1 Email Encryption. 2 Threats To Sensitive Data 3 Client Systems Corporate Mail Server Recipients’ Systems Recipients’ Mail Server Email at Risk In Motion.

Slides:



Advertisements
Similar presentations
SSL Trust Pitfalls Prof. Ravi Sandhu.
Advertisements

Universal Access to All Internet Archive: Non-Profit Library.
Lesson 2 Communication as a Key Role. For additional information or questions please contact Toledo-Lucas County Health Department APC:
Claude C. Longoria, M.B.A. Manager ImmTrac Group ImmTrac Update Texas Immunization Stakeholders Working Group November 1, 2007.
Senate Committee on Health and Human Services February 10, 2009 Overview: Texas Department of State Health Services David Lakey, M.D. Commissioner.
Texas Medical Monitoring Project Community and Medical Care Providers Involvement in MMP Sylvia Odem, MPH MMP Project Coordinator Department of State Health.
Paul Wood Senior Analyst, MessageLabs. summary.
MOSS ADAMS LLP | 1 W HAT I S S ENSITIVE D ATA ? Whats the Risk and What Do We Do About It? Weston Nelson Steve Fineberg Steven Gin.
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
We have to Share Data - Now What? Jon R. Wall Security / IA Microsoft.
NFPA Urban Fire Safety Project Urban Fire Forum October 21, 2011 Sharon Gamache Program Director High-Risk Outreach Programs.
What you will get? Or what you like to know?
Integrated Imaging and Document Management System Product Overview.
Hosted Exchange 2007 Enterprise Grade and Collaboration Solutions for Small and Medium Businesses.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
An Overview of the National Council of Urban Indian Health D’Shane Barnett, Executive Director Prepared for the Annual Self Governance Conference May 7,
Name ____________________ Date ___________ Period ____.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
North Texas Demographic Characteristics and Trends DFW International Luncheon Dallas Public Library May 19, 2010 Dallas, TX.
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Chapter 5 Print and Electronic Messages
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Alpha Five User Group, Bill Parker, SSL Security and WAS, July 2007 SSL Security with Alpha Five App Server Protecting sensitive or personal data.
Privacy in a Public World ISACA North Alabama Chapter March 11, 2008.
© Affiliated Computer Services, Inc. (ACS) 2010 ACS Encryption.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Wireless and Security CSCI 5857: Encoding and Encryption.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
1 Secure Telework Connectivity Peggy Ward Chief Information Security Officer July 22,
© 2009 PGP Corporation Confidential State of Key Management Brian Tokuyoshi Solution Manager.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Cryptography and Network Security (SSL)
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Mail Saurus Reference:“Usable Encryption Enabled by AJAX” J.F. Ryan; B.L. Reid; Networking and Services, ICNS '06. Digital Object Identifier /ICNS
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter Three Confidentiality In this chapter, you will learn about: Basic principles of confidentiality The attorney-client privilege and the difference.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
Dyalog’08. Conga, SSL and WebServices Morten Kromberg Dyalog’08 - Elsinore.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Treat it like it’s yours: best practices for handling student transcript data Bob Hughes Application Support Manager North Orange County CCD CCCTran Steering.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
James G. Connell, III CJA Panel Training Program May 13, 2016.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
BUILD YOUR BRAND IDENTITY WITH DATACAPTIVE’S CRO MAILING LIST
Today’s Risk. Today’s Solutions. Cyber security and
4 ways to stay safe online 1. Avoid viruses and phishing scams
بعض النقاط التي تؤخذ في الحسبان عند تقييم الاستثمارات الزراعية
Single Password, Multiple Accounts
Date, location, department
Date, location, department
Data and Applications Security Developments and Directions
Record your QUESTIONS as your read.
Presentation transcript:

1 Encryption

2 Threats To Sensitive Data

3 Client Systems Corporate Mail Server Recipients’ Systems Recipients’ Mail Server at Risk In Motion is Vulnerable at Multiple Points—SSL/TLS Security Alone is Not Sufficient Resides at Multiple Points Internet Where Is Sensitive Data At Risk?

4 Data Breach Date Location# Records 2008 East Burke High School (Morganton, NC) University of Texas at Dallas (Dallas, TX) 9, Department of Consumer Affairs (Sacramento, CA) 5, Finjan (San Jose, CA) 5, Monster.com (Maynard, MA) 1,600, Lucas County Children Services (OH) 900 Source: Osterman Research 2008; Radicati Group, Osterman Research, 2 Aberdeen Group and 3 IDC Communication Is Vulnerable Prevention Is Cost-effective The Growing Threat To

5 % of Organizations 0% 35% <$10,000 15% 20% 21% 10% 33% 5% 10% 15% 20% 25% 30% Cost Up to $50,000 Up to $100,000 Up to $500,000 More than $500,000 Source: Osterman Research Security Trends 2008 Cost Of Or IM Data Breach

Risk Posed By Various Communication Media 6 0% 60% Voice-over-IP (VoIP) Telephony 45% 20% 31% 56% 19% 10% 20% 30% 40% 50% Communication Media Enterprise Instant Messaging Wireless Voice (Cellular and Text Messaging) Wireless Data 51% Consumer Instant Messaging % Risk or Significant Risk Source: Osterman Research Security Trends 2008

7 Encryption Laws Nevada On October 1, 2008, the law prohibits any business in Nevada from sending a customer’s personal information through an electronic transmission— except via fax—unless the business uses encryption to ensure the security of the transmission. The law stipulates that all , website, and other forms of Internet based communications that involve the personal information of customers must be encrypted.

8 Encryption Laws Massachusetts On September 22, 2008, the state of Massachusetts released the final Massachusetts Regulations (201 CMR 17.00). Those regulations, effective March 1, 2010, are the most comprehensive encryption requirements imposed on companies by any state The Regulations require companies to encrypt all personal information transmitted electronically or wirelessly. In Massachusetts, businesses must also encrypt all personal information stored on laptops and other portable devices.

9 PGP Desktop

10 Automated End-to-End Encryption Maintain Corporate Access to Encrypted Data Protect Intellectual Property, Customer Data, and Brand Equity Secure and Simple Protection Group Test: Security “PGP® Desktop continues to set the standard for pure security in an enterprise environment… We rate it our Best Buy.” 2008 PGP Desktop Advantages

11 at Risk In Motion Recipients’ Systems Recipients’ Mail Server at Risk Client Systems Corporate Mail Server Internet End-to-End Encryption Protects in Motion and at Rest PGP ® Desktop PGP ® Support Package for BlackBerry ® PGP ® Desktop PGP ® Support Package for BlackBerry ® PGP Desktop How It Works

12 Management ServerSenderRecipient Easy, Automatic Operation Enforced Security Policy End-to-End Encrypted PGP Desktop Deployment

13 Secure Business Communication Automated, End-to-End Encryption PGP Support Package for BlackBerry Advantages Centralized Management and Policy Enforcement Multi-layer Defense for Customer Data

14 PGP Support Package for BlackBerry Deployment BlackBerry ® ClientRecipient PGP Universal ™ Server BlackBerry ® Enterprise Server Logs, Policy, Keys Enforced Security Policy Easy, Automatic Operation Reduced Operational Costs

15 PGP Universal Gateway

16 SC Magazine: Best Buy Protect Intellectual Property, Customer Data, and Brand Equity Centralized Management, Deployment, and Policy PGP Universal Gateway Advantages Expand as Needed Flexible Clientless Delivery Options “PGP delivers a top-notch encryption gateway that is easy to use and contains excellent policy enforcement features. Setting up the Universal server was incredibly easy. The interface is very intuitive and is one of our favorite interfaces.” 5 stars, March 2010

17 at Risk Internet PGP Universal™ Gateway Secures All Communications PGP ® Desktop PGP Universal ™ Web Messenger PGP ® PDF Messenger PGP Universal ™ Gateway + PGP Universal ™ Server Recipients’ Systems Recipients’ Mail Server In Motion PGP Universal Gateway How It Works

18 PGP Universal Gateway Deployment Desktop Client PGP Universal ™ Gateway Recipients Enforced Security Policy Easy, Automatic Operation Reduced Operational Costs

19 PGP PDF Messenger

20 Need For Secure Paperless Communication PGP PDF Messenger Helps A recent report from IDC estimates that 161 exabytes of digital data were created in 2006 and this number is expected to grow to 988 exabytes by 2010…companies will bear the burden of having to secure and manage more than 85 percent of this data. One terabyte of data represents the equivalent of: 50,000 trees processed into paper and printed 2,000 CDs

21 Reduce Cost and Accelerate Process Protect Intellectual Property, Customer and, Brand Equity PGP PDF Messenger Advantages Increase Your Competitive Advantage Guarantee Secure Document Delivery SC Magazine: Best Buy “The administrative interface is very slick. The centralized, yet granular, policy management – via Universal Server – makes integration into the enterprise easy to accomplish. Encryption and signing internal s is completely transparent to both parties, with a choice of using S/MIME or OpenPGP. External users without an encryption client can receive messages via a Webmail interface or PGP’s PDF Messenger.” 2008

22 sent to recipient— no special action taken by sender PGP PDF Messenger How It Works PGP Universal Gateway processes and applies policy, then sends as password-protected PDF (message not stored) Recipient receives ; opens secured message with PDF reader Desktop ClientPGP PDF MessengerRecipients 132

23 Recipient receives ; directed to authenticate and retrieve passphrase User opens PDF with password from PGP Universal Gateway “receipt” PGP Universal Gateway displays Secured PDF password; logs “receipt” of delivery PGP PDF Messenger How It Works (Certified Delivery) Desktop ClientPGP PDF MessengerRecipients 1 23

24 Just to name a few… Examples Secure Statement Of Delivery

25 PGP Desktop PGP Mobile 3.0 Updates

26 Outlook Encrypt & Sign Buttons (DTE) Description: - New Encrypt and Sign buttons on Outlook* to allow users manual control Benefits: - One click security options - Enables compliance with digital signature laws - Increases options to protect sensitive data - Allows companies to hold individual end users liable - Enables legally binding digital signatures * Outlook for Windows only NOTE: GWE has manual options for users ([PGP], Important flag, on client Outlook lock or other icon can be coded in

27 Description: - Adds 2 new offline policy options -send unencrypted** or -use latest locally cached policy* to existing block** messages policy Benefits: - Enables policy enforcement when offline - s can be sent when offline - Per user group options * Managed DTE only ** Managed and unmanaged DTE Enhanced Offline Mail Policy (DTE)

28 Description: - Adds timing options for log uploads and policy updates Benefits: - Improved performance - Increased options and control - Increased # of clients Universal Server can manage Enhanced Policy Update Options (DTE)

29 Description: - Adds Lotus Notes native encryption option for internal traffic - Architecture enhancements Benefits: - Improved integration and encryption options in Lotus Notes environments - Improved performance & functionality - By leveraging latest LN APIs Lotus Notes Enhancements (DTE)

30 Description: - PGP Universal Server decrypts archived encrypted Benefits: - Enables compliance with company archiving and regulatory requirements -Multiple archiving options after decryption Archival Output Of Encrypted s (DTE)

31 Description: - Universal Server now has a user interface for PGP Mobile management Benefits: - Convenience; easier to manage UI For Management Of PGP Mobile

32 Summary PGP Corporation’s Solutions are “Future-proof” Presents a Significant Risk

33 Existing Infrastructure PGP Encryption Solutions PGP Encryption Platform 3 rd Party Solutions Custom Applications Commercial Software Commercial Hardware File Disk and Device Mainframe Mobile Devices PGP Encryption Platform Key Lifecycle Key Storage Authentication / Authorization Automated Operations and ProvisioningPolicy Management Auditing Reporting Logging

Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you! 34 Sisoft