365 Total Protection honored with Computing Security Award 2020

365 Total Protection honored with Computing Security Award 2020

On 10.12.2020 the time finally arrived: The winners of this year’s Computing Security Awards were announced via livestream on YouTube.

Hornetsecurity has reason to celebrate, as its 365 Total Protection service was named as the winner in the “Editor’s Choice” category.

Hornetsecurity’s 365 Total Protection Suite offers email security management specifically designed for Microsoft 365 accounts. M365 customers benefit from fully comprehensive protection as well as simplified IT security management.

The editors of UK magazine Computing Security recognized 365 TP as a highly efficient solution that complements Microsoft’s cloud service with critical security mechanisms.  

Microsoft 365 as target of cyberattacks

Microsoft 365 is used by over one million companies worldwide. In the US alone, more than 650,000 companies rely on the software in their day-to-day operations. Vast amounts of sensitive data are exchanged in the Microsoft 365 cloud every day. Cybercriminals are also aware of this. The company reported a 250 percent increase in targeted attacks as early as the beginning of 2020.

If you also consider that 95 percent of all cyberattacks on companies start with an email, then it becomes clear: the right protection for email communication is extremely important, and 365 Total Protection is the ideal solution.

365 Total Protection is Editor’s Choice of the Year

The award is based on a detailed test of the product, which can be downloaded free of charge.

The editors‘ summary states:

“Hornetsecurity offers a cost-effective and highly efficient solution. Its 365 Total Protection cloud service provides a wealth of email security measures, which includes AI intelligence-based protection, allowing it to evolve as new threats emerge.”

365 Total Protection combines all the necessary security features that a fully comprehensive email security management requires. These include Email Live Tracking, Threat Defense and Global S/MIME & PGP Encryption. In the Enterprise version, additional features such as Malware Ex-Post Alert, ATP Sandboxing and email archiving are added. The company uses intelligent filter mechanisms in its protection solutions, which enable efficient detection and filtering of any cyber threats via e-mail.

Computing Security Magazine therefore concludes its assessment as follows: “Hornetsecurity’s 365 Total Protection lives up to its name, as it delivers a smart email security solution that integrates seamlessly with Microsoft 365. It fills the security holes Microsoft leaves behind, and with prices for the Business version starting at only $2 per user per month, is affordable for organizations of all sizes.”

Hornetsecurity introduces new self-service module

Hornetsecurity introduces new self-service module

During the Corona crisis, communication via email has gained great importance. Cyber criminals take advantage of the insecurity of many citizens to obtain money by fraudulent emails. Despite current domain authorization through SPF Records, malicious emails can still get into the mailboxes of victims. Hornetsecurity’s new self-service module “Email Authentication” offers a solution to this problem: users can now choose how to deal with scanned malicious emails at the touch of a button.

Authentication methods SPF, DKIM and DMARC

The verification is performed using the authentication methods SPF, DKIM and DMARC. In combination, these procedures function as a secure instrument against attacks on email communication. Thus, current spam, spoofing, phishing and malware attacks as well as targeted CEO fraud attacks can be blocked. This corresponds to the recommended security standard of the German Federal Office for Information Security.

The SPF authentication process recognizes emails sent with unauthorized sender addresses of the sender domains. The DKIM authentication process detects emails that have been modified during transit. And the DMARC authentication procedure ensures that the envelope sender address matches the body form address.

Hornetsecurity offers individual adjustment possibilities

Hornetsecurity now provides administrators and analysts with a number of options to customize the default settings of the authentication procedures to the individual needs of the users. While Hornetsecurity’s support team had to individually define the settings of the authentication procedures for customers for many years, this is now possible at the push of a button in a self-module.

For example, the results of the SPF authentication procedure can be displayed differently. Depending on whether the verification result is a hard or soft fail, an email is quarantined, rejected or delivered.

The SPF authentication procedure can also be used to individually define which components of the emails are to be analyzed. The following options are available:

  • analyze “envelope from” only,
  • only parse ‘header from’,
  • analyze ‘envelope from’ and ‘header from’.

With the DMARC and DKIM authentication procedure, it is possible to reject suspicious emails directly so that they are not stored on the server. By default, they are moved to quarantine.

Checklist for protection against email attacks

Despite all security measures, the following rules still remain valid in the end: Be careful when handling emails and their attachments. Caution is required for emails with long sender addresses or general addressing. Personal details should not be confirmed and winning notifications can also be ignored.

Why switch from Symantec Cloud Security to Hornetsecurity?

Why switch from Symantec Cloud Security to Hornetsecurity?

Are you a partner of Symantec who is currently selling Symantec Cloud? Or are you on the receiving end; the customer who is being provided Symantec’s Cloud Security? Have you begun considering your switch? With the recent news of the Broadcom acquisition of Symantec, it was announced that over 1 Billion + in funds will be removed from the budget that was set specifically for Symantec Cloud’s Research and Development, Marketing, and Support. For Symantec Email Security partners and customers this is unsettling news, as email cyber-attacks make up over 90% of all threats in today’s modern IT world.

Email is the #1 attack vector, and hackers are constantly creating and identifying new ways to successfully penetrate a business or user’s privacy. With the budget cuts Broadcom has put in place, innovation and research and development will cease hindering updated security levels that are necessary to combat the ever-changing security landscape. Experts believe, knowing that these budget cuts have been put in place, that the security needed for the future will not be met within the MessageLabs solution.

Choosing Hornetsecurity as your Symantec Email Security alternative

With email security being more important for society than ever, it is critical that you choose a provider who is heavily focused on the future of their email security solutions. A provider who fulfills the highest level of protection, but also a provider who aims to continually innovate in preparation for the future. A provider who offers the full package in the realm of email security solutions such as various forms of encryption, automatic archiving, advanced threat protection, continuity, and more. This is where Hornetsecurity fits in perfectly for your organization.

With Hornetsecurity, you are partnering with a vendor who focuses specifically on the security of business cloud communications. Hornetsecurity is a well-known trusted cloud email security provider in much of the world, and is an industry leader throughout Europe. Hornetsecurity operates across 11 offices, spread out over several countries, securing over 45,000+ businesses with our proprietary solutions. Hornetsecurity offers clear advantages over Symantec Cloud, providing ease of use, comfortability, and reduced management time for any administor working with our solutions.

Independent of all software and hardware, Hornetsecurity saves organizations time and money giving administrators control and transperency. With hundreds of new features and improvements being made within the last 12 months, you can be assured that Hornetsecurity’s offerings are of maximum security and reliability. With a 100% channel focus, our partners benefit from our MSP and Value Added Reseller partner programs, in which direct business is funneled to them in addition to receiving up to 30% margins. With longer system logs, instantenous set-up, and full white-label capabilites, Hornetsecurity allows partners to make the most of the award-winning solution suite. Whether it be on Office 365, Gsuite, Linux Based, etc. Hornetsecurity has the product portfolio to secure your business email communications at the highest level available on the market.

Award-Winning Managed Cloud Security Services by Hornetsecurity

Hornetsecurity has been focusing on cloud computing since 2007 and offers high level protection for customers’ IT infrastructures. 365 Total Protection from Hornetsecurity offers comprehensive protection for Microsoft cloud services – specially developed for Office 365 and is seamlessly integrated to provide comprehensive protection for Microsoft cloud services. Easy to set up and extremely intuitive to use, 365 Total Protection simplifies your IT Security management from the start. 365 Total Protection Business provides all-around protection for the Microsoft Office 365 Suite. 365 Total Protection Enterprise enhances the Business package with features such as email archiving and ATP sandboxing.

With Hornetsecuritys’ Spam and Malware Protection you can be assured of the highest detection rates on the market, with 99.999% guaranteed spam detection and 99.99% virus detection and protects mail servers against DDoS attacks and phishing emails.

With the comprehensive features of our award-winning Advanced Threat Protection, even the most sophisticated cyber attacks have no chance. In times of a wide range of attack vectors, Hornetsecuritys’ Advanced Threat Protection was developed to cope with a multitude of methods in order to ward off all kind of threats like Spear Phishing, Ransomware, Zero-Day Threats and more. With freezing, URL scanning, rewriting and sandboxing Advanced Threat Protection secures the email traffic from insidious cyber attacks.

Switch from Symantec to Hornetsecurity now to receive an exclusive offer!

Hornetsecurity Services compatible with SIEM services thanks to new SIEM Connector

Hornetsecurity Services compatible with SIEM services thanks to new SIEM Connector

The IT infrastructures of companies are exposed to a variety of different threats – ranging from ransomware attacks to phishing waves, or bot attacks aimed at firewalls. To avoid becoming a victim of cyber attacks, complex defense mechanisms must be installed. SIEM services are an important component of this process. SIEM services bundle and analyze all security-relevant data at a central location, which allows suspicious activities to be detected early.

With the new Hornetsecurity SIEM Connector, Hornetsecurity now also offers an interface for SIEM services for its 365 Total Protection and Spam Filter Service products. The Connector automatically receives and imports e-mail log entries from the Hornetsecurity Cloud.

SIEM-Services

Data relating to IT security can be found in many different places in an organization – on end devices, servers, network devices, and special security infrastructure such as firewalls, antivirus or mail security systems. Information and Event Management Services (SIEM) are software products that collect and analyze this information in real-time at a central location.  The programs derive patterns and trends based on this information so that targeted cyber attacks with multiple attack vectors can be detected more quickly. Among the best-known SIEM services are IBM QRadar and Splunk.

The Hornetsecurity SIEM Connector

With the new Hornetsecurity SIEM Connector, users of SIEM services can have email log entries automatically read from the Hornetsecurity Cloud. The new product can be booked if the Hornetsecurity Spam Filter Service or 365 Total Protection (Business or Enterprise) is already in use.

The Hornetsecurity SIEM Connector sends detailed information by means of syslog packets containing the following details:

• General email information: Email subject, attachment file names, message ID from the header, encryption method used and size of the email.

• Processing information: date and time of first processing, classification and reason for classification and number of log entries for this email.

• Sender information: Source address from the SMTP dialog and sender as specified in the email header.

• Information about the recipient: Mailbox to which this email has been assigned by the Hornetsecurity Spamfilter service and recipient, as specified in the e-mail header.

Thanks to the connector, Hornetsecurity services can provide critical log data to SIEM services to provide comprehensive protection for the IT infrastructure.

Simple onboarding of the Hornetsecurity Services: Video tutorial for product training

Simple onboarding of the Hornetsecurity Services: Video tutorial for product training

Extortion, theft, drug trafficking – in the age of digitalization, all these crimes are also committed online. Email communication has a central role therein: it is considered the most popular means of communication in companies and at the same time the main vector of attack for malware. Through social engineering, cybercriminals manipulate their victims to persuade them to click on links and open attachments containing ransomware and trojans, for example.

However, companies are not only facing the challenge of protecting email inboxes from misuse as a gateway for cyberattacks. Information and data communicated via email are also increasingly becoming a valuable digital resource to cybercriminals. Managed Security Services offer comprehensive protection against increasing cybercrime without the installation of additional hardware or software. Every day, several new cyber threats emerge that work their way into the system, so it is important to act quickly.

Hornetsecurity’s Email Security Services protect your email communications from the most sophisticated cyber attacks, annoying spam and malware. In order to offer customers the opportunity to familiarize themselves with the services in advance and to make the implementation of the products as easy as possible, Hornetsecurity extends its onboarding service with a training program made up of YouTube videos. The activation of these services can thus be implemented as quickly and easily as possible directly by the user.

The trainings are organized in different playlists: The Spamfilter Basic Playlist provides information about the setup of Hornetsecurity’s Spam & Malware Protection and its different features. The Spamfilter Advanced I Playlist contains further information on the use of 365 Total Protection, Email archiving and Signature & Disclaimer. The Spamfilter Advanced II Playlist provides useful information on Email encryption and Advanced Threat Protection.

The videos can be accessed at any time using the links below. The videos provide customers all the information they need for onboarding.

Hornetsecurity mobile – on the move with the Progressive Web App

Hornetsecurity mobile – on the move with the Progressive Web App

In recent years, the number of apps downloaded from app stores to mobile devices has steadily decreased. According to a forecast by the IT consulting firm Gartner, half of all apps used in 2020 will be Progressive Web Apps (PWA). Hornetsecurity reacted to this trend and released a Progressive Web App for the Hornetsecurity Control Panel.

A Progressive Web App is a combination of a responsive website and a native app. Since February 2019, a Progressive Web App has been available to all Hornetsecurity customers, enabling them to access the control panel from a mobile device in a simple way. Since the release of the control panel version 6.5.2.0 at the end of June 2019, the Progressive Web App has also been available as a white-label version that Hornetsecurity customers and partners who have booked the white-label option can use to customize the app name, icon and splash screen.

Advantages of the Progressive Web App from Hornetsecurity

With the Progressive Web App, it is possible to create an icon on the home screen, allowing easy access to the control panel. In comparison to a responsive website, the Control Panel does not need to be opened in a browser but is accessed directly by clicking on the icon. With the white-label version; the icon, app name and logo on the splash screen can also be adapted to the company’s design.

Another advantage is that, unlike native apps, the Progressive Web App does not need to be downloaded and therefore does not consume any storage capacity on the mobile device. The Progressive Web App software updates automatically. Furthermore, the use of the Progressive Web App saves time, as the user name and password can be saved and thus prevent the time-consuming, repeated input of user data.

If you would like to access the control panel quickly and conveniently from home or on the train, install the Progressive Web App and enjoy better usability.

How to install the Progressive Web App

1. Open the Internet browser on your smartphone and enter “cp.hornetsecurity.com” in the address bar.
2. At the bottom of your browser, a pop-up opens with instructions for installing the Web App.
3. After installing the Web App on your home screen, open the app and log in with your login data.