Latest Research

Select and Implement an Email Security Gateway

The emails you want are only the tip of the iceberg compared to what you get.

Book This Workshop

Immature and underdeveloped Email Security Gateways result in:

  • Ineffective email filtering.
  • Potential data leakage or theft.
  • Decreases in productivity.
  • Limited network visibility.

The right Email Security Gateway can result in:

  • Increased enterprise information security.
  • Increased productivity of the average employee.
  • Protection of valuable intellectual property, financial information or other valuable or sensitive information.

Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book Now

Module 1: Gather and align requirements for the Email Security Gateway

The Purpose

  • Conduct current state assessment to gain visibility into current email security maturity and capability levels.
  • Collect organizational and architectural requirements to narrow ESG options.
  • Collect security requirements to understand your risk appetite.
  • Conduct requirements assessment .

Key Benefits Achieved

  • Realize the necessity for an email gateway.
  • Identify the specific requirements that an email gateway must carry out for your organization.
  • Understand gateway requirements to understand deployment options. 

Activities: Outputs:
1.1 Know the volume of your security incidents and the volume of your email and related statistics.
  • Identified email volumes and related email based security incidents
1.2 2Identify all architectural, organizational, security and other requirements of your ESG.
  • Defined requirements of ESG solutions
1.3 Determine what email security solutions your organization needs.
  • Identify relevant features of your ESG

Module 2: Capture costs and benefits of Email Gateway

The Purpose

  • Understand benefits of various deployment options.
  • Determine costs of implementation.
  • Develop a financial analysis of an Email Gateway implementation.

Key Benefits Achieved

  • Calculate the total cost of ownership (TCO) and the return on investment (ROI) of an email gateway implementation.

Activities: Outputs:
2.1 Determine inputs for TCO calculations.
  • Determine your TCO and ROI of your ESG
2.2 Identify incident related costs/losses for ROI calculations.
  • Understand how to effectively use your TCO and ROI within your ESG project
2.3 Identify organization email information for ROI calculation.

Module 3: Evaluate Email Gateway solutions and vendor selection

The Purpose

  • Understand the email gateway product landscape.
  • Determine key advanced features to meet your organization’s requirements.
  • Prepare to evaluate potential vendors.

Key Benefits Achieved

  • Understand what products best meet your organization’s requirements.
  • Prepare proper documentation, such as an RFP, as well as a vendor demo script to comprehensively evaluate your shortlist of chosen vendors.

Activities: Outputs:
3.1 Understand the ESG vendor landscape.
  • Create a shortlist of vendors
3.2 Determine a shortlist of vendors.
  • Create an RFP.
3.3 Create an RFP.
  • Prepare a demo script
3.4 Prepare a demo script.

Module 4: Prepare for Email Gateway implementation and continued operations

The Purpose

  • Determine your deployment method.
  • Create incident response team.
  • Create an email attack information page.
  • Maintain information in central document.

Key Benefits Achieved

  • Understand key consideration points for the deployment of an email gateway.
  • Develop an incident response team.
  • Construct an email attack information page.
  • Understand what is required for the maintenance and sustainability of an email gateway while developing processes to ensure this.

Activities: Outputs:
4.1 Develop supporting policies.
  • Deployment Roadmap
4.2 Develop a stakeholders communication plan.
4.3 Develop education plan on proper email security.
  • Email attack information page
4.4 Manage vendor contracts and relationships, vendor risk and vendor performance.
  • Incident response team
4.5 Develop ESG continuing governance plans.
  • Email gateway business case and operations plan
4.6 Create an computer incident response team (CIRT).
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019