Why switch from Symantec Cloud Security to Hornetsecurity?

Why switch from Symantec Cloud Security to Hornetsecurity?

Are you a partner of Symantec who is currently selling Symantec Cloud? Or are you on the receiving end; the customer who is being provided Symantec’s Cloud Security? Have you begun considering your switch? With the recent news of the Broadcom acquisition of Symantec, it was announced that over 1 Billion + in funds will be removed from the budget that was set specifically for Symantec Cloud’s Research and Development, Marketing, and Support. For Symantec Email Security partners and customers this is unsettling news, as email cyber-attacks make up over 90% of all threats in today’s modern IT world.

Email is the #1 attack vector, and hackers are constantly creating and identifying new ways to successfully penetrate a business or user’s privacy. With the budget cuts Broadcom has put in place, innovation and research and development will cease hindering updated security levels that are necessary to combat the ever-changing security landscape. Experts believe, knowing that these budget cuts have been put in place, that the security needed for the future will not be met within the MessageLabs solution.

Choosing Hornetsecurity as your Symantec Email Security alternative

With email security being more important for society than ever, it is critical that you choose a provider who is heavily focused on the future of their email security solutions. A provider who fulfills the highest level of protection, but also a provider who aims to continually innovate in preparation for the future. A provider who offers the full package in the realm of email security solutions such as various forms of encryption, automatic archiving, advanced threat protection, continuity, and more. This is where Hornetsecurity fits in perfectly for your organization.

With Hornetsecurity, you are partnering with a vendor who focuses specifically on the security of business cloud communications. Hornetsecurity is a well-known trusted cloud email security provider in much of the world, and is an industry leader throughout Europe. Hornetsecurity operates across 11 offices, spread out over several countries, securing over 45,000+ businesses with our proprietary solutions. Hornetsecurity offers clear advantages over Symantec Cloud, providing ease of use, comfortability, and reduced management time for any administor working with our solutions.

Independent of all software and hardware, Hornetsecurity saves organizations time and money giving administrators control and transperency. With hundreds of new features and improvements being made within the last 12 months, you can be assured that Hornetsecurity’s offerings are of maximum security and reliability. With a 100% channel focus, our partners benefit from our MSP and Value Added Reseller partner programs, in which direct business is funneled to them in addition to receiving up to 30% margins. With longer system logs, instantenous set-up, and full white-label capabilites, Hornetsecurity allows partners to make the most of the award-winning solution suite. Whether it be on Office 365, Gsuite, Linux Based, etc. Hornetsecurity has the product portfolio to secure your business email communications at the highest level available on the market.

Award-Winning Managed Cloud Security Services by Hornetsecurity

Hornetsecurity has been focusing on cloud computing since 2007 and offers high level protection for customers’ IT infrastructures. 365 Total Protection from Hornetsecurity offers comprehensive protection for Microsoft cloud services – specially developed for Office 365 and is seamlessly integrated to provide comprehensive protection for Microsoft cloud services. Easy to set up and extremely intuitive to use, 365 Total Protection simplifies your IT Security management from the start. 365 Total Protection Business provides all-around protection for the Microsoft Office 365 Suite. 365 Total Protection Enterprise enhances the Business package with features such as email archiving and ATP sandboxing.

With Hornetsecuritys’ Spam and Malware Protection you can be assured of the highest detection rates on the market, with 99.999% guaranteed spam detection and 99.99% virus detection and protects mail servers against DDoS attacks and phishing emails.

With the comprehensive features of our award-winning Advanced Threat Protection, even the most sophisticated cyber attacks have no chance. In times of a wide range of attack vectors, Hornetsecuritys’ Advanced Threat Protection was developed to cope with a multitude of methods in order to ward off all kind of threats like Spear Phishing, Ransomware, Zero-Day Threats and more. With freezing, URL scanning, rewriting and sandboxing Advanced Threat Protection secures the email traffic from insidious cyber attacks.

Switch from Symantec to Hornetsecurity now to receive an exclusive offer!

Hornetsecurity Services compatible with SIEM services thanks to new SIEM Connector

Hornetsecurity Services compatible with SIEM services thanks to new SIEM Connector

The IT infrastructures of companies are exposed to a variety of different threats – ranging from ransomware attacks to phishing waves, or bot attacks aimed at firewalls. To avoid becoming a victim of cyber attacks, complex defense mechanisms must be installed. SIEM services are an important component of this process. SIEM services bundle and analyze all security-relevant data at a central location, which allows suspicious activities to be detected early.

With the new Hornetsecurity SIEM Connector, Hornetsecurity now also offers an interface for SIEM services for its 365 Total Protection and Spam Filter Service products. The Connector automatically receives and imports e-mail log entries from the Hornetsecurity Cloud.

SIEM-Services

Data relating to IT security can be found in many different places in an organization – on end devices, servers, network devices, and special security infrastructure such as firewalls, antivirus or mail security systems. Information and Event Management Services (SIEM) are software products that collect and analyze this information in real-time at a central location.  The programs derive patterns and trends based on this information so that targeted cyber attacks with multiple attack vectors can be detected more quickly. Among the best-known SIEM services are IBM QRadar and Splunk.

The Hornetsecurity SIEM Connector

With the new Hornetsecurity SIEM Connector, users of SIEM services can have email log entries automatically read from the Hornetsecurity Cloud. The new product can be booked if the Hornetsecurity Spam Filter Service or 365 Total Protection (Business or Enterprise) is already in use.

The Hornetsecurity SIEM Connector sends detailed information by means of syslog packets containing the following details:

• General email information: Email subject, attachment file names, message ID from the header, encryption method used and size of the email.

• Processing information: date and time of first processing, classification and reason for classification and number of log entries for this email.

• Sender information: Source address from the SMTP dialog and sender as specified in the email header.

• Information about the recipient: Mailbox to which this email has been assigned by the Hornetsecurity Spamfilter service and recipient, as specified in the e-mail header.

Thanks to the connector, Hornetsecurity services can provide critical log data to SIEM services to provide comprehensive protection for the IT infrastructure.

Simple onboarding of the Hornetsecurity Services: Video tutorial for product training

Simple onboarding of the Hornetsecurity Services: Video tutorial for product training

Extortion, theft, drug trafficking – in the age of digitalization, all these crimes are also committed online. Email communication has a central role therein: it is considered the most popular means of communication in companies and at the same time the main vector of attack for malware. Through social engineering, cybercriminals manipulate their victims to persuade them to click on links and open attachments containing ransomware and trojans, for example.

However, companies are not only facing the challenge of protecting email inboxes from misuse as a gateway for cyberattacks. Information and data communicated via email are also increasingly becoming a valuable digital resource to cybercriminals. Managed Security Services offer comprehensive protection against increasing cybercrime without the installation of additional hardware or software. Every day, several new cyber threats emerge that work their way into the system, so it is important to act quickly.

Hornetsecurity’s Email Security Services protect your email communications from the most sophisticated cyber attacks, annoying spam and malware. In order to offer customers the opportunity to familiarize themselves with the services in advance and to make the implementation of the products as easy as possible, Hornetsecurity extends its onboarding service with a training program made up of YouTube videos. The activation of these services can thus be implemented as quickly and easily as possible directly by the user.

The trainings are organized in different playlists: The Spamfilter Basic Playlist provides information about the setup of Hornetsecurity’s Spam & Malware Protection and its different features. The Spamfilter Advanced I Playlist contains further information on the use of 365 Total Protection, Email archiving and Signature & Disclaimer. The Spamfilter Advanced II Playlist provides useful information on Email encryption and Advanced Threat Protection.

The videos can be accessed at any time using the links below. The videos provide customers all the information they need for onboarding.

Hornetsecurity mobile – on the move with the Progressive Web App

Hornetsecurity mobile – on the move with the Progressive Web App

In recent years, the number of apps downloaded from app stores to mobile devices has steadily decreased. According to a forecast by the IT consulting firm Gartner, half of all apps used in 2020 will be Progressive Web Apps (PWA). Hornetsecurity reacted to this trend and released a Progressive Web App for the Hornetsecurity Control Panel.

A Progressive Web App is a combination of a responsive website and a native app. Since February 2019, a Progressive Web App has been available to all Hornetsecurity customers, enabling them to access the control panel from a mobile device in a simple way. Since the release of the control panel version 6.5.2.0 at the end of June 2019, the Progressive Web App has also been available as a white-label version that Hornetsecurity customers and partners who have booked the white-label option can use to customize the app name, icon and splash screen.

Advantages of the Progressive Web App from Hornetsecurity

With the Progressive Web App, it is possible to create an icon on the home screen, allowing easy access to the control panel. In comparison to a responsive website, the Control Panel does not need to be opened in a browser but is accessed directly by clicking on the icon. With the white-label version; the icon, app name and logo on the splash screen can also be adapted to the company’s design.

Another advantage is that, unlike native apps, the Progressive Web App does not need to be downloaded and therefore does not consume any storage capacity on the mobile device. The Progressive Web App software updates automatically. Furthermore, the use of the Progressive Web App saves time, as the user name and password can be saved and thus prevent the time-consuming, repeated input of user data.

If you would like to access the control panel quickly and conveniently from home or on the train, install the Progressive Web App and enjoy better usability.

How to install the Progressive Web App

1. Open the Internet browser on your smartphone and enter “cp.hornetsecurity.com” in the address bar.
2. At the bottom of your browser, a pop-up opens with instructions for installing the Web App.
3. After installing the Web App on your home screen, open the app and log in with your login data.

ATP update – Introducing the new feature Malicious Document Decryption

ATP update – Introducing the new feature Malicious Document Decryption

In order to spread ransomware, viruses or spyware into the systems of companies and organizations, cybercriminals are constantly developing new methods: Now they are focusing on a simple but very effective way, in which their distributed malware attached to an email can bypass antivirus scanning. The infected attached document is encrypted with a password, which prevents the filtering mechanisms of antivirus programs from detecting the hidden malware.
The current threat situation requires an update of the existing filtering mechanisms: “Malicious Document Decryption”fulfills these requirements perfectly.

Just a few weeks ago, we reported about a “fake application mail” campaign that targeted HR departments in companies. This attack was performed by the ransomware GandCrab 5.2. The Hornetsecurity Security Lab still detects incoming malicious emails with encrypted and malware-infected attachments. The password for the decryption of the malicious file is visible to the recipient in the message of the email. However, decrypting the attachment downloads the hidden virus and infects the computer system.

“Malicious Document Decryption” adds another elementary feature to Advanced Threat Protection to prevent the increasing threat of hidden malware. Emails with encrypted attachments are analyzed for their potential passwords within the email in order to decrypt the attachment in the sandbox. The file is then scanned using static and dynamic analysis methods and the behavior of the file is examined during execution. This makes it possible to detect malware in encrypted files and block the corresponding emails before they reach the recipient.

The “Malicious Document Decryption” feature decrypts all encrypted Microsoft Office file types and will be extended to decrypt PDF and archive files (RAR, ZIP, etc.).
Since the beginning of June, “Malicious Document Decryption” is included in the ATP service and already activated for all existing ATP customers..

Blockchain explained easily

Blockchain explained easily

Over and over again in recent times the subject of blockchains has made the headlines. Probably the best-known representative of this technology is the Bitcoin cryptocurrency. Yet the uses to which a blockchain can be put are more diverse and are hotly discussed in the financial and insurance industries and in IT. So what exactly is a blockchain and what is the technology behind it? This blog entry looks at this question and goes on to examine the advantages that blockchains bring and the scenarios in which they can be used.

What is a blockchain?

A blockchain is essentially a decentralized digital database for the storage of data. This technology can be used to perform what are known as transactions and to verify and automate them. Transactions are data collections that are distributed to all participants (or ‘nodes’) within a particular network and subsequently collected together in blocks.
The origin of the name ‘blockchain’ is as follows. A ‘block’ is a body of stored transactions, while a ‘chain’ is formed by stringing together a number of blocks. The result is a ‘blockchain’ that is formed of multiple information blocks and is further extended by additional blocks. When this happens, the new block is always attached to the most recent block of the existing chain.

How does a blockchain work?

The individual blocks of a blockchain are created in a decentralized peer-to-peer network by means of a process called ‘mining’. In mining, transactions are verified by a consensus mechanism, validated and then joined together to form a block. The block thus formed is then chained to the existing blockchain.
The commonest consensus mechanism is the ‘proof of work’ algorithm. This is used in the Bitcoin blockchain, for example, and serves to ensure that a consensus prevails in the affected network about an identical version of the blockchain. To generate a new block, the miners must use a mathematical function – known as the hash function – to find the correct outcome of a given character string. This is done by entering various values into the hash function. The outcome of this function is predetermined, and therefore no conclusions can be drawn about the values contained within it. If the predetermined outcome and the result of the hash function employed are identical, the newly formed block is accepted and adopted by all nodes of the network.
The data of a blockchain is redundant and secure, since the data is stored on all the nodes within the network. As a result, the failure of one or more nodes does not pose the hazard of potential loss of data. Data contained within a blockchain can be neither changed nor deleted. Any manipulation would result in all subsequent blocks being invalid.

What types of blockchain are there?

Blockchains can basically be divided into three main types: public, private and consortium or federated. There are also other mixed forms that are not examined in this entry.
Public blockchain
In a public blockchain, the network is entirely decentralized. There is no central point of responsibility, so that everybody in the blockchain participates on all nodes of the network and can access the blockchain data distributed within it. Before a new transaction can be added to a block, it must be verified and synchronized by every node. This type is therefore relatively slow and resource-intensive. Public blockchains are often used with cryptocurrencies such as Bitcoin or Ethereum. All nodes within the network agree the transactions. They therefore decide which transactions are included in a new block and added to the chain.
Private blockchain
In this type there is a responsible party that operates the blockchain and undertakes the verification of the transactions. The responsible party can be a person or a company. This party also decides who may perform actions such as reading or writing. This form of blockchain has a higher level of data protection than the public variant, but it loses the fundamental notion of decentralization. The private blockchain is suitable for companies that do not wish to make their data freely accessible. Daimler and LBBW tested the use of a private blockchain in a pilot project for processing a bonded loan, from initiation through placement, allocation and conclusion of contract through to the interest payment and repayment confirmations.
Consortium or federated blockchain
This is an extension of the private blockchain in which responsibility for the blockchain is shared among several parties. For example, a group of persons or companies can share in the responsibility for verification of transactions and distribution of access rights.
A consortium blockchain is faster than the public type, but unlike a private blockchain, is not dependent on a single person or company. Since a number of participants are involved who must decide on the transactions to be performed, wrong decisions, fraud attempts and the like are also less likely to occur. Consortium blockchains are likewise suitable for companies and are used in the banking industry, for example. Here there are alliances of multiple companies.
Hornetsecurity News

Stay in touch

Sign up to get the latest News about Cloud Security.

Oops! We could not locate your form.

Within these alliances are what are known as ‘smart contracts’. Here a supplier, say, is automatically paid once he has supplied the correct quantity at the agreed time.

Use of blockchains in IT security

Blockchain technology can be used in a wide range of scenarios. In cyber security, the risk of cyberattacks can be minimized by means of secure encryption mechanisms. Data that has been verified in a consensus mechanism can then no longer be altered. The redundant infrastructure of a blockchain increases the failure safety of sensitive data and constantly increases user acceptance in the company.

More information: