1 ZIXCORP The Criticality of Security Kevin Cloutier 781-993-6221 Oct 2015.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
MAXIMIZE WEBFOCUS GO MOBILE! Copyright 2010, Information Builders. Slide 1 Brian Carter 3/21/12.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
Phil Lee, Head of US Office, Fieldfisher Jim Brashear, General Counsel, Zix © 2015 ZixCorp. All Rights Reserved. THE CHANGING LEGAL PERSPECTIVE ON BYOD.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
WRITE MARKETING COPY and EXECUTE TARGETED S 3.07.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Encryption Team 2.0 Nayan Thakkar, Eddie Gallon, David Kotar, Bruce Malone and Pamela Dorman.
© Affiliated Computer Services, Inc. (ACS) 2010 ACS Encryption.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Offer Exchange Let your customers pick their preferred version of the world’s most popular business and collaboration platform Lync Secure, business-grade,
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Prepared By Ben Smyrlian Zix Encryption Network Protects Every .
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
Brandon McCormick Channel Account Manager (781) Zix Training 101: Our Solutions.
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
The Changing World of Endpoint Protection
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
The State of Computer & Data Security in Corporations Independent Survey.
Whitelist Management. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from.
WRITE MARKETING COPY and EXECUTE TARGETED S 3.07.
Module 7 Planning and Deploying Messaging Compliance.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
The Benefits of Indigo SMS Aumne, Inc. Tel: Fax: Commerce Ct Suite 200, Lisle, IL USA.
Patrick Opela, Director, Enterprise Business Solutions, Stewart Title Interviewed by Neil Farquharson SECURING S IN THE TITLE INDUSTRY 1 © 2015 ZixCorp.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
ACS Encryption- Filter Audit Product of ACS Encryption Services.
 2014 Diagnotes, Inc. – Confidential & Proprietary Spring Into Quality Symposium March 14, 2014.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Secure Services Shared Hosted MS Exchange 2010.
CLOUD VIRTUALIZATION MLArchiver for vCloud Air Archiving | eDiscovery | Records Management | Analytics Stephen Catanzano August.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Total Enterprise Mobility Comprehensive Management and Security
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Mobile Devices in the Corporate World
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
The time to address enterprise mobility is now
Encrypted from CDS Office Technologies
A Winning Combination !! and Good afternoon…
ZIXCORP The Criticality of Security Dena Bauckman
Mobile Data Solutions Inc
Attention! In order to print this two-page flyer, please follow these steps: 1) Personalize the text and logo area with your custom copy and logo. 2) Delete.
ZIXCORP The Criticality of Security Kevin Cloutier
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Digital $$ Quiz Test your knowledge.
Business Document Platform
Securely run and grow your business
COMPLETE BUSINESS TEXTING SOLUTION
Corporate Encryption:
Presentation transcript:

1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015

 Founded in 1998 as an encryption company, now with DLP and BYOD security  More than 11,500 active customers including :  Six divisions of the U.S. Treasury  All of the FFIEC U.S. federal financial regulators (incl. FDIC and OCC)  The U.S. Securities and Exchange Commission  24 U.S. state financial regulators  More than 2,000 U.S. financial institutions  25% of all banks in the U.S.  20% of all hospitals in the U.S.  32 Blue Cross Blue Shield organizations ABOUT ZIXCORP 2

YOUR BIGGEST SOURCE OF DATA LOSS

Your organization is sending PII out today – Analysis shows an average of 5% of outbound volumes include PII, NPI, PHI, SSNs, CCs, etc. – You need to know who sent, who received, what was sent, why it was sent, and how it was sent – Even one violation, depending on your industry, can cost you thousands of $$$$ and public data breach exposure Your organization has a mobility risk –Employees are using mobile phones to download –Data proliferation on mobile devices is a huge risk, even with an MDM solution in place KNOW YOUR

Data Loss Prevention (DLP) Encryption Mobile Device Management (MDM) / Bring Your Own Device (BYOD) Security Compliance Reporting SECURITY TOOLS TO MITIGATE THE RISKS

Enhanced DLP allows organizations to: o Detect outbound s that violate corporate policies o Capture and analyze violations o Filter, search and report on violations o Quarantine sensitive s that contain sensitive information based on wide range of parameters ENHANCED DLP 6

DLP VIEW OF SENSITIVE 7

You now have the sensitive , but what do you do with it? If authorized to be sent, encrypt it But not all encryption is equal Do not deploy Encryption to just: AFTER DLP, THEN WHAT?

Policy based encryption –Integrates with DLP to auto encrypt sensitive content Transparent encryption –Auto encrypt to other organizations using the same solution/protocol with no logins/passwords needed –Automatic Key Management Encrypted Delivery to “Non” encryption users –A system that delivers the encrypted to anyone regardless of what technology they have on receiving end Encrypted Delivery to Mobile Devices A USABLE ENCRYPTION SOLUTION

WHY ARE WE ALL SPEAKING A DIFFERENT LANGUAGE? How can we connect with so many roadblocks?  Portals  Passwords  Secure attachments  Password resets  Extra steps

THE POWER OF ENCRYPTION TRANSPARENCY An elegant solution is one that works without you even knowing it.  No portals  No passwords  No extra steps Shared Public Key Directory

WHAT ABOUT DELIVERY OF ENCRYPTED ON MOBILE DEVICES? Typically, recipients are unable to open encrypted on mobile devices. The result:  User frustration  Interrupted workflow  Reduced productivity

ENCRYPTION SOLUTION SHOULD MANAGE MOBILITY EFFECTIVELY AND EFFICIENTLY Senders and receivers using the solution should experience encrypted like any other on their mobile device. Accessing encrypted mobile should be as easy as one click.

The still has to go, but how? S olution should auto recognize the recipient does not have technology in place but still delivers the encrypted via a secure messaging portal (pull) or via an encrypted HTML attachment (push) Registration to receive these encrypted s must be simple and non-invasive Allow for the recipient to reply back encrypted AND to compose brand new s encrypted Consider impact of delivery method on mobile devices WHAT ABOUT ENCRYPTED TO RECIPIENTS WHO DO NOT HAVE DECRYPTION TECHOLOGY?

15

MOST POPULAR MOBILE BUSINESS APPS , CALENDAR AND CONTACTS 16 Source: BYOD and Mobile Security Report, 2014, Holger Schulze, Information Security Community on LinkedIn

Survey results indicate 45% of respondents report that within the previous 12 months, one or more employees lost a mobile device containing company data  InformationWeek’s 2014 Mobile Security Report 3.1 Million smartphones were stolen in the USA during sixty per minute  Consumer Reports’ Annual State of the Net survey, % of respondents say their top mobile security concern is data loss from lost or stolen devices  InformationWeek’s 2014 Mobile Security Report 17 MARKET RESPONSE TO BYOD

MOBILE DEVICE USERS’ FRUSTRATION 18

ADDING TO BYOD CHALLENGES 19

20 TYPICAL MDM SOLUTION S ARE RETAINED IN PERMANENT MEMORY Data Proliferation

TODAY’S APPROACHES ARE MISSING THE POINT MDM & CONTAINER VENDORS  Assume Data on the Device  Too Complex and Too Expensive  Too Invasive For Users  Too Difficult To Implement  Creates Corporate Liability Concerns  Overkill for  Problem Getting Worse Manage access, not devices!

WHAT THEY DON’T WANT IS:  Company monitoring their personal activities or restrict apps  Interruption of their calendar, contacts, phone and texting functions  Invasion or deletion (wiping) of their personal data USERS WANT EASE OF USE Brooklyn gives IT the security they need and. COMPANIES WANT SAFE DATA WHAT THEY DON’T WANT IS:  Corporate data distributed on hundreds of devices  Users resorting to personal or other insecure means of maintaining productivity THE STATE OF BYOD

BYOD SOLUTION Full functionality, but NO data on the device, so no need to manage the device 23 Data Proliferation

BYOD DELIVERS THE BEST OF BOTH WORLDS Companies benefit from  Enhanced Data Protection  Productive employees and improved morale  Minimize Corporate Liability  One copy of corporate data  Compliance Reporting  License by user, not device Employees benefit from  Convenience of using their own devices  Control of their devices and personal data  Protected privacy without employer access to personal data

Who sent, Who Received, Top Domains, Delivery Method, Time Stamps, Subject, Policy – And Content! What sensitive data was sent! On Demand and Scheduled Reports Graphical and Detailed Drill downs Includes Reporting on all delivery methods – Including TLS Exportable to formats usable by you Allows you to know what was viewed on a mobile device and when it was viewed COMPLIANCE REPORTING

To See How ZixCorp Provides DLP, Encryption, and BYOD Security come to our booth or contact me Thank you Kevin Cloutier