Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Epsilon Bolsters Security: Shares Details Following Massive Data Breach

Following a massive breach in late March that exposed the personal information of millions of users, Epsilon, the world’s largest permission based email marketing services company, today shared information on security enhancements that the company has implemented in response to the high profile security breach.

Following a massive breach in late March that exposed the personal information of millions of users, Epsilon, the world’s largest permission based email marketing services company, today shared information on security enhancements that the company has implemented in response to the high profile security breach.

Epsilon said it has been working closely with Verizon to deploy a number of new leading-edge data security measures, including implementing two-factor authentication and “IP certification requirements” which limit inbound and outbound access to the email platform to white-listed IP addresses.

Additionally, Epsilon is an early adopter of new of data-breach detection technologies from Verizon, which will help Epsilon to identify and mitigate “electronic crimes in motion.”

Combining intelligence from Verizon’s global-IP network, their insight into Internet traffic, one of the largest databases of breach statistics and frontline experience against the world’s most sophisticated hackers, the new, custom cloud-based service provides a significant improvement over conventional methods of breach detection. The cloud-based solution from Verizon is delivered through its Terremark subsidiary.

The company said it is also working to build an advanced anti-phishing solution to easily differentiate legitimate communications from fraudulent ones and to monitor brand abuse across email domains. Epsilon plans to release the offering to clients in Q4 2011.

“We recognize that established industry standards are simply not enough in this day and age,” said Bryan Kennedy, president and CEO of Epsilon. “Working with Verizon gives Epsilon access to the best security tools, technologies and expertise in the world to combat cybercrime in near real time.”

“We are excited to bring our expertise and knowledge base to Epsilon to improve the way they protect their IT infrastructure. This solution allows them to detect and mitigate crimes as they are happening, so that hackers can be stopped in their tracks,” said Peter Tippett, vice president of security and industry solutions for Verizon. “As cybercriminals become more sophisticated, so must cyber security and data protection.”

Ironically, Tippett, speaking at the Infosecurity Europe trade show in April 2010, made an interesting statement: “We know successful security breaches are leveling off, and that means we are headed in the right direction as organizations band together to fight cybercrime. By 2020, we expect life to be notably better for cyber users.”

Advertisement. Scroll to continue reading.

Epsilon sends over 40 billion emails annually and counts over 2,500 clients, including 7 of the Fortune 10 to build and host their customer databases. The company disclosed in late March that its systems had been compromised, and that customer data belonging to about 50 of its clients had been stolen. Customer names and email addresses, and in a few cases other pieces of information, were compromised at several brands including Citibank, Capital One, JPMorgan, Best Buy, TD Ameritrade, Verizon, and dozens of other large brands in the financial services and retail sectors.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...