CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Better Together: How a Secure Email Gateway Can Help Improve Office 365 Security

Organizations of all kinds rely heavily on Office 365 to run their organizations, with research showing over a million companies worldwide and 600,000 companies in the United States using the platform in 2020. The reasons are clear: Office 365 offers unparalleled productivity features that most employees simply can’t do without.

But that widespread adoption also makes the platform a big target for malicious actors, who continue to find clever ways to attack organizations. While Office 365 has good built-in security features, is there a way to add even more protection? According to Phil Hay, senior research manager at Trustwave, the answer is yes.

Phil’s research has shown that by layering a Secure Email Gateway (SEG) over Office 365, organizations can improve their detection rates and their protection – at a cost that might be more reasonable than other alternatives. To learn more about the subject, we interviewed Phil.

Q:   Could you tell us about your research on integrating an SEG into Office 365?

Phil:   Essentially what organizations are doing here is taking an SEG and putting it in front of Office 365, in terms of network architecture. So instead of your email Domain Name System (DNS) records pointing directly at Office 365, and the email being delivered there directly, it will go to the SEG first – whether it’s SEG Cloud or SEG on-premise.

By routing to the SEG first, email gets scanned by the security technology first, so emails can be detected or quarantined at the SEG level and then passed to Office 365, which can do its own scanning.

So, when we talk about integrations, that’s what we’re referring to: placing an SEG in front the cloud. And from having done these integrations, the testing we’ve done has clearly shown that adding an additional layer of protection is beneficial. While Office 365 has very capable scanners that pick-up phishing and malware and other threats, our engines work differently and have propriety technology , so they will catch threats that Office 365 alone won’t, particularly at the E3 level.

Q:   What are the benefits?

Phil:   The SEG will pick up threats that Office 365 alone won’t, particularly around malware and business email compromise (BEC) threats. We have a saying that Office 365 and Trustwave SEG are better together – and that’s literally true. For organizations that really want to gain an extra edge in their protection, or for those that have particularly demanding security needs, an SEG can help provide it.

17592_picture1

 

Q:   What type of organizations would best benefit from this integration?

Phil:   While nearly all organizations can potentially benefit from this, it’s the organizations that have particularly demanding security needs that will most likely want to focus on better safeguarding their email traffic. The higher up your security poster you go, the more benefit you can derive.

At Trustwave, we’ve also seen many small and mid-sized business (SMB) customers who might not even be on E3 yet and are seeing very high-spam volumes switch to this type of implementation. The SEQ can really help with spoofing emails, malicious attachments, and simply reducing the overall level of spam. In particular, this technology can help recognized many different types of attached files – some of which the native technology frequently misses.

 


WHITE PAPER

In, Out and Around: 360° Security for Office 365

If your organization is using or plans to move to Office 365, learn what to expect from an email security, data protection and management perspective. Read Trustwave’s whitepaper for insights into protecting Office 365 email.

 

Latest Trustwave Blogs

Unlocking the Power of Offensive Security: Trustwave's Proactive Approach to Cyber Defense

Clients often conflate Offensive Security with penetration testing, yet they serve distinct purposes within cybersecurity. Offensive Security is a broad term encompassing strategies to protect...

Read More

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Editor’s Note – The situation with the Change Healthcare cyberattack is changing frequently. The information in this blog is current as of April 16. We will update the blog as needed. April 16, 2024:...

Read More

Law Enforcement Must Keep up the Pressure on Cybergangs

The (apparent) takedown of major ransomware players like Blackcat/ALPHV and LockBit and the threat groups’ (apparent) revival is a prime example of the Whack-a-Mole nature of combating ransomware...

Read More