Well meaning and malicious insiders are putting organizations at risk of a breach by mishandling information, violating company policy and industry and government regulations, and not following safe business processes when it comes to handling company confidential information and intellectual property. Email Security.cloud offers multiple ways to protect sensitive information, including Data Protection, Policy Based Encryption, and Image Control.
Email Data Protection includes a policy configuration engine and compliance and regulatory-focused templates to easily create and enforce data protection policies. Enhanced reporting and content matching let administrators see when policies are violated. Policy resources, such as content keyword and regular expression lists, can be shared with the Web Data Protection service in Symantec Web Security.cloud to apply rules consistently across email and web.
Easy to set up and maintain, this cost-effective service helps reduce the risk of data loss and enables users to establish and enforce an acceptable use policy so employee email use can be more productive while upholding the privacy and compliance needs of the business. Data Protection analyzes multiple email components including email body, subject, and headers, as well as text within Microsoft Office® documents and PDFs that are embedded within emails or sent as attachments.
Policy Based Encryption
Policy Based Encryption Essentials provides push PDF encryption in the Email Safeguard service plan. Encryption of messages can be initiated manually by the user or automatically by policies set in Data Protection. Encryption is seamless to the sender, and encrypted emails can be read on a variety of devices, including mobile.
Policy Based Encryption Advanced is an add-on service to the Email Safeguard plan. It supports additional encryption options, including PGP and S/MIME, to ensure that enterprises can communicate securely with each other, no matter which encryption platforms they have. Policy Based Encryption Advanced is also fully brandable.
Email Image Control scans emails and attachments to identify, control, and block inappropriate images from entering or leaving the organization. Particularly well-suited to the accurate detection of pornographic images, Image Composition Analysis (ICA) applies a comprehensive range of image-filtering algorithmic techniques, including facial recognition, body positioning analysis, texture, analysis, and flesh tone analysis.