GlobalCerts & SurfControl Only a layered approach can provide total risk management.

Slides:



Advertisements
Similar presentations
Symantec & IMlogic January © 2006 Symantec - CONFIDENTIAL Contents Intro Vision Key Benefits Product Strategy Business Strategy Roadmap.
Advertisements

Public Key Infrastructure and Applications
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Security Controls and Systems in E-Commerce
IT Security Policy Framework
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
1 Effective, secure and reliable hosted security and continuity solution.
The World Internet Security Company ID Management in e-Health February 2007.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Confidentiality and Privacy Controls
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Lisa Farmer, Cedo Vicente, Eric Ahlm
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Chapter 12 Network Security.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
© by Seclarity Inc. 2005, Slide: 1 Seclarity, Inc Lightfall Court Columbia, MD A Blumberg Capital, Valley Ventures and Intel Capital Funded.
Forms Management: Compliance, Security & Workflow Efficiencies.
Dell Connected Security Solutions Simplify & unify.
Instant Messaging – Turning Toys Into Tools Presented by: Marla K. Brock – Bilzin Sumberg Kajetan Koci – Loeb & Loeb Kevin Sullivan – Cohen & Grigsby.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Module 9 Configuring Messaging Policy and Compliance.
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Securing Information Systems
Securing Information Systems
Encrypted from CDS Office Technologies
Regulatory Compliance
HIPAA.
Meganet Corporation VME Mail 2004
OLMEK Building a confidential and secure communication between a Bank and its customers March 2006.
Securing Information Systems
Confidentiality and Privacy Controls
O365 Data Compliance Control of sensitive data is key to cloud adoption Addressing Legal and Regulatory Data Compliance requirements is now a critical.
Vendor of Solutions and Services Integrates Office 365 in Its Management Solution Partner Logo “Our new version of iQ.Suite makes safe and flexible.
COMPLETE BUSINESS TEXTING SOLUTION
Corporate Encryption:
Presentation transcript:

GlobalCerts & SurfControl Only a layered approach can provide total risk management.

Who is GlobalCerts? Founded as Tovaris in Fall 1999 by team of information security and electronic mail experts Changed name to GlobalCerts in 2004 to better illustrate our corporate strategy Brought first S/MIME-compliant secure messaging gateway appliance to market in Fall 2000 Headquarters in Bedford, NH, and offices in Charlottesville, VA, Washington DC, Boston, MA, and Dublin, Ireland Privately held company with customers in the healthcare, insurance, banking, investment, government, legal and corporate spaces in U.S., Canada, and Europe

Turn-Key, ALL INCLUSIVE Secure & Secure Messaging Platform S/MIME Secure Messaging Automatic certificate lookup and harvesting Automatic encryption and decryption Digital signatures SecureMessenger Secur Gateway universal secure messaging feature Enables secure to any recipient, requiring only: Standard web browser address SecureTier Scalable backbone network Connects Secur Gateway appliances Management and distribution of standard X.509 certificates (public keys) Automatic certificate lookup on every message S/MIMECompliant UniversalSecureDelivery GlobalCertificateNetwork

The Benefits & Advantages for Compliance with the GlobalCerts are Clear Turn-key security with little to no user overhead No client software to load on each individual workstation Automatic encryption and decryption Send secure to any recipient Little to no management burden Automated cert management - find and retrieve recipient certificates by default (automatically), on every message sent Integrate secure with anti-virus, content scanning, etc. Link remote locations quickly – within a couple of hours Ensures privacy with strong encryption, ensures confidentiality with symmetric key exchange, ensures integrity with a hash function and ensures non-repudiation with symmetric key exchange.

Who is SurfControl? Leading provider of enterprise threat protection Shields enterprises from known and emerging Internet dangers through Layered Threat Protection Redefined traditional “filtering” into a unified set of web, and messaging security solutions Continuously filter inbound and outbound Internet traffic to eliminate spam, spyware, phishing, web and abuse More than 20,000 customers worldwide

The Risk 80% of breaches originate within an organization and are carried out by an insider. Some may be malign, but more commonly they are ‘user error’ –hitting send by mistake. Information leakage is ranked right after spam as a major content issue facing corporations today. Today, enterprises need to protect not only external threats, but emerging internal threats regulating the need to control outbound content Information taken from research done by IDC.

What am I protected against? Violations of regulatory compliance –HIPAA –GLBA –Sarbox (See additional slides for full description of each) Violations of corporate policy & best practices Loss/leakage of intellectual property Loss/leakage of confidential or customer information Inappropriate content

Regulatory Compliance Healthcare – HIPAA All Protected Health Information (PHI) must be secured to ensure privacy and confidentiality when electronically stored, maintained or transmitted. containing PHI sent across the Internet unencrypted puts a healthcare organization in jeopardy of public scrutiny, stiff fines, and in gross negligence cases can even include imprisonment.

Regulatory Compliance Financial – GLBA Under the Gramm-Leach-Bliley Act financial institutions must provide customers with a notice of privacy policies and must not disclose nonpublic personal information about consumers. GLB requires that the SEC establishes standards for protecting customer information. (Section ) Any perceived threat or hazard to the security or integrity of customer records and information must be protected. This includes customer information in both storage and via .

Regulatory Compliance Enterprises-Sarbanes-Oxley Act (Sarbox) Sarbox was created to restore investor confidence in US public markets, which was damaged by business scandals and lapses in corporate governance. Under Sarbox good corporate governance and ethical business practices are no longer optional niceties. is a key corporate infrastructure that, per sections 302 and 404 need to be further controlled. When leaves an organization it is in clear text and there is no way to “control” the integrity of the information in that message.

The Joint Solution The joint solution from SurfControl & GlobalCerts provides seamless content-forced encryption, allowing for tighter enterprise-wide content protection and compliance enforcement. Users don’t do anything differently to send/receive Administrators don’t manage complex systems Recipients don’t change the way they receive secure messages Sensitive information stays confidential, protected and compliant

Joint Solution Architecture

Who is using our Joint Solution? –Iowa Health System: 10,000+ users (Case Study Available) –Compass Bank: 800+ users –Holmes Murphy: 500+ users –Blue Ball National Bank: 500+ users –Lincare: users –Harris County Hospital 4,000+ users