Swisscom chooses Hornetsecurity for email security

Swisscom chooses Hornetsecurity for email security

Hanover (10.12.18) – As a leading provider of ICT services in Switzerland, Swisscom is one of the driving forces in the digitalization of the Swiss economy. Furthermore, the company is one of the most important and largest providers in the security and cloud market throughout the country. For its Security Service Provider business, Swisscom is now implementing Premium Cloud Security Services from Hornetsecurity starting in first quarter of 2019.

In the context of internationalization and globalization of more and more companies, they are faced with the decision to make company data available in the cloud from any location. Convincing advantages of cloud computing, such as flexibility, scalability, resource and cost savings, allow companies to operate faster and more efficiently in the market. With its comprehensive Managed Security Services, the Security Operations Center in Switzerland (staffed by specialists 24/7) and professional threat detection & response services, Swisscom protects customer systems in real time.

Hornetsecurity News


Stay in touch

Sign up to get the latest News about Cloud Security.

Due to the worldwide network, new threats are emerging, which is why security solutions from the cloud and companies with high expertise in the area of cybercrime are particularly in demand. With many years of experience, Hornetsecurity has already established itself as a pioneer in several parts of the European cloud security market. The partnership with Swisscom is in line with the international growth-oriented strategy of the cloud security company from Hanover. “We were looking for a provider that could replace the various and highly customized solutions we have seen so far and that could reliably meet our customers’ high expectations in terms of scalability, security and convenience. Hornetsecurity convinced with the wide range of features of its Email Security Services, the convenient multi-client interface and high flexibility”, says Tim Rückforth, Product Manager Web & Mail Security at Swisscom.

Hornetsecurity’s services offer the same high-quality protection against sophisticated attacks for all company locations. When it comes to data protection, Swisscom customers will remain on the safe side:

 

“During the next eight weeks, Hornetsecurity will implement its infrastructure in Swisscom’s redundant data centers in Switzerland. The data of the Swiss customers are thus handled exclusively in the local data center. The protection and preservation of our customers’ sensitive and important data is our top priority,” says Daniel Hofmann, CEO of Hornetsecurity.

 

“With Email Security based on Hornetsecurity, we will offer the best protection against spam, malware and other threats to our customers, which fits perfectly into our Managed Security Services portfolio and we will actively promote through our channels. I am sure that this is the beginning of a successful partnership,” Rückforth added.

“Technology Fast 50 Award 2018” – Hornetsecurity honoured for the fourth time

“Technology Fast 50 Award 2018” – Hornetsecurity honoured for the fourth time

Hanover (13.11.2018) – The IT sector is one of the strongest growing and fastest expanding industries in Germany. The steps in the development of digital technologies are getting increasingly larger and in order to survive in this tough competition, specialized companies have to meet high demands, such as innovative ideas, strong know-how and special solution-oriented skills. Based on its many years of experience, the internationally operating consulting agency Deloitte knows about the efforts behind the success of fast-growing companies in this environment and has been honoring the 50 fastest growing technology companies in Germany every year since 2002.

Hornetsecurity News


Stay in touch

Sign up to get the latest News about Cloud Security.

“Numerous rapidly expanding companies from Germany have positioned themselves in future-oriented fields of technology in recent years. This is accomplished by entrepreneurs who have managed to consistently pursue their visions, with a willingness to take risks and an entrepreneurial spirit.“, says Dr. Andreas Gentner, Partner and Head of Technology, Media & Telecommunications EMEA at Deloitte.

“With the Fast 50 Award, we want to honor outstanding entrepreneurial achievements for Germany as a tech location.” The ranking is based on the percentage sales growth of the last four financial years. Hornetsecurity increased its growth by 117.42% during this period and was awarded with the Deloitte Technology Fast 50 Award 2018 last week.

By now, the cloud security expert received this special recognition for the fourth time. “The award for once again being one of the 50 fastest-growing IT companies makes us extremely happy and is yet another clear sign for us that we are on the right track. It’s the proof for the hard work of the last years and we are proud of the success of our company. We will continue to focus on innovative solutions and high-quality products in the future.“, says Oliver Dehning, CEO of Hornetsecurity, who proudly received the award at “The New Yorker” in Cologne.

With regard to its ongoing growth strategy and in addition to its extensive product range, Hornetsecurity also relies on its latest product: 365 Total Protection is the first comprehensive Security & Compliance Suite designed specifically for Microsoft Office 365. As part of 21 business and security features, the cloud solution offers a range of innovative functionalities that complements the Microsoft cloud service.

Advanced Persistent Threats – The invisible threat

Advanced Persistent Threats – The invisible threat

What do the Olympic Winter Games, the Information Network Berlin-Bonn and large companies as well as SMBs have in common? They were and still are targets of highly evolved cyber-attacks that are aiming to spy on and sabotage internal processes and to steal and copy important and secret data. The realization happens as undetected as possible and over a longer period of time. These types of attacks are commonly known as “Advanced Persistent Threat” (APT).

Hornetsecurity News


Stay in touch

Sign up to get the latest News about Cloud Security.

The attacks are presumed as “advanced” because the attacker has large amounts of time and money available and thus gives himself an advantage in terms of access to information and development capacities. For victims, the infiltration of their IT infrastructure is hardly traceable and difficult to discover, so that the intruder can act undetected in the internal network for several weeks or even months. Cybercriminals are often a group of individuals that operate together, and it is not unusual that competitors, organizations or even states are the initiators of those ingenious attacks.

Their objectives differ and range from copying as much detailed information as possible about company internals as well as military and political facts to financial enrichment in terms of financial and credit card theft. In Germany, the Federal Office for the Protection of the Constitution recently warned against a renewed wave of APT attacks targeting German media companies and organizations in the field of chemical weapons research.

In general, cybercrime increases with the ongoing digitalization in companies. According to a recent study by Bitkom on digital espionage, sabotage and data theft, 68 % of the companies surveyed in Germany stated that they had been affected by cybercrime in the last two years (as of October 2018).

Five Stages of an APT Attack

Unlike “common” virus and spam attacks, in which hackers send a large number of infected emails to hit random victims, an APT grouping deliberately seeks a high-ranking target chosen for its objectives. The attackers proceed according to a classic pattern, which can be divided into 5 stages:

1. Exploring and researching

Once a target has been selected, the first phase of the attack is to gather as much information as possible about the company or organization. Hackers are particularly likely to access corporate websites, social media and other sources open to the public to find possible points of entry into the target’s systems.

2. Invasion of the system

If the attacker has gathered a conception of the structure of his target and knows which IP addresses, domains and systems are connected in which way, he will be able to search for vulnerabilities in detail. To finally gain access to the systems of the target, the hackers use various methods: Social engineering, such as CEO fraud & phishing as well as ransomware, blended and targeted attacks are among the best known. Cyber security is not just about computer systems and networks – APT groupings often use the “human factor” as a vulnerability by exploiting human traits such as helpfulness and trust. A recent survey conducted by the Federal Office for Information Security (BSI) revealed that one in six employees would respond to a fake email from the executive floor and disclose sensitive company information.

3. Spying out and spread

As soon as the hackers have access to the system, they usually operate as carefully as possible so as not to attract attention. The company’s security measures and deployed software are identified so that further security holes can be exploited to extend attackers’ access to the network. With the help of keyloggers and the found data, an attempt to find out passwords and thus gain access to other data records and systems is made.

4. Execution of the attack

The perpetrators access the unprotected systems and start to act according to their motivation and objectives for this attack. For example, sensitive company data can be collected over a long period and/or malware can be installed to the IT system. Also, the paralyzing of systems and thus of the operational procedures is an option.

5. Filtering and analysis of the data

The data and information collected is sent to the APT Grouping’s base for analysis. To have further access to the infected system of the company at any time and especially unnoticed, a kind of “back door” can be installed by the attackers.

Detecting and preventing APTs

Regarding such individualized and manual procedures in particular, the focus of IT security should rest on targeted detection and immediate reaction to possible attack attempts. With the daily flood of incoming and outgoing emails, manual monitoring of individual attachments or content indicating CEO fraud, for example, cannot be handled.

With Hornetsecurity Advanced Threat Protection, innovative forensic analysis engines provide real-time monitoring of corporate communications and immediately prevent attacks. The APT service is directly integrated into Email Security Management and offers protection mechanisms such as sandboxing, URL rewriting, URL scanning, freezing and targeted fraud forensics in addition to the spam and virus filter. In the event of an attack, it is important to that a company’s IT security team is immediately notified with specific details about the nature and target of the APT attack, the sender and why the email was intercepted. Thanks to Real Time Alerts, Hornetsecurity ATP is able to inform a company’s IT security team about current attacks. This up-to-date information can be used for countermeasures, so that security gaps can be effectively closed in the shortest possible time and additional protective measures can be set up.

Additional information:

 

Hornetsecurity rocked the it-sa 2018

Hornetsecurity rocked the it-sa 2018

With an eye-catching light show, extraordinary stand design and exciting stage programme, Hornetsecurity’s 90 sqm booth was one of the highlights at the it-sa 2018 in Nuremberg. The 7 meter long LED wall was the heart of the stand, where a live demo of the latest product “365 Total Protection” and the outstanding benefits of the Hornetsecurity Services were shown alternately.

After the days of this year’s fair, Europe’s largest IT security exhibition announced new records: About 696 exhibitors from the cloud, mobile and cyber security industry from 27 countries were attending and around 14,290 trade visitors from over 50 nations walked through the exhibition halls.

Hornetsecurity News


Stay in touch

Sign up to get the latest News about Cloud Security.

The informative and creatively designed program on the six meter long stage of Hornetsecurity did not let any visitor pass by: At every full hour, during the “Hornetsecurity Promi Check”, a voice imitator with provided entertainment by vocally taking on the roles of interesting personalities and explaining the services and products of Hornetsecurity in a simple way.

The focus was especially on the introduction of the new product “365 Total Protection”, presented hourly by Hornetsecurity’s Head of Product Management Dr. Yvonne Bernard.

The fully comprehensive Security & Compliance Suite for Office 365 users was presented to the public for the first time. After the presentation, together with the distributors acmeo and ADN, the Hornetsecurity team answered profound questions from interested parties.

At the end of the first fair day, a fantastic live concert on the Hornetsecurity stage created an enthusiastic atmosphere. The Hornet-Crew served freshly tapped free beer and tasty fried sausages to the party guests at the beer wagon outside.

Together with many visitors and DJ, the party was celebrated in a very cheerful way. Also on Wednesday evening, the it-sa fair party became an attraction due to the support of Hornetsecurity. In a beautiful ambience with a large chillout area, beer wagon and great DJ, the party continued all night long.

Hornetsecurity is certain that it provided an unforgettable exhibition experience. All in all, the team looks back on three eventful and successful days at the fair. The Hornets plan to rock the it-sa again next year in even bigger style.

Impressions from the it-sa exhibition:

Hornetsecurity it-sa 2018
Hornetsecurity it-sa 2018
Hornetsecurity it-sa 2018
Hornetsecurity it-sa 2018
Hornetsecurity it-sa 2018
Hornetsecurity it-sa 2018
Hornetsecurity it-sa 2018
Hornetsecurity it-sa 2018