• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Is Your Email Safe from Cyberattacks?

Email-based cyberattacks are on the rise; enterprises need cloud-based protection solutions.

April 24, 2019 Lisa Montgomery 2 Comments

cyberattacks

Email may seem an unlikely pipeline for cyberattacks, but according to recent analysis from Frost & Sullivan, “Global Email Security Market, Forecast to 2022,” it has become the channel of choice for delivering malware and malware-less attacks, and hackers have begun to employ social engineering techniques for deception and impersonation.

Due to the rising frequency and sophistication of threats, email security grew year on year (YoY) to 11.5 percent in 2017 to touch $2.24 billion. The momentum continued into 2018, with revenues increasing 15.9 percent YoY to $2.59 billion. By 2022, the market is anticipated to be worth $3.58 billion, growing at a compound annual growth rate (CAGR) of 9.9 percent.

 

The Problem

Why has email become such a popular medium for hackers? The proliferation of user devices, a mix of device ownership models, always-connected work lifestyles and, above all, the use of cloud-based mailbox services are adding new levels of complexity to email security.

 

 

The Solution

“To tap the opportunities in this market, vendors need to innovate cloud-based solutions as well as augment Office 365 and other cloud email services like Google G-Suite. They will also be looking to build out global data centers to meet data privacy regulations, strengthen cloud resilience, and engage with public cloud (AWS, Azure) for higher scalability,” advises Tony Massimini, senior industry analyst, Digital Transformation. “Furthermore, they may invest in a global threat intelligence network in order to leverage threat intelligence and analytics for advanced threat detection and other functions for email security.”

 

“Email security has been a crowded and highly fragmented market, but with customers demanding integrated solutions and a single pane of glass, vendors are exploring partnership and consolidation options,” notes Massimini. “Already, vendors like Mimecast offer a fully integrated suite of proprietary cloud services, while the Symantec Email Security solution tightly integrates with security environments via the Symantec Integrated Cyber Defense platform.

 

For comprehensive email security, Frost & Sullivan says the following items need to be addressed when developing solutions:

  • Incorporating more automation to compensate for the shortage of skilled security professionals.
  • Complying with data privacy regulations, such as General Data Protection Regulation(GDPR).
  • Focusing on malware-less threat detection, threat analytics, and behavioral analysis. Email security awareness training is important.
  • Developing data loss prevention (DLP), as well as detection and remediation technologies for outbound email.
  • Leveraging email security across the security suite.
  • Innovating cloud security and augmenting Office 365 and other cloud email services.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cloud, Cyber Attacks, Cyber Security

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Trackbacks

  1. Is it Time to Get Rid of Ad Blocking Software? - My TechDecisions says:
    May 1, 2019 at 2:00 pm

    […] Related: Is Your Email Safe From Cyberattacks? […]

    Reply
  2. Data Breaches: An Inside Job? - My TechDecisions says:
    May 3, 2019 at 2:00 pm

    […] used to be that we worried mostly about cyberattacks from outside sources. This type of threat still exists, no doubt, but becoming more troubling for […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.