Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

4/30/2010
05:07 PM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

Sending Email, Web Security To The Cloud

E-mail and Web security outsourcing are gaining more momentum as resource-strapped companies look for ways to tighten their IT belts. IT shops are constantly being asked to do more with less, and it's often security that gets more budget cuts since it's an IT area that doesn't contribute directly to a company making money.

E-mail and Web security outsourcing are gaining more momentum as resource-strapped companies look for ways to tighten their IT belts. IT shops are constantly being asked to do more with less, and it's often security that gets more budget cuts since it's an IT area that doesn't contribute directly to a company making money.The questions many companies end up asking are, how easy is it to move to a hosted e-mail and Web security service, and will it work with current security solutions in place?

The answers are surprisingly simple, and what better way to help secure your network than to make it someone else's problem? OK, ultimately it's still your problem, but the need to constantly care for and feed an appliance goes away with hosted security services. Also, you don't have to worry about resizing your appliance every few years.

Outsourcing e-mail security functions, like anti-spam, anti-phishing, and anti-malware, is as easy as pointing your MX record to the security provider. At that point, mail starts flowing through the e-mail security service provider's network, passing through the various filters and scanners, then getting passed onto your network.

If you have an appliance for additional filtering or data leakage prevention (DLP), then the mail can pass through there first before arriving to your actual mail server. Outbound e-mail can take the same, reverse path.

Similarly, outsourcing Web security services, like content filtering, anti-malware, DLP, etc., requires just a couple of changes. Hosted Web security services provide multiple options for accepting traffic from customers. They include making the change on user workstations to run through the Web security proxy and forwarding the Web traffic directly from the company's router or firewall.

And like e-mail security services, existing Web proxy appliances can usually work with hosted Web security services by inspecting the Web traffic, then passing it off to the service provider.

If you're in a seemingly sinking boat, looking for an economical way to extend your existing e-mail and Web security appliances or secure your e-mail and Web without all the expensive upfront costs of an appliance, then hosted e-mail and Web security services might just be right for you. The variety of easy connection options make evaluating services a breeze.

John H. Sawyer is a senior security engineer on the IT Security Team at the University of Florida. The views and opinions expressed in this blog are his own and do not represent the views and opinions of the UF IT Security Team or the University of Florida. When John's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.