NHIN-Direct SMTP/Email Notes 6/10/2010. Why we chose Email Concepts match the charter exactly Implementations match the charter exactly* Well understood.

Slides:



Advertisements
Similar presentations
MEDITECH … Direct Messaging John Valutkevich Michael Henricksen
Advertisements

Admin: Simple to provision and configure Policy driven via Transport Rules Customizable branding of encrypted s and mail reading portal Allows.
DIRECT TRANSPORT FOR QH 10/18-19 F2F NOTES (SPN).
Modul 7 Preservasi Surat Elektronik Mata Kuliah Preservasi Informasi Digital.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
S&I Framework Provider Directories Initiative esMD Work Group October 19, 2011.
Direct Implementation Perspective 0 Mark Bamberg, Vice President Research & Development MEDfx.
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
Internet Messaging in 60 Minutes Terry Gray -University of Washington Policy Issues Mission Critical Messaging Goals Relevant Standards Standards Update.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Today we will discuss.
Security Jonathan Calazan December 12, 2005.
Chapter 30 Electronic Mail Representation & Transfer
Guide to Operating System Security Chapter 10 Security.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
Deployment Models A. client (no S/MIME) »NHIN-Direct developed security agent »off-the-shelf S/MIME proxy B. client using Native S/MIME »Internet.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Tracing Examples Computer Forensics Tracing Examples.
03/09/05Oregon State University X-Sig: An Signing Extension for the Simple Mail Transport Protocol (SMTP) Robert Rose 03/09/05.
SMTP, POP3, IMAP.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Securing Microsoft® Exchange Server 2010
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Official information in – managing the risk of leakage ● Reduce risk via protective markings ● Simplify.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
NHIN-Direct SMTP/ Notes 6/8/2010. Why we chose Concepts match the charter exactly Implementations match the charter exactly* Well understood.
Module 6 Planning and Deploying Messaging Security.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Mandatory Payload = MU2 Consolidated CDA. Qualifier: "leniency" (allowance for null or alternative codes) should be allowed in the following areas of structured.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Module 7 Planning and Deploying Messaging Compliance.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Corent’s SurPaaS Transforms Your Software into Scalable SaaS on Windows Azure – in Days! COMPANY PROFILE: CORENT TECHNOLOGY INC. Corent’s SurPaaS is a.
Security fundamentals Topic 9 Securing internet messaging.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Technical Awareness on Analysis of Headers.
Hosted Microsoft Exchange & Collaboration Emergic nextGenMail Hosted Microsoft Exchange & Collaboration Presented By: Sales Person Name ID: Mobile:
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Colleen Alber OnBase Mail Integrations. Agenda 1.Integration for Microsoft Outlook 2.Mailbox Importer.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Meganet Corporation VME Mail 2004
S/MIME T ANANDHAN.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Data Security for Microsoft Azure
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Module 4 System and Application Security
Agenda The current Windows XP and Windows XP Desktop situation
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

NHIN-Direct SMTP/ Notes 6/10/2010

Why we chose Concepts match the charter exactly Implementations match the charter exactly* Well understood by end users Well understood by existing ISP industry Well understood by existing vendors Almost no new code - security agent only (same code that is a subset of other implementations) ISPs can participate with their existing infrastructure and skill set

Implementation Overview Really, it’s just . Security agent plugged in at any point in the pipeline between Client (Source) and Server (Source HISP) Channels can be TLS- encrypted to protect routing information Client EHR, PHR Server Server Client EHR, PHR SMTP, MAPI POP3, IMAP, MAPI SMTP POP3, IMAP, MAPI SMTP, MAPI SSHDHD

Key Technologies Content Packaging: RFC MIME Addressing: Security & Trust: S/MIME HISP-HISP Transport: SMTP(S) Client-HISP Transport: SMTP, POP3, IMAP, MAPI, etc… Certificate distribution: DNS CERT

Structure, metadata and innovation Scalable structure – Body Text (always available, Individual Involvement) – Unstructured attachments (PDF) – Structured attachments (CCx, SCRIPT, etc.) – Explicit metadata MIME part (XDM) Transport has proven itself over 20+ years Innovate in the payload

Security Agent S/MIME Sign and Encrypt of messages fully supports requirements of Security & Trust Workgroup Certificate distribution by DNS CERT records Scalable approach to PKI Management – starts easy as TLS, adds ability to scale down to individual – HISP manages certificates – Organization manages certificates – Individual manages certificates Ability to use across implementations demonstrates the value of taking a transport-independent approach

Sample Message “On the wire” thread-index: AcsGjnbwhdd7B5CFQSuA2mgm0a8D9Q== Received: from umeshma4 ([ ]) by nhind.hsgincubator.com with Microsoft SMTPSVC( ); Mon, 7 Jun :12: Message-ID: From: "Dr Biff Hooper" To:"Dr. Alsip", Subject: Fw: Patient Referral Date: Mon, 7 Jun :11: Organization: Biff's Clinic Content-Transfer-Encoding:base64 MIME-Version: 1.0 Content-Type:application/pkcs7-mime; smime-type=enveloped-data; name="smime.p7m" X-Priority: 3 X-MSMail-Priority: Normal Importance: Normal X-Mailer: Microsoft Windows Live Mail X-MimeOLE: Produced By Microsoft MimeOLE V Content-Class: urn:content-classes:message Priority: normal Return-Path: X-OriginalArrivalTime: 07 Jun :12: (UTC) FILETIME=[76B95050:01CB068E] MIMDtx4GCSqGSIb3DQEHA6CDA7cOMIMDtwkCAQAxggJvMIG6AgEAMCMwFTETMBEGA1UEAxMKVU0t QU1BTEdBMQIKFmbg8QAAAAAAGDANBgkqhkiG9w0BAQEFAASBgMrVicD/tjx0ZZ0daK0nN2GMLqJg FalBuKGxe+ZZATxHxJPCD4rg80pI5vLt/s8A3sRrCrrOSniwpl1kzg6Nunlq6wz/PpK7QTVofwpt H0ZGYMRin/CxQD4tlf9YFmLuXNdvrvG7AkgRdMS7MZZzBliEdCdUZncb6qnyEf9Y1JlsMIIBrgIB ADCBlTCBhzELMAkGA1UEBhMCVVMxETAPBgNVBAgTCE1pc3NvdXJpMQ8wDQYDVQQKEwZDZXJuZXIx... fEL7VbSd34tez2pUHCL9FbtRBWReSW1hcLEvlsJjeCBaVAKFrW6VZqzTt+M=

Reliable Messaging Store and forward model is critical in a massively distributed network – because it is likely that destinations will be unavailable – Daily issues, upgrades, disaster, remote Ability to route across intermediate hops will be important in a heterogeneous network – Corporate intranet gateways

Why Existing Services Matter Operations – Administration and provisioning – Backups – System health monitoring – Patch and upgrade process Security history, minimal new attack surface Multi-tenant issues worked out Training and industry skill set – admin, NOC, customer service Account support: quota management, billing, fraud detection, etc.

Demo: Step 1 Source: Outlook + Windows SMTP Destination: Thunderbird + Postfix Notes – Attached CCD document – Read receipt

Demo: Step 2 Source: Millennium + IronPort Destination: Thunderbird + Postfix Notes – EHR integration – Flexible attachment types

Demo: Step 3 Source: Thunderbird + Postfix Destination: Windows Live Mail + Windows SMTP Notes – Simple text message – Out of Office

Demo: Step 4 Source: Windows Live Mail + Windows SMTP Destination: HealthVault & Thunderbird Notes – Multiple recipients – Structured PHR integration

Demo Technologies Clients – Cerner Millennium – Thunderbird – Outlook – Windows Live Mail – HealthVault DNS – Bind Servers – Windows SMTP – Postfix Operating Systems – Amazon EC2 – Windows Server – Linux

Demo Topology

Since Tuesday Secure Exchange Solutions has successfully sent and received NHIN-D messages using the SMTP implementation A “desktop gateway” is available that enables any currently- live mail service (Gmail, Hotmail) to be used for NHIN-D messaging – We believe that with the SMTP solution, the bar for the largest webmail providers to offer NHIN-D service is low enough that we can expect to see offerings emerge.