Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
327 views79 pages

Advanced Email Security Training

The document provides an overview of Acronis Cyber Protect Cloud with Advanced Email Security. It highlights how the solution improves client security by detecting email-borne threats before reaching end-users through powerful threat intelligence and detection techniques. It prevents advanced threats like APTs and zero-days that evade conventional defenses through unique CPU-level analysis. The Advanced Email Security pack offers a single, integrated solution that is easy to deploy, manages email security, and provides rapid incident response support.

Uploaded by

Juntos PodCast
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
327 views79 pages

Advanced Email Security Training

The document provides an overview of Acronis Cyber Protect Cloud with Advanced Email Security. It highlights how the solution improves client security by detecting email-borne threats before reaching end-users through powerful threat intelligence and detection techniques. It prevents advanced threats like APTs and zero-days that evade conventional defenses through unique CPU-level analysis. The Advanced Email Security pack offers a single, integrated solution that is easy to deploy, manages email security, and provides rapid incident response support.

Uploaded by

Juntos PodCast
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 79

#CyberFit Academy

Cyber Protect Cloud


Cloud Tech Associate –
Advanced Email Security

#CyberFit

#CyberFit Academy
Cyber Protect Cloud
Introduction

#CyberFit Academy
Course Summary

Instructor-led technical training


Deep dive into Acronis Advanced pack for Email Security
Prerequisites: Cloud Tech Fundamentals Training

Assessment:

20 MCQ questions 60 Minutes working 70% Passing Grade Two Attempts given Open Book
time

#CyberFit Academy
Target Persona

Support Team Leader


Managed Service Provider

• Wants to improve the managed services offerings with


vendor solutions that understand service providers ability to
deliver, automate, train, support and manage these solutions
while integrating them into stack of tools
• Interested in Training, Updating, Automating Processes and
Cybersecurity Issues focused on pain points

#CyberFit Academy
Learning Objectives

After finishing this instruction you will be able to


• Understand setup and navigation in the Advanced Email
Security Pack
• Understand the features, what they mean and how they are
utilized
• Support and maintain clients on Advanced Email Security
Pack

#CyberFit Academy
Course Modules

1. Product Information
2. High-Level Overview and Recognition
3. The Technology
4. Setup, Navigation and Management
5. What’s Next

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

Cloud Tech Associate


STEP (Security/Backup/
2 Email Security)
You Are Here

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

Cloud Tech Associate


STEP (Security/Backup/
2 Email Security)
Cloud Tech Professional
You Are Here STEP
Final Step 3

#CyberFit Academy
Certification Track

STEP Acronis #CyberFit Cloud Tech Associate Certifications


2 Consists of the following courses (specializations)

Optional:

Let’s start here


#CyberFit Academy
Cyber Protect Cloud
Product Overview

#CyberFit Academy
Service Providers Email Security Challenges

Increasing email Inefficient Management complexity


threats protection and skill shortage
• 94% of malware is delivered via • APTs (Advanced persistent • 53% of security professionals
email threats) go undetected on admit that the number of security
average 71 days in the Americas, tools is so burdensome that it
• Phishing attacks account 177 days in EMEA, and 204 days adversely impacts security and
for more than 80% of reported in APAC. increases risk
security incidents
• 43% of organizations experience • 84% of organizations are
• 98% of attack rely on social false-alerts in 1/5 of detection experiencing an IT security skills
engineering cases shortage

• 80% of breaches are new • Traditional sandboxing solutions


or unknown “zero-day attacks” take between 7 to 20 minutes to
deliver a verdict

Sources: CSO Online; “Phishing and Social Engineering in 2018“, KnowBe4; Security Boulevard; State of Endpoint Security Risk”, Ponemon Institute;
“Cost of Data Breach Report”, Ponemon Institute, 2020; “Security Technology Sprawl Report”, ReliaQuest, 2019
Acronis Cyberthreats Report 2022 – At war with ransomware gangs: a year in review, Acronis International GmbH, 2021

#CyberFit Academy
What if you could rely on
just one integrated multi-
layered email security
solution?

#CyberFit Academy
Add Advanced packs: Security, Management, Backup,
Disaster Recovery, Email Security, File Sync and Share

Optimize for every Easy to upsell Vendor consolidation


#CyberFit Academy workload
Best-in-breed backup combined
with integrated security and management

Protect every Best-in-breed backup Strengthens your AV Accelerate security


workload at no charge
#CyberFit Academy included against zero-day threats and manageability
2022 Roadmap for Service Providers

#CyberFit Academy
Section Summary

• Service providers are facing an increasing number of challenges when


trying to provide proper email protection to their customers.
• Most of those challenges are a result of the complex environment
related to remote work, the robust spread of email-borne threats, the
inefficient level of protection of traditional tools, poor management
(too many vendors and tools, a lot of overlap and manual work) and
skill shortage.
• Acronis developed the Advanced Email Security Pack to address
those challenges and help MSPs provide next-generation email
protection to their partners and customers.

#CyberFit Academy
Cyber Protect Cloud with
Advanced Email Security
High Level Overview and
Recognition

#CyberFit Academy
Acronis Cyber Protect Cloud with
Advanced Email Security powered by
Improve client security by detecting email-borne threats before they reach end-users

Stop phishing and Catch advanced evasion Prevent APTs


spoofing attempts techniques and zero-day attacks
Minimize client risks with powerful Detect hidden malicious content by Prevent advanced email threats
threat intelligence, signature- recursively unpacking embedded that evade conventional defenses
based detection, URL reputation files and URLs and separately with Perception Point’s
checks, unique image- analyzing them with dynamic and unique CPU-level technology,
recognition algorithms, and static detection engines. which acts earlier in the attack
machine learning with DMARC, chain to block exploits before
DKIM, and SPF record checks. malware is released, delivering a
clear verdict within seconds.

#CyberFit Academy
What Makes Advanced Email Security Unique?
Leverage a single, multi-layered email security solution
for lightning-fast detection that’s easy to deploy and manage

Scan 100% of Prevent APTs and Effortless rapid Incident response Unmatched
traffic in real time zero-day attacks deployment services detection speed

▪ Every bit of content ▪ Unique CPU-level ▪ Cloud-native ▪ Direct access to cyber ▪ Prevent all threats
(emails, files, and URLs) analysis analysts and email before they reach
▪ Integrates the solution
analyzed at any scale security experts end-users
▪ Acts earlier in the directly in the email
▪ Clear verdict in seconds attack chain than other system ▪ Ongoing reporting and ▪ Better than the
technologies support, including reactive approach of
▪ Before the content ▪ Without any need for
handling FPs, standard email
reaches end users ▪ Blocks threats at the additional SEG
remediating and security technologies
exploit stage, prior to configurations
releasing as required.
malware release.

#CyberFit Academy
Stronger Protection
Protect your clients’ #1 threat vector from any attack

Minimize clients’ Prevent email- Block advanced Cover 100% of Don’t disrupt Leverage a leading
risks borne threats attacks traffic processes technology

Stop threats before • Spam, Block sophisticated Analyze every bit of • Minimum delays SELabs independent
they reach attacks that evade content at any scale clear verdict evaluations
• Phishing,
conventional
• Microsoft 365, • 3 seconds on
• BEC, defenses: APTs,
• Google Workspace Zero- and N-days average vs 7-20
• Spoofing,
mins for standard
• Open-Xchange
• Malware, sandboxing
• Malicious URLs solutions
• Zero-days • Near-zero false
positives
• APTs

#CyberFit Academy
Simplified Management
Consolidate and streamline your services while saving time and resources

Consolidate Cut costs Reduce deployment Increase threat Get access to security
solutions complexity visibility professionals

• Single solution Consolidation of solutions • Reduce deployment Increased visibility over all Direct access to cyber
times to a few minutes email security alerts and analysts and email
• Integrate email security,
incidents security experts
backup, DR, anti- • Eliminate the need for
malware, and cyber additional
protection management configurations
• Reduce resources
needed to deliver
services

#CyberFit Academy
Unmatched detection speed
Get proactive and move from detection to prevention with near-zero delays

Legacy sandboxing technologies, are inherently slow:


waiting to see how the malware acts, which leads to
detection delays and forces CISOs to:

• Move their security solution to detection mode, with


post-email delivery analysis Advanced
Email Security
• Scan only a fraction of all incoming data, which leaves gaps in Powered by
Perception Point
defenses, especially against unknown attack techniques

Moreover, Content Disarm and Reconstruction (CDR)


solutions can make harm reconstructed content or make it 7-20 min
unusable.
Perception Point’s technology shortens content scanning
from up to 20 minutes to under 30 seconds, with no tampering
Sandbox
of any kind

#CyberFit Academy
Advanced Email Security: Stop email-borne threats
Malware and ransomware. Prevent known and zero-day Internal phishing. Prevent lateral phishing with a zero-
malware with multiple antivirus engines and next- trust approach, scanning 100% of traffic at any scale
generation dynamic scans. Detect hidden malicious with Perception Point’s lighting-fast technology.
content. Leverage powerful threat intelligence to stay
ahead of emerging threats.
Account takeover. Stop account takeover attempts with
multiple security layers, including phishing and anti-
Phishing. Block known malicious URLs based on four malware engines, threat intelligence, and anti-evasion
leading URL reputation engines. Catch unknown technology.
malicious URLs with unique image recognition engine.
Unpack deeply embedded, hidden phishing attempts
Zero-days and APTs. Catch advanced threats that
and leverage threat intelligence from six market-leading
evade conventional defenses with a unique CPU-level
sources.
technology that detects and blocks attacks at the
exploit stage, prior to malware release.
Business email compromise (BEC). Prevent payload-
less attacks and impersonation attempts through
Evasion techniques – Detect hidden malicious content
machine-learning algorithms with IP reputation, SPF,
by recursively unpacking the content into smaller units
DKIM, and DMARC record checks. Reduce “further
which are then dynamically checked by multiple
along the line” BEC attacks with threat intelligence,
engines.
phishing, and antivirus engines.

#CyberFit Academy
#1 in SE Labs’ independent evaluation
The test was performed with different Product
Protection
Accuracy Rating
Legitimate
Accuracy Rating
Total Accuracy
Rating
Total Accuracy
Rating (%)

sets of attacks, including social, Advanced Email Security


2,603 700 3,303 94%
(powered by Perception Point)
phishing, malware, and BEC, as well as Fortinet FortiMail 2,525 640 3,165 90%
clean samples. Mimecast Secure Email Gateway 2,412 700 3,112 89%

• Ranked #1 across all categories Kaspersky Cloud 1,681 550 2,231 64%

Google G Suite Enterprise 956 505 1,461 42%


• Best detection capabilities
Google G Suite Business 825 535 1,360 39%
• Zero false positives
Microsoft Office 365 463 550 1,013 29%

• Overall rating of AAA Microsoft Office 365 Advanced Threat Protection 426 550 976 28%

Advanced Email Security (powered by Perception Point)

Stopped Rejected Edited (deny) Junk (deny) Junk Folder Inbox Edited (allow) Junk (allow)

Social 51 0 0 0 0 0 0 0

Phishing 60 0 0 0 0 0 0 0

Malware 69 0 0 0 0 0 0 1

Business Email Compromise 20 0 0 0 0 0 0 0

TOTAL 200 0 0 0 0 0 0 1

#CyberFit Academy
Featured in Gartner’s Email
Security Market Guide
Perception Point’s technology was selected in
both 2019 and 2020 Gartner’s Email Security
Market Guide as a representative vendor due to:
• Client interest and inquiries about the product
• The unique, innovative and forward-looking
capabilities

Perception Point was named as part of the IESS


(integrated email security solutions) category which
focus on solutions that are “very quick and easy to
deploy, as they don’t require changes to the email flow at
the gateway”

#CyberFit Academy
Section Summary

• Acronis Advanced Email Security Pack provides a next-generation


email security solution with cutting-edge prevention of malware and
ransomware attacks, phishing, BEC, impersonation, zero-days, APTs
and evasion techniques.
• Block email-borne threats before they reach the end-user.
• Content scanning time: from up to 20 minutes for legacy sand-boxing
technologies to under 30 seconds (no tampering of any kind) with
Acronis Advanced Email Security

#CyberFit Academy
Advanced E-Mail Security
Technology Deep Dive

#CyberFit Academy
Multi-layered protection
7 layers of protection against email-borne threats

Threat Intelligence

Advanced
Email Security
Powered by
Perception Point
Anti- Static
phishing Detection

Anti-spam Anti-evasion Next-generation


Engine Anti-spoofing Dynamic Detection
(against APTs and
zero-days)

Why?
Block email-borne threats before they reach end-users

#CyberFit Academy
Regulations and Compliancy

While Perception Point looks at the body


of the email, they do not scan the full body
of the email due to privacy reasons. They
comply with privacy standards like SOC II
and GDPR.

Information looked at includes:


• the metadata
• reputation of sender
• message ID
• reply to and return address

#CyberFit Academy
Layers of Protection - What is looked at?

URLs Encrypted Emails

• Dynamically scans every website • The encryption key would need to


and follows URLs to redirects until be provided for better protection
it gets to the source • Rule setup option: decrypt email
• Algorithms for image recognition - first then send to Perception Point
looks for graphics/logos or • Another viable option - just say no
anything potentially harmful on the to any encrypted emails coming in
site
• Being done for every URL in an
email

#CyberFit Academy
Layers of Protection - What is looked at?
Dropbox, One Drive, PDF attachments
Evernote examples (or others non-password protected)

• Looks for clickables on those sites • Take and run through HAP
• Download file will be scanned to • Looks for URL’s inside PDF and
make sure it is not a threat clicks to check
• If it points to another URL, it will • Attachments done through HAP
also be scanned and that until it along with Anti-Virus signatures
gets to the source
• Average time of execution - 10
seconds

#CyberFit Academy
Hardware Assistance Platform (HAP)

HAP

• Unlike standard sandboxing (primarily operating on OS


level), works at CPU level.
• Benefits:
• Moves faster through the system (typically 30-40 seconds
instead of up to 10 minutes)
• Much higher accuracy with better detection
• Looks at how an attack is built, not what it is trying to do

#CyberFit Academy
Anti-spam engine
Stop the unwanted spam emails once and for all

Receives the email and applies anti-spam


and reputation-based filters, including IP
reputation checks, to block malicious or
unwanted communication

• Block malicious attempts


• Quickly flag emails
• Clear the clutter in emails due to spam

Why?
Reduce risks for clients by preventing unwanted spam

#CyberFit Academy
Anti-evasion
Detect malicious content hidden within clean one

Separates embedded files and URLs into their


individual components to identify hidden URLs

malicious content Files


• Recursively extracts embedded URLs and files –
unpacking files and following URLs at any nesting level.
• All of the extracted components go separately through
the next security layers.
• Unique algorithms run the same files and URLs in
multiple versions and patterns to make sure the attack is
Security layers
not leveraging unseen evasion mechanisms

Why?
Prevent advanced evasion techniques with lightning-fast speed

#CyberFit Academy
Threat intelligence
Stay ahead of emerging threats

Leverage powerful threat intelligence


to stop potential or current attacks
▪ Threat intelligence from multiple market-leading
sources
▪ Combined with Perception Point’s custom engine
that collects information on URLs and files from
protected customers and from the wild
• Increase reactiveness to threats
• Don’t miss any threat that appears in the wild – Advanced Email Security
Powered by Perception Point
leverage the combined knowledge of external
security vendors and the cyber community

Why?
Prevent emerging threats from infiltrating clients’ emails

#CyberFit Academy
Anti-phishing engines
Keep phishing attacks from tormenting end-users
Catches phishing attacks and impersonation
techniques based on content analysis with
multiple phishing filters:
▪ URL reputation engines from market-leading
sources
▪ Unique image recognition technology catches
malicious URLs based on the images and logos used
on the web page
▪ Lexical analysis of the URL
▪ Reputation vector of various parameters of the
sender and the recipient
▪ Block known and unknown malicious URLs

Why?
Prevent phishing attacks before it reaches end-users

#CyberFit Academy
Anti-spoofing
Prevent business email compromise (BEC), including look-alike domain, and
display-name deception
Machine Learning-based technology inspects all
relevant data and metadata to identify any
deviation from standard operations and to detect
suspicious content well ahead it reaches the end-
user
▪ IP reputation, SPF (Sender Policy Framework),
DKIM (DomainKeys Identified Mail) and DMARC
(Domain-Based Message Authentication
Reporting and Conformance) record checks
▪ Machine learning, text and metadata analysis,
scoring of senders, and other algorithms
▪ Catch any impersonation attempt

Why?
Keep clients protected against social engineering based on payload-less attacks.

#CyberFit Academy
Antivirus for emails (signature-based detection)
Stop known email-borne malware in seconds
Strengthen your local anti-malware solution with
another layer of protection that’s specifically
developed for preventing email-borne threats.

Applies signature-based detection to emails and files


to identify malicious attacks based on a traditional
approach to detection in combination with modern
technologies.
▪ Combines multiple signature-based, antivirus
engines
▪ Perception Point’s custom technology identifies
highly complicated signatures and applies
additional static analysis methods

Why?
Minimize the risks for clients being infected by malware through email

#CyberFit Academy
Next-generation dynamic detection for APTs
and zero-days
Prevent advanced attacks that evade conventional defenses
Unique CPU-level technology acts earlier in the kill chain
than any other solution. It blocks attacks at the exploit
phase by analyzing the applications’ execution flow
during runtime to identify deviations from standard flow
based on the assembly code.
▪ True APT prevention – analysis at the exploit
stage (pre-malware release)
▪ Clear verdict within 10 seconds on average –
much quicker than sandboxing solutions
▪ No compromising on content functionality – unlike CDR
(content disarm and reconstruction) solutions

Why?
Prevent advanced attacks such as APTs and zero-days that conventional defenses miss

#CyberFit Academy
Decisions and rules
Customize the system and create policies for enhanced protection

“Decisions” mechanism that allows creating


policies based on any evidence that the system
collects, combining automated algorithms and
human-driven decisions to smartly decide
whether the content is malicious or not.
• Decisions include extensive set of options of www URL
whitelisting/blacklisting based on sender IP, domain or URL.
Text…
• Enables complex rules based on the different, specific
attributes of the source.

Why?
Decrease risks for clients and provide maximum flexibility
on any type of email that requires attention
#CyberFit Academy
Complete Microsoft 365 Protection

Backup for Backup for Backup Backup for


Microsoft Microsoft OneDrive for Microsoft Microsoft Teams
Exchange Online for Business SharePoint Online Including call protection

Back up from Microsoft data centers directly to cloud storage


Automatically protect new Microsoft 365 users, groups and sites
Search through Microsoft 365 backups to get quick access to your backed-up data

New Unlimited Acronis cloud storage for personal Microsoft 365 mailboxes

#CyberFit Academy
Enhance your Microsoft 365 native defenses
Excel where native Microsoft defenses fall short – prevent more threats and
leverage lightning-fast detection

#CyberFit Academy
Backup

Get an efficient Ready-to-use cloud storage Protection for Gmail, Drive


cloud-to-cloud solution with options include Google, Microsoft, (including Team Drives), Calendar
nothing to install and Acronis and Contacts

Flexible restore options – from Search Google Workspace Verify the authenticity
single items to a user’s entire Drive backups – with metadata and full-text of files in Drive backups with
or Gmail data (email body copy) capabilities blockchain

Unlimited Acronis-hosted storage for Google Drive and OneDrive

#CyberFit Academy
Section Summary

• Know the main cyber security threats out there and what their
impact is for small, medium and large business.
• Advanced Email Security, looks on hardware level for threats and
bad actors trying to infiltrate a system.
• The solution provides 7 layers of protection and proactively looks for
threats.
• Faster than any sandboxing tool.
• Although it scans certain elements of an email, it does not scan the
full email due to privacy regulations, as it is compliant with legislation
such as GDPR and SOC II.

#CyberFit Academy
Cyber Protect Cloud
Setup, Navigation and Management

#CyberFit Academy
Section Modules

1. Setup – Advanced Email Security Pack


2. Navigation and Management

#CyberFit Academy
Cyber Protect Cloud
Setup
(Advanced E-mail Security Pack)

#CyberFit Academy
Service Activation, Installation and Initial Setup
Service Activation

1. Login as a Partner

2. Choose an account

3. Enable Advanced
Email Security Pack

Once the service is


enabled, please access
the Service Management
Console.

#CyberFit Academy
Service Activation, Installation and Initial Setup
Access
1. Select Email Security
option from the Menu.

2. Click on Go to the email


security console button
to access the service.

3. You will be redirected to


Perception Point
console.

#CyberFit Academy
Service Activation, Installation and Initial Setup
Connect new Service
1. Click on the Plus sign on
the top right corner to add
a new service

2. Choose the correct


account

3. Select the appropriate


email service: Inline (no
MX record change) or
SMTP method (MX record
change)

4. Enter the domain and then


click Connect

#CyberFit Academy
Service Activation, Installation and Initial Setup
Connect new Service
5. You will then be prompted to
add the TXT Records in your
domain provider console (to be
done by the email admin).

6. This may take up to 72 hours.

7. Recommendation: check if the


TXT appears as a public record
here:
https://mxtoolbox.com/TXTLooku
p.aspx

8. Click on Next

#CyberFit Academy
Service Activation, Installation and Initial Setup
Connect new Service
9. Please download the
onboarding guide which
will provide for you:

• IPs to be Whitelisted

• Email Connectors to be
created

• Email Rules to be created

#CyberFit Academy
Cyber Protect Cloud
Navigation and Management
(Advanced E-mail Security Pack)

#CyberFit Academy
X-ray insights and reporting
Holistic view of the threat landscape across organizations

Leverage a web-based dashboard


(X-ray) to get access to:
• Forensics data for each email and incident
• Widgets tracking the threat landscape and solution
performance across organizations
• Proactive insights on threats seen in the wild
• Easily accessible and manageable datasets along
with weekly, monthly and ad-hoc reports from the
Incident Response team
• Usage reports ensure you understand how many
mailboxes are protected for billing purposes

• Fast access to management actions


• Quickly identify problems

#CyberFit Academy
Main Screen and Features - Insights

#CyberFit Academy
Main Screen and Features - Insights
Accounts Drop-
Down Menu

#CyberFit Academy
Main Screen and Features - Insights
Accounts Drop-
Down Menu

Filters

#CyberFit Academy
Main Screen and Features - Insights
Accounts Drop-
Down Menu

Filters

Verdict:
• Malicious
• Spam
• Restricted
• Suspicious

#CyberFit Academy
Main Screen and Features - Insights
Accounts Drop-
Down Menu

Filters

Tools

Verdict:
• Malicious
• Spam
• Restricted
• Suspicious

#CyberFit Academy
Main Screen and Features - Scans
Provides a holistic view of all
incidents across any channel,
including powerful filtering
capabilities and widget-based
aggregations.

For each scan, you can see a


summary containing:
• Verdict
• Channel
• Time
• From who to whom
• Subject, file name or URL
• Users

#CyberFit Academy
Main Screen and Features - Scans
Scan details provide
detailed forensics
regarding each scam,
including:
• structure of the attack
• exploit information
• detected by layers
• extracted path
• summary, including
source IP
• email headers

#CyberFit Academy
Main Screen and Features - Settings
Settings Section – account
drop-down menu at the top
right corner.

Configure White and


Blacklists according to:
• Sender email address
• Recipient email address
• Sender IP
• URL

#CyberFit Academy
Main Screen and Features – VIP Users
• Users that are more prone to
impersonation attacks (BEC).

• Advanced Email Security Pack,


powered by Perception Point,
contains an option to add these
users’ private emails to the
system.

• If an email is sent using a similar


display and/or an unrecognised
email address is trying to
impersonate this user the system
will flag it as malicious.

#CyberFit Academy
Main Screen and Features – Self Analyze
Validates if a file or a URL has
malicious content.

1. To analyse a file:
• Drag and Drop; or,
• Browse

2. To analyse a URL
• Choose URL Analysis
• Enter the URL
• Then click on Analyze.

#CyberFit Academy
End-user support
Additional help for end-users
End-users are the weakest link in any organization. Advanced Email
Security provides them with additional help to ensure social
engineering attacks won’t penetrate your defenses:
• End-user reporting – enable end-users to directly consult
with email security experts for suspicious emails (the functionality
can be turned on or off from the administrative console)
• End-user contextual help – flag emails with customizable banners
based on policies and rules to provide end-users with additional
contextual information

• Allow end-users to consult with security experts before taking reckless


action
• Increase end-users security awareness

#CyberFit Academy
Incident response service
Direct access to cyber analysts and email security experts at no additional cost

The incidents response team of


Perception Point, acts as an extension of
your own service delivery and security
teams:
• Monitor all customer traffic across organizations
• Analyze malicious intents
• Ongoing reporting – weekly,
monthly, ad-hoc
• Ongoing support, including handling false
positives, remediating and releasing when
required, maintaining the decisions mechanism,
and engine optimization.
The service is requested through the management
console and delivered as reports via email.

Why?

#CyberFit Academy
Section Summary

• Know how to activate Acronis Cyber Protect Cloud – Advanced


Email Security Pack and access the Perception Point Console

• How to connect a new service and what are the prerequisites (MX
change or not, add TXT record)

• Where to find rules and ports to be enabled for successful service


activation

• How to create White and Blacklists, add VIP users and run scans

• Know what the available support options and tools are

#CyberFit Academy
What’s Next?

#CyberFit Academy
Review the Materials

Download and review


the course materials

Re-watch the videos as


many times as you’d like

#CyberFit Academy
Take the Exam

20 Multiple-choice questions

60 Minutes working time

70% Passing grade

Two attempts given

Open book

#CyberFit Academy
Certification Track

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

Cloud Tech Associate


STEP
2
(Email Security)

#CyberFit Academy
Certification Track

STEP Acronis #CyberFit Cloud Tech Associate Certifications


2 Consists of the following courses (specializations)

Optional:

#CyberFit Academy
Certification Track

Cloud Tech Fundamentals


STEP

1 Already Should Have Taken

Cloud Tech Associate


STEP
2
(Email Security)
Cloud Tech Professional
STEP
Final Step 3

#CyberFit Academy
Other Acronis Resources

• Inside Sales
• Field Sales
• Partner Success Managers
• Solution Engineers
• Sales Enablement Team
• Partner Portal for More #CyberFit
Academy Training Courses and easy-to-
use Marketing materials

#CyberFit Academy
Supplemental Materials

The Evangelism Team at Acronis will be periodically releasing


new content
Please check back often
Check email for #CyberFit Academy Updates
https://kb.acronis.com/academy
Social Media Accounts
• Instagram: https://www.instagram.com/acronis
• Facebook: https://www.facebook.com/acronis
• Twitter: https://twitter.com/Acronis
• Reddit: https://www.reddit.com/r/acronis
• YouTube: https://www.youtube.com/user/Acronis

#CyberFit Academy
Cyber Foundation
Building a More
Knowledgeable Future

Create, Spread and Protect


Knowledge with Us!
www.acronis.org
Building New Schools
Publishing Education Programs
Publishing Books

#CyberFit Academy

You might also like