Securing Corporate Email & Documents Richard Elphick Titus Labs.

Slides:



Advertisements
Similar presentations
We have to Share Data - Now What? Jon R. Wall Security / IA Microsoft.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Admin: Simple to provision and configure Policy driven via Transport Rules Customizable branding of encrypted s and mail reading portal Allows.
® Microsoft Office 2010 Browser and Basics.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Authentication Administration Storage Compliance Authentication Administration Storage Compliance Audio Conferencing and Calendaring .
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
The Inexperienced 19 The Stressed The Careless The Disorganized The Industrious The Newcomer The Overcautious The Home.
Message Classification Document DocumentClassification SharePointSolutions Server 2008 R2 FCI Its all about Classification…
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Security and Policy Enforcement Mark Gibson Dave Northey
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
SIM318. Protect Sensitive Information Reduce risk associated with information leaks Improve regulatory compliance Centrally manage information protection.
BusinessEnterprise Business Business Essentials Business Premium ProPlusE1E3 Target Customer Price per user per year $USD $99$60$150$144$96$240 Seat Cap.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Putting Secure Information Sharing and Access Management Into Practice John Hewie Microsoft Canada Tim.
April, 2008 Microsoft Rights Management Service (RMS) Review.
Overview. SharePoint & Office 2010 Tech Preview Additional products being launched: Project 2010 and Visio 2010 ~$1B annual R&D investment across Office,
ETP Reloaded e-Commission Technological Platform Upgrade to Microsoft Office 2003 DIGIT Adapted to DG SCIC.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Demos Sharing a document B2B Protected with Policy Tips Departmental Templates Mac Outlook Protected PDF OneDrive / SharePoint Document Tracking.
1 Copyright © 2014 M. E. Kabay. All rights reserved. CSH5 Chapter 67 “Developing Classification Policies for Data” Karthik Raman & Kevin Beets Classification.
Module 9 Configuring Messaging Policy and Compliance.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
Module 9 Configuring Messaging Policy and Compliance.
Module 7 Planning and Deploying Messaging Compliance.
Microsoft.com/publicsector Records Management Microsoft Records Management for Government Agencies.
XP Browser and Basics COM111 Introduction to Computer Applications.
Building an EDRM solution on the Microsoft & Tower Platform Jonny Chambers (Microsoft) & Jason Boswell (Tower Software)
Implementing Microsoft Exchange Online with Microsoft Office 365
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Comprehensive Project Management Solutions with the.NET Server family.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
Microsoft Exchange Server 2013 Security Mick Tomlinson– Technical Instructor New Horizons.
Microsoft ® Outlook & Microsoft Exchange Delivering Value & Choice across PC, Phone, and Browser The Right Tool for the Job Delivering Value & Choice.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
1/10/2018 9:33 PM Cloud Roadshow © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO.
Secure your complete data lifecycle using Azure Information Protection
A Winning Combination !! and Good afternoon…
Data Protection Session
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Secure your complete data lifecycle using Azure Information Protection
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Azure Information Protection
Azure Information Protection
06 | Planning Exchange Online and Configuring DNS Records
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Using classification for access control and compliance
Encryption in Office 365 Shobhit Sahay Technical Product Manager
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Azure Information Protection
Make it real: Help your customers comply with the GDPR
Presentation transcript:

Securing Corporate & Documents Richard Elphick Titus Labs

Titus Labs Overview East Midlands WARP

Titus Labs Overview Headquartered in Ottawa, Canada Established in the UK since 2005 Microsoft platform Solution Provider Classification Document Classification Sharepoint Solutions Data Classification Market Leader - Local Authorities, Criminal Justice, Central Government, Defence, Commercial 1.5 million+ seats world wide 150,000+ seats in UK 3

Top Reasons for Protective Marking Awareness Accountability Compliance Efficiency Enforcement Automation 4 RESTRICTED PROTECT NOT PROTECTIVELY MARKED

UK Government Compliance HMG Security Policy Framework Security Policy No. 2: Protective Marking and Asset Control GCSX Code of Connection (CoCo) v4.1 Government Protective Marking Scheme (GPMS) 5 | © TITUS LABS. ALL RIGHTS RESERVED | GCSX NETWORK CONTROL NUMBER 23 (MUST) The mail client or user adds security labels to each that carries a protective marking of PROTECT or higher MANDATORY REQUIREMENT 11 Departments and Agencies must apply the Protective Marking System and the necessary controls and technical measures as outlined in this framework.

GPMS Classification Levels Protective MarkingImpact level Top Secret6 Secret5 Confidential4 Restricted3 Protect2, 1 Not Protectively Marked0 6

Sensitive Data Breach: Fines Lawsuits Embarrassing headlines Loss of IP Possible risk to public safety

Communication and Security Challenges Information Security  High storage and eDiscovery costs with “archive everything”  Low adoption of security technologies e.g. Encryption  Leveraging Data Loss Prevention and perimeter security solutions Inadvertent Data Loss  Unstructured information assets  Sensitive s forwarded to inappropriate recipients  Confidential document leaks  Compliance with government classification schemes e.g. GPMS  Inconsistent enforcement of classification policies  Lack of information handling awareness and accountability Policy Enforcement 8

| © TITUS LABS. ALL RIGHTS RESERVED | Start with Protective Markings Helps inform risk-management based decisions Promotes secure information sharing Forces users to stop and think about the value of data RESTRICTED PROTECT NOT PROTECTIVELY MARKED

Message Classification Document Classification Titus Labs Protective Marking Solutions 10 SharePoint Server 2008 R2 FCI Classification & policy enforcement at the desktop

Titus Labs Message Classification Key FeaturesBenefits Classification Selector Enforce classification at point of creation Label MarkerRaise security awareness through visual markings Metadata GeneratorEnhance archiving, DLP, perimeter security solutions Policy VerifierEducate users and stop slips Security EnablerTransparently encrypt and protect s 11 Classification and policy enforcement at the desktop for s, meeting requests, and tasks

Classification Selector – Simple for Users 12 Compose Click Send Classification pop-up Guided classification

Help Tooltips in Select Dialog

Customizable Online Help 14 Customizable help page......reinforces classification training

Visual Labels for Awareness 15 Header Footer Disclaimer Subject Marking Titus Labs Task Pane & Ribbon (Office 2007)

Reduce Inadvertent Disclosure 16 Policy Verifier: Before Send  Trusted Domains  Safe Recipients  Content Validation  No Change/Downgrade  Maximum Recipients  Warn on Send All messages are customizable

Message Classification Web Access Key FeaturesBenefits Classification Selector Enforce classification at point of creation Label MarkerRaise security awareness through visual markings Metadata GeneratorInteroperate with TMC for Outlook, and enhance archiving, DLP, perimeter security solutions Policy VerifierEducate users and stop slips OWA PreventPrevent viewing of confidential information when using OWA 17 Classification and policy enforcement for OWA s, meeting requests, and tasks

TMC & TDC 3.3 Platform Support Microsoft Office 2003, 2007, 2010 Microsoft Windows XP, Vista, 7 Microsoft Exchange 2003, 2007, 2010

Key Takeaways 19 UseableHigh user acceptance/adoption with minimal disruption DeployableDeploys fast and easily; SMS and Group Policy 1 MB footprint per application AffordableLow cost per user; leverages existing infrastructure High ImpactImmediate compliance and information protection

Conference Round-up John Doyle Leicester City Council, EMGWARP Vice Chair

EMGWARP Conference Thank you