Presentation on theme: "1 Email Encryption. 2 Threats To Sensitive Data 3 Client Systems Corporate Mail Server Recipients’ Systems Recipients’ Mail Server Email at Risk In Motion."— Presentation transcript:
3 Client Systems Corporate Mail Server Recipients’ Systems Recipients’ Mail Server Email at Risk In Motion Email is Vulnerable at Multiple Points—SSL/TLS Security Alone is Not Sufficient Email Resides at Multiple Points Internet Where Is Sensitive Data At Risk?
4 Data Breach Date Location# Records 2008 East Burke High School (Morganton, NC) 163 2008 University of Texas at Dallas (Dallas, TX) 9,100 2008 Department of Consumer Affairs (Sacramento, CA) 5,000 2008 Finjan (San Jose, CA) 5,878 2007 Monster.com (Maynard, MA) 1,600,000 2005 Lucas County Children Services (OH) 900 Source: Osterman Research 2008; Radicati Group, Osterman Research, 2 Aberdeen Group and 3 IDC Email Communication Is Vulnerable Prevention Is Cost-effective The Growing Threat To Email
5 % of Organizations 0% 35% <$10,000 15% 20% 21% 10% 33% 5% 10% 15% 20% 25% 30% Cost Up to $50,000 Up to $100,000 Up to $500,000 More than $500,000 Source: Osterman Research Email Security Trends 2008 Cost Of Email Or IM Data Breach
Risk Posed By Various Communication Media 6 0% 60% Voice-over-IP (VoIP) Telephony 45% 20% 31% 56% 19% 10% 20% 30% 40% 50% Communication Media Enterprise Instant Messaging Wireless Voice (Cellular and Text Messaging) Wireless Data Email 51% Consumer Instant Messaging % Risk or Significant Risk Source: Osterman Research Email Security Trends 2008
7 Email Encryption Laws Nevada On October 1, 2008, the law prohibits any business in Nevada from sending a customer’s personal information through an electronic transmission— except via fax—unless the business uses encryption to ensure the security of the transmission. The law stipulates that all email, website, and other forms of Internet based communications that involve the personal information of customers must be encrypted.
8 Email Encryption Laws Massachusetts On September 22, 2008, the state of Massachusetts released the final Massachusetts Regulations (201 CMR 17.00). Those regulations, effective March 1, 2010, are the most comprehensive encryption requirements imposed on companies by any state The Regulations require companies to encrypt all personal information transmitted electronically or wirelessly. In Massachusetts, businesses must also encrypt all personal information stored on laptops and other portable devices.
10 Automated End-to-End Email Encryption Maintain Corporate Access to Encrypted Data Protect Intellectual Property, Customer Data, and Brand Equity Secure and Simple Email Protection Group Test: Email Security “PGP® Desktop Email continues to set the standard for pure email security in an enterprise environment… We rate it our Best Buy.” 2008 PGP Desktop Email Advantages
11 Email at Risk In Motion Recipients’ Systems Recipients’ Mail Server Email at Risk Client Systems Corporate Mail Server Internet End-to-End Email Encryption Protects Email in Motion and at Rest PGP ® Desktop Email PGP ® Support Package for BlackBerry ® PGP ® Desktop Email PGP ® Support Package for BlackBerry ® PGP Desktop Email How It Works
13 Secure Business Communication Automated, End-to-End Email Encryption PGP Support Package for BlackBerry Advantages Centralized Management and Policy Enforcement Multi-layer Defense for Customer Data
14 PGP Support Package for BlackBerry Deployment BlackBerry ® ClientRecipient PGP Universal ™ Server BlackBerry ® Enterprise Server Logs, Policy, Keys Enforced Security Policy Easy, Automatic Operation Reduced Operational Costs
16 SC Magazine: Best Buy Protect Intellectual Property, Customer Data, and Brand Equity Centralized Management, Deployment, and Policy PGP Universal Gateway Email Advantages Expand as Needed Flexible Clientless Email Delivery Options “PGP delivers a top-notch encryption gateway that is easy to use and contains excellent policy enforcement features. Setting up the Universal server was incredibly easy. The interface is very intuitive and is one of our favorite interfaces.” 5 stars, March 2010
17 Email at Risk Internet PGP Universal™ Gateway Email Secures All Communications PGP ® Desktop Email PGP Universal ™ Web Messenger PGP ® PDF Messenger PGP Universal ™ Gateway Email + PGP Universal ™ Server Recipients’ Systems Recipients’ Mail Server In Motion PGP Universal Gateway Email How It Works
20 Need For Secure Paperless Communication PGP PDF Messenger Helps A recent report from IDC estimates that 161 exabytes of digital data were created in 2006 and this number is expected to grow to 988 exabytes by 2010…companies will bear the burden of having to secure and manage more than 85 percent of this data. One terabyte of data represents the equivalent of: 50,000 trees processed into paper and printed 2,000 CDs
21 Reduce Cost and Accelerate Process Protect Intellectual Property, Customer and, Brand Equity PGP PDF Messenger Advantages Increase Your Competitive Advantage Guarantee Secure Document Delivery SC Magazine: Best Buy “The administrative interface is very slick. The centralized, yet granular, policy management – via Universal Server – makes integration into the enterprise easy to accomplish. Encryption and signing internal emails is completely transparent to both parties, with a choice of using S/MIME or OpenPGP. External users without an encryption client can receive messages via a Webmail interface or PGP’s PDF Messenger.” 2008
22 Email sent to recipient— no special action taken by sender PGP PDF Messenger How It Works PGP Universal Gateway Email processes email and applies policy, then sends as password-protected PDF (message not stored) Recipient receives email; opens secured message with PDF reader Desktop ClientPGP PDF MessengerRecipients 132
23 Recipient receives email; directed to authenticate and retrieve passphrase User opens PDF with password from PGP Universal Gateway Email “receipt” PGP Universal Gateway Email displays Secured PDF password; logs “receipt” of delivery PGP PDF Messenger How It Works (Certified Delivery) Desktop ClientPGP PDF MessengerRecipients 1 23
24 Just to name a few… Examples Secure Statement Of Delivery
26 Outlook Encrypt & Sign Buttons (DTE) Description: - New Encrypt and Sign buttons on Outlook* to allow users manual control Benefits: - One click security options - Enables compliance with digital signature laws - Increases options to protect sensitive data - Allows companies to hold individual end users liable - Enables legally binding digital signatures * Outlook for Windows only NOTE: GWE has manual options for users ([PGP], Important flag, on client Outlook lock or other icon can be coded in
27 Description: - Adds 2 new offline policy options -send unencrypted** or -use latest locally cached policy* to existing block** messages policy Benefits: - Enables policy enforcement when offline - Emails can be sent when offline - Per user group options * Managed DTE only ** Managed and unmanaged DTE Enhanced Offline Mail Policy (DTE)
28 Description: - Adds timing options for log uploads and policy updates Benefits: - Improved performance - Increased options and control - Increased # of clients Universal Server can manage Enhanced Policy Update Options (DTE)