delivers multi-layer file inspection to better protect your organization against known
and unknown threats. Known threats are efficiently identified and blocked by ProxySG, Symantec Messaging
Gateway or other tools, while unknown or suspicious content is identified and delivered to Content Analysis for
deep inspection, interrogation, analysis and ultimately blocking, if deemed malicious. Recent enhancements to
Content Analysis include the ability to use on-box or cloud sandboxing, integration with endpoint protection and
response and the addition of Symantec Antimalware and Advanced Machine Learning to Content Analysis for
increased threat detection capability. The result is an extremely effective and efficient defense-in-depth model that
detects even the most advanced attacks without requiring excessive or redundant infrastructure.
Threat Isolation
Symantec Web Isolation and Email Threat Isolation executes web sessions away from endpoints, sending only a
safe rendering of information to users’ browsers, thereby enabling users to visit potentially dangerous websites
without the risk of infection by preventing any website-delivered zero-day malware from reaching their devices.
When combined with Symantec Secure Web Gateways, rich policies can evolve from the standard (and inefficient)
allow/deny model by isolating traffic from uncategorized sites or URLs with suspicious or potentially unsafe risk
profiles. By integrating with Symantec messaging solutions, Threat Isolation isolates links and attachments in email
to prevent phishing threats and credential attacks.
Symantec Network Security
Solution Brief
Security Analytics
Effective security organizations understand the need to be prepared for the unknown and are effectively equipped
for swift incident response. Symantec Security Analytics provides a clear view of what is happening in your
environment. It delivers enriched, full-packet capture for complete network and cloud workload visibility, advanced
forensics, anomaly detection, and real-time traffic analysis of everything crossing your network or to and from
the cloud. Armed with this detailed record, incident response teams can conduct detailed forensic investigations,
respond quickly to incidents, and resolve breaches in a fraction of the time they would spend with conventional
processes.
Strong Encryption
Strong encryption is essential for secure communication, privacy protection and data integrity. Unfortunately,
cybercriminals know this too. Most cyber threats hide in SSL / TLS encryption, which is often the majority of all
network traffic. Symantec Proxies and SSL Visibility Appliance decrypt traffic, feed a wide variety of security
tools, all while adhering to data privacy policies, laws and regulations. Just as important, these solutions manage
encrypted traffic while preserving the original strong encryption strength.3
Global Intelligence
Content Analysis Network
Passes acceptable
.JAR .EXE Hash Reputation files to user
Proxy/SMG
Signatures evaluate
Dual Anti-Malware/Anti-Virus known bad
On Premises
Additional Sandbox
3 https://jhalderm.com/pub/papers/interception-ndss17.pdf
Symantec Network Security
Solution Brief
Symantec Email Security includes isolation technology so inbound, encrypted email attachments can be opened in
a secure web container allowing users to access attachments whilst keeping them safe from any malicious content.
For outbound email, sensitive data can be encrypted allowing secure communications between customers and
business partners. Encryption can be set automatically via integration with Symantec DLP.
The Symantec ICD Platform unifies products, services and partners to drive down the cost and complexity of cyber
security, while protecting enterprises against sophisticated threats. ICD combines information protection, threat
protection, identity management, compliance and other advanced services, powered by shared intelligence and
automation across endpoints, networks, applications, and clouds.