Well meaning and malicious insiders are putting organizations at risk of a breach by mishandling information, violating company policy and industry and government regulations, and not following safe business processes when it comes to handling company confidential information and intellectual property. Email Security.cloud offers multiple ways to protect sensitive information, including Data Protection, Policy Based Encryption, and Image Control.
Email Data Protection includes a policy configuration engine and compliance and regulatory-focused templates to easily create and enforce data protection policies. Enhanced reporting and content matching let administrators see when policies are violated. Policy resources, such as content keyword and regular expression lists, can be shared with the Web Data Protection service in Symantec Web Security.cloud to apply rules consistently across email and web.
Easy to set up and maintain, this cost-effective service helps reduce the risk of data loss and enables users to establish and enforce an acceptable use policy so employee email use can be more productive while upholding the privacy and compliance needs of the business. Data Protection analyzes multiple email components including email body, subject, and headers, as well as text within Microsoft Office® documents and PDFs that are embedded within emails or sent as attachments.
Policy Based Encryption
Policy Based Encryption is available as an add-on to Email Security.cloud that enforces email encryption based on pre-defined policies. It encrypts regardless of the recipients’ technology, while ensuring emails can be read on all devices, including mobile. Encryption of messages can be initiated manually by the user or automatically by policies set in Data Protection.
Email Safeguard or Data Protection is required for Policy-Based Encryption.
Email Image Control scans emails and attachments to identify, control, and block inappropriate images from entering or leaving the organization. Particularly well-suited to the accurate detection of pornographic images, Image Composition Analysis (ICA) applies a comprehensive range of image-filtering algorithmic techniques, including facial recognition, body positioning analysis, texture, analysis, and flesh tone analysis.