![]() |
As an IT manager, your professional life is a balancing act in which you weigh the needs of your department against the reality of your budget. The range of potential purchases that makes up your budget proposal includes "critical" products, as well as not-so-urgent pet projects. Before you finalize next year's capital budget, better be sure you've included funds for e-mail encryption in addition to virus scanning and content filtering.
E-mail security encompasses a wide variety of initiatives that attempt to reduce risk to employees, IT networks, intellectual property and customers. Recent legislation has forced businesses to implement various e-mail security initiatives that might not have been deployed voluntarily. Although virus scan-
ning is old hat to most IT shops and content filtering is becoming just as common, encryption--a broad topic that is often overlooked by small businesses--is becoming increasingly important, especially given the rise of Wi-Fi hot spots and the use of handheld devices, such as Treos and BlackBerrys. The three types of e-mail encryption--boundary, staging server and end-to-end--offer varying levels of security. The type of encryption that makes sense for your company will depend on the kind of business you're in and the type of content you need to lock down.

Nearly half of 149 IT decision-makers for North American small companies surveyed by Forrester Research said they plan to spend capital in 2006 to secure e-mail. They'll focus their capital on securing e-mail at the gateway, concentrating on spam, viruses and regulatory compliance. This trend is likely to continue and will probably increase in the coming years as companies realize the importance of e-mail security to their overall security strategy.
So which combination of encryption and protection is right for you? There's no single answer. It's safe to say, however, that a blind drive to meet bare-minimum compliance standards is a poor method for choosing an encryption-security solution--such a strategy could leave your organization compliant but still insecure.