cxo voice
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

What is email security? and its importance in securing enterprise networks

Exclusive Interview with Sundaresan Kanappan, VP and Country General Manager of Tech Data India

Deepa Sharma by Deepa Sharma
November 1, 2022
email security interview

Photo: Sundaresan Kanappan

Cybercrime cases have drastically increased in recent times. A report says 91% of cyber attacks start from email. Targeting via email is the most favorable method for cybercriminals to infiltrate your system and your organization’s IT infrastructure. In an exclusive interview with CXO VOICE, Sundaresan Kanappan, VP and Country General Manager of Tech Data India, explains various points related to email security, its importance, roles, how organizations should manage it to tackle emerging threats. 

What is the email security, and its role in securing enterprise networks?

Sundaresan Kanappan: On average, each of us receives about 100 emails daily, and globally about 300 billion emails are sent and received daily. With such high volumes, email is the number one vector for cyberattacks, with 91% of all cyberattacks starting via email.

Email security protects email accounts and communications from unauthorized access, loss of information, or compromise from malicious threats, including spam, malware, and phishing attacks. 

Because emails were designed to be as open and accessible as possible, they can be intercepted by any viewer. This is especially the case with enterprise networks, wherein emails being a popular mode of communication, are also a common entry point for cybercriminals. 

Email security combines tools such as Secure Email Gateway (SEG), Domain-based Message Authentication, Reporting & Conformance (DMARC), and email encryption solutions for enterprise networks that typically have large infrastructure setups.

It can also incorporate emerging technologies and techniques, such as Artificial Intelligence (AI) and Machine Learning (ML), to further strengthen email defense and resilience strategies. 

ADVERTISEMENT

What are the top email security threats for organizations, and how to tackle them?

Sundaresan Kanappan: Some of the top email security threats include: 

1. Phishing is the most prevalent type of email security threat, where attackers send a fraudulent email, often pretending to be a well-known and trusted brand. It is designed to trick individuals into disclosing sensitive personal information, including usernames, passwords, and credit card details.

According to the IC3 Internet Crime Report released by the FBI in March this year, phishing variants accounted for 69.4% of reported cybercrimes. The number of phishing attacks has tripled since 2020.

2. Ransomware attacks are the most public and high-profile email security threats, especially in incidents where large volumes of user data are stolen or where the services and operations of the target company are disrupted. Earlier this year, CISA, the FBI, NSA, and other international partners issued an advisory stating that ransomware groups have an increasing impact due to approaches targeting the cloud, managed service providers, industrial processes, and the software supply chain.

Ransomware is now a sophisticated industry with ‘professional’ organized crime groups offering ‘Ransomware-as-a-Service’ (RaaS) services for hire, including exploit kits and 24/7 support centers.

3. Business Email Compromise (BEC) attacks have become increasingly common and complex since the COVID-19 pandemic began, in tandem with the proliferation of remote work. No longer limited to just email, fraudsters use virtual meeting platforms (like Microsoft Teams or Zoom) to impersonate a CEO or CFO to instill a sense of trust, claiming that they are having audio or video problems (a common occurrence for remote workers) and then sending instructions via message or email to send confidential information or a wire transfer. These transfers are generally immediately placed into crypto wallets and moved around, making recovery of the funds incredibly difficult.

How to recognize malicious emails?

Sundaresan Kanappan: Some important signs end-users can look out for include: 

a. Inconsistencies in email addresses, URLs, and company domains: It is always important to be able to verify whether an email is actually from its apparent sender. Inconsistencies include email addresses that are different from the name on the account and domain names that are similar but not exactly the same.

b. Request for personal information: Most legitimate organizations will never ask for your personal information via the internet. For example, if an email supposedly from your bank asks for your bank account number, it should definitely raise a red flag.

c. Suspicious attachments: Even if an attachment is from a seemly trustworthy source, it is prudent to check the attachment or not to open the file if it seems suspicious. This is since malicious code or programmes can be embedded into attachments and installed once they are opened. 

d. Poor grammar: Some phishing attacks tend to originate from foreign countries where English is not the first language. Hence, keep a lookout for grammatical errors. 

Email security

Is the Application’s built-in security enough to tackle the security threats via email?

Sundaresan Kanappan: Traditional email security solutions tend to work on the outside by changing the Mail Exchanger record (MX record) and using technologies such as antivirus protection, data encryption, and spam filters to create a protective boundary around your inbox to not let any malware come through. 

Built-in security needs to be absolutely robust to deal with security threats via email. Given this scenario, Tech Data recently strengthened its security portfolio in partnership with MailGuard – a world leader in email security. This partnership allows Tech Data to add MailGuard 365 — a solution built by MailGuard in collaboration with the Microsoft team that is integrated natively in Azure, to protect the more than 345 million Microsoft 365 subscribers — to its cyber security go-to-market portfolio in the Asia Pacific and Japan region.

A world-first evolutionary approach, MailGuard 365 is the last email security engine, designed to target and stop email threats by re-scanning inbound emails after the Microsoft 365 security stack (including Microsoft Defender) has done its security threat assessment. 

How should organizations manage email security?

Sundaresan Kanappan: Adopting a multi-layered approach to email security is ideal. No single vendor can defend against every threat. If a business is using Microsoft 365, even with Defender, or Google Workspace, they should still deploy an additional specialist layer of email security to enhance their protection. Industry experts refer to it as a ‘defense-in-depth’ approach, and it’s what motivated MailGuard to co-build MailGuard 365 in collaboration with Microsoft engineers. Speed to detect and stop new threats is vital, and MailGuard 365 is up to 48 hours faster at blocking emerging zero-day threats. 

Additionally, businesses must take a holistic approach to their email security, like considering password management and best practices such as mandating multi-factor authentication and investing in cyber awareness training for their workforce.  

Please tell me about the recent Tech Data – MailGuard partnership.

Sundaresan Kanappan: With this partnership, Tech Data aims to support MailGuard in further strengthening its presence across the Asia Pacific (APAC) market. This will be realized through Tech Data’s capabilities and reach across the diverse APAC region. MailGuard365: MailGuard’s Integrated Cloud Email Security (ICES) solution will now be exclusively available in 6 countries across the APAC region: Hong Kong, India, Indonesia, Malaysia, Singapore, and Vietnam.

MailGuard365 is native to Microsoft, allowing Microsoft customers to activate MailGuard 365 from within Microsoft itself. Given that Tech Data is an indirect Microsoft CSP, this is another reason why MailGuard chose to partner with us. A solution like MailGuard365 also aligns with our holistic approach to cyber security and strengthens Tech Data’s cloud security and cybersecurity portfolios. 

How does Tech Data manage security across its offerings, including cloud services?

Sundaresan Kanappan: Tech Data’s partnerships with the world’s leading cloud security-as-a-service vendors ensure that our partners are able to provide their clients with industry-leading cybersecurity that features the most up-to-date and thorough services. This enables our partners to deliver cloud-based products for businesses of all sizes and needs, whether it is endpoints, email, or web protection.

Our extensive cloud services portfolio enables channel partners to assess, migrate, optimize, and manage customer workloads and applications to accelerate their transformation and modernize their IT environments. Tech Data works hand-in-hand with partners to provide the necessary level of expertise to support end-users in maximizing the benefits of cloud computing.

Our partnership with MailGuard is in line with Tech Data’s overall strategy of empowering Independent Software Vendors (ISVs) and other partners. ISVs, in particular, have intellectual property and vertical market solutions, which may require MailGuard 365-type embedded email security solutions. 

The inclusion of MailGuard into our portfolio also enables partners, especially those who are selling Microsoft, to drive better yields and generate higher revenue with existing customers. 

END.

Also Read: The Emergence of Spyware, Zero Click Attacks, Smishing, and Store Security

Deepa Sharma

Deepa Sharma

Deepa Sharma is CXOVoice’s Managing Editor, overseeing all coverage technology, cybersecurity, banking, and financial coverage. She can be reached at [email protected]

Related Posts

Johnson & Johnson Medtech
Press Release

Johnson & Johnson Medtech Partners with Qure.ai to Boost Early Detection of Lung Cancer

May 9, 2025
Ant International and Barclays
Finance

Ant International and Barclays Partner to Revolutionize Global Treasury Management with Advanced AI Technology

May 7, 2025
Microsoft Farmbeats
Technology

Microsoft and National FFA Expand FarmBeats for Students Program to Enhance Agricultural Education Across the U.S.

May 7, 2025
CEOs on AI
AI

CEOs Bet Big on AI: Navigating the Hurdles to Unlock Its Power

May 7, 2025
Asus TUF 500
Technology

Unleash Your Gaming Potential with the ASUS TUF Gaming Compact Desktop

May 6, 2025
IBM Lumen
Business

Revolutionizing AI: Lumen Technologies and IBM Partner to Unlock Scalable AI for Businesses

May 6, 2025
IBM Oracle
AI

IBM and Oracle Join Forces to Advance Agentic AI and Hybrid Cloud

May 6, 2025
Tech Mahindra and Fable Partner to Launch the ‘Mind Master’ Book Club Featuring Chess Grandmaster Viswanathan Anand
Press Release

Tech Mahindra and Fable Partner to Launch the ‘Mind Master’ Book Club Featuring Chess Grandmaster Viswanathan Anand

May 6, 2025
Load More
ADVERTISEMENT

Latest Updates

Johnson & Johnson Medtech

Johnson & Johnson Medtech Partners with Qure.ai to Boost Early Detection of Lung Cancer

by Businesswire Desk
7 minutes ago

Ant International and Barclays

Ant International and Barclays Partner to Revolutionize Global Treasury Management with Advanced AI Technology

by News Desk
2 days ago

Microsoft Farmbeats

Microsoft and National FFA Expand FarmBeats for Students Program to Enhance Agricultural Education Across the U.S.

by News Desk
2 days ago

CEOs on AI

CEOs Bet Big on AI: Navigating the Hurdles to Unlock Its Power

by Deepa Sharma
2 days ago

Oracle Oracle APSSDC

Oracle Partners with APSSDC to Empower 400,000 Students in Andhra Pradesh with Cutting-Edge Digital Skills Training

by News Desk
2 days ago

Asus TUF 500

Unleash Your Gaming Potential with the ASUS TUF Gaming Compact Desktop

by News Desk
3 days ago

Expert Views

Molly Sands AI
AI

AI RIP: 5 Things Knowledge Workers Will Say ‘Sayonara’ to in the Next Decade

March 8, 2025
multi cloud
Cloud

Multi-Cloud Made Simple: Strategies for Smart Business Management

March 5, 2025
Soft Skills
Opinion

Soft Skills and Technical Know-How: A Winning Combination in the Tech Industry

March 4, 2025
Digital Freedom
Cyber Security

Your Data, Their Gold: The Silent Battle for Digital Freedom

February 25, 2025
LLM in India
AI

Why A Homegrown LLM Is the Next Big Leap for India

February 22, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-
Interview on Counterfeit products with Nikhil Narayan
Leaders Talk

Advancements in ML & AI made it possible to detect counterfeit products in real-time, says Nikhil Narayan

-
Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami
Leaders Talk

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami

-
AI chatbots, Prasanna-Kumar
Leaders Talk

Can AI chatbots enhance customer experience and reduce the cost of serving customers?

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release

Copyright © 2025 CXOVoice - All Right Reserved