cheap mlb jerseyscheap jerseyscheap nhl jerseyscheap jerseys

Corporate Communications Security – Gigaom

Always updating business technology trends

Get updates that impact your industry from our GigaOm Research Community

Join the community!

Yes, much of the world may have moved from email to social media and culturally dubious TikTok dances, but traditional email remains the cornerstone of business communication. And sadly, it’s still a key vector for malware, data leaks, and phishing attacks can undermine the protection of a business. It doesn’t have to be that way.

In a newly released report titled “GigaOm Radar for fraud prevention and detection,” GigaOm Analyst Simon Gibson surveyed more than a dozen enterprise-focused email security solutions. He figured out a range of approaches to ensure communications can often be combined together to provide critical, in-depth protection against even identified attackers. .

Figure 1. GigaOm Radar to prevent and detect email phishing

“When evaluating these vendors and their solutions, it’s important to consider your own business and business processes,” wrote Gibson in the report, emphasizing the need to implement The solution that best addresses your organization’s business processes and email traffic. “For some, it may be preferable to settle on a comprehensive solution, while for others it may be more appropriate to build a best-breed architecture from multiple vendors. . “

In an area of ​​authoritative solutions, Gibson found that Forcepoint, recently purchased by Raytheon, stands out thanks to the layers of protection provided by its Advanced Classification Engine. Meanwhile, Region 1 and Zimperium are both leaders showing significant momentum, with Region 1 driven by a recent solution partnership with Virtru and Zimperium excelling in their deep commitment to Mobile messaging security.

Gibson said in a video interview for GigaOm it was time to focus on mobile devices. Companies are “throttling growth” and allowing unprecedented access and dependence on mobile devices, he says, creating an urgent need to overcome these threats.

Gibson’s conclusion in the report? He points out three things: Intensive defense, an awareness of existing models and infrastructure, and a healthy respect for the ‘human factor’ that can make security hard to lock. .

Leave a Comment