{"id":5680,"date":"2021-04-19T10:37:27","date_gmt":"2021-04-19T08:37:27","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-recent-cyber-attacks-call-for-modular-email-security-platforms"},"modified":"2024-05-07T11:28:35","modified_gmt":"2024-05-07T09:28:35","slug":"zero-trust-recent-cyber-attacks-call-for-modular-email-security-platforms","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-recent-cyber-attacks-call-for-modular-email-security-platforms\/","title":{"rendered":"Zero Trust: Recent Cyber Attacks Call for Modular Email Security Platforms"},"content":{"rendered":"\n<p>The need for more IT security has never been more apparent. We are increasingly opening ourselves up to the globally networked world \u2013 to communicate with each other, to trade, and to work together. Yet the more we open up, the more vulnerable we become, as made evident by the recent attacks in early March on organizations using <a href=\"https:\/\/www.retarus.com\/blog\/en\/security-flaws-in-ms-exchange-email-continuity-in-case-of-emergency\/\">Microsoft Exchange Server<\/a>. A hole in the Exchange environment\u2019s security initially led to attacks in the USA. It was not long before the hackers started launching attacks in Europe as well.<\/p>\n\n\n\n<p>The security mechanisms offered by inflexible on-premises infrastructures or the usual cloud office solutions are often insufficient in protecting your organization and combating such attacks. For the protection they crucially require, companies are better advised to look to flexible cybersecurity services which are focused on email security and the increasingly prevalent Microsoft 365 Security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-ensure-that-security-vulnerabilities-in-exchange-do-not-become-a-problem-zero-trust-as-a-strategy\">How to ensure that security vulnerabilities in Exchange do not become a problem: Zero Trust as a strategy<\/h2>\n\n\n\n<p>The Zero Trust concept originates from the assumption that you should fundamentally not trust anyone or anything \u2013 not even yourself. The <a href=\"https:\/\/www.forrester.com\/report\/No-More-Chewy-Centers-The-Zero-Trust-Model-Of-Information-Security\/RES56682\">Zero Trust model<\/a> was already formulated and recommended by Forrester twelve years ago for digital ecosystems. Zero Trust prescribes a basic principle of mistrust as a way of ensuring that maximum security can be achieved.<\/p>\n\n\n\n<p>The example of the attacks on Exchange servers mentioned above illustrates that security mechanisms provided by on-prem or one-vendor approaches are insufficient for ensuring adequate protection for business communication. A secure, global exchange of information can only be accomplished by opting for modular and integrated ecosystem approaches. Outdated, insular solutions or simply pulling up the drawbridge by isolating the network is no longer enough. Modular platforms are best suited for enabling the selection of various components and meshing them together to achieve the highest possible degree of security for modern communication traffic.<\/p>\n\n\n\n<p>Gartner says, \u201cTraditionally, security products architectures have been built on proprietary ecosystems with minimal built-in integrations across different providers and products. This silo approach has been reinforced by end users\u2018 strategies focusing on best-of-breed capabilities from specialist providers. Digital transformation initiatives will increasingly require solutions that support deployment of more dynamic and effective controls across disparate environments and ecosystems. The emergence of approaches such as passwordless authentication and decentralized identity are examples of new security answers to the need of having security more localized and decentralized.\u201d <sup>1<\/sup><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cloud-trend-in-the-pandemic-fuels-demand-for-appropriate-security-solutions\">Cloud trend in the pandemic fuels demand for appropriate security solutions<\/h2>\n\n\n\n<p>The trend towards the cloud has been accelerated by the COVID-19 pandemic, as evidenced by a recent IDC study:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The acceptance and opportunities of the cloud are both set to grow continuously to reach a forecast market value of 1 trillion US dollars in 2024.<\/li>\n\n\n\n<li>Worldwide spending on security is expected to grow by 8.1 percent on average in the period from 2020 to 2024.<\/li>\n<\/ul>\n\n\n\n<p>A growing number of companies are now deciding to move over to the cloud office services offered by Microsoft or Google. According to the Zero Trust principle however, companies using these services should be careful not to rely exclusively on a single cloud office solution and its integrated security mechanisms. It is advised that companies employ additional modern security technologies and services offered by third-party providers. Many companies have chosen this route already. &nbsp;&nbsp;A recent <a href=\"https:\/\/www.gartner.com\/document\/3992220?ref=solrAll&amp;refval=284151858\">Gartner study<\/a><sup>2<\/sup> shows:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2021\/04\/Gartner.png\" alt=\"\" class=\"wp-image-5681\"\/><\/figure>\n\n\n\n<p>As it can be seen from the Gartner graphic above:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>56 Percent of those who have purchased Microsoft Office 365 are using or planning to use third-party anti-virus\/anti-spam solutions.<\/li>\n\n\n\n<li>24 Percent of the participating companies are using or planning to use additional content or email migration tools.<\/li>\n\n\n\n<li>An additional 19 percent are using content or email archiving products offered by third party providers.<\/li>\n\n\n\n<li>In total, only 8 percent are not currently relying on third-party services.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-zero-trust-thanks-to-a-modular-secure-email-platform\">Zero Trust thanks to a modular Secure Email Platform<\/h2>\n\n\n\n<p>Most harmful attacks make their way into the company network via email. However, since the <a href=\"https:\/\/www.retarus.com\/blog\/en\/is-it-possible-to-utilize-cloud-services-in-a-gdpr-compliant-manner\/\">GDPR<\/a> came into force, the sharing of sensitive data &#8211; especially via email &#8211; is now afforded special protection. For this reason, it is highly recommended to take a best-of-breed approach, which consciously relies on technologies from a range of providers and takes the various dimensions of email into account.<\/p>\n\n\n\n<p>The following dimensions should be considered when selecting a modular Secure Email Platform:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Basic protection<\/strong> from DDoS attacks through multiple, intelligent filtering and anti-virus software<\/li>\n\n\n\n<li><strong>Advanced Threat Protection (ATP)<\/strong> to safeguard against highly sophisticated, intelligent attacks (for instance, through sandboxing, intelligent and automatic pattern recognition, and intelligent traffic handling)<\/li>\n\n\n\n<li><strong>Post-delivery Protection<\/strong> to render dangerous links and hacker attacks harmless, even after they have passed the firewall<\/li>\n\n\n\n<li><strong>Information Protection<\/strong> with state-of-the-art encryption technologies, archiving, and information protection frameworks to protect sensitive information such as personal data, company secrets, or patents<\/li>\n\n\n\n<li><strong>Compliance<\/strong> and strict adherence to legal provisions and regulations with the aid of audit-ready, verifiable control mechanisms<\/li>\n\n\n\n<li><\/li>\n<\/ul>\n\n\n\n<p>Third-party providers such as Retarus provide <a href=\"https:\/\/www.retarus.com\/blog\/en\/retarus-the-perfect-addition-to-microsoft-365-and-other-cloud-email-services\/\">security services that complement Microsoft 365<\/a> substantially in these aforementioned dimensions.<\/p>\n\n\n\n<p>More details about the Retarus Secure Email Platform can be found <a href=\"https:\/\/www.retarus.com\/secure-email-platform\/\">here<\/a> or from your <a href=\"https:\/\/www.retarus.com\/contact\">local<\/a> Retarus contact person.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>1) Gartner, Emerging Technologies: Defining Composable Security, Dennis Gaughan, April 20, 2021. See also Smarter With Gartner, \u201c<a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/gartner-keynote-the-future-of-business-is-composable\/?_ga=2.221855448.1333518819.1616998995-1866319792.1604566093&amp;_gac=1.45908566.1614582658.CjwKCAiAm-2BBhANEiwAe7eyFMO9xU58T9P2BUi1R3jUX4zwcAZRIw3etwA-Vs60MiYgirqOMdFu3RoC8GMQAvD_BwE\">Gartner Keynote: The Future of Business Is Composable\u201d, October 19, 2020<\/a><sup>, <\/sup> <\/p>\n\n\n\n<p>2) Gartner, \u2018Infographic: How Tech CEOs Can Work With (Or Compete Against) Microsoft Office 365\u2019, Craig Roth, October 26, 2020<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The security mechanisms offered by inflexible on-premises infrastructures or the usual cloud office solutions are often insufficient in protecting your organization and combating such attacks. For the protection they crucially require, companies are better advised to look to flexible cybersecurity services which are focused on email security and the increasingly prevalent Microsoft 365 Security.<\/p>\n","protected":false},"author":55,"featured_media":10153,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"yes","footnotes":""},"categories":[66,8,15],"tags":[3761,102,3633,3641],"class_list":["post-5680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-news","category-security","tag-cybersecurity","tag-email-security","tag-microsoft-exchange","tag-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>E-Mail-Sicherheit - \u201eZero Trust\u201c und modulare Plattformen als Strategie<\/title>\n<meta name=\"description\" content=\"\u201eZero Trust\u201c: Aktuelle Cyber-Angriffe verlangen nach modularen Plattformen f\u00fcr E-Mail-Sicherheit. Mehr lesen \u2713\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201eZero Trust\u201c: Aktuelle Cyber-Angriffe verlangen nach modularen Plattformen f\u00fcr E-Mail-Sicherheit\" \/>\n<meta property=\"og:description\" content=\"Immer mehr Unternehmen entscheiden sich derzeit f\u00fcr die Cloud-Office L\u00f6sungen von Microsoft oder Google. Im Sinne von \u201eZero Trust\u201c sollten Anwenderunternehmen allerdings nicht ausschlie\u00dflich auf eine Cloud-Office-L\u00f6sung und die dort integrierten Sicherheitsmechanismen setzen, sondern zus\u00e4tzliche moderne Security-Technologien und -Services von Drittanbietern einsetzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Corporate Blog - EN\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-19T08:37:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T09:28:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/05\/shutterstock_445627555-1920x1080px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yvonne Kaupp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"\u201eZero Trust\u201c: Aktuelle Cyber-Angriffe verlangen nach modularen Plattformen f\u00fcr E-Mail-Sicherheit\" \/>\n<meta name=\"twitter:description\" content=\"Immer mehr Unternehmen entscheiden sich derzeit f\u00fcr die Cloud-Office L\u00f6sungen von Microsoft oder Google. Im Sinne von \u201eZero Trust\u201c sollten Anwenderunternehmen allerdings nicht ausschlie\u00dflich auf eine Cloud-Office-L\u00f6sung und die dort integrierten Sicherheitsmechanismen setzen, sondern zus\u00e4tzliche moderne Security-Technologien und -Services von Drittanbietern einsetzen. .\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yvonne Kaupp\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/\"},\"author\":{\"name\":\"Yvonne Kaupp\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/a3e598be3195faf544956ec3e3adaa24\"},\"headline\":\"Zero Trust: Recent Cyber Attacks Call for Modular Email Security Platforms\",\"datePublished\":\"2021-04-19T08:37:27+00:00\",\"dateModified\":\"2024-05-07T09:28:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/\"},\"wordCount\":881,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/22\\\/2024\\\/05\\\/shutterstock_445627555-1920x1080px.jpg\",\"keywords\":[\"Cybersecurity\",\"Email Security\",\"Microsoft Exchange\",\"Zero Trust\"],\"articleSection\":[\"Cloud\",\"News\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/\",\"name\":\"E-Mail-Sicherheit - \u201eZero Trust\u201c und modulare Plattformen als Strategie\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/22\\\/2024\\\/05\\\/shutterstock_445627555-1920x1080px.jpg\",\"datePublished\":\"2021-04-19T08:37:27+00:00\",\"dateModified\":\"2024-05-07T09:28:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/a3e598be3195faf544956ec3e3adaa24\"},\"description\":\"\u201eZero Trust\u201c: Aktuelle Cyber-Angriffe verlangen nach modularen Plattformen f\u00fcr E-Mail-Sicherheit. Mehr lesen \u2713\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/22\\\/2024\\\/05\\\/shutterstock_445627555-1920x1080px.jpg\",\"contentUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/22\\\/2024\\\/05\\\/shutterstock_445627555-1920x1080px.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust: Recent Cyber Attacks Call for Modular Email Security Platforms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/\",\"name\":\"Retarus Corporate Blog - EN\",\"description\":\"Always up to date\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/a3e598be3195faf544956ec3e3adaa24\",\"name\":\"Yvonne Kaupp\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/author\\\/yvonnek\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"E-Mail-Sicherheit - \u201eZero Trust\u201c und modulare Plattformen als Strategie","description":"\u201eZero Trust\u201c: Aktuelle Cyber-Angriffe verlangen nach modularen Plattformen f\u00fcr E-Mail-Sicherheit. Mehr lesen \u2713","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/","og_locale":"en_US","og_type":"article","og_title":"\u201eZero Trust\u201c: Aktuelle Cyber-Angriffe verlangen nach modularen Plattformen f\u00fcr E-Mail-Sicherheit","og_description":"Immer mehr Unternehmen entscheiden sich derzeit f\u00fcr die Cloud-Office L\u00f6sungen von Microsoft oder Google. Im Sinne von \u201eZero Trust\u201c sollten Anwenderunternehmen allerdings nicht ausschlie\u00dflich auf eine Cloud-Office-L\u00f6sung und die dort integrierten Sicherheitsmechanismen setzen, sondern zus\u00e4tzliche moderne Security-Technologien und -Services von Drittanbietern einsetzen.","og_url":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/","og_site_name":"Retarus Corporate Blog - EN","article_published_time":"2021-04-19T08:37:27+00:00","article_modified_time":"2024-05-07T09:28:35+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/05\/shutterstock_445627555-1920x1080px.jpg","type":"image\/jpeg"}],"author":"Yvonne Kaupp","twitter_card":"summary_large_image","twitter_title":"\u201eZero Trust\u201c: Aktuelle Cyber-Angriffe verlangen nach modularen Plattformen f\u00fcr E-Mail-Sicherheit","twitter_description":"Immer mehr Unternehmen entscheiden sich derzeit f\u00fcr die Cloud-Office L\u00f6sungen von Microsoft oder Google. Im Sinne von \u201eZero Trust\u201c sollten Anwenderunternehmen allerdings nicht ausschlie\u00dflich auf eine Cloud-Office-L\u00f6sung und die dort integrierten Sicherheitsmechanismen setzen, sondern zus\u00e4tzliche moderne Security-Technologien und -Services von Drittanbietern einsetzen. .","twitter_misc":{"Written by":"Yvonne Kaupp","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/#article","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/"},"author":{"name":"Yvonne Kaupp","@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/a3e598be3195faf544956ec3e3adaa24"},"headline":"Zero Trust: Recent Cyber Attacks Call for Modular Email Security Platforms","datePublished":"2021-04-19T08:37:27+00:00","dateModified":"2024-05-07T09:28:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/"},"wordCount":881,"commentCount":0,"image":{"@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/05\/shutterstock_445627555-1920x1080px.jpg","keywords":["Cybersecurity","Email Security","Microsoft Exchange","Zero Trust"],"articleSection":["Cloud","News","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/","url":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/","name":"E-Mail-Sicherheit - \u201eZero Trust\u201c und modulare Plattformen als Strategie","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/05\/shutterstock_445627555-1920x1080px.jpg","datePublished":"2021-04-19T08:37:27+00:00","dateModified":"2024-05-07T09:28:35+00:00","author":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/a3e598be3195faf544956ec3e3adaa24"},"description":"\u201eZero Trust\u201c: Aktuelle Cyber-Angriffe verlangen nach modularen Plattformen f\u00fcr E-Mail-Sicherheit. Mehr lesen \u2713","breadcrumb":{"@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/#primaryimage","url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/05\/shutterstock_445627555-1920x1080px.jpg","contentUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/05\/shutterstock_445627555-1920x1080px.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/blog\/en\/zero-trust-aktuelle-cyber-angriffe-verlangen-nach-modularen-plattformen-fuer-e-mail-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Zero Trust: Recent Cyber Attacks Call for Modular Email Security Platforms"}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/blog\/en\/#website","url":"https:\/\/www.retarus.com\/blog\/en\/","name":"Retarus Corporate Blog - EN","description":"Always up to date","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/a3e598be3195faf544956ec3e3adaa24","name":"Yvonne Kaupp","url":"https:\/\/www.retarus.com\/blog\/en\/author\/yvonnek\/"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/5680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=5680"}],"version-history":[{"count":14,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/5680\/revisions"}],"predecessor-version":[{"id":10484,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/5680\/revisions\/10484"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media\/10153"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=5680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=5680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=5680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}