Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Clusters and Clouds

December 3, 2008

Suddenly chief security officers, chief information security officers, and network managers are seeing dollars in the clusters and clouds. Intransa and Pivot3 are pioneering security video storage clusters while IT security is looking to the clouds for email security.

John Latonna, manager of network security at Brunswick, has moved email security to the cloud – Google’s cloud to be specific. And he is saving significant dollars while also outsourcing some of the headaches.

Adam Swidler, senior product manager with Google Enterprise, wants others to soar cloudward.

Email Security:

Google email security service, powered by Postini, helps keep email free from spam, viruses, phishing, and other email threats. Google email security is a hosted solution that blocks spam and other threats well before they reach an enterprise. Unlike legacy products, it requires no hardware or software to install and maintain, thus greatly reducing your IT resource requirements and costs.

Complete spam and virus protection

Comprehensive message security to stop spam, viruses, phishing, denial of service (DoS), directory harvest attacks (DHA), and other email attacks

Zero-hour anti-virus protection with multi-layered protection, including heuristic and signature-based detection

Extensive and detailed quarantine summary reporting to end users through a convenient web console

Content-based policies for inbound and outbound traffic

Built-in lexical analysis for social security and credit card numbers

Build virtually any custom content rule with regular expression matching

Apply a variety of policy dispositions to triggered content — approve, bounce, quarantine, quarantine redirect, log and deliver

Real-time processing with scale and reliability

Patented real-time, pass-through architecture ensures that there are no delays, message loss or disruptions to email service, regardless of how high spam volumes climb

99.999% availability for message processing and capacity to handle billions of transactions a day

Policy enforced domain to domain messaging encryption using standard SSL or TLS protocols

SAS 70 Type II certified and WebTrust seal validates Google's stringent standards for physical and operational security, assuring the safety of your communications

Manage communication policies for message attachments and content

Email Archving:

Google Message Discovery, powered by Postini, is an easily-deployed, hosted service that helps organizations manage email retention and security, providing both complete email security and a centralized, searchable repository so you can locate email quickly in the event of legal discovery. Email security and archiving services are available together with up to 10 years of retention for $45 per user per year.

Manage email retention and discovery

Capture and index all of your organization's email and attachments in a centralized repository

Store email in redundant and secure Google data centers, creating a reliable, offsite backup

Identify specific emails and attachments quickly through a search interface using parameters such as date range, sender, recipient, subject and content

Place search results on litigation hold to preserve messages beyond their retention periods

Export search results to PST or MBOX format for further review and analysis

Integrated security protects against spam and viruses

Enable comprehensive message security to stop spam, viruses, phishing, denial of service (DoS), directory harvest attacks (DHA), and other email attacks

Set content-based policies for inbound and outbound traffic

Patented real-time, pass-through architecture ensures that there are no delays, message loss or disruptions to email service, regardless of how high spam volumes climb

Manage email security settings and the archive from a single, unified console

Deploy rapidly and maintain effortlessly

Start archiving in a matter of days, with no hardware or software to install on site

Performance is monitored 24/7 by Google, and our services are SAS 70 audited

Updates are released automatically at no additional cost and with no installation effort required

Email Encryption:

Business requirements, industry regulations and government mandates all dictate that companies sufficiently protect communications that contain sensitive or regulated data. Whether it's personally identifiable information, financial data, medical records or proprietary corporate property, you simply must ensure that sensitive content reaches its destination safely. Google Message Encryption, powered by Postini, is a cost-effective hosted solution that automatically encrypts email based on your policy definitions, helping organizations avoid the financial penalties and brand equity damage that can result from sending proprietary or regulated data via unprotected email.

Send encrypted messages to business partners and customers

No additional software, hardware or technical training required

Automated or user-initiated encryption for confidential emails to any recipient

Centralized reporting of encrypted messages and policy enforcement

Centrally-managed content inspection, encryption policies to help comply with GLBA, HIPAA, PCI DSS and Data privacy regulations

Content based policies

Granular content rules let administrators define and enforce specific content policies for data security

Deep inspection of messages and attachments automatically applies encryption policy to regulated content

Full integration with built-in content policy management lexicons enables simple, automated encryption of policy controlled content 

Multiple delivery options

Secure web delivery enables encrypted message pickup from a customized web portal with your company's own look and feel

Direct inbox delivery sends encrypted email directly to the recipient's inbox as an encrypted attachment

Automated notification if the recipient doesn't view the secured message

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing