cxo voice
  • Business
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Business
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

What is email security? and its importance in securing enterprise networks

Exclusive Interview with Sundaresan Kanappan, VP and Country General Manager of Tech Data India

Deepa Sharma by Deepa Sharma
November 1, 2022
A A
email security interview

Photo: Sundaresan Kanappan

Cybercrime cases have drastically increased in recent times. A report says 91% of cyber attacks start from email. Targeting via email is the most favorable method for cybercriminals to infiltrate your system and your organization’s IT infrastructure. In an exclusive interview with CXO VOICE, Sundaresan Kanappan, VP and Country General Manager of Tech Data India, explains various points related to email security, its importance, roles, how organizations should manage it to tackle emerging threats. 

What is the email security, and its role in securing enterprise networks?

Sundaresan Kanappan: On average, each of us receives about 100 emails daily, and globally about 300 billion emails are sent and received daily. With such high volumes, email is the number one vector for cyberattacks, with 91% of all cyberattacks starting via email.

Email security protects email accounts and communications from unauthorized access, loss of information, or compromise from malicious threats, including spam, malware, and phishing attacks. 

Because emails were designed to be as open and accessible as possible, they can be intercepted by any viewer. This is especially the case with enterprise networks, wherein emails being a popular mode of communication, are also a common entry point for cybercriminals. 

Email security combines tools such as Secure Email Gateway (SEG), Domain-based Message Authentication, Reporting & Conformance (DMARC), and email encryption solutions for enterprise networks that typically have large infrastructure setups.

It can also incorporate emerging technologies and techniques, such as Artificial Intelligence (AI) and Machine Learning (ML), to further strengthen email defense and resilience strategies. 

ADVERTISEMENT

What are the top email security threats for organizations, and how to tackle them?

Sundaresan Kanappan: Some of the top email security threats include: 

1. Phishing is the most prevalent type of email security threat, where attackers send a fraudulent email, often pretending to be a well-known and trusted brand. It is designed to trick individuals into disclosing sensitive personal information, including usernames, passwords, and credit card details.

According to the IC3 Internet Crime Report released by the FBI in March this year, phishing variants accounted for 69.4% of reported cybercrimes. The number of phishing attacks has tripled since 2020.

2. Ransomware attacks are the most public and high-profile email security threats, especially in incidents where large volumes of user data are stolen or where the services and operations of the target company are disrupted. Earlier this year, CISA, the FBI, NSA, and other international partners issued an advisory stating that ransomware groups have an increasing impact due to approaches targeting the cloud, managed service providers, industrial processes, and the software supply chain.

Ransomware is now a sophisticated industry with ‘professional’ organized crime groups offering ‘Ransomware-as-a-Service’ (RaaS) services for hire, including exploit kits and 24/7 support centers.

3. Business Email Compromise (BEC) attacks have become increasingly common and complex since the COVID-19 pandemic began, in tandem with the proliferation of remote work. No longer limited to just email, fraudsters use virtual meeting platforms (like Microsoft Teams or Zoom) to impersonate a CEO or CFO to instill a sense of trust, claiming that they are having audio or video problems (a common occurrence for remote workers) and then sending instructions via message or email to send confidential information or a wire transfer. These transfers are generally immediately placed into crypto wallets and moved around, making recovery of the funds incredibly difficult.

How to recognize malicious emails?

Sundaresan Kanappan: Some important signs end-users can look out for include: 

a. Inconsistencies in email addresses, URLs, and company domains: It is always important to be able to verify whether an email is actually from its apparent sender. Inconsistencies include email addresses that are different from the name on the account and domain names that are similar but not exactly the same.

b. Request for personal information: Most legitimate organizations will never ask for your personal information via the internet. For example, if an email supposedly from your bank asks for your bank account number, it should definitely raise a red flag.

c. Suspicious attachments: Even if an attachment is from a seemly trustworthy source, it is prudent to check the attachment or not to open the file if it seems suspicious. This is since malicious code or programmes can be embedded into attachments and installed once they are opened. 

d. Poor grammar: Some phishing attacks tend to originate from foreign countries where English is not the first language. Hence, keep a lookout for grammatical errors. 

Email security

Is the Application’s built-in security enough to tackle the security threats via email?

Sundaresan Kanappan: Traditional email security solutions tend to work on the outside by changing the Mail Exchanger record (MX record) and using technologies such as antivirus protection, data encryption, and spam filters to create a protective boundary around your inbox to not let any malware come through. 

Built-in security needs to be absolutely robust to deal with security threats via email. Given this scenario, Tech Data recently strengthened its security portfolio in partnership with MailGuard – a world leader in email security. This partnership allows Tech Data to add MailGuard 365 — a solution built by MailGuard in collaboration with the Microsoft team that is integrated natively in Azure, to protect the more than 345 million Microsoft 365 subscribers — to its cyber security go-to-market portfolio in the Asia Pacific and Japan region.

A world-first evolutionary approach, MailGuard 365 is the last email security engine, designed to target and stop email threats by re-scanning inbound emails after the Microsoft 365 security stack (including Microsoft Defender) has done its security threat assessment. 

How should organizations manage email security?

Sundaresan Kanappan: Adopting a multi-layered approach to email security is ideal. No single vendor can defend against every threat. If a business is using Microsoft 365, even with Defender, or Google Workspace, they should still deploy an additional specialist layer of email security to enhance their protection. Industry experts refer to it as a ‘defense-in-depth’ approach, and it’s what motivated MailGuard to co-build MailGuard 365 in collaboration with Microsoft engineers. Speed to detect and stop new threats is vital, and MailGuard 365 is up to 48 hours faster at blocking emerging zero-day threats. 

Additionally, businesses must take a holistic approach to their email security, like considering password management and best practices such as mandating multi-factor authentication and investing in cyber awareness training for their workforce.  

Please tell me about the recent Tech Data – MailGuard partnership.

Sundaresan Kanappan: With this partnership, Tech Data aims to support MailGuard in further strengthening its presence across the Asia Pacific (APAC) market. This will be realized through Tech Data’s capabilities and reach across the diverse APAC region. MailGuard365: MailGuard’s Integrated Cloud Email Security (ICES) solution will now be exclusively available in 6 countries across the APAC region: Hong Kong, India, Indonesia, Malaysia, Singapore, and Vietnam.

MailGuard365 is native to Microsoft, allowing Microsoft customers to activate MailGuard 365 from within Microsoft itself. Given that Tech Data is an indirect Microsoft CSP, this is another reason why MailGuard chose to partner with us. A solution like MailGuard365 also aligns with our holistic approach to cyber security and strengthens Tech Data’s cloud security and cybersecurity portfolios. 

How does Tech Data manage security across its offerings, including cloud services?

Sundaresan Kanappan: Tech Data’s partnerships with the world’s leading cloud security-as-a-service vendors ensure that our partners are able to provide their clients with industry-leading cybersecurity that features the most up-to-date and thorough services. This enables our partners to deliver cloud-based products for businesses of all sizes and needs, whether it is endpoints, email, or web protection.

Our extensive cloud services portfolio enables channel partners to assess, migrate, optimize, and manage customer workloads and applications to accelerate their transformation and modernize their IT environments. Tech Data works hand-in-hand with partners to provide the necessary level of expertise to support end-users in maximizing the benefits of cloud computing.

Our partnership with MailGuard is in line with Tech Data’s overall strategy of empowering Independent Software Vendors (ISVs) and other partners. ISVs, in particular, have intellectual property and vertical market solutions, which may require MailGuard 365-type embedded email security solutions. 

The inclusion of MailGuard into our portfolio also enables partners, especially those who are selling Microsoft, to drive better yields and generate higher revenue with existing customers. 

END.

Also Read: The Emergence of Spyware, Zero Click Attacks, Smishing, and Store Security

Deepa Sharma

Deepa Sharma

Deepa Sharma is CXOVoice’s Managing Editor, overseeing all coverage technology, cybersecurity, banking, and financial coverage. She can be reached at [email protected]

Related Posts

SAP and TCS
News

SAP Forge Five-Year Partnership with TCS to Transform its IT Landscape

November 28, 2025
Wipro and IISc
Business

Wipro Partners with IISc to Drive Innovation in Quantum Computing and Advanced AI Technologies

November 27, 2025
SoftBank Acquisition of Ampere
Business

SoftBank Completes Acquisition of Chipmaker Ampere Computing

November 26, 2025
HCLTech and AWS
Finance

HCLTech and AWS Join Forces to bring autonomous, AI-powered solutions for financial services industry

November 26, 2025
Meta to Deploy Google TPUs
Technology

Meta Platforms Plans to Deploy Google TPUs in Its Data Centres by 2027

November 25, 2025
Tech Mahindra AWS Generative AI Competency
Business

Tech Mahindra Achieves AWS Generative AI Competency

November 25, 2025
Vodacom Google Cloud
Business

Vodacom Partners with Google Cloud to Accelerate Digital Transformation and AI Adoption in Africa

November 25, 2025
Indian Businesses AI
Business

93% of Indian Businesses Expect AI ROI Within Three Years, Finds SAP’s Value of AI Report 2025

November 25, 2025
Load More
ADVERTISEMENT

Latest Updates

SAP and TCS

SAP Forge Five-Year Partnership with TCS to Transform its IT Landscape

by Deepa Sharma
2 days ago

Wipro and IISc

Wipro Partners with IISc to Drive Innovation in Quantum Computing and Advanced AI Technologies

by Deepa Sharma
3 days ago

SoftBank Acquisition of Ampere

SoftBank Completes Acquisition of Chipmaker Ampere Computing

by Arshi Khan
4 days ago

HCLTech and AWS

HCLTech and AWS Join Forces to bring autonomous, AI-powered solutions for financial services industry

by Deepa Sharma
4 days ago

Meta to Deploy Google TPUs

Meta Platforms Plans to Deploy Google TPUs in Its Data Centres by 2027

by Deepa Sharma
5 days ago

Tech Mahindra AWS Generative AI Competency

Tech Mahindra Achieves AWS Generative AI Competency

by News Desk
5 days ago

Expert Views

India's Cybersecurity ecosystem
Cyber Security

Inside India’s $20 Billion Cybersecurity Ecosystem: Growth, Challenges, and the Road Ahead

November 11, 2025
From Coaches to Control Rooms: 5 Trends Shaping Railway Smart Video Storage
Opinion

From Coaches to Control Rooms: 5 Trends Shaping Railway Smart Video Storage

November 8, 2025
AI Underwriter
AI

Why AI is the Underwriter’s Strongest Ally

October 30, 2025
agentic AI threats
Cyber Security

Top 10 agentic AI threats, and how to defend against them

October 17, 2025
Your Face, Your Data: The Hidden Risks of Uploading to AI Tools
Cyber Security

Your Face, Your Data: The Hidden Risks of Uploading to AI Tools

October 7, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

NewgenONE
Interview

Reimagining Enterprise Transformation: Varun Goswami on the Future of NewgenONE and AI-Driven Automation

-
Jagat Shah, Chairman & CEO of MITSUMI Group
Leaders Talk

Leadership in Emerging Markets: Exclusive Interview with Jagat Shah, Chairman & CEO of MITSUMI Distribution

-
Tokenization
Interview

Revolutionizing Finance: An Exclusive Interview with Sid Ugrankar, Co-founder of Qila.io on the Future of Blockchain and Tokenization

-
Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-

Entrepreneur

Persistent Gender Bias Clouds Perceptions of Leadership in Tech: Study Finds

Top Leadership Skills Entrepreneurs Need in the Age of AI

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • News
  • Business
  • Technology
  • Cyber Security
  • Opinion
  • Leaders Talk

Copyright © 2025 CXOVoice - All Right Reserved