News Centre

Trend Micro Cloud Email Gateway (key features)

Article by Diogo Correa
October 29, 2018

SHARE THIS POST:

TRend-Micro-Emil-Tech-Patrol

Email is mission-critical when it comes to an business across any industry, but email-based threats, including ransomware and Business Email Compromise (BEC), are growing exponentially as technology develops complimented by a user adoption growth and it’s difficult to keep up. Even your savviest employees can mistakenly click on a malicious link and expose your entire business to strong malicious activity. Throughout this article, we will analyse one of the best email securities by one of the worlds biggest brands when it comes to security in an attempt to give you the understanding and knowledge base when trying to look for the right email protection for your business.

Trend Micro™ Cloud Email Gateway Services is smart, it’s optimised, and most of all it’s “connected” to further stop phishing, ransomware, and BEC attacks. Powered by XGen® security, the services use an optimum blend of cross-generational threat techniques including machine learning, sandbox analysis, data loss prevention (DLP), and other methods to stop all types of email threats. The solutions minimise management overhead and connect with other Trend Micro security layers to share threat intelligence (very important) and provide central visibility of threats across your organisation.

What can it cover?

The solution protects all majored services from:

  • Microsoft® Exchange™
  • Microsoft® Office 365®,
  • Gmail™, and other hosted and on-premises email solutions.

Key Features:

  • Layered Protection: Provides comprehensive protection for phishing, spam, and graymail with multiple techniques, including sender, content and image analysis, machine learning and more.
  • Email Fraud Protection: Protects against BEC with enhanced machine learning, combined with expert rules, analysing both the header and content of the email.
  • Document Exploit Protection: Detects advanced malware and exploits in PDF, Microsoft Office, and other documents using static and heuristic logic to detect and examine abnormalities.
  • Zero-day Protection: Discovers unknown malware using multiple pattern-less techniques, including pre-execution machine learning and sandbox analysis.
  • Advanced Threat Protection: Includes top-rated Trend Micro Deep Discovery Sandbox technology for dynamic analysis of potentially malicious attachments in a secure virtual environment.
  • URL time-of-click: Blocks emails with malicious URLs before delivery and re-checks URL safety when a user clicks on it.
  • Source Verification and Authentication: Include Sender Policy Framework (PF), DomainKeys Identified Mail (DKIM), Domain-based Message Authentication, Reporting, and Conformance (DMARC).
  • Threat Intelligence: Uses the Trend Micro™ Smart Protection Network™, one of the largest threat intelligence databases, to correlate web, email, file, domain registries, and many other threat sources to identify attacker infrastructures, before they are launched.
  • Email Encryption: Policy-driven email encryption includes hosted key management service and enables recipients to read encrypted emails on any device using a web browser.
  • Data Loss Prevention (DLP):  Includes DLP templates to make it easier to track, document, and safeguard confidential and sensitive information.
  • Email Continuity: Provides a standby email system that gives uninterrupted use of email in the event of a mail server outage.
  • Flexible Reporting: Generates reports based on scheduled and customisable content.
  • Connected Threat Defence: Synchronises with TRand Micro Control Manager™ to share and implement a file and URL suspicious objects list.

What we’ve found with Trend Micro’s Hosted email Security is that it’s a no-maintenance-required solution that delivers continuously updated protection to stop spam, malware, spear phishing, the latest ransomware threats, including WannaCry, and advanced targeted attacks before they reach your network.

 

 

What a cloud email security service can do for your business:

Stop phishing and spam

  1. Examines the authenticity and reputation of the email sender to screen out malicious senders.
  2. Analyses email content using a variety of techniques to filter out spam and phishing.
  3. Protects against malicious URLs at delivery and at time-of-click (rewrites and analyses URLs at the time of click and blocks them if malicious).

Detects and blocks advanced threats

  1. Detects and blocks ransomware and other types of zero-day malware using pre-execution machine learning, macro analysis, exploit detection, and dynamic sandbox analysis.
  2. Pre-execution machine learning filters unknown malware before sandbox analysis, enhancing efficiency and efficacy of advanced threat protection.
  3. Shares threat information with other security layers to guard against persistent and targeted attacks.

Protects against BEC

  1. Includes enhanced machine learning, combines with expert rules to analyse both the header and content of the email to examine the behaviour (an unsecured email provider, forged domain, or a reply to a free email service) and intention (Financial implication, urgency, or a call to action).
  2. Allows you to have the flexibility to define your organisation’s high-profile users list for BEC protection.

Gives you PEACE OF MIND (Something we all need :))

  1. 24/7 Technical Support
  2. All emails from Europe, the Middle East and Africa (EMEA) customers are routed to data centres in Western Europe, and emails from the rest of the world are routed to data centres in the United States*. For Australian and New Zealand, emails are routed to data centres in Australia.
  3. The main service is hosted on AWS and the cloud sandbox is hosted on Trend Micro data centres certified by ISO 27001. Data centres in different regions operate independently and are not interconnected due to data privacy and sovereign considerations.

Now with all protection vendors, you will have an option of a standard product or an advanced one and this is no different in the case of Trend Micro and here is a comparison table of both ‘standard’ and ‘advanced’ Cloud Email Gateway Services:

 

CAPABILITY

 

STANDARD

(Trend Micro Hosted Email Security)

 

ADVANCED

(Trend Micro Email Security Advanced)

Email sender analysis and authentication by SPF, DKIM, and DMARC 

Yes

 

 

Yes

 

Protection: Known threats (spam, malware, malicious URLs, and graymail) 

Yes

 

 

Yes

 

Protection: Unknown malware detectionExploit detection, machine learning, sandbox analysisExploit detection, machine learning, sandbox analysis
Protection: Unknown URL protection 

URL time-of-click

 

 

URL time-of-click

 

Protection: Al-based fraud/BEC detection 

Yes

 

 

Yes

 

Compliance: DLP & email encryption 

Yes

 

 

Yes

 

Email continuity 

 

 

Yes

 

Mail tracking: High performance log search 

 

 

Yes

 

End User quarantine: Automatically combine multiple aliases into one quarantine account 

 

 

Yes

 

Reporting: Customisable and scheduled reports 

 

 

Yes

 

External log sharing to security information and event management (SIEM)Via Trend Micro Control ManagerVia Trend Micro Control Manager or Syslog Directly to SIEM
Connected Threat Defence: Sharing/implementing of file and URL suspicious objects 

 

 

Yes

 

 

 

If you would like to try this technology against an existing technology that your company uses, contact us today.

 

Other Articles Your May Enjoy:

Share your thoughts in the Comments section:

Subscribe For The Latest In Technology

Other Posts You May Like

TECH NEWS & UPDATES

Please enter your name.
Please enter a valid email address.
Something went wrong. Please check your entries and try again.

RECENT POSTS

Microsoft Azure

Introduction to Azure – A Core Cloud Service

Microsoft Responds to COVID-19

Microsoft Responds To COVID-19 By Offering E1 Licenses Free For The Next 6-Months

teams_video_calls_intelligent_workplace

Microsoft Teams vs Zoom. What is right for your business?

Microsoft Azure

Azure Firewall Manager now supports virtual networks.

White Paper

Enjoy this free eBook

Tech Patrol - Microsoft Office 365

White Paper (Why businesses Are Migrating to Cloud)

  • This field is for validation purposes and should be left unchanged.
trend-micro-cloud-email-gateway-key-features-tech-success
Scroll to Top