Prepared By Ben Smyrlian Zix Encryption Network Protects Every Email.

Slides:



Advertisements
Similar presentations
ONE® Mail Training Presentation North York General Hospital North York General Hospital.
Advertisements

An introduction to the State’s Encryption Service State of Minnesota Office of Enterprise Technology and Department of Human Services.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
Curtis Parker | December 2010 | Microsoft Corporation.
Sandhills Center Encryption Overview for External Recipients
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
Compliance in Office 365 Edge Pereira Sandy Millar From Avanade Australia OSS304.
ZixCorp Update CSBS Atlanta David Catalanotto - AE Alex Chiu – SE 17-Oct-11 Copyright 2011 ZixCorp, All Rights Reserved.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
Phil Lee, Head of US Office, Fieldfisher Jim Brashear, General Counsel, Zix © 2015 ZixCorp. All Rights Reserved. THE CHANGING LEGAL PERSPECTIVE ON BYOD.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
© 2011 Colt Technology Services Group Limited. All rights reserved Fax2Mail solution overview Presenter’s Name.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
Encryption Team 2.0 Nayan Thakkar, Eddie Gallon, David Kotar, Bruce Malone and Pamela Dorman.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
1 Secure Services. 2 Secure is a hosted application that provides users with enterprise-grade business features including calendaring, contacts.
ESCCO Data Security Training David Dixon September 2014.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Module 6 Planning and Deploying Messaging Security.
Brandon McCormick Channel Account Manager (781) Zix Training 101: Our Solutions.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
By: Star Duncan & Hannah Cole Computer Apps 4 th Period.
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
Efficiency and Compliance Voice Documentation for Financial Services.
 Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 7 Planning and Deploying Messaging Compliance.
ONE® Pages Training Presentation North York General Hospital.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
The Benefits of Indigo SMS Aumne, Inc. Tel: Fax: Commerce Ct Suite 200, Lisle, IL USA.
Patrick Opela, Director, Enterprise Business Solutions, Stewart Title Interviewed by Neil Farquharson SECURING S IN THE TITLE INDUSTRY 1 © 2015 ZixCorp.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
ProofPoint Encryption Project Kansas Health Solutions Patrick Yancey, Director of Information Technology.
Secure Services Shared Hosted MS Exchange 2010.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Cloud Faxing for Law Firms
Encrypted from CDS Office Technologies
Internet Business Associate v2.0
A Winning Combination !! and Good afternoon…
ZIXCORP The Criticality of Security Dena Bauckman
Introduction to ONE Mail
ZIXCORP The Criticality of Security Kevin Cloutier
Staying Austin College
ONE® Pages Training Presentation
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
September 23rd, 2015.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
ONE® Mail Training Presentation
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Security Hardening through Awareness August 2018
COMPLETE BUSINESS TEXTING SOLUTION
Corporate Encryption:
Presentation transcript:

Prepared By Ben Smyrlian Zix Encryption Network Protects Every

A Leader in Data Protection  Founded in 1998 as an encryption company  More than 11,500 active customers  Committed to innovative, easy-to-use security  Recognized as the industry leader in encryption by Gartner Research  Innovator in the bring-your-own-device (BYOD) market Dallas, TX based company traded on NASDAQ (ZIXI)  Approximately 200 employees  Offices in Burlington, MA and Ottawa, Canada COMPANY OVERVIEW

 20% of all hospitals in the U.S.  32 Blue Cross Blue Shield organizations  25% of all banks and credit unions in the U.S.  All of the U.S. federal banking regulators  The SEC, FINRA and CFPB  Six divisions of the U.S. Treasury TRUSTED REPUTATION THE MOST INFLUENTIAL INSTITUTIONS USE ZIX

Is it just a “don’t send it” policy? When private information needs to go out, do you: o Fax, mail, courier service? o Encrypt to disk / USB / laptop and ship? o Password protect documents or encrypted files? These are challenging alternatives because… o is the preferred method of communication o Cost of postage, paper, and employee time o Cumbersome methods cause frustration with recipients What assurances do you have that employees are following company’s privacy policies? Let’s enhance business communication and ensure compliance with automated policies and easy encryption. HOW DO YOU SEND SENSITIVE INFORMATION TODAY?

World’s largest, shared encryption community o Represents more than 11,500 businesses o Encrypts 1.1M messages a day o 75% of messages without passwords, portals or extra steps Powered by ZixData Center o Customers automatically enrolled o Centralized and automated key exchanges between all customers ZIX ENCRYPTION NETWORK A UNIQUE APPROACH Customers benefit from the industry’s only automatic transparent encryption, regardless of content

How can we connect with so many roadblocks?  Portals  Passwords  Secure attachments  Password resets  Extra steps COMPETING SOLUTIONS THE FRUSTRATION OF SEPARATE COMMUNITIES

GOOGLE APPS MESSAGE ENCRYPTION

BEST METHOD OF DELIVERY OUTBOUND COMPLIANCE ZixData Center ZixGateway Everyone Else Sender TLS TLS Recipient ZixGateway Zix Customer Mail Server

ZixGateway scans the subject line, message body and more than 200 types of attachments. Unique policies designed to reduce false positives and false negatives. Dedicated ZixResearch Center o Develops and manages filters to comply with HIPAA, GLBA and state privacy laws o Custom filters at no additional cost to customers SCANNING CAPABILITIES POWERFUL DLP CONTENT FILTERS

Pre-Built Content Filters: o Financial Identifiers o Financial Terms o Credit Card Numbers o Social Security Numbers ZixCorp’s content filtering capabilities: FINANCIAL SCANNING account numbers, loan or policy numbers, etc. Financial Identifiers AND Financial Terms balance transfer, checking account, refinance, W-2, etc. OR Credit Cards Numbers OR Social Security Numbers number masks for VISA, MasterCard, American Express, Discover, and more number masks for SSN: nine- digit number, number is divided into three parts, numbers never allocated

DLP Content Filters: o Health Identifiers o Health Terms o Social Security Numbers ZixCorp’s content filtering capabilities: HIPAA SCANNING patient IDs, policy numbers, claim numbers, etc. Health Identifiers AND HealthTerms type of clinical diagnosis, prescriptions drugs, illness, etc. OR Social Security Numbers number masks for SSN: nine- digit number, number is divided into three parts, numbers never allocated

Pre-Built Content Filters: o Health Identifiers o Health Terms o Social Security Numbers ZixCorp’s content filtering capabilities: HIPAA SCANNING patient IDs, policy numbers, claim numbers, etc. Health Identifiers AND HealthTerms type of clinical diagnosis, prescriptions drugs, illness, etc. OR Social Security Numbers number masks for SSN: nine- digit number, number is divided into three parts, numbers never allocated

ZIXGATEWAY REPORTING

UNIQUE SECURITY BRANDING BUILDING CONFIDENCE AND AWARENESS Customer Experience – Secure, Transparent with Branding No Password Required Customer Experience – Secure, Transparent with Branding No Password Required

ZixGateway‘s Policy-based Superior TLS o Delivers automatic fail-over to alternate secure delivery method if recipient does not support TLS o Although transparent, is branded to alert recipient the message was secure/compliant in transit o ZixGateway provides reports on how messages are delivered to recipients, including TLS SUPERIOR TLS SUPPORT UNRIVALED BENEFITS WITH ZIXGATEWAY This message was sent securely using ZixCorp.

ZIXPORT ANYONE, ANYWHERE, ANY DEVICE Hosted in ZixData Center with % availability Easy to use, secure web portal with secure read, reply, replay all and download capabilities Superior support for mobile devices and tablets Industry-leading advanced features include o One click “Remember Me” option o Configurable message retention settings o Secure compose capabilities for business partners and customers o Supports 12 languages

ZIXPORT – INBOUND “CONTACT US” SECURE COMPOSE ZixData Center ZixGateway From Signatures Mail Server Outside Sender

ZIXPORT – INBOUND “CONTACT US” SECURE COMPOSE ZixData Center ZixGateway From Website Outside Sender Mail Server

ZIXPORT – INBOUND SECURE RECIPIENT COMPOSE

QUESTIONS?

THANK YOU BEN SMYRLIAN CHANNEL ACCOUNT MANAGER IL, IN, OH, PA