Security and Compliance Overview - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Security and Compliance Overview

Description:

Archiving and encryption adds costs. Frequent message discovery requests drain IT productivity ... SOX, FRCP archiving requirements. PCI encryption mandates ... – PowerPoint PPT presentation

Number of Views:99
Avg rating:3.0/5.0
Slides: 19
Provided by: Goog249
Category:

less

Transcript and Presenter's Notes

Title: Security and Compliance Overview


1
Security and Compliance Overview
  • Prramhod Shetty-Product Manager

2
Customer Challenges
  • Message based threats are growing
  • External threats (spam, virus, malware)
  • Internal threats (data leak risk)
  • Compliance requirements are increasing
  • Archiving and encryption adds costs
  • Frequent message discovery requests drain IT
    productivity
  • Complex messaging architecture
  • Frequent upgrades and patches for point products
  • Costs escalate with more message volume and
    threats

3
Growing External Threats Drain Productivity
  • Spam volumes are extremely high and growing
  • gt 90 of email traffic is spam in Postini data
    centers
  • We block 1 billion messages and 2 Terabytes of
    spam every day!
  • Spammers are using very sophisticated techniques
  • Example IRS notice that cross links to a web
    site (creating a disruptive bot-net)

Legacy solutions fail to scale, disrupt mail
server performance and sap employee productivity
4
Emerging Enterprise Security Vulnerability
Publicly Reported Data Breaches
Data leak incidents and requirements are on the
rise
  • Data leak incidents and requirements are on the
    rise
  • 68 of organizations experience 6 cases of data
    leaks every year (1)
  • Data privacy compliance industry/governmental
    regulation requires protection of sensitive
    content

Source datacompliance.org
(1) IT Policy Compliance Group
5
Compliance Requirements Are Increasing
Compliance
6
Messaging Architecture Built With Point Products
Is Costly and Complex
Each point application IT resource and management
Directory Service
  • Multiple user provisioning systems
  • Multiple policy management systems
  • Multiple management reporting systems
  • Scalability and reliability costs increase as
    your business grows

7
Customer Challenges
  • Message based threats are growing
  • External threats (spam, virus, malware)
  • Internal threats (data leak risk)
  • Compliance requirements are increasing
  • Archiving and encryption adds costs
  • Frequent message discovery requests drain IT
    productivity
  • Complex messaging architecture
  • Frequent upgrades and patches for point products
  • Costs escalate with more message volume and
    threats

A better approach is needed to address growing
threats, compliance needs and simplified
messaging security architecture
8
Google Apps
Messaging
Collaboration
Security
Compliance
Google Apps Platform
Give employees powerful messaging and
collaboration tools without the usual IT hassle
and cost
9
Google Message Processing Overview
Technologies DHA Blocker Spam Storm
Blocker Virus Storm Blocker DoS/DDoS
Blocker Non-Account Bouncing
Technologies Anti Virus Engines Anti Spam
Engine Customer Content Policies Customer
Attachment Policies
Technologies Load Balancing Fail Over
Delivery Intelligent Geographic Routing Spooling
X
70
Accepted
30
X
Good
50
50
Benefits 50 of SMTP connections rejected Rapid
blocking of Zombie PCs Ensures constant volume
for filter manager
  • Benefits
  • 40 of accepted emails are quarantined
  • Excellent Capture and False Positive rate
  • - Capture Rate 98
  • False Positive rate 0.0003

Benefits Advanced delivery options for good
email Enhanced availability of service Spooling
of good email if customer gateways down
9
10
PassThru Processing guarantees delivery
ACK
  • Google works as a proxy - we never take ownership
    of good email.
  • Security
  • Email is buffered in memory and good email is
    never written to disk.
  • Visibility
  • Same as if you are using internal solution
  • Email can only exist in
  • Sender Outbound Queue
  • Google Quarantine
  • Recipient Inbound Queue

10
11
(No Transcript)
12
Management Reporting
12
13
Google SLAs
13
14
Google Approach Provides Better Security and
Compliance
Effective
  • Global threat visibility 1 billion messages, 2
    Terabytes of spam blocked daily
  • Immediate activation and always on, always
    current
  • Unified policy management for security and
    compliance

Trusted
  • 36,000 businesses and 12 M users trust us with
    security every day
  • WebTrust certified, SAS70 Type II audited
  • Follow the sun global support, optional 24/7
    support available

15
Google Approach Lowers Costs

Google
Legacy approach
Google Confidential
15
16
Why Google?
17
Next Steps
18
Thank You
Write a Comment
User Comments (0)
About PowerShow.com