Title: Security and Compliance Overview
1Security and Compliance Overview
- Prramhod Shetty-Product Manager
2Customer Challenges
- Message based threats are growing
- External threats (spam, virus, malware)
- Internal threats (data leak risk)
- Compliance requirements are increasing
- Archiving and encryption adds costs
- Frequent message discovery requests drain IT
productivity - Complex messaging architecture
- Frequent upgrades and patches for point products
- Costs escalate with more message volume and
threats
3Growing External Threats Drain Productivity
- Spam volumes are extremely high and growing
- gt 90 of email traffic is spam in Postini data
centers - We block 1 billion messages and 2 Terabytes of
spam every day! - Spammers are using very sophisticated techniques
- Example IRS notice that cross links to a web
site (creating a disruptive bot-net)
Legacy solutions fail to scale, disrupt mail
server performance and sap employee productivity
4Emerging Enterprise Security Vulnerability
Publicly Reported Data Breaches
Data leak incidents and requirements are on the
rise
- Data leak incidents and requirements are on the
rise - 68 of organizations experience 6 cases of data
leaks every year (1) - Data privacy compliance industry/governmental
regulation requires protection of sensitive
content
Source datacompliance.org
(1) IT Policy Compliance Group
5Compliance Requirements Are Increasing
Compliance
6Messaging Architecture Built With Point Products
Is Costly and Complex
Each point application IT resource and management
Directory Service
- Multiple user provisioning systems
- Multiple policy management systems
- Multiple management reporting systems
- Scalability and reliability costs increase as
your business grows
7Customer Challenges
- Message based threats are growing
- External threats (spam, virus, malware)
- Internal threats (data leak risk)
- Compliance requirements are increasing
- Archiving and encryption adds costs
- Frequent message discovery requests drain IT
productivity - Complex messaging architecture
- Frequent upgrades and patches for point products
- Costs escalate with more message volume and
threats
A better approach is needed to address growing
threats, compliance needs and simplified
messaging security architecture
8Google Apps
Messaging
Collaboration
Security
Compliance
Google Apps Platform
Give employees powerful messaging and
collaboration tools without the usual IT hassle
and cost
9Google Message Processing Overview
Technologies DHA Blocker Spam Storm
Blocker Virus Storm Blocker DoS/DDoS
Blocker Non-Account Bouncing
Technologies Anti Virus Engines Anti Spam
Engine Customer Content Policies Customer
Attachment Policies
Technologies Load Balancing Fail Over
Delivery Intelligent Geographic Routing Spooling
X
70
Accepted
30
X
Good
50
50
Benefits 50 of SMTP connections rejected Rapid
blocking of Zombie PCs Ensures constant volume
for filter manager
- Benefits
- 40 of accepted emails are quarantined
- Excellent Capture and False Positive rate
- - Capture Rate 98
- False Positive rate 0.0003
Benefits Advanced delivery options for good
email Enhanced availability of service Spooling
of good email if customer gateways down
9
10PassThru Processing guarantees delivery
ACK
- Google works as a proxy - we never take ownership
of good email. - Security
- Email is buffered in memory and good email is
never written to disk. - Visibility
- Same as if you are using internal solution
- Email can only exist in
- Sender Outbound Queue
- Google Quarantine
- Recipient Inbound Queue
10
11(No Transcript)
12Management Reporting
12
13Google SLAs
13
14Google Approach Provides Better Security and
Compliance
Effective
- Global threat visibility 1 billion messages, 2
Terabytes of spam blocked daily - Immediate activation and always on, always
current - Unified policy management for security and
compliance
Trusted
- 36,000 businesses and 12 M users trust us with
security every day - WebTrust certified, SAS70 Type II audited
- Follow the sun global support, optional 24/7
support available
15Google Approach Lowers Costs
Google
Legacy approach
Google Confidential
15
16Why Google?
17Next Steps
18Thank You