Fortra Email Security + Microsoft 365

Next-Generation Security for Cloud-Based Email

Text

Executive Summary

Email is undergoing a fundamental transformation as organizations worldwide shift more office productivity and business applications to the cloud. With around 95% of the Fortune 500 using Microsoft 365, they arguably lead this movement.

But for all of its convenience and utility, email has always been highly vulnerable to cyberattacks on multiple fronts, providing fertile grounds for the email security market to grow at an estimated 22% annually, putting it on track to reach around $18B by 2023. Organizations are spending billions to secure their email, but is all that money being invested wisely?

The Secure Email Gateway (SEG) represents a sizable chunk of that spend. Unfortunately the SEG is no match for modern identity-based attacks that can surreptitiously evade signature-based detection. As a point of proof—today around 94% of data breaches originate from email, not to mention countless fraud losses from schemes including spear phishing, executive and brand impersonation, ransomware, and account takeovers.

Recognizing that email security is an organizational priority, about 60% of large organizations will have had comprehensive security awareness training in place by 2022. But, as security training becomes the norm, SOC teams already dealing with an overall cybersecurity skills shortage are becoming inundated with employee-reported phishing incidents—of which around 68% globally are ultimately determined to be false positives.

Text

The email security market will grow an estimated 22% annually, putting it on track to reach around $18B by 2023.

Text

As more organizations migrate to M365, they are recognizing that current investments in email security and phishing response deserve a closer look. While legacy email security vendors continue to shore up the Secure Email Gateway and the financial annuity it represents to them, more organizations are embracing the reality that current email security architectures are fundamentally inadequate.

Cloud-first organizations are ditching the on-prem SEG and taking advantage of the enriched security features in M365 and the new Fortra Email Security suite, a combined solution designed to stop malicious email attacks that often come without malware or other recognizable payloads. They have found that the SEG impedes the native security controls of M365 by obscuring the email header and feedback loop. By removing the SEG, they have improved security, reduced costs and enabled business agility.

This new approach blocks not only traditional spam, virus, and malware, but also the next generation of identity deception attacks. It secures the corporate sending domain from unauthorized use. And, in a significant departure from legacy security controls, it detects threats moving laterally across the organization and remediates newly identified threats that have made it to the inbox by evading initial detection or that weaponized post-delivery.

Text

More organizations are embracing the reality that current email security architectures, including Microsoft 365, are fundamentally inadequate.

Text

Introduction to a Cloud-First World

The Migration of Workloads and Security to the Cloud

When Marc Benioff launched the “no software” movement on the eve of the dot-com bust in 1999, there was little indication of the tectonic shift to come across the business IT landscape.

While “Googled” became a word, “elastic cloud” compute and storage became the norm and organizations turned to Infrastructure-as-a-Service (IaaS) as prices for cloud hosting dropped precipitously. Organizations worldwide could now place workers and facilities just about anywhere around the globe and adjust IT strategy and workloads on the fly.

Platform-as-a-Service (PaaS) has since emerged as a compelling way to free organizations from decades of layered on-premises systems, improve security, and deliver integrated services.

As the dust began to settle, what started off as an ingenious way to eliminate IT capital expenditures, alleviate overhead, and accelerate software deployment morphed into a new way of business.

IaaS, PaaS and Software-as-a-Service (SaaS) turned out to be ideal enablers for an increasingly virtual and mobile workforce. Equipped with the ability to avoid up-front time and cost and to quickly phase out inefficient services, business agility improved.

Today, just under one-third of overall corporate IT budget goes to cloud services, and the industry was on track to reach about $513B by the end of 2022.

With close to 59.7 million subscribers as of December 2022, perhaps no SaaS solution illustrates this better than M365, which didn’t just move to the cloud, but also reinvented the office productivity suite and became more resilient to cyber attacks. Now, there are compelling business reasons to move email security to the cloud as well.

Text

Examining Efficacy and Risk of Traditional Email Security Controls

Persistent Security Gaps in Legacy Systems

Given the substantial investments in email security infrastructure over the past few decades, the current state of email security is surprisingly dismal.

An estimated 22.9 million phishing attacks are launched every minute of the day, many of which result in a data breach. That data breach costs an average $8.19 million per incident in the United States, not to mention the long-term damage to brand reputation and regulatory fines.

Executive spoofing has become commonplace because the core email architecture allows end users (instead of the network) to specify the sending identity. Currently, only around 13% of the Fortune 500 have fully protected their corporate domains, leading not only to fake messages from the C-suite, but similar attacks including brand impersonation, partner invoice scams, and employee payroll scams.

Even with domains protected, workers can be attacked through techniques such as display name deception and look-alike domains. Email-based scams utilizing these techniques can lead to email account takeover (ATO), which allows cybercriminals to pose as the individual to divert money, steal information, and perform other malicious activities. Making matters worse, new single sign-on (SSO) capabilities can exacerbate the incident, leaving sensitive documents, confidential information, and collaboration tools exposed to unauthorized access.

ATO-based attacks are especially dangerous because they are notoriously difficult to detect and serve as a gateway to lateral movement as threat actors glean important context to compromise additional accounts, escalate their privileges, and gain access to other systems, all of which can result in a data breach across the extended enterprise. 

Malware, virus, and Trojan attacks are still commonplace, but with effective defenses having moved into M365, attacks have shifted from targeting network and infrastructure to targeting core human emotions of fear, curiosity, and anxiety. These social engineering attacks come without a recognizable payload, so they typically bypass the SEG with plain-text emails that do not utilize the traditional techniques of malicious URLs and attachments.

For its part, the SEG checks incoming email only on receipt and generally does not recheck the inbox for latent threats that evaded detection or that weaponized post-delivery. The legacy protection also only protects against external attacks as email flows into the organization, completely ignoring the email flowing across the organization.

Report: Anatomy of a Compromised Account

Fortra's Global Inbox Threat Intelligence feeds seeded more than 8,000 phishing sites with fake credentials and then monitored what happened next. In this report, you’ll discover more about how cybercriminals access and use compromised accounts.

READ THE REPORT
Text

Moving Email Security Forward

The Business Imperative for a Modern Security Architecture

To supplement the protection of the SEG, organizations have turned en masse to phishing simulation training. Currently around 98% of organizations enable employee-reported phishing and about 88% use phishing simulation to train employees. But the math is against them.

SOC teams already dealing with a widespread cyber skills shortage manage close to 33,000 reported phishing incidents on average each year. With a false positive rate of 68% globally and around 6.4 hours to investigate each one, they simply can’t keep up. Exploits can take months to detect, while exfiltration of sensitive data can happen in a matter of hours.

Phishing training can help, but organizations can still expect around a 3% failure rate where employees are unable to detect a phish email. Unfortunately, it takes only one successful attack to do serious damage. It turns out that aside from the organizational drag that comes from mass distrust of the inbox, putting employees in the direct line of defense against email-based cyber attacks is a somewhat risky proposition, particularly given the existential threats a major breach can represent.

But as ineffective as the SEG tends to be against advanced email attacks, it also presents a significant obstacle to cloud-first strategies. By placing the SEG “inline” as email passes through, the SEG obfuscates the native security features of Exchange Online Protection, preventing M365 from optimal function. It changes the email header information viewable by M365 and the feedback loop from users goes directly to the SEG, leaving it none the wiser from user-reported phishing attempts.

All the while, the SEG requires maintenance, training, and support that consumes valuable SOC team resources. Taken together, the cost and overhead of the SEG, the systemic risks to the business plan from attacks that evade it, and the negative impact it has on native security controls built into M365, the SEG represents a significant hindrance to organizations looking to drive higher labor productivity and worker output.

This, of course, is a big part of the reason organizations adopt M365 in the first place and typically as part of their digital transformation strategies. Simplifying IT infrastructure while providing workers new and improved ways to communicate, collaborate, and perform their job functions both safely and securely is a critical objective for organizations looking to attract and retain the best talent as the new generations—the digital natives— enter the workforce.

And while M365 provides a level of security closely resembling what organizations would find in a traditional SEG, including the ability to detonate and identify actively malicious payloads with Microsoft Phishing Defense™, additional protections against the most dangerous threats are needed to safeguard the organization from advanced threats, such as business email compromise, executive spoofing, and account takeovers.

From Secure Email Gateway to the Rise of the Next-Generation Cloud Email Architecture

The on-prem secure email gateway worked for years, but it is no match for a new generation of rapidly evolving advanced email attacks that use identity deception to trick recipients. This guide explains what cybercriminals are doing to successfully scam people and organizations and how M365 and other cloud-based email are the gateway to next-generation cloud email architecture and security.

READ THE GUIDE
Text

The New Paradigm for Email Security

Cloud-Based Security for a Cloud-First World

An evolution of the legacy Secure Email Gateway, the next-generation cloud-based email architecture is purposefully built for the cloud-first world and differs in several remarkable ways. Because it’s a cloud-native SaaS application and compliments the built-in security features of M365, it offers several key enhancements.

Many of the legacy features of the SEG are already pre-built into M365 via Exchange Online Protection (EOP) and Microsoft's optional Phishing Defense product. In fact, M365 provides support for all areas that have been traditionally protected by the SEG: pre-content filter based control, integrated anti-spam, integrated anti-virus, attachment sandboxing, URL analysis, and data loss prevention.

Designed to assess incoming emails by analyzing content and infrastructure reputation, these platform-native controls are proving essential to ferreting out spam, malicious URLs and malware, certain keywords, or a high volume of attacks from a single IP. In fact, according to a recent Gartner report, anti-malware and anti-spam features built into M365 are now being recognized as best-in-class.

However for those areas not fully protected by native functionality, the M365 architecture offers APIs such as the Microsoft Security Graph that enable complementary security solutions to integrate seamlessly. This is where many organizations enable the secure email gateway, but because they were designed two decades ago, their architecture nearly always requires that it be inline in the mail flow, slowing down mail delivery and introducing a point of failure. Beyond the mail deliverability and increased risk of downtime, inline SEG architecture actually hinders the effectiveness of the M365 security by modifying header data before it reaches Exchange Online Protection or Microsoft's Phishing Defense.

Unfortunately, cybercriminals rely on finding new and innovative ways to bypass the filters organizations put into place to protect against them, which is why they have recently turned to identity-based deception. Different from traditional email attacks, this nextgeneration of email attacks rely on impersonation and plain-text emails to bypass the filters set against the attacks of the past.

This is where Fortra Email Security solutions can augment the controls set by Exchange Online Protection to prevent advanced attacks on M365 environments. Designed specifically to identify when a message is malicious based on identity and models of trusted behavior rather than content, Fortra's Cloud Email Protection prevents the most dangerous types of attacks from ever reaching user inboxes. And for those emails that evade initial detection or weaponize after delivery, Suspicious Email Analysis automatically removes, or claws back, emails from user inboxes, effectively preventing users from opening the email or clicking on malicious links.

Text

Using Artificial Intelligence to Protect Email

Malicious emails that use identity deception continue to bypass the legacy SEG and the native controls of M365 because they are notoriously difficult to detect. Consisting of only a few words, emails reach the targeted end user because there is no malicious content to identify. Those security systems looking for previously recognized signatures of malicious content can find nothing wrong with the email.

Once the email passes through security to the inbox, the scam becomes easy to perpetuate. Cybercriminals count on the human emotions of fear, curiosity, and anxiety to convince the recipient to reply. Once engaged in a conversation, the scammer simply needs to ask for a wire transfer, gift card purchase, or payroll diversion to complete their scam.

Fortra’s Data Science employs a combination of machine learning, large language models, and neural networks to determine whether an email should be trusted. It quickly detects and stops advanced impersonation threats, like BEC, that bypass signature or pattern-based defenses, before reaching user inboxes.

This new approach gets more effective with every email analyzed. As a result, it effectively transitions the email security paradigm from one that was designed to address isolated events to one that continuously protects the organization against evolving email threats, as quickly as they emerge. And because this technology is always on, it becomes possible to continuously rescore messages and remove those that evaded initial detection from inboxes.

Image
fta-data-science

So while M365 stops the vast majority of the most common types of attacks, Cloud Email Protection and Suspicious Email Analysis provide the defense needed to stop the most dangerous and sophisticated attacks. With this combination of the Fortra Email Security solutions and M365, email attacks are stopped with 99.9% efficacy—enabling users to trust their inbox and SOC teams to quickly and efficiently identify and respond to emerging threats.

Read Fortra's Latest Machine Learning Guide

GET THE GUIDE
Text

M365 + Fortra Email Security

The Next Generation of Protection for Cloud-Based Email

The next-generation approach to email security protects against new and advanced attacks better than its predecessors, but it also encompasses additional features not typically present in a SEG. With the ability to authenticate legitimate sender domains, inspect email flowing laterally across the organization, and recheck the inbox to detect and remediate latent threats, the next-generation of email security is designed for modern organizations undergoing a digital transformation.

In either a cloud-only or hybrid environment, the Fortra Email Security comprehensive solution leverages secure APIs to ensure faster mail delivery and prevent downtime. This ensures that the native M365 security controls are not blinded by a legacy inline SEG architecture.

Image
Azure-integration

This represents a significant departure from simply tacking on additional products and feature sets to the traditional SEG in what can best be described as a band-aid approach. Instead, Fortra Email Security moves from from a tactical, event-based approach to a strategic, continuous process that learns from evolving threats to block 99.9% of all advanced attacks and helps SOC teams reduce detection and remediation time by up to 95%.

READ THE DATASHEET >

Text

Conclusion

Moving into the Next Generation of Email Security

After almost five decades in use, the architecture supporting enterprise email has been fundamentally redesigned and moved to the cloud. M365 sits at the forefront of this movement.

In turn, the legacy Secure Email Gateway has been commoditized, with key signature-based defenses moving into M365. Fortra Email Security augments these native security controls to protect against modern, identity-based attacks. Since it works with Exchange Online Protection and Microsoft's Phishing Defense— not against them—to prevent business email compromise, domain spoofing, spear phishing, account takeovers, and all forms of identity-based email attacks.

M365 and Fortra Email Security are proven to work together to help organizations stay safe, reduce phishing incident investigative workloads, and provide premium protection of their email environment so employees, partners, and customers can trust their inboxes.

Two-thirds of Fortra customers who have used M365 have eliminated their SEG entirely and now rely on the native security controls built into the two platforms for complete email security protection. This includes leading organizations, such as Adobe and Upwork.

Text

Organizations that have moved to M365, as well as those with hybrid deployments, can rely on the same protections while eliminating the cost, overhead and complexity the SEG introduces to their business.

These protections differ in many ways from traditional legacy protections and include the ability to secure sending domains through DMARC email authentication, continuously protect against evolving identity-based attacks, automate remediation workflows for phishing incidents, and guard against email account takeover-based attacks.

This new paradigm of email security reduces the dependence on phishing training to defend organizations against the costly and time-consuming business disruption caused by modern attacks. It also simplifies the security infrastructure, reduces capital expenditures, and overhead while better equipping organizations to achieve the intended business benefits from their cloud-based deployment.

Text

About Fortra

Fortra is a cybersecurity company like no other. We're creating a simpler, stronger future for our customers. Our trusted experts and portfolio of integrated, scalable solutions bring balance and control to organizations around the world. We’re the positive changemakers and your relentless ally to provide peace of mind through every step of your cybersecurity journey. Learn more at fortra.com.

Discover How Fortra Email Security Can Improve Your Current Security Infrastructure

As your last line of defense against advanced email attacks, Fortra Email Security stops attacks that bypass other technologies—protecting employees and customers, while also enabling phishing response teams to quickly analyze and respond to targeted attacks. 

Calculate the ROI of Implementing Fortra's Cloud Email Protection to Your Current Email Architecture

Discover how much money you can save when adding Fortra's Cloud Email Protection to your organization's enterprise email security environment to protect your users' inboxes from advanced email threats, such as BEC and targeted phishing attacks, with our custom ROI analyzer.