1 ZIXCORP The Criticality of Email Security Dena Bauckman Director Product Management April 2015.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
MAXIMIZE WEBFOCUS GO MOBILE! Copyright 2010, Information Builders. Slide 1 Brian Carter 3/21/12.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Phil Lee, Head of US Office, Fieldfisher Jim Brashear, General Counsel, Zix © 2015 ZixCorp. All Rights Reserved. THE CHANGING LEGAL PERSPECTIVE ON BYOD.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Federated Search: True Enterprise Search Abe Lederman, President and CTO Deep Web Technologies Search Engine Meeting – April 28-29, 2008.
Offer Exchange Let your customers pick their preferred version of the world’s most popular business and collaboration platform Lync Secure, business-grade,
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
BUSINESS B1 Information Security.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Integrated Security & Confidentiality (S&C) Guidelines Across Programs: It Does Work National Security & Confidentiality Guidelines Webinar April 10, 2012.
Prepared By Ben Smyrlian Zix Encryption Network Protects Every .
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
Brandon McCormick Channel Account Manager (781) Zix Training 101: Our Solutions.
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
The Changing World of Endpoint Protection
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
The State of Computer & Data Security in Corporations Independent Survey.
Whitelist Management. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Patrick Opela, Director, Enterprise Business Solutions, Stewart Title Interviewed by Neil Farquharson SECURING S IN THE TITLE INDUSTRY 1 © 2015 ZixCorp.
Click to edit Master title Information Security: A Discussion Wednesday, December 6, 2006 Bob Steadman Director, National IT Security Sobeys.
AUTO SAFE USB Consulting “Plugging in the right solutions for road safety” Nicholas Szczerbickyj, Antoine Buteau, Wendy Erica Lai.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
 2014 Diagnotes, Inc. – Confidential & Proprietary Spring Into Quality Symposium March 14, 2014.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Secure Services Shared Hosted MS Exchange 2010.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Complete Cloud Security Anyone, anywhere, any app, any device.
Total Enterprise Mobility Comprehensive Management and Security
Mobile Devices in the Corporate World
The time to address enterprise mobility is now
Protection of CONSUMER information
ZIXCORP The Criticality of Security Dena Bauckman
Mobile Data Solutions Inc
Impact of IT Consumerisation on Enterprise Security
Attention! In order to print this two-page flyer, please follow these steps: 1) Personalize the text and logo area with your custom copy and logo. 2) Delete.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
ZIXCORP The Criticality of Security Kevin Cloutier
Digital $$ Quiz Test your knowledge.
University of Maryland Robert H. Smith School of Business
COMPLETE BUSINESS TEXTING SOLUTION
Corporate Encryption:
Presentation transcript:

1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015

2 YOUR BIGGEST SOURCE OF DATA LOSS

3 WE DON’T THINK TWICE BEFORE HITTING SEND o Learn from the Sony Hack −Executives were comfortable sending out this information −Perception vs Reality o It won’t happen to me mentality −Its like not getting car insurance because you are a good driver −Sending an is like sending a post card in the mail o Lack of Awareness −Man in the Middle Attacks o Sending Sensitive Information Unintentionally −“Should I be encrypting this?”

4 SECURITY TOOLS TO MITIGATE THE RISKS o Data Loss Prevention (DLP) o Encryption o Mobile Device Management (MDM) / Bring Your Own Device (BYOD) Security

5 DATA LOSS PREVENTION (DLP) FOR o Enhanced DLP allows organizations to: −Detect outbound s that violate corporate policies −Capture and analyze violations −Filter, search and report on violations −Quarantine sensitive s that contain sensitive information based on wide range of parameters

6 DLP VIEW OF SENSITIVE

7 AFTER DLP, THEN WHAT? o You now have the sensitive , but what do you do with it? o If authorized to be sent, encrypt it o But not all encryption is equal o Do not deploy Encryption to just:

8 A USABLE ENCRYPTION SOLUTION o Policy based encryption −Integrates with DLP to auto encrypt sensitive content o Transparent encryption −Auto encrypt to other organizations using the same solution/protocol with No logins/passwords needed −Automatic Key Management o Encrypted Delivery to “Non” encryption users −Anyone, anywhere and on any device

9 How can we connect with so many roadblocks?  Portals  Passwords  Secure attachments  Password resets  Extra steps WHY ARE WE ALL SPEAKING A DIFFERENT LANGUAGE?

10 An elegant solution is one that works without you even knowing it.  No portals  No passwords  No extra steps Shared Public Key Directory THE POWER OF ENCRYPTION TRANSPARENCY

11 WHAT ABOUT RECIPIENTS WHO DO NOT HAVE ENCRYPTION TECHOLOGY? o Secure messaging Portal −Registration to receive these encrypted s must be easy and non-invasive −Allow for the recipient to reply back encrypted AND to compose brand new s encrypted −Consider impact of delivery method on mobile devices

12 Typically, recipients are unable to open encrypted on mobile devices. The result:  User frustration  Interrupted workflow  Reduced productivity WHAT ABOUT DELIVERY OF ENCRYPTED ON MOBILE DEVICES?

13 ENCRYPTION SHOULD MANAGE MOBILITY EFFECTIVELY AND EFFICIENTLY o User should experience encrypted like any other on their mobile device. o Accessing encrypted mobile should be as easy as one click.

14

15 MOST POPULAR MOBILE BUSINESS APPS , CALENDAR AND CONTACTS 15 Source: BYOD and Mobile Security Report, 2014, Holger Schulze, Information Security Community on LinkedIn

16 MARKET RESPONSE TO BYOD o Survey results indicate: −45% of respondents report that within the previous 12 months, one or more employees lost a mobile device containing company data InformationWeek’s 2014 Mobile Security Report −3.1 Million smartphones were stolen in the USA during sixty per minute Consumer Reports’ Annual State of the Net survey, 2014 −72% of respondents say their top mobile security concern is data loss from lost or stolen devices InformationWeek’s 2014 Mobile Security Report

17 ADDING TO BYOD CHALLENGES 17

18 Manage access, not devices! TODAY’S APPROACHES ARE MISSING THE POINT MDM & CONTAINER VENDORS –Assume Data on the Device –Too Complex and Too Expensive –Too Invasive For Users –Too Difficult To Implement –Creates Corporate Liability Concerns –Overkill for , Contact and Calendar –Problem Getting Worse

19 WHAT THEY DON’T WANT IS:  Company monitoring their personal activities or restrict apps  Interruption of their calendar, contacts, phone and texting functions  Invasion or deletion (wiping) of their personal data USERS WANT EASE OF USE Brooklyn gives IT the security they need and. COMPANIES WANT SAFE DATA WHAT THEY DON’T WANT IS:  Corporate data distributed on hundreds of devices  Users resorting to personal or other insecure means of maintaining productivity THE STATE OF BYOD

20 BYOD DELIVERS THE BEST OF BOTH WORLDS Companies benefit from –Enhanced Data Protection –Productive employees and improved morale –Minimize Corporate Liability –One copy of corporate data –License by user, not device Employees benefit from –Convenience of using their own devices –Control of their devices and personal data –Protected privacy without employer access to personal data

21 ABOUT ZIXCORP o Founded in 1998 as an encryption company, now with DLP and BYOD security o 11,500+ active customers including: −Six divisions of the U.S. Treasury −All of the FFIEC U.S. federal financial regulators (incl. FDIC and OCC) −The U.S. Securities and Exchange Commission −24 U.S. state financial regulators −More than 2,000 U.S. financial institutions −25% of all banks in the U.S. −20% of all hospitals in the U.S. −32 Blue Cross Blue Shield organizations 21

To See How ZixCorp Provides DLP, Encryption, and BYOD Security come to our booth Thank you Dena Bauckman Director Product Management