SonicWall Email Security Datasheet

Protect your infrastructure from advanced email threats and compliance violations with powerful, easy-to-use solutions

Partners / Technology Partners / SonicWall / Email Security Datasheet >

Email is crucial for your business communication, but it is also the number one vector for threats such as ransomware, phishing, business email compromise (BEC), spoofing, spam and viruses. What’s more, government regulations now hold your business accountable for protecting confidential data and ensuring it is not leaked and that email containing sensitive customer data or confidential information is securely exchanged. Whether your organization is a growing small-to medium-sized business (SMB), a large, distributed enterprise or a managed service provider (MSP), you need a cost-effective way to deploy email security and encryption, and the scalability to easily grow capacity for — and delegate management across — organisational units and domains.

SonicWall Email Security appliances and software provide multi-layered protection from inbound and outbound email threats and compliance violations by scanning all inbound and outbound email content, URLs and attachments for sensitive data, delivering real-time protection ransomware, targeted phishing attacks, spoofing, viruses, malicious URLs, zombies, directory harvest (DHA), Denial of Service (DoS) and other attacks. The solution leverages multiple, patented SonicWall threat detection techniques and a unique, worldwide attack identification and monitoring network.

SonicWall Capture Advanced Threat Protection service delivers industry-leading, multi-engine sandboxing, with patent-pending Real-time Deep memory inspection (RTDMI™) technology,

to isolate unknown threats found in suspicious file attachments and URLs, so you can stop advanced threats before they reach your users’ inboxes. Email Security with Capture ATP gives you a highly effective and responsive defense against ransomware and zero-day attacks.

The solution also includes Domain-based Message Authentication, DKIM (Domain Keys Identified Mail), SPF (Sender Policy Framework), Reporting and Conformance (DMARC), a powerful email authentication method that helps identify spoofed mail, reducing spam and targeted phishing attacks such as spear-phishing, whaling, CEO fraud and business email compromise, It also reports on sources and senders of email, so you can identify and shut down unauthorised senders falsifying email with your address and protect your brand. In addition, it prevents confidential data leaks and regulatory violations with advanced compliance scanning and management, including integrated email encryption cloud service to ensure secure exchange of sensitive data.

Administration of the Email Security solution is intuitive, quick and simple. You can safely delegate spam management to end users, while still retaining ultimate control over security enforcement. You can also easily manage user and group accounts with seamless multi-LDAP synchronisation. For large, distributed environments, multi-tenancy support lets you delegate sub-administrators to manage settings at multiple organisational units (such as enterprise divisions or MSP customers) within a single Email Security deployment.

Benefits

  • Stop ransomware and zero-day malware from reaching you inbox with Capture Advanced Threat Protection
  • Protect users from clicking on malicious links across any device and from any location with time-of-click URL protection
  • Advanced analysis techniques to stop targeted phishing attacks, email fraud and business email compromise (BEC)
  • Stop new threats with real-time threat intelligence updates from SonicWall Capture Labs
  • Maintain email hygiene with powerful anti-spam and anti-virus
  • Protect your data by enforcing granular data loss preventions (DLP) and compliance policies
  • Simplify management with intelligent automation, task delegation, at-a-glance customisable dashboard and robust reporting
  • Leverage flexible, scalable deployment options, including hardened physical appliances, robust virtual appliances and powerful Windows Server® software

Features

Advance Threat Protection

Detect and block advanced threats until verdict. This service is the only advanced-threat-detection offering that combines multi-layer sandboxing, including Real- Time Deep Memory Inspection, full system emulation and virtualisation techniques, to analyse suspicious code behaviour within emails, to protect customers against the increasing dangers of zero-day threats. The service includes advanced URL protection that dynamically analyses embedded URLs, to block and quarantine messages with malicious URLs before they reach the inbox, so users never click on them and become compromised. Capture ATP service delivers finer granularity with file attachments and URLs analysis, additional in-depth reporting capabilities, and a streamlined user-experience.

In addition, SonicWall Email Security rewrites all embedded URLs to block emails with malicious or phishing URLs, so users are protected at the time of click across any device and from any location.

Targeted Attack Protection

SonicWall’s anti-phishing technology uses a combination of methodologies, including machine learning, heuristics, reputation and content analysis, to stop sophisticated phishing attacks. The solution also includes powerful email authentication standards, such as SPF, DKIM and DMARC, to stop spoofing attacks, business email compromise and email fraud.

Real-Time Threat Intelligence

Receive the most accurate and up-to-date protection against new spam attacks while ensuring delivery of benign email with real-time threat information from the SonicWall Capture Threat Network, which collects information from millions of data sources. The SonicWall Capture Labs analyses that information and performs rigorous testing to establish reputation scores for senders and content, identifying new threats in real-time.

Anti-Virus And Anti-Spyware Protection

Get up-to-date anti-virus and anti-spyware protection. The solution utilises signatures from industry leading anti-virus databases and malicious URL detections

for multi-layer protection that is superior to that provided by solutions that rely on a single anti-virus technology.

In addition, predictive analysis enables you to safeguard your network from the time a new virus outbreak occurs until the time an anti-virus signature update is available.

Intelligent automation, task delegation and robust reporting

Simplify management with intelligent automation, task delegation and robust reporting. Automatically manage email addresses, accounts and user groups. Seamlessly integrate with multiple- LDAP servers. Confidently delegate spam management to end users with the downloadable Junk Button for Outlook® plug-in, while still retaining full control. Locate any email in seconds with the Rapid Message Search Engine. Centralised reporting (even in split mode) gives you easily customisable, system-wide and granular information on attack types, solution effectiveness and built-in performance monitoring and reports are available in PDF and JPEG formats.

Compliance Policy Management

This add-on service enables compliance with regulatory mandates by helping you to identify, monitor and report on email that violates compliance regulations and guidelines (e.g., HIPAA, SOX, GLBA, and PCI-DSS) or corporate data loss guidelines. The subscription service also enables policy-based routing of mail for approval, archiving and encryption.

Email Encryption

Add a powerful framework for stopping data leaks, managing and enforcing compliance requirements and providing mobile-ready secure email exchange for organisations of all sizes.

Encrypted email can be tracked to confirm the time of receipt and time opened. Intuitive for the recipient, a notification email is delivered to the recipient’s inbox with instructions to simply log into a secure portal to read or securely download the email. The service is cloud-based with no additional client software necessary and unlike competitive solutions; the encrypted email may be accessed and read from mobile devices or laptops.

Flexible Deployment Options

Gain scalable, long-term value by configuring your solution for growth and redundancy with minimal upfront costs. You can deploy Email Security as a hardened, high-performance appliance, as software leveraging existing infrastructure or as a virtual appliance leveraging shared computing resources to optimise utilisation, ease migration and reduce capital costs. Start with a single system and then as your business grows, add capacity and move to a fail-over enabled, split-mode architecture. Multi-tenancy support allows large enterprise or managed service provider deployments with multiple departments or customers to establish organisational units with one or multiple domains. The deployment may be centrally managed, but still allows a given organisational unit to have its own users, sub-administrators, policy rules, junk boxes and more.

SonicWall Email Security Deployment Options

The highly flexible architecture of SonicWall Email Security enables deployments in organisations that require a highly scalable, redundant and distributed email protection solution that can be centrally managed. SonicWall Email Security can be deployed in either all-in-one or split mode.

In split mode, systems may be configured as a remote analyser or a control center. In a typical split-mode setup, one or more remote analysers is connected to a control center. The remote analyser receives email from one or more domains and applies connection management, email filtering (anti-spam, anti-phishing and anti-virus) and advanced policy techniques to deliver benign email to the downstream email server. The control center centrally manages all remote analysers and collects and stores junk email from the remote analysers. Centralised management includes reporting and monitoring of all related systems. This paradigm allows the solution to cost-effectively scale and protect both inbound and outbound email for growing organisations. Using SonicWall Email Security Virtual Appliances, split mode can be fully deployed on one or multiple servers for optimal efficiencies of scale.

Features

System Specifications

Ordering Information