SecurityWeek: The Other Things You Can Do with TLS

If you’re familiar with Transport Layer Security (TLS), chances are you think of it as a simple means of securing the transmission of email between two mail transfer agents (MTAs) and the encryption of email. However, the near-universal feature of MTAs also provides features that many organizations don’t take advantage of when they could. Businesses will often face problems that have usually been solved with other technologies, but there are other features that will help reduce the risk of specific vulnerabilities and comply with regulations and industry best practices.

In my latest SecurityWeek column, “The Other Things You Can Do with TLS,” I highlighted some of the other things that can be done with TLS:

  • Setting policy on the strength of encryption used
  • Verifying identities of machines
  • Authenticating permission to relay email

Overall, TLS assists with internal threats of disclosure of sensitive and secret information in military, intelligence, and financial services when deployed internally. Businesses should be aware that it allows access to military-grade encryption and authentication that’s built into the way Internet email works and could reduce cost and complexity of other VPN solutions.

Be sure to check out the full article here and as always, we look forward to your comments below.

This entry was posted in Barry Shurtz, Email Security, Greg Olsen, SecurityWeek. Bookmark the permalink.

Leave a Reply