Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity

    Blazing an E-Mail Audit Trail

    Written by

    Michael Caton
    Published November 1, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      With an ever-rising tide of corporate e-mail, companies face numerous difficulties as they attempt to meet regulatory requirements aimed at ensuring their e-mail communications are auditable.

      As part of these challenges, companies must deploy products and technologies for creating policies, ensuring secure delivery of content, tracking communications to prove that they are auditable and audited, and retrieving archived messages as needed. Complicating these processes is the need to also deal with communications that are outside corporate e-mail, including instant messaging, Web-based e-mail services and Web-based discussion boards.

      Policies are the key element for ensuring that organizations meet regulatory requirements. In addition, policies help ensure that companies follow specific workflow procedures and that the resulting actions are auditable.

      Because policy engines can be found in many technologies and products in the e-mail delivery and archival chain, companies need to figure out how best to tap one or two policy engines to fill multiple gaps.

      For example, to determine if users are sending Social Security numbers in clear text, many policy engines can be configured to look for numerical data in “XXX-XX-XXXX” format. If an e-mail message contains such data, the policy engine can be configured to take action such as returning it to the sender with an explanation of the policy violation or automatically encrypting the message.

      Companies can tap workflow management tools, such as Liquid Machines Inc.s Email Control, which works closely with Microsoft Corp.s Exchange to manage message workflow between the user and the Exchange server. With Email Control, rules can be used to ensure messages are encrypted or to limit user actions permitted on forwarding or printing messages. These internal systems can make it easier to manage cross-group communications in an organization.

      Another option is to use a perimeter-oriented product, such as messaging gateway appliances from IronPort Systems Inc. or CipherTrust Inc., to enforce policy. These systems guard inbound and outbound communications and can work with other products to automate mail functions.

      /zimages/6/28571.gifClick here to read eWEEK Labs reviews of three messaging gateway appliances.

      A growing number of vendors are working to integrate compliance tools with instant messaging networks, but monitoring IM and other communications is more difficult and involves blocking sites or more actively monitoring individual user behavior.

      Orchestria Corp.s Active Policy Management 3.0, for example, looks at unstructured text-based communications as well as at file activity using client-based software and server-based administration tools.

      Enterprises have secured their cross-domain e-mail communications for years using S/MIME (Secure Multipurpose Internet Mail Extension). However, data security regulations such as HIPAA (Health Insurance Portability and Accountability Act) focus on securing recipients and require companies to invest in encryption and public-key technologies that improve message encryption. These data security measures mandate that communications are encrypted, at a minimum, from the senders gateway to the recipients e-mail client—and preferably all the way from the senders e-mail client to the recipients e-mail client.

      Applications such as PostX Corp.s Trusted Enterprise and Voltage Security Inc.s SecureMail deliver secure content using public-key infrastructures on a Web platform.

      /zimages/6/28571.gifTo read reviews of Trusted Enterprise and SecureMail, click here.

      The user experience with these products doesnt differ much from going to a Web site to securely view data and rids companies of the burden of hosting data securely on Web site. This is because the content sent to the user in e-mail is the encrypted data.

      A key element of managing e-mail-based communications is providing the tools necessary to ensure that communications comply with policies and that steps are in place to take corrective action when communications deviate from policies.

      There are two e-mail auditing approaches to consider: flagging messages that potentially violate policy for corrective action, or sampling messages to ensure that communications are being monitored for potential violations of policy.

      When flagging messages for further review, multilevel auditing is required to ensure that auditing occurs with consistency and that proper follow-up procedures for rectifying violations can be easily defended in case questions of discovery occur.

      For the second auditing choice, companies must sample messages and make them available for easy discovery in the event of external audits on policies to demonstrate that they are monitoring communications that should be monitored and that e-mail does not include any violations.

      Technical Analyst Michael Caton can be reached at michael_caton@ziffdavis.com.

      /zimages/6/28571.gifCheck out eWEEK.coms Messaging & Collaboration Center for more on IM and other collaboration technologies.

      /zimages/6/77042.gif

      Be sure to add our eWEEK.com messaging and collaboration news feed to your RSS newsreader or My Yahoo page

      Michael Caton
      Michael Caton

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×