Solved

Antispam third party service security

Posted on 2014-10-21
4
148 Views
Last Modified: 2014-10-27
Hello All,

We are trying to implement an Antispam cloud service. All of our inbound emails will be passing through them first and then relayed to us.

I am a little concern if they will be holding a copy of our emails somewhere and wanted to know if there is anything that I can ask them to provide to us in order to assure confidentiality, something that will also serve us to provide to our IT auditors in the future.

Any ideas will be greatly appreciated.

Thanks!
0
Comment
Question by:LuiLui77
  • 2
4 Comments
 
LVL 28

Accepted Solution

by:
jhyiesla earned 500 total points
ID: 40394443
Basically you need to do just what you said - ask them if they are a store and forward service or just a forward service.  Then ask for documentation showing proof of their statement and I'd consider putting it into the contract if possible. If they are going to store them at all and you're OK with that - which isn't necessarily a bad thing, you need some signed documentation showing the level of security they have on their systems.  As  company we usually write these kinds of things either into the contracts or as a part of a Business Associate agreement. If they don't offer what you need or can't provide the signed documentation or you have some uneasiness about them, I'd move on to another service.
0
 

Author Comment

by:LuiLui77
ID: 40394533
Great advise, thank you jhyiesla!

I will be asking them for it.
0
 
LVL 25

Expert Comment

by:Mohammed Khawaja
ID: 40395083
We are using Fusemail where they not only provide anti-spam and anti-virus but they provide web browser access to email functionality in an event of your in-house mail failure.  Look at their website for email security and email continuity features so that you could ask for same thing from your provider.  Their website is www.fusemail.com
0
 

Author Closing Comment

by:LuiLui77
ID: 40406645
Hello All,

All documents need were provided. I had to sign an NDA though, which it sounds logical.

Thanks to you all!
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

On Beyond Tools A conversation I recently had with the DevOps manager of a major online retailer really made me think about DevOps monitoring tools (https://www.onpage.com/devops-incident-management-tool/). The manager and I discussed how sever…
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question