Professional Documents
Culture Documents
3 Solution overview
4 Value Proposition
2
Cyber Security Product Portfolio
1 2 3 4 5
3
Why Email Security?
4
How email is #1 threat vector
5
Rise in cyber attacks since Covid-19 outbreak
FirstCloud Email Security uses Cisco + Proprietary technologies
7
Multi-Layered Defence using ESA/Ironport, TALOS and FirstWave
Advanced
Anti-malware
8
A Comprehensive Email Security Package
Advanced Protection for both Inbound and Advanced Security Policy Enforcement Secure Role-Based Access Portal with rich
Outbound Emails Features administration features
• Stop known viruses and advanced threats from • Granular Email classifiers and Email policy filters • Centralised view of domains, sub-domains, and
reaching the customer’s mail server: anti-virus, users, with their privileges
anti-spam, anti-phishing, anti-ransomware • Granular security filters and content policy filters
that can be applied for both Inbound and • Centralised view on policies available to enforce
• Strong Impersonation controls to prevent C-level Outbound emails and being enforced
fraud (Whaling)
• Delivers an additional layer of advanced inbound • Centralised view on historical and real-time
• Advanced filters to block forged and phishing and outbound email security for Office 365 reports
email attempts using machine learning Exchange Online (SaaS) customers. Outbound
• Customer may have multiple administrators for a
emails sent from the Office 365 cloud are
• Apply advanced Content Control Filters to check single account. Each administrator can have a
verified using DKIM authentication
marketing spam, profanity, invoices, abuse etc. unique login and be provided full access or read
• Centralised policy view and management for only privileges specific to each user. This
• Scans for clean, suspect and malicious URLs
single domain and across domains functionality allows a unique, single “Admin
• Checks for IP and Domain reputations User” account that can create multiple
Strong Analytics, Reporting and Controls administrators.
• Uses SPF to detect and block spoofed emails
• Comprehensive search, retrieval and replay of
• Performs DMARC validation. Uses authentication Additional Value-Adding Features
inbound and outbound emails for a retrospective
against established DKIM and SPF standards to
time- period of up to 32 days. Can be extended. • Mail system failover supported
block fraudulent RS Brothersivity appearing to
come from domains under your control • Real-time analytics dashboard on safe, blocked • Alerts on Email system unavailability
• Real-time security updates from Cisco Talos, the and quarantined emails, with granular info
• Email spooling: disaster recovery service that
world’s largest threat intelligence service • Email self-release (user) and Administrator supports spooling of inbound emails that can’t
• Apply Email Data Loss Prevention with PCI/ release options available be delivered due to your mail server being
Credit Card filters, and Custom Keyword Filters • Online, Offline and Scheduled threat and usage unreachable or unavailable for up to 5 days
• Opportunistic TLS Encryption of all emails reports can be generated for management
13
250+
100 TB
Full Time Threat Intel
Of Data Received Daily
Researchers
600 BILLION 4
Daily Email Messages Global Data Centers
30 years building
Global
the world’s
scanning
networks
14
The FirstWave Multi-Tenant Portal provides full control
Anti-Spam Drop/Quarantine
Anti-Virus Drop/Quarantine
Rewrite
Graymail Detection
Quarantine/Rewrite
Outbreak Filters
Real-Time URLAnalysis
11
EMAIL SECURITY ARCHITECTURE
Mail
Senders and
Receivers
12
Email Security product variants
13
FirstCloud Mail Security: Service Performance Levels
14
Business Essentials Package Features proposed with this pricing
✓ Anti-Malware
✓ O365 Security with DKIM ✓ Email Trace and Replay
✓ Impersonation controls (C/D-level Fraud) ✓ Data Loss Prevention ( Lite ) ✓ 32-day archival; option to extend
✓ Email Classifiers ✓
28
TIMELINE: SERVICE CUTOVER WITHIN 3-4 DAYS
1 day Up to 3 days
• Environment setup & • Scope finalisation • Provision • User Acceptance Tests • Monitor, post migration,
controls domain(s) on CCSP and sign-off initial period
• Requirements
• Authorisation & confirmation • Replicate & verify • Technical knowledge
privileges policies & filters sharing
• Migration sequence
• Existing security (risk mitigation) • Exceptions handling • In-life transition &
policies and filters handover
• Sign-off governance & • Supervised MX cutover
• Existing mail routes key personnel • Support procedure tests
• Mail flow tests & sign-off
• Bespoke configurations • Export policies & rules
Deploying cloud email for national delivery
service Requirement Customer Result
• Reduced internal maintenance of the • High availability
legacy system
• Increased security through authorization
• Improved visibility with a range of live
and downloadable reports • Optimal personnel utilization
17
Email protection for large scale education
facility Requirement Customer Result
• Implementation of cloud security • Effective monitoring & supervision
gateway regulating more than 30 million
emails a month • Improved availability & scalability
• Real-time threat intelligence, advanced • Quick & seamless integration with Gmail
content control, with ease and flexibility • Improved capacity management
in reporting, archiving and managing
organisational policies • Enhanced flexibility
18
TTBS Value Proposition
Support Platform
Voice support for customers and account Single platform to manage multiple
manager security applications