Entrust Debuts E-Mail-Monitoring Tool - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
10/1/2004
04:18 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
How To Turn Your Data Into Dollars
Mar 29, 2017
Organizations are swamped with data in the form of web traffic, ERP systems, CRM systems, point of ...Read More>>

Entrust Debuts E-Mail-Monitoring Tool

Concerned about spam? Maybe you should be worried about the E-mail your own employees are sending.

The surge in spam and viruses makes it easy to forget that internal communications can prove as problematic as external messages. Entrust Inc., an identity- and access-management software company, revealed Thursday the availability of a Linux-based appliance to address E-mail content concerns, whether incoming, outgoing, or internal. The Entrust Entelligence Compliance Server brings E-mail into real-time regulatory and policy compliance, allowing administrators to deal with offensive language, spam, or the requirements of laws such as the Sarbanes-Oxley Act.

"Clearly, there are threats from the outside, and people are annoyed by the amount of spam coming into the organization," says Leah MacMillan, VP of secure messaging at Entrust. "But there's also a great concern about the kind of information that's actually leaving an organization."

Some of the ways companies check E-mail for compliance, such as hiring people to review outbound E-mail, occur only after a violation has happened, she says. "We can capture E-mail as it leaves the organization and before a violation occurs, so you can take the appropriate action," she says.

That might include sending E-mail back for consideration or quarantining it until a privacy officer has reviewed it. Or it might mean automatically encrypting the message if the Compliance Server deems its contents sensitive.

"For example, if you're in the health-care industry and you're handling private health information," MacMillan says, "if you're accepting those messages, you also have to be concerned with the compliance issues associated with that."

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Success = Storage & Data Center Performance
Balancing legacy infrastructure with emerging technologies requires laying a solid foundation that delivers flexibility, scalability, and efficiency. Learn what the most pressing issues are, how to incorporate advances like software-defined storage, and strategies for streamlining the data center.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll