Advanced Email Security Training
Advanced Email Security Training
#CyberFit
#CyberFit Academy
Cyber Protect Cloud
Introduction
#CyberFit Academy
Course Summary
Assessment:
20 MCQ questions 60 Minutes working 70% Passing Grade Two Attempts given Open Book
time
#CyberFit Academy
Target Persona
#CyberFit Academy
Learning Objectives
#CyberFit Academy
Course Modules
1. Product Information
2. High-Level Overview and Recognition
3. The Technology
4. Setup, Navigation and Management
5. What’s Next
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
Optional:
#CyberFit Academy
Service Providers Email Security Challenges
Sources: CSO Online; “Phishing and Social Engineering in 2018“, KnowBe4; Security Boulevard; State of Endpoint Security Risk”, Ponemon Institute;
“Cost of Data Breach Report”, Ponemon Institute, 2020; “Security Technology Sprawl Report”, ReliaQuest, 2019
Acronis Cyberthreats Report 2022 – At war with ransomware gangs: a year in review, Acronis International GmbH, 2021
#CyberFit Academy
What if you could rely on
just one integrated multi-
layered email security
solution?
#CyberFit Academy
Add Advanced packs: Security, Management, Backup,
Disaster Recovery, Email Security, File Sync and Share
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud with
Advanced Email Security
High Level Overview and
Recognition
#CyberFit Academy
Acronis Cyber Protect Cloud with
Advanced Email Security powered by
Improve client security by detecting email-borne threats before they reach end-users
#CyberFit Academy
What Makes Advanced Email Security Unique?
Leverage a single, multi-layered email security solution
for lightning-fast detection that’s easy to deploy and manage
Scan 100% of Prevent APTs and Effortless rapid Incident response Unmatched
traffic in real time zero-day attacks deployment services detection speed
▪ Every bit of content ▪ Unique CPU-level ▪ Cloud-native ▪ Direct access to cyber ▪ Prevent all threats
(emails, files, and URLs) analysis analysts and email before they reach
▪ Integrates the solution
analyzed at any scale security experts end-users
▪ Acts earlier in the directly in the email
▪ Clear verdict in seconds attack chain than other system ▪ Ongoing reporting and ▪ Better than the
technologies support, including reactive approach of
▪ Before the content ▪ Without any need for
handling FPs, standard email
reaches end users ▪ Blocks threats at the additional SEG
remediating and security technologies
exploit stage, prior to configurations
releasing as required.
malware release.
#CyberFit Academy
Stronger Protection
Protect your clients’ #1 threat vector from any attack
Minimize clients’ Prevent email- Block advanced Cover 100% of Don’t disrupt Leverage a leading
risks borne threats attacks traffic processes technology
Stop threats before • Spam, Block sophisticated Analyze every bit of • Minimum delays SELabs independent
they reach attacks that evade content at any scale clear verdict evaluations
• Phishing,
conventional
• Microsoft 365, • 3 seconds on
• BEC, defenses: APTs,
• Google Workspace Zero- and N-days average vs 7-20
• Spoofing,
mins for standard
• Open-Xchange
• Malware, sandboxing
• Malicious URLs solutions
• Zero-days • Near-zero false
positives
• APTs
#CyberFit Academy
Simplified Management
Consolidate and streamline your services while saving time and resources
Consolidate Cut costs Reduce deployment Increase threat Get access to security
solutions complexity visibility professionals
• Single solution Consolidation of solutions • Reduce deployment Increased visibility over all Direct access to cyber
times to a few minutes email security alerts and analysts and email
• Integrate email security,
incidents security experts
backup, DR, anti- • Eliminate the need for
malware, and cyber additional
protection management configurations
• Reduce resources
needed to deliver
services
#CyberFit Academy
Unmatched detection speed
Get proactive and move from detection to prevention with near-zero delays
#CyberFit Academy
Advanced Email Security: Stop email-borne threats
Malware and ransomware. Prevent known and zero-day Internal phishing. Prevent lateral phishing with a zero-
malware with multiple antivirus engines and next- trust approach, scanning 100% of traffic at any scale
generation dynamic scans. Detect hidden malicious with Perception Point’s lighting-fast technology.
content. Leverage powerful threat intelligence to stay
ahead of emerging threats.
Account takeover. Stop account takeover attempts with
multiple security layers, including phishing and anti-
Phishing. Block known malicious URLs based on four malware engines, threat intelligence, and anti-evasion
leading URL reputation engines. Catch unknown technology.
malicious URLs with unique image recognition engine.
Unpack deeply embedded, hidden phishing attempts
Zero-days and APTs. Catch advanced threats that
and leverage threat intelligence from six market-leading
evade conventional defenses with a unique CPU-level
sources.
technology that detects and blocks attacks at the
exploit stage, prior to malware release.
Business email compromise (BEC). Prevent payload-
less attacks and impersonation attempts through
Evasion techniques – Detect hidden malicious content
machine-learning algorithms with IP reputation, SPF,
by recursively unpacking the content into smaller units
DKIM, and DMARC record checks. Reduce “further
which are then dynamically checked by multiple
along the line” BEC attacks with threat intelligence,
engines.
phishing, and antivirus engines.
#CyberFit Academy
#1 in SE Labs’ independent evaluation
The test was performed with different Product
Protection
Accuracy Rating
Legitimate
Accuracy Rating
Total Accuracy
Rating
Total Accuracy
Rating (%)
• Ranked #1 across all categories Kaspersky Cloud 1,681 550 2,231 64%
• Overall rating of AAA Microsoft Office 365 Advanced Threat Protection 426 550 976 28%
Stopped Rejected Edited (deny) Junk (deny) Junk Folder Inbox Edited (allow) Junk (allow)
Social 51 0 0 0 0 0 0 0
Phishing 60 0 0 0 0 0 0 0
Malware 69 0 0 0 0 0 0 1
TOTAL 200 0 0 0 0 0 0 1
#CyberFit Academy
Featured in Gartner’s Email
Security Market Guide
Perception Point’s technology was selected in
both 2019 and 2020 Gartner’s Email Security
Market Guide as a representative vendor due to:
• Client interest and inquiries about the product
• The unique, innovative and forward-looking
capabilities
#CyberFit Academy
Section Summary
#CyberFit Academy
Advanced E-Mail Security
Technology Deep Dive
#CyberFit Academy
Multi-layered protection
7 layers of protection against email-borne threats
Threat Intelligence
Advanced
Email Security
Powered by
Perception Point
Anti- Static
phishing Detection
Why?
Block email-borne threats before they reach end-users
#CyberFit Academy
Regulations and Compliancy
#CyberFit Academy
Layers of Protection - What is looked at?
#CyberFit Academy
Layers of Protection - What is looked at?
Dropbox, One Drive, PDF attachments
Evernote examples (or others non-password protected)
• Looks for clickables on those sites • Take and run through HAP
• Download file will be scanned to • Looks for URL’s inside PDF and
make sure it is not a threat clicks to check
• If it points to another URL, it will • Attachments done through HAP
also be scanned and that until it along with Anti-Virus signatures
gets to the source
• Average time of execution - 10
seconds
#CyberFit Academy
Hardware Assistance Platform (HAP)
HAP
#CyberFit Academy
Anti-spam engine
Stop the unwanted spam emails once and for all
Why?
Reduce risks for clients by preventing unwanted spam
#CyberFit Academy
Anti-evasion
Detect malicious content hidden within clean one
Why?
Prevent advanced evasion techniques with lightning-fast speed
#CyberFit Academy
Threat intelligence
Stay ahead of emerging threats
Why?
Prevent emerging threats from infiltrating clients’ emails
#CyberFit Academy
Anti-phishing engines
Keep phishing attacks from tormenting end-users
Catches phishing attacks and impersonation
techniques based on content analysis with
multiple phishing filters:
▪ URL reputation engines from market-leading
sources
▪ Unique image recognition technology catches
malicious URLs based on the images and logos used
on the web page
▪ Lexical analysis of the URL
▪ Reputation vector of various parameters of the
sender and the recipient
▪ Block known and unknown malicious URLs
Why?
Prevent phishing attacks before it reaches end-users
#CyberFit Academy
Anti-spoofing
Prevent business email compromise (BEC), including look-alike domain, and
display-name deception
Machine Learning-based technology inspects all
relevant data and metadata to identify any
deviation from standard operations and to detect
suspicious content well ahead it reaches the end-
user
▪ IP reputation, SPF (Sender Policy Framework),
DKIM (DomainKeys Identified Mail) and DMARC
(Domain-Based Message Authentication
Reporting and Conformance) record checks
▪ Machine learning, text and metadata analysis,
scoring of senders, and other algorithms
▪ Catch any impersonation attempt
Why?
Keep clients protected against social engineering based on payload-less attacks.
#CyberFit Academy
Antivirus for emails (signature-based detection)
Stop known email-borne malware in seconds
Strengthen your local anti-malware solution with
another layer of protection that’s specifically
developed for preventing email-borne threats.
Why?
Minimize the risks for clients being infected by malware through email
#CyberFit Academy
Next-generation dynamic detection for APTs
and zero-days
Prevent advanced attacks that evade conventional defenses
Unique CPU-level technology acts earlier in the kill chain
than any other solution. It blocks attacks at the exploit
phase by analyzing the applications’ execution flow
during runtime to identify deviations from standard flow
based on the assembly code.
▪ True APT prevention – analysis at the exploit
stage (pre-malware release)
▪ Clear verdict within 10 seconds on average –
much quicker than sandboxing solutions
▪ No compromising on content functionality – unlike CDR
(content disarm and reconstruction) solutions
Why?
Prevent advanced attacks such as APTs and zero-days that conventional defenses miss
#CyberFit Academy
Decisions and rules
Customize the system and create policies for enhanced protection
Why?
Decrease risks for clients and provide maximum flexibility
on any type of email that requires attention
#CyberFit Academy
Complete Microsoft 365 Protection
New Unlimited Acronis cloud storage for personal Microsoft 365 mailboxes
#CyberFit Academy
Enhance your Microsoft 365 native defenses
Excel where native Microsoft defenses fall short – prevent more threats and
leverage lightning-fast detection
#CyberFit Academy
Backup
Flexible restore options – from Search Google Workspace Verify the authenticity
single items to a user’s entire Drive backups – with metadata and full-text of files in Drive backups with
or Gmail data (email body copy) capabilities blockchain
#CyberFit Academy
Section Summary
• Know the main cyber security threats out there and what their
impact is for small, medium and large business.
• Advanced Email Security, looks on hardware level for threats and
bad actors trying to infiltrate a system.
• The solution provides 7 layers of protection and proactively looks for
threats.
• Faster than any sandboxing tool.
• Although it scans certain elements of an email, it does not scan the
full email due to privacy regulations, as it is compliant with legislation
such as GDPR and SOC II.
#CyberFit Academy
Cyber Protect Cloud
Setup, Navigation and Management
#CyberFit Academy
Section Modules
#CyberFit Academy
Cyber Protect Cloud
Setup
(Advanced E-mail Security Pack)
#CyberFit Academy
Service Activation, Installation and Initial Setup
Service Activation
1. Login as a Partner
2. Choose an account
3. Enable Advanced
Email Security Pack
#CyberFit Academy
Service Activation, Installation and Initial Setup
Access
1. Select Email Security
option from the Menu.
#CyberFit Academy
Service Activation, Installation and Initial Setup
Connect new Service
1. Click on the Plus sign on
the top right corner to add
a new service
#CyberFit Academy
Service Activation, Installation and Initial Setup
Connect new Service
5. You will then be prompted to
add the TXT Records in your
domain provider console (to be
done by the email admin).
8. Click on Next
#CyberFit Academy
Service Activation, Installation and Initial Setup
Connect new Service
9. Please download the
onboarding guide which
will provide for you:
• IPs to be Whitelisted
• Email Connectors to be
created
#CyberFit Academy
Cyber Protect Cloud
Navigation and Management
(Advanced E-mail Security Pack)
#CyberFit Academy
X-ray insights and reporting
Holistic view of the threat landscape across organizations
#CyberFit Academy
Main Screen and Features - Insights
#CyberFit Academy
Main Screen and Features - Insights
Accounts Drop-
Down Menu
#CyberFit Academy
Main Screen and Features - Insights
Accounts Drop-
Down Menu
Filters
#CyberFit Academy
Main Screen and Features - Insights
Accounts Drop-
Down Menu
Filters
Verdict:
• Malicious
• Spam
• Restricted
• Suspicious
#CyberFit Academy
Main Screen and Features - Insights
Accounts Drop-
Down Menu
Filters
Tools
Verdict:
• Malicious
• Spam
• Restricted
• Suspicious
#CyberFit Academy
Main Screen and Features - Scans
Provides a holistic view of all
incidents across any channel,
including powerful filtering
capabilities and widget-based
aggregations.
#CyberFit Academy
Main Screen and Features - Scans
Scan details provide
detailed forensics
regarding each scam,
including:
• structure of the attack
• exploit information
• detected by layers
• extracted path
• summary, including
source IP
• email headers
#CyberFit Academy
Main Screen and Features - Settings
Settings Section – account
drop-down menu at the top
right corner.
#CyberFit Academy
Main Screen and Features – VIP Users
• Users that are more prone to
impersonation attacks (BEC).
#CyberFit Academy
Main Screen and Features – Self Analyze
Validates if a file or a URL has
malicious content.
1. To analyse a file:
• Drag and Drop; or,
• Browse
2. To analyse a URL
• Choose URL Analysis
• Enter the URL
• Then click on Analyze.
#CyberFit Academy
End-user support
Additional help for end-users
End-users are the weakest link in any organization. Advanced Email
Security provides them with additional help to ensure social
engineering attacks won’t penetrate your defenses:
• End-user reporting – enable end-users to directly consult
with email security experts for suspicious emails (the functionality
can be turned on or off from the administrative console)
• End-user contextual help – flag emails with customizable banners
based on policies and rules to provide end-users with additional
contextual information
#CyberFit Academy
Incident response service
Direct access to cyber analysts and email security experts at no additional cost
Why?
#CyberFit Academy
Section Summary
• How to connect a new service and what are the prerequisites (MX
change or not, add TXT record)
• How to create White and Blacklists, add VIP users and run scans
#CyberFit Academy
What’s Next?
#CyberFit Academy
Review the Materials
#CyberFit Academy
Take the Exam
20 Multiple-choice questions
Open book
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
Optional:
#CyberFit Academy
Certification Track
#CyberFit Academy
Other Acronis Resources
• Inside Sales
• Field Sales
• Partner Success Managers
• Solution Engineers
• Sales Enablement Team
• Partner Portal for More #CyberFit
Academy Training Courses and easy-to-
use Marketing materials
#CyberFit Academy
Supplemental Materials
#CyberFit Academy
Cyber Foundation
Building a More
Knowledgeable Future
#CyberFit Academy