Advertisment

Secure Computing unveils STAMP

author-image
CIOL Bureau
Updated On
New Update

BANGALORE, INDIA: Secure Computing Corporation unveiled a new initiative called "STAMP" (Seven Technologies for Advanced Mail Protection)-- designed to comprehensively improve email security by bringing  market research, industry architecture requirements and solutions to the forefront.

Advertisment

Organisations are faced with a plethora of email challenges, many of which negatively impact businesses and productivity. This includes spam surges, malware threats, sensitive information leaks, and compliance and audit demands.

The STAMP initiative provides the marketplace with a deeper knowledge and understanding of the issues, identifies and highlights essential architectural components, and takes a comprehensive look at tools, technologies and solutions necessary to stamp out corporate email risk.

Atri Chatterjee, senior vice president, Secure Computing, said: "Our recent survey that looks at North American organisations with 500 employees or more, found out that while inbound threats have evolved, only a small portion of organisations are well protected. Unfortunately, 60 percent of organisations were found to be performing dismally and allowing more than five percent of email spam into the network."

Advertisment

"Additionally, nearly half of organisations suffered email data leaks, and while most organisations were very concerned about this, only 28 percent have taken steps to alleviate risk. Even in today's challenging economic times, executives recognise the importance of email security and organisations are willing to invest in new solutions

Seven Requirements for Advanced Mail Protection

 

Secure Computing has identified the following seven key requirements for addressing today's evolving messaging threats effectively and as cost-effectively as possible: 

Real-time, multi-protocol reputation-based messaging security, providing zero hour protection, reduced bandwidth and archiving costs;

Advertisment

Multi-tiered inbound defenses, including global and local intelligence to deliver 99.5 percent effectiveness;

Complete content detection--both structured and unstructured--resulting in privacy and intellectual property protection;

Robust encryption and other compliance actions based upon policy, ensuring compliance and lowering risk of theft;

Advertisment

Integrated inbound and outbound protection solution, thus reducing costs and improving efficiency;

A hybrid security application delivery architecture, enabling choice or mix of on-premise, hosted and virtualised solutions for greater business agility and flexibility;

Enterprise-ready, best-of-breed solution approach, combining scalability with stability, ease of administration and robust reporting capabilities to maximize and prove ROI to management.

tech-news