News
The review of tools to secure email messages and attachments
When you use electronic mail as a means of transferring important confidential information, several problems arise that concern the reliability of protection of such information against unauthorized viewing. Information security experts all around the world face the problem of secure transfer of data and documents attached to electronic messages.
What solution does the market offer? What is suitable for big and middle-sized companies, and what is good for small companies and individuals?
There are a number of companies around the world that offer various solutions for security of email messages and attachments against unauthorized access and use.
This paper describes some of the solutions and evaluates them according to several parameters.
What the market offers
For convenience, we divide all market offers into corporate systems (Type 1) and web services (Type 2).
|
Functionality |
Type 1 |
Type 2 |
---|---|---|---|
1 |
Protects against viewing by unauthorized persons |
yes |
usually available |
Binds the secured message to user account/hardware |
usually available |
rarely |
|
2 |
Sends secured messages to external email (that is not a part of the corporate email system) |
yes |
usually available |
3 |
Sends secured reply |
rarely |
no |
4 |
Uses corporate mail server |
usually available |
no |
Uses external mail server of the service provider |
usually available |
yes |
|
5 |
Reports on how the secured message is used |
yes |
usually available |
6 |
The sender can manage the messages after they are delivered (delete a message, modify the rights) |
usually available |
rarely |
Specifies the number of views of the secured message |
yes |
rarely |
|
Determines the time of the message/attachment viewing and the period of its existence |
yes |
rarely |
|
7 |
Installation of a third-party viewer is required |
rarely |
no |
8 |
Supports mobile platforms |
usually available |
rarely |
9 |
Integration with Outlook |
yes |
rarely |
Integration with с Lotus Notes |
usually available |
rarely |
|
10 |
Secured attachments separately from the message body |
usually available |
Yes, but at the server level. There is no protection against access by unauthorized persons |
11 |
Supports different attachment formats (pdf, txt, jpeg, rtf, xls) |
rarely |
no |
12 |
Manages print rights |
usually available |
rarely |
Protects against grabbers |
rarely |
no |
|
13 |
Protects against remote access |
rarely |
no |
14 |
Pricing policy |
Commercial use |
There are free offers with limited functionality, for individual persons |
Review of the offers
- The first-priority task is to secure email messages and attachments against unauthorized viewing. To do so, information encryption and binding to a certain object are applied. It is assumed that it is impossible to read the information without the binding object. All corporate systems implement such functionality. As for the web services, some of them send messages to the recipients in plain text form. The recipient authentication is performed by the login and password that give permission to download the secured message to the recipient’s mail client.
- It is highly important to be able to send messages to third-party organizations and unknown senders. In such a case, it is impossible to use standard corporate DLP systems. Protection should be embedded into the message. All corporate systems of email security and almost all web services implement it.
- Almost none of the systems available on the market can send protected replies.
- If a company does not want to use third-party mail servers but wishes to deploy the system on the company’s hardware, this can only be implemented by some of the corporate systems, but not by the web services. Meanwhile, individuals and small companies are more likely to use an external mail protection server and not to spend time and money for deployment of such a server.
- Tracking the statistics on how the secured message is being used can be of use for marketing or when the recipient is not entirely trustworthy. In this case, the sender can see who, when and where has got access to the secured message and can use the information to protect her/his interests.
- Imposing certain restrictions on the secured message and attachment usage is connected with the previous subject. For example, the sender wants the message to be available only during one hour after it has been opened for the first time, or wishes to distribute it only in a single country.
- Secured information cannot be viewed by standard tools until special modules that decrypt messages and attachments are installed. The developers of the protection services have provided for the use of third-party viewers. Such tools can be delivered as an attachment to the secured messages or as a download link in the message body. It may seem inconvenient at first, but a closer look shows that such functionality is very useful:
- When information is stored by the recipient in plain text form, it will be fully available to the third parties if they get access to it. If you want to store information in a secured format and not be concerned that somebody views it if it is stolen, it should not be decrypted when the recipient opens the message. The information can only be viewed by a special viewer in this case.
- Special viewer can restrict such features as printing, screen capture, etc.
In most cases, the viewer should only be installed once when the recipient opens the message for the first time.
- Support of mobile devices is an important part of the email message and attachment security system. Modern business tends to use mobile devices to remotely access corporate and confidential information. Both system types offer special applications compatible with mobile OS to view the secured emails on a tablet or a smartphone.
- All systems of the first type support Microsoft Outlook. Some, but not all, systems support Lotus Notes. As for the web services, each and all of them allow viewing secured messages only in a browser.
- A sender often sends an attachment along with the message. It is the attachment that contains confidential information. Therefore, the message body does not require protection, but the attachment does. Such an option is available with most, but not all, corporate systems. As for the web services, they operate in the same way as with the message body protection, i.e. the attachment is stored in a secured format by the provider, but becomes unprotected and can be viewed by anybody after it is downloaded to the client.
- Files of different formats can be attached to the message. However, the protection does not support all of the formats. The most popular format is pdf, because it is a general-purpose format and can contain text and graphics, as well as multimedia content. Therefore, pdf is a default format for the attachments in all systems. Few corporate systems support other formats, while web services do not support other formats at all.
- Protection against printing and grabbers (screen capture) is only available with the systems that have their own viewers. Web services do not provide for the feature. Corporate systems seldom have such a feature.
- Security of messages or attachments against being viewed when the user’s computer is accessed remotely is also rarely used, though it is necessary in some cases. Web services do not provide for the feature. Corporate systems seldom have such a feature.
- All corporate systems imply commercial usage. As for the web services, some of them provide free usage, but with limited functionality and for individual persons only.
The opinion of an expert
Madina Yunusova, Marketing director for StarForce Technologies:
We have analyzed the market during the development of our custom solution and have decided what methods would allow a client to achieve maximum effect:
- Fast and simple integration of the solution into the existing information system of an organization.
- Embedded DRM functionality to remotely control and secure messages and attachments.
- High cracking resistance level.
- Applying print control, disabling screen capture and securing email attachments are obligatory.
- To effectively manage the email correspondence, it is necessary to define its usage policy and obtain statistics on how the documents are viewed.
Our company uses all the above-mentioned methods in its solutions.
Conclusion
All the offers have very different features; however, corporate systems are more suitable for big and middle-sized organizations, while web services are more for individual persons and small companies. The number of the available options can satisfy the most demanding clients. In the present-day world, however, demanding much of the information protection is a guarantee of future security and peace of mind, rather than a drawback.
About StarForce Technologies
StarForce Technologies (www.star-force.com) is a leading vendor of information protection, copy protection and code obfuscation solutions for software, electronic content and audio/video files. Since 2000, StarForce has been successfully developing and implementing its state-of-the-art security solutions, providing copyright and intellectual property protection worldwide. Two of these solutions were transformed into StarForce cloud services: sfcontent.com protects e-Documents against illegal copying and distribution and sfletter.com secures emails.
StarForce is a reliable and responsible Technological Partner for enterprises potentially incurring losses due to cyber-gangs, hackers, software piracy, unauthorized data access and information leaks. StarForce’s customers are Russian Railways, Corel, 1C, Mail.ru, Aeroflot, SUN InBev Russia, AMD Labs, ATC International, MediaHouse, Russobit M, New Disc, Buka, Snowball, 2Play, GFI, CENEGA, Akella, etc.
Press contacts:
pr@star-force.com