© 2009 WatchGuard Technologies WatchGuard Email Encryption Subscription Ensuring Privacy and Compliance of Messages.

Slides:



Advertisements
Similar presentations
Admin: Simple to provision and configure Policy driven via Transport Rules Customizable branding of encrypted s and mail reading portal Allows.
Advertisements

GlobalCerts & SurfControl Only a layered approach can provide total risk management.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Product and Technology News Georg Bommer, Inter-Networking AG (Switzerland)
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Security Jonathan Calazan December 12, 2005.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Office 365 Message Encryption – Encrypt messages to any SMTP address Personal account statement from a financial institutions Information Rights Management.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Electronic Mail Security
Masud Hasan Secue VS Hushmail Project 2.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Prepared By Ben Smyrlian Zix Encryption Network Protects Every .
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Module 6 Planning and Deploying Messaging Security.
© 2009 PGP Corporation Confidential State of Key Management Brian Tokuyoshi Solution Manager.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Brandon McCormick Channel Account Manager (781) Zix Training 101: Our Solutions.
Types of Electronic Infection
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
 Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
CertifiedMail …when privacy matters ™. What CertifiedMail empowers you to achieve Secure …simplified. End-to-end secure messaging From any sender.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Weever Apps Capabilities Overview. Over 65% of business have mobile employees.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
Security fundamentals Topic 9 Securing internet messaging.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Secure . is a means of exchanging digital messages from an author to one or more recipients – it is instant with no delay or postal costs.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
Secure Services Shared Hosted MS Exchange 2010.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Total Enterprise Mobility Comprehensive Management and Security
July 19, Secure Messaging Models Co-existence and Interoperability Russell W. Chung New York, NY July 19, 2005.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Cloud Faxing for Law Firms
Encrypted from CDS Office Technologies
Internet Business Associate v2.0
Andy Taylor Partner Program, RPost
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
WatchGuard XCS Threat Prevention
netprem.com Postal Registered Mail – by Electronic Means
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Introduction to Symantec Security Service
Presentation transcript:

© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages

Everyday Messages Contain Private Data  Privacy  Compliance  Sensitive Information  Confidential Data  Intellectual Property  Attachment Risk  Mandated Third Party Security  Security Prudence

Encryption Use Cases  Business Processes  Operations, finance, legal, M&A and HR  Sales, purchase orders, quotes and invoices  Compliance  PCI, HIPAA, EU Directive, GLBA, PIPA…  3 rd party communications  Business-Class Messaging  Reliable read receipts and branded Envelopes  Message recall and expiration

Why Encryption Isn’t Used By Everyone…

Encryption Technology Evolution S/MIME & PGP Public Key Open Source Challenges  Certificates  Complexity  Limited Adoption Universal Pull Store-and-Forward No Certificates Challenges  Overhead  ISP-Like Costs  Niche Universal Push Universal Reach No Overhead Challenges Attachment Think Fax MachinesThink Post OfficeThink Registered Mail TIME 3 rd generation secure Envelope is first viable solution for mainstream adoption

WatchGuard Encryption Subscription

WatchGuard Data Loss Prevention  Deep Inspection  & Web  Content and context scanning  Consolidated Policy Management  Single UI  Reporting  Integrated Remediation  Encryption  Block or allow  Quarantine or reroute  Instant-On Data Loss Prevention!!! “The true value of content monitoring and filtering lies in helping management to identify and correct faulty business processes and accidental disclosures.” Source: Gartner Research: Content Monitoring and Filtering Helps Find Faulty Business Process, Accidental Disclosures

The Power of Content & Context

Envelope Encryption Optimizing Experience for User Environment  3 Ways to Open to Ensure Successful Delivery 1.Local decryption using JavaScript (most common)  Highest performance, best scalability and security 2.Open online: security decrypt message at key server  Sends to server via secure HTTPS for decryption  Transparent fallback mechanism if JavaScript not available 3.Open by forward: securely decrypt message at key server  Sends to server via secure HTTPS for decryption  Transparent fallback mechanism if JavaScript not available

Registration Flow Making “Business Class”

Sender Experience and Flexibility of Policies Transparent Experience to Sender!

Receiving a Message First-Time Registration

Receiving a Message Simple & Intuitive

Receiving a Message Simple Secure

Business Class Enhanced Visibility and Control

Finally… Encryption Made Easy! WatchGuard Provides a Single, Integrated Solution  Easiest User Experience  No client or plug-in required  No certificates  No recipient admin-rights needed  Easiest Deployment  Seamlessly integrated within WatchGuard XCS Platform for instant-on use  Proven  Millions of encrypted messages sent per month  Worldwide adoption

© 2009 WatchGuard Technologies Thank you. Questions?