ITU-T X.1236 Global Email Security Standard

Security Technologies Required to Establish a Secure Email Environment.
ITU-T-Global-Email-Standard-img1
Cyberattacks through email are very real and direct threats that many employees in companies face daily, with some encountering them dozens of times a day. As time goes by, cyberattacks are increasing explosively and becoming even more sophisticated. In such situation, remaining idly could result in the loss of valuable personal information and business data.

Influence of the Standards

icon_Member-Nations
193 ITU Member Nations
164 WTO Member Nations
Basic Technical Regulations
icon_info
Email Security Products Purchase and Development Guidelines
icon_Email-Security-Technology
Email Security Technology Analysis and Enhancement Resource
SECURITY SOLUTIONS

Are you currently using standard-based email security solutions?

ITU-T X.1236 Security requirements and countermeasures for targeted email attacks

“Established on September 22nd, 2023, through the
Telecommunication and Standardization Sector ITU-T,
a specialized agency of the United Nations”

itu-t-x-1236

Target attacks for inbound and outbound emails are evolving into more sophisticated and unknown types, such as using unknown malicious files or exploiting the target’s social relationships. Therefore, solutions that reflect the proposed security feature requirements are needed to effectively prevent or block them.

This is a credible standard that public institutions and businesses worldwide should collectively reference in order to counter advanced email attacks.

Reason for Applying Global Security Standard

World Trade Organization (WTO) Agreement on Technical Barriers

GES-point-icon

First, under Article 2, Paragraphs 4 and 7 of the World Trade Organization (WTO) Agreement on Technical Barriers to Trade (TBT), standards must be adhered to. These regulations serve as legal grounds, and non-compliance can result in restrictions in international trade.

Article2

Article 2

Preparation, Adoption and Application of Technical Regulations by Central Government Bodies

With respect to their central government bodies:
2.4 Where technical regulations are required and relevant international standards exist or their completion is imminent, Members shall use them, or the relevant parts of them, as a basis for their technical regulations except when such international standards or relevant parts would be an ineffective or inappropriate means for the fulfilment of the legitimate objectives pursued, for instance because of fundamental climatic or geographical factors or fundamental technological problems.

2.7 Members shall give positive consideration to accepting as equivalent technical regulations of other Members, even if these regulations differ from their own, provided they are satisfied that these regulations adequately fulfil the objectives of their own regulations.

GES-point-icon
Secondly, applying email security standards aims to establish minimum security guidelines to counter targeted emails and similar threats. Targeted emails are tailored attacks, and even if just one of the various attacks is not covered, it may leave systems to be complete vulnerable, despite successfully covering the other attacks. Therefore, email hacking one of the most serious issues of all time. However, by adhering to international security standards, it is possible to cover at least all of the minimum scope of attacks required to stay safe. This enables an appropriate counteract to email attacks and enhances the security of both businesses and individuals, ensuring protection from email hacking.

Provides integrated coverage across all inbound and outbound areas

without separating each of them
GES-1

Everything for inbound email security

which users can use at ease
GES-img2

10 Types of Email Attacks

that are increasing explosively
GES-img3
PARTNERSHIP

Become a EG-Platform Partner Today