Download presentation
Presentation is loading. Please wait.
1
Email Threat Scan (ETS) for Office 365
Partner Sales Training Hi and welcome to our presentation on the Barracuda Threat Scan. My name is <<PRESENTER>>, <<TITLE>> and I’m here with Asaf Cidon, VP of Content Security Services and we’ll spend the next 20 minutes going over how you can use ETS to detect malware and advanced threats in your customer’s environment.
2
“There are two types of organizations: Those who have been breached and those who have been breached but don’t know it yet.” James Scott, Senior Fellow at ICIT Sadly, this is an all too familiar sentiment in the world today. There are two types of organizations, the breached and those who are breached but don’t know it yet.
3
Cloud overtakes on-premises in 2017
And this is especially important when you consider the trend with . This is a graph from a Radicati report that shows that we’re reaching an inflection point soon… in 2017, cloud-based is going to be more dominant that on-premises based … and this trend is only increasing. We’re currently at about 55% on-premises to 45% cloud but by 2020, the industry is going to shift dramatically to 70% cloud. Radicati Cloud Business Market
4
The wrong ‘up and to the right’
Now with this shift, we have to consider the increase in breaches over time. From this year’s Verizon Data Breach Investigation Report, hacking, malware, and social (which includes phishing and ransomware) are drastically on the rise. These are advanced threats that are moving up and to the right. [[ASAF TO ADD COLOR]] Verizon 2016 Data Breach Investigations Report
5
Why should customers get scanned?
Advanced threats are dangerous and on the rise Only a layered security approach that uses Advanced Threat Detection can mitigate the risk Threat Scan is a free service to assess risks from advanced threats and remediate them So when customers asked why they should get scanned, the answer is very simple: Advanced threats are dangerous and on the rise. Organizations of all sizes are getting attacked daily and IT departments need to be vigilant against these threats. To mitigate these new threats , only a layered security approach that uses Advanced Threat Detection will work. Meaning: It is important to augment Office 365’s built-in protections with additional security layers. So to address these advanced threats and the trends that are guiding customer’s deployments, we’re offering a free service: The Barracuda Threat Scan to assess risks from advanced threats and remediate them.
6
1000s 92% >50 Threats everywhere Office 365 mailboxes scanned
Percentage of accounts with threats Threats found per account In the short time since we’ve launched ETS, we’ve already scanned thousands of mailboxes and the results are intriguing and not altogether surprising. Out of the thousands of mailboxes we’ve scanned, just over 90% of accounts in Office 365 contain malware. To be clear, if you are using Office 365 and are not using any advanced security solution, you are already very likely harboring a threat! And of these accounts that were infected, on average, they contained greater than 50 threats per account. So this is a problem that affects everyone everywhere and you need to be ready.
7
Boost partner role in Office 365 discussion
What Demonstrate value of Advanced Threat Detection How Onboard customers in two clicks Provide personalized risk assessment Why Drive new revenue from Essentials Establish partner as advisor in threat remediation To secure against these advanced threats, we offer Barracuda Essentials for Office 365 which blocks threats in real-time so malware never reach the company’s mailbox. It sandboxes any suspicious attachments and then “detonates” it in a sandbox environment to detect malware. Now when speaking to customers, they sometimes aren’t quite sure of the value of Advanced Threat Detection or even understand how they are at risk. Addressing this concern is what Threat Scan provides; a quick and easy way to illustrate what threats they already have in their environment. It only takes a minute to run the scan and within a day, we send them a personalized risk assessment report that details the risks already in their environment. The thought process is that once we demonstrate that there is malware in their environment, using Essentials for Office 365 is the next logical step to assure they are secure moving forward. It also ensures the partner is the advisor in any threat remediation discussion.
8
Scan – Educate – Prevent
Generate threat report Educate customer on risks Prevent threats by selling Essentials Scan mailboxes for threats It’s really simple and we have three steps to the process… scan, educate, and prevent. Let’s go over scan first.
9
Scan – Educate – Prevent
Generate threat report Educate customer on risks Prevent threats by selling Essentials Scan mailboxes for threats The first steps is the scan mailboxes for threats and all we need is an Office 365 admin account and a customer that isn’t currently using Essentials for Office 365.
10
Sign Up in Two Minutes How to scan customer? Call customer
Send your custom sign-up link: ADDRESS Show how easy it is for them to sign up Send us an once customer is signed up: Here’s the process and when we say sign up in two minutes, we’re being generous as it is more like 30 seconds. We call the customer and tell them to go to custom scan.barracuda.com link and sign up. The custom link is so that we can track the customer back to a specific partner. If they already have a Barracuda account because they have another device, they can simply log in. They then need to provide an admin account username and password for Office 365 and that’s it… the scan will start running immediately.
11
Giving permissions to Office 365 account
Data scanned and removed from Barracuda servers within seconds Similar to ATD mechanism for Security Service Permissions can be revoked at anytime Data privacy solution brief When customers enter the credentials for their Office 365 account, they can revoke permissions at any time they see fit. And we don’t keep any of the data on our servers… we scan it and remove it. It’s a similar process to our ATD mechanism of where we inspect and detonate any potential threat in our sandbox so the customer doesn’t have to worry about the threat. If customers are curious, we do have a data privacy solution brief that is available on the website or we can send to any partner after this webinar… just let us know.
12
Scan Demo So now, I would like to hand the presentation over to Asaf who is going to go through the demo of how to run a scan. Asaf… [[ASAF TO RUN DEMO]]
13
Scan – Educate – Prevent
Generate threat report Educate customer on risks Prevent threats by selling Essentials Scan mailboxes for threats OK, so we saw how easy it was to run the scan… the next step is to call the customer to go over the threat report with them.
14
Follow Up with Customers
We will send you the scan results (typically within 24 hours) Don’t forget to us after running the scan Schedule call with the customer Review results during call Typically, it takes about 24 hours for a scan to complete and we will send it to them once it is done. The next step is to schedule a call with the customer so we can review the results with them and talk about next steps.
15
Educate Demo I’d like to hand it back to Asaf who will run through our ‘Educate’ demo. [[ASAF TO RUN DEMO]]
16
Educate customers on risks
What if customers find false positives Some applications behave like malware Extremely low false positive rate Advanced threats can cause a lot of damage Advanced threats in deleted/junk folder s may have been read before being deleted Types of threats Sandboxing identifies how threats behave, not their specific type In some cases, a customer may point out that we found a false positive… that’s a perfectly reasonable comment but we do want to point out that some applications behave like malware in the way they function. And while this is the case, we do have an extremely low false positive rate for risk evaluation. The message here is that these threats can cause a great deal of damage in a short period of time so a false positive is more tolerable than malware making it’s way into your network. Another question we may get is ‘why are we scanning the deleted and junk folder?’ To get a complete picture of the threat landscape, we have to scan the entire mailbox because malware may have been opened prior to its deletion. Some customers are also looking for the specific type of threat but keep in mind that sandboxing identifies how they behave, not specifically what they are. In this case, we want to demonstrate that a certain type of threat is present.
17
Scan – Educate – Prevent
Generate threat report Educate customer on risks Prevent threats by selling Essentials Scan mailboxes for threats OK, we’ve come to the third component of our message… prevent.
18
Prevent Threats with Barracuda Essentials
Barracuda Essentials for Office 365 blocks threats in real-time Threats never reach the company’s mailbox Utilizes sandboxing technology to detonate threats Preventing ongoing threats Compatible with on-premises and hybrid configurations Central admin with Barracuda Cloud Control Prevention is completely about using Essentials for Office 365 to block threats from occurring as they never reach the company’s inbox. And for that, Essentials for Office 365 is the ideal solution to prevent malware from entering your customer’s environment. Essentials offers cloud-based multi-layer security, archiving, and backup for Office 365 that compliments all Office 365 plans.
19
Prevention Delete threats from mailbox Wipe infected endpoints
Check if company s are publicly visible Now once your customer has selected Essentials for Office 365 as the solution to secure their cloud-based , there’s the matter of what to do with the threats that are in your mailbox that Threat Scan picked up… Delete them… delete all the threats to ensure that a threat isn’t detonated. Also check if the company addresses are public. This is an easy way for hackers to target specific s as they don’t have to guess at what people’s addresses are… they can target specific corporate officers for a greater effect.
20
Moving Forward OK, so moving forward, here is my ask of everyone today.
21
Next Steps Select two customers for an Email Threat Scan
Using Office 365 Above 25 seats Mindful of security Call your Barracuda rep to walk you through the scans Schedule time with the customer to review the scans Please select two customers (or more) that you would like to perform the scan. They need to be running Office 365 and have more than 25 mailboxes or user accounts and they should be mindful of security. Call us… we will get on the calls with you and jointly call your customer to go over the scan. And then schedule time with your customer so we can review the details of the scan and go over the report. Once again, we’ll be on the call with you and we can jointly discuss the best options for your customer’s security needs. That’s it and we’re looking forward to hearing from you. We will now open it up to questions from the attendees.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.