1 Encryption
2 Threats To Sensitive Data
3 Client Systems Corporate Mail Server Recipients’ Systems Recipients’ Mail Server at Risk In Motion is Vulnerable at Multiple Points—SSL/TLS Security Alone is Not Sufficient Resides at Multiple Points Internet Where Is Sensitive Data At Risk?
4 Data Breach Date Location# Records 2008 East Burke High School (Morganton, NC) University of Texas at Dallas (Dallas, TX) 9, Department of Consumer Affairs (Sacramento, CA) 5, Finjan (San Jose, CA) 5, Monster.com (Maynard, MA) 1,600, Lucas County Children Services (OH) 900 Source: Osterman Research 2008; Radicati Group, Osterman Research, 2 Aberdeen Group and 3 IDC Communication Is Vulnerable Prevention Is Cost-effective The Growing Threat To
5 % of Organizations 0% 35% <$10,000 15% 20% 21% 10% 33% 5% 10% 15% 20% 25% 30% Cost Up to $50,000 Up to $100,000 Up to $500,000 More than $500,000 Source: Osterman Research Security Trends 2008 Cost Of Or IM Data Breach
Risk Posed By Various Communication Media 6 0% 60% Voice-over-IP (VoIP) Telephony 45% 20% 31% 56% 19% 10% 20% 30% 40% 50% Communication Media Enterprise Instant Messaging Wireless Voice (Cellular and Text Messaging) Wireless Data 51% Consumer Instant Messaging % Risk or Significant Risk Source: Osterman Research Security Trends 2008
7 Encryption Laws Nevada On October 1, 2008, the law prohibits any business in Nevada from sending a customer’s personal information through an electronic transmission— except via fax—unless the business uses encryption to ensure the security of the transmission. The law stipulates that all , website, and other forms of Internet based communications that involve the personal information of customers must be encrypted.
8 Encryption Laws Massachusetts On September 22, 2008, the state of Massachusetts released the final Massachusetts Regulations (201 CMR 17.00). Those regulations, effective March 1, 2010, are the most comprehensive encryption requirements imposed on companies by any state The Regulations require companies to encrypt all personal information transmitted electronically or wirelessly. In Massachusetts, businesses must also encrypt all personal information stored on laptops and other portable devices.
9 PGP Desktop
10 Automated End-to-End Encryption Maintain Corporate Access to Encrypted Data Protect Intellectual Property, Customer Data, and Brand Equity Secure and Simple Protection Group Test: Security “PGP® Desktop continues to set the standard for pure security in an enterprise environment… We rate it our Best Buy.” 2008 PGP Desktop Advantages
11 at Risk In Motion Recipients’ Systems Recipients’ Mail Server at Risk Client Systems Corporate Mail Server Internet End-to-End Encryption Protects in Motion and at Rest PGP ® Desktop PGP ® Support Package for BlackBerry ® PGP ® Desktop PGP ® Support Package for BlackBerry ® PGP Desktop How It Works
12 Management ServerSenderRecipient Easy, Automatic Operation Enforced Security Policy End-to-End Encrypted PGP Desktop Deployment
13 Secure Business Communication Automated, End-to-End Encryption PGP Support Package for BlackBerry Advantages Centralized Management and Policy Enforcement Multi-layer Defense for Customer Data
14 PGP Support Package for BlackBerry Deployment BlackBerry ® ClientRecipient PGP Universal ™ Server BlackBerry ® Enterprise Server Logs, Policy, Keys Enforced Security Policy Easy, Automatic Operation Reduced Operational Costs
15 PGP Universal Gateway
16 SC Magazine: Best Buy Protect Intellectual Property, Customer Data, and Brand Equity Centralized Management, Deployment, and Policy PGP Universal Gateway Advantages Expand as Needed Flexible Clientless Delivery Options “PGP delivers a top-notch encryption gateway that is easy to use and contains excellent policy enforcement features. Setting up the Universal server was incredibly easy. The interface is very intuitive and is one of our favorite interfaces.” 5 stars, March 2010
17 at Risk Internet PGP Universal™ Gateway Secures All Communications PGP ® Desktop PGP Universal ™ Web Messenger PGP ® PDF Messenger PGP Universal ™ Gateway + PGP Universal ™ Server Recipients’ Systems Recipients’ Mail Server In Motion PGP Universal Gateway How It Works
18 PGP Universal Gateway Deployment Desktop Client PGP Universal ™ Gateway Recipients Enforced Security Policy Easy, Automatic Operation Reduced Operational Costs
19 PGP PDF Messenger
20 Need For Secure Paperless Communication PGP PDF Messenger Helps A recent report from IDC estimates that 161 exabytes of digital data were created in 2006 and this number is expected to grow to 988 exabytes by 2010…companies will bear the burden of having to secure and manage more than 85 percent of this data. One terabyte of data represents the equivalent of: 50,000 trees processed into paper and printed 2,000 CDs
21 Reduce Cost and Accelerate Process Protect Intellectual Property, Customer and, Brand Equity PGP PDF Messenger Advantages Increase Your Competitive Advantage Guarantee Secure Document Delivery SC Magazine: Best Buy “The administrative interface is very slick. The centralized, yet granular, policy management – via Universal Server – makes integration into the enterprise easy to accomplish. Encryption and signing internal s is completely transparent to both parties, with a choice of using S/MIME or OpenPGP. External users without an encryption client can receive messages via a Webmail interface or PGP’s PDF Messenger.” 2008
22 sent to recipient— no special action taken by sender PGP PDF Messenger How It Works PGP Universal Gateway processes and applies policy, then sends as password-protected PDF (message not stored) Recipient receives ; opens secured message with PDF reader Desktop ClientPGP PDF MessengerRecipients 132
23 Recipient receives ; directed to authenticate and retrieve passphrase User opens PDF with password from PGP Universal Gateway “receipt” PGP Universal Gateway displays Secured PDF password; logs “receipt” of delivery PGP PDF Messenger How It Works (Certified Delivery) Desktop ClientPGP PDF MessengerRecipients 1 23
24 Just to name a few… Examples Secure Statement Of Delivery
25 PGP Desktop PGP Mobile 3.0 Updates
26 Outlook Encrypt & Sign Buttons (DTE) Description: - New Encrypt and Sign buttons on Outlook* to allow users manual control Benefits: - One click security options - Enables compliance with digital signature laws - Increases options to protect sensitive data - Allows companies to hold individual end users liable - Enables legally binding digital signatures * Outlook for Windows only NOTE: GWE has manual options for users ([PGP], Important flag, on client Outlook lock or other icon can be coded in
27 Description: - Adds 2 new offline policy options -send unencrypted** or -use latest locally cached policy* to existing block** messages policy Benefits: - Enables policy enforcement when offline - s can be sent when offline - Per user group options * Managed DTE only ** Managed and unmanaged DTE Enhanced Offline Mail Policy (DTE)
28 Description: - Adds timing options for log uploads and policy updates Benefits: - Improved performance - Increased options and control - Increased # of clients Universal Server can manage Enhanced Policy Update Options (DTE)
29 Description: - Adds Lotus Notes native encryption option for internal traffic - Architecture enhancements Benefits: - Improved integration and encryption options in Lotus Notes environments - Improved performance & functionality - By leveraging latest LN APIs Lotus Notes Enhancements (DTE)
30 Description: - PGP Universal Server decrypts archived encrypted Benefits: - Enables compliance with company archiving and regulatory requirements -Multiple archiving options after decryption Archival Output Of Encrypted s (DTE)
31 Description: - Universal Server now has a user interface for PGP Mobile management Benefits: - Convenience; easier to manage UI For Management Of PGP Mobile
32 Summary PGP Corporation’s Solutions are “Future-proof” Presents a Significant Risk
33 Existing Infrastructure PGP Encryption Solutions PGP Encryption Platform 3 rd Party Solutions Custom Applications Commercial Software Commercial Hardware File Disk and Device Mainframe Mobile Devices PGP Encryption Platform Key Lifecycle Key Storage Authentication / Authorization Automated Operations and ProvisioningPolicy Management Auditing Reporting Logging
Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you! 34 Sisoft