ZIXCORP The Criticality of Security Kevin Cloutier

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
1 3M Privacy Filters Justification Toolkit: How to Use The following presentation is meant to provide you with the most impactful data points to help you.
Phil Lee, Head of US Office, Fieldfisher Jim Brashear, General Counsel, Zix © 2015 ZixCorp. All Rights Reserved. THE CHANGING LEGAL PERSPECTIVE ON BYOD.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Apps VS Mobile Websites Which is better?. Bizness Apps Survey Bizness Apps surveyed over 500 small business owners with both a mobile app and a mobile.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Prepared By Ben Smyrlian Zix Encryption Network Protects Every .
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
Mobile Apps For Small Businesses Your customers are mobile. Is your business?
Brandon McCormick Channel Account Manager (781) Zix Training 101: Our Solutions.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
LEANMAIL PROTECTION PLANS Automation meets working by design Copyright Atrendia 2015 Inbox480 LeanMail Inbox480 Protection Cc: LeanMail Cc: Protection.
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
The State of Computer & Data Security in Corporations Independent Survey.
Whitelist Management. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Patrick Opela, Director, Enterprise Business Solutions, Stewart Title Interviewed by Neil Farquharson SECURING S IN THE TITLE INDUSTRY 1 © 2015 ZixCorp.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Secure Services Shared Hosted MS Exchange 2010.
Total Enterprise Mobility Comprehensive Management and Security
Thank you/Appreciate time Intro me- Manage channel last 2 years
Mobile Devices in the Corporate World
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
The time to address enterprise mobility is now
Encrypted from CDS Office Technologies
Apps VS Mobile Websites Which is better?
Business GROWTH With Marketing.
A Winning Combination !! and Good afternoon…
ZIXCORP The Criticality of Security Dena Bauckman
How To Deliver Apps Faster And Secure Them The Microsoft Way
Mobile Data Solutions Inc
Boomerang Adds Smart Calendar Assistant and Reminders to Office 365 That Increase Productivity and Simplify Meeting Scheduling OFFICE 365 APP BUILDER.
Working with Google Applications Gmail, a popular
Protect sensitive information with Office 365 DLP
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Attention! In order to print this two-page flyer, please follow these steps: 1) Personalize the text and logo area with your custom copy and logo. 2) Delete.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Gain powerful insights into your print environment
Understanding best practices in classifying sensitive data
How to introduce polling as a presenter… let’s make it easy for your audience to participate! Example instruction slide for using web voting.
CrossXing Revised 6/30/16 HCB00480.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
To , or not to – that is the question
Digital $$ Quiz Test your knowledge.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Meeting, training & teaching in the interactive iWorld
Collaborative Business Solutions
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Business Document Platform
Guidance: This sales script is designed to be used. after
COMPLETE BUSINESS TEXTING SOLUTION
Protect data in core business applications
Corporate Encryption:
2019 Thales Global Cloud Security Study
Microsoft Virtual Academy
Presentation transcript:

ZIXCORP The Criticality of Email Security Kevin Cloutier 781-993-6221 kcloutier@zixcorp.com Oct 2015 1

ABOUT ZIXCORP Founded in 1998 as an email encryption company, now with DLP and BYOD security More than 11,500 active customers including: Six divisions of the U.S. Treasury All of the FFIEC U.S. federal financial regulators (incl. FDIC and OCC) The U.S. Securities and Exchange Commission 24 U.S. state financial regulators More than 2,000 U.S. financial institutions 25% of all banks in the U.S. 20% of all hospitals in the U.S. 32 Blue Cross Blue Shield organizations 2

YOUR BIGGEST SOURCE OF DATA LOSS 3

Your organization is sending PII out today Analysis shows an average of 5% of outbound volumes include PII, NPI, PHI, SSNs, CCs, etc. You need to know who sent, who received, what was sent, why it was sent, and how it was sent Even one email violation, depending on your industry, can cost you thousands of $$$$ and public data breach exposure Your organization has a mobility risk Employees are using mobile phones to download email Data proliferation on mobile devices is a huge risk, even with an MDM solution in place KNOW YOUR EMAIL 4

Data Loss Prevention (DLP) Encryption EMAIL SECURITY TOOLS TO MITIGATE THE RISKS Data Loss Prevention (DLP) Encryption Mobile Device Management (MDM) / Bring Your Own Device (BYOD) Security Compliance Reporting 5

Enhanced Email DLP Enhanced Email DLP allows organizations to: Detect outbound emails that violate corporate policies Capture and analyze email violations Filter, search and report on email violations Quarantine sensitive emails that contain sensitive information based on wide range of parameters 6

Email DLP View of Sensitive email 7

You now have the sensitive email, but what do you do with it? AFTER DLP, THEN WHAT? You now have the sensitive email, but what do you do with it? If authorized to be sent, encrypt it But not all email encryption is equal Do not deploy Email Encryption to just: 8

Policy based email encryption A USABLE EMAIL ENCRYPTION SOLUTION Policy based email encryption Integrates with email DLP to auto encrypt sensitive content Transparent email encryption Auto encrypt to other organizations using the same solution/protocol with no logins/passwords needed Automatic Key Management Encrypted Delivery to “Non” encryption users A system that delivers the encrypted email to anyone regardless of what technology they have on receiving end Encrypted Delivery to Mobile Devices 9

WHY ARE WE ALL SPEAKING A DIFFERENT LANGUAGE? How can we connect with so many roadblocks? Portals Passwords Secure attachments Password resets Extra steps

Shared Public Key Directory THE POWER OF EMAIL ENCRYPTION TRANSPARENCY An elegant solution is one that works without you even knowing it. No portals No passwords No extra steps Shared Public Key Directory

WHAT ABOUT DELIVERY OF ENCRYPTED EMAIL ON MOBILE DEVICES? Typically, recipients are unable to open encrypted email on mobile devices. The result: User frustration Interrupted workflow Reduced productivity

EMAIL ENCRYPTION SOLUTION SHOULD MANAGE MOBILITY EFFECTIVELY AND EFFICIENTLY Senders and receivers using the solution should experience encrypted email like any other email on their mobile device. Accessing encrypted mobile email should be as easy as one click.

WHAT ABOUT ENCRYPTED EMAIL TO RECIPIENTS WHO DO NOT HAVE DECRYPTION TECHOLOGY? The email still has to go, but how? Solution should auto recognize the recipient does not have technology in place but still delivers the email encrypted via a secure messaging portal (pull) or via an encrypted HTML attachment (push) Registration to receive these encrypted emails must be simple and non-invasive Allow for the recipient to reply back encrypted AND to compose brand new emails encrypted Consider impact of delivery method on mobile devices 14

Good News. I am NOT going to describe to you what BYOD is Good News! I am NOT going to describe to you what BYOD is. What I will confirm is that with the time we have together, I will be referring to employee owned devices rather than to corporate-owned, personally enabled – C.O.P.E. devices. Quick straw poll. Please may I ask those of us here who have at least one BYOD device to raise their hand. Thank you. [Comment] 15

Most Popular Mobile Business Apps Email, Calendar and contacts As we all know, most employees work in your company buildings. They don’t go out to your customers. They don’t talk with industry analysts or investment funds. In fact, as you can see form this chart, 86% of employees really only need access to their emails, their calendar and their contact list. So why would we pay to give everyone MDM if only 14% - sales teams and senior staff - need it. MDM may have sufficed in the past, however nowadays – especially in this less secure world - we need a multi-tiered strategy. Let’s talk security for a moment. Source: BYOD and Mobile Security Report, 2014, Holger Schulze, Information Security Community on LinkedIn 16

Market response to BYOD Survey results indicate 45% of respondents report that within the previous 12 months, one or more employees lost a mobile device containing company data InformationWeek’s 2014 Mobile Security Report 3.1 Million smartphones were stolen in the USA during 2013 - sixty per minute Consumer Reports’ Annual State of the Net survey, 2014 72% of respondents say their top mobile security concern is data loss from lost or stolen devices As you can see from the slide, InformationWeek’s 2014 survey on Mobile Security found that in 45% of companies, one or more employees lost a mobile device containing company data within the previous 12 months. In fact 3.1 million smartphones were stolen in the USA in 2013 – possibly 5 million in 2014 - with approximately half of them never being recovered despite “find my phone” type GPS location applications. So that’s why the top concern around BYOD is securing company data on mobile devices. 17

Mobile Device Users’ Frustration “In their quest to do their jobs, mobile device users are offered comparatively sophisticated communications platforms that they're often untrained to effectively use, control, and make productive. - Tom Henderson, IT World And if these figures weren't bad enough, most employees find MDM solutions cumbersome or difficult to use. So they’re LESS inclined to maintain security, LESS inclined to stick to your Company Security policy. 18

Adding to BYOD Challenges These figures come from the Ponemon Institute The survey found that a large proportion of employees have disabled the auto-lock function – the time out function – on their tablets and smartphones. And that an incredible 93% anonymously admit to violating corporate policies designed to prevent data breaches. With a complex MDM solution, your employees are driven to circumvent the security hurdles. You see BYOD devices were never designed for corporate use. They are consumer products. They are specifically designed to share information between applications – to give the user a seamless experience. In implementing MDM solutions, the vendors are trying to undo this seamlessness. Trying to put up barriers in a device designed to have no barriers. And that introduces all kinds of complexities both for IT and for the users. 19

TYPICAL MDM SOLUTION Data Proliferation EMAILS ARE RETAINED IN PERMANENT MEMORY Data Proliferation Here is MDM… and this is how emails are handled. Just as with a desktop computer, the emails are being downloaded and stored in the device’s permanent memory. 20

TODAY’S APPROACHES ARE MISSING THE POINT MDM & CONTAINER VENDORS Assume Data on the Device Too Complex and Too Expensive Too Invasive For Users Too Difficult To Implement Creates Corporate Liability Concerns Overkill for Email Problem Getting Worse Manage access, not devices!

Brooklyn gives IT the security they need and The state of byod USERS WANT EASE OF USE WHAT THEY DON’T WANT IS: Company monitoring their personal activities or restrict apps Interruption of their calendar, contacts, phone and texting functions Invasion or deletion (wiping) of their personal data COMPANIES WANT SAFE DATA WHAT THEY DON’T WANT IS: Corporate data distributed on hundreds of devices Users resorting to personal email or other insecure means of maintaining productivity Brooklyn gives IT the security they need and .

EMAIL BYOD SOLUTION Full email functionality, but NO data on the device, so no need to manage the device Data Proliferation 23

EMAIL BYOD DELIVERS THE BEST OF BOTH WORLDS Companies benefit from Enhanced Data Protection Productive employees and improved morale Minimize Corporate Liability One copy of corporate data Compliance Reporting License by user, not device Employees benefit from Convenience of using their own devices Control of their devices and personal data Protected privacy without employer access to personal data

On Demand and Scheduled Reports Graphical and Detailed Drill downs EMAIL COMPLIANCE REPORTING Who sent, Who Received, Top Domains, Delivery Method, Time Stamps, Subject, Policy And Content! What sensitive data was sent! On Demand and Scheduled Reports Graphical and Detailed Drill downs Includes Reporting on all delivery methods Including TLS Exportable to formats usable by you Allows you to know what email was viewed on a mobile device and when it was viewed 25

To See How ZixCorp Provides Email DLP, Encryption, and BYOD Security come to our booth or contact me Thank you Kevin Cloutier 781-993-6221 Kcloutier@zixcorp.com