Specifically for email security, most of the appliances out there focus on inbound email scanning (i.e. antispam)...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
and some rudimentary outbound scanning for compliance purposes (such as to stop personal or credit card data from leaking). Some also include email encryption capabilities to protect data that can't be sent in the clear.
For enterprises, deciding on an appliance has a lot to do with scale and granularity. Many of the lower-end appliances will not be able to scale up to enterprise traffic dynamics, so test the specific environment to make sure the device can scale adequately. Secondly, if there are detailed policies or data formats the company needs to deal with, then a higher-end product may be in order.
Finally, as opposed to trying to figure out what class of appliance to implement, consider a managed service to make scalability and uptime the service provider's responsibility.
- Will Web application security vendor mergers present better opportunities for buyers?
- Learn best practices for application-level firewall deployment.
Dig Deeper on Security Industry Market Trends, Predictions and Forecasts
Related Q&A from Mike Rothman
In the world of security certifications, what is the GISP and how alike is it to the CISSP? In this security management expert response, learn about ...continue reading
Depending on your enterprise, it may or may not be necessary to utilize a QSA. In this security management expert response, learn how to determine ...continue reading
When developing software securely, what role does gap analysis play? In this security management expert response, learn how to implement gap analysis...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.