SlideShare uma empresa Scribd logo
1 de 27
Why You Shouldn’t Email Your
   Sensitive Documents
           David Strom
        david@strom.com
   TechNet Mid America July 2012
Email docs to yourself
Email is inherently insecure…
Obstacles to Email Encryption
           Adoption Today
• Unencrypted emails are too easy to send
• IT admins think encryption is too expensive or
  cumbersome or complex
• Compliance regsshould drive more email
  encryption usage (but don’t…)
• The mobile encryption experience hasn’t been
  so wonderful


                       4
Investors’ Email Compromises Have
           Consequences!




                5
Secure email alternatives
•   Cloud-based storage
•   Secure document delivery services
•   Data loss prevention products
•   Full encryption choices
File sending
services
YouSendIt Privacy Policy
Certain information may become accessible,
  such as the text and subject of messages you
  have sent, the name and content of the User
  Files you have sent, the date and time
  messages were sent, and the email addresses
  of the recipients.
Responses to MegaUpload shutdown
Secure document services
Secure document issues
• Do you need secure intra- or inter-enterprise
  collaboration?
• Can you recall sent messages?
• What happens when someone leaves your
  company?
• How does the service affect users’ existing
  email experience?
• Can you authenticate recipients and thwart
  malware such as key-loggers?
Data loss prevention
•   Global Velocity's GV-2010 security appliance
•   BlueCoat Networks DLP appliance
•   Sendmail'sSentrion email server
•   McAfee Host DLP
•   Symantec/Vontu DLP v10
•   Safend Protector
•   Trend Micro DLP
DLP Drawbacks
• You are tracking rather than encrypting
  messages
• Once a message leaves your premises, you
  can’t do anything
  about it
• Can be expensive
Full encryption choices
•   Voltage SecureMail
•   PGP Universal Server
•   Sophos Email Appliance
•   Cisco IronPort
•   Proofpoint Protection Server
•   Mimecast's Unified Email Messaging
•   Echoworx Encrypted Mail
Common product features
• Crypto key management
• Auto encrypt sensitive info as part of their
  policies
• Lots more rules processing
• Outlook plug-ins
Encryption Landscape
   Vendor           Approach               Key/Certificate          Mobile capability
                                            Management
Cisco IronPort   Symmetric key per           CRES (cloud)              Web-based
                    message                 Or on premise
 Proofpoint      Symmetric key per   PP Key service or on premise   Web-based; read
                    message                                              only
Symantec/PGP            PKI          PGP Directory or on premise    Web-based; read
                                                                         only
   Entrust              PKI           Entrust PKI or on premise        Web-based

     Zix                PKI                 Zix Directory              Web-based


   Voltage        Identity-based            Cloud-based                Native app
                    encryption

  Echoworx              PKI                 Echoworx PKI               Native app
Voltage’s
Secure email
mobile client
Questions?
           David Strom
     david@strom.com
          314 277 7832
     @dstrom (Twitter)
http://strominator.com

Mais conteúdo relacionado

Mais procurados

Sitetagger Engage
Sitetagger EngageSitetagger Engage
Sitetagger Engagepickett88
 
Token, token... From SAML to OIDC
Token, token... From SAML to OIDCToken, token... From SAML to OIDC
Token, token... From SAML to OIDCShiu-Fun Poon
 
Defigo Security Solutions
Defigo Security Solutions Defigo Security Solutions
Defigo Security Solutions Bizofit
 
Digital signature
Digital signatureDigital signature
Digital signatureJanani S
 
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Ajin Abraham
 
Presented AITC Blockchain Framework @ NPC 17
Presented AITC Blockchain Framework @ NPC 17Presented AITC Blockchain Framework @ NPC 17
Presented AITC Blockchain Framework @ NPC 17Rajesh Kumar
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Architect secure cloud services.
Architect secure cloud services.Architect secure cloud services.
Architect secure cloud services.Moshe Ferber
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummiesrosegrif1
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyCloudflare
 
ORCON in 10 Minutes
ORCON in 10 MinutesORCON in 10 Minutes
ORCON in 10 MinutesVic Winkler
 

Mais procurados (12)

Sitetagger Engage
Sitetagger EngageSitetagger Engage
Sitetagger Engage
 
Token, token... From SAML to OIDC
Token, token... From SAML to OIDCToken, token... From SAML to OIDC
Token, token... From SAML to OIDC
 
Defigo Security Solutions
Defigo Security Solutions Defigo Security Solutions
Defigo Security Solutions
 
as2 concepts
as2 conceptsas2 concepts
as2 concepts
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
 
Presented AITC Blockchain Framework @ NPC 17
Presented AITC Blockchain Framework @ NPC 17Presented AITC Blockchain Framework @ NPC 17
Presented AITC Blockchain Framework @ NPC 17
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Architect secure cloud services.
Architect secure cloud services.Architect secure cloud services.
Architect secure cloud services.
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummies
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense Strategy
 
ORCON in 10 Minutes
ORCON in 10 MinutesORCON in 10 Minutes
ORCON in 10 Minutes
 

Semelhante a How to secure your emails for sensitive docs

Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Nicholas Davis
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Nicholas Davis
 
Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Nicholas Davis
 
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...Nicholas Davis
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Nicholas Davis
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Nicholas Davis
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorNewvewm
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsAndris Soroka
 
Pki the key to securing sensitive communications
Pki the key to securing sensitive communicationsPki the key to securing sensitive communications
Pki the key to securing sensitive communicationsNicholas Davis
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginNovell
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentationgtbsalesindia
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Finalniallmmackey
 

Semelhante a How to secure your emails for sensitive docs (20)

Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...
 
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
 
Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by Porticor
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Pki the key to securing sensitive communications
Pki the key to securing sensitive communicationsPki the key to securing sensitive communications
Pki the key to securing sensitive communications
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentation
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Final
 
Pgp
PgpPgp
Pgp
 

Mais de David Strom

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023David Strom
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity JobDavid Strom
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT securityDavid Strom
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacyDavid Strom
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsDavid Strom
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking backDavid Strom
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media worldDavid Strom
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of ThingsDavid Strom
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersDavid Strom
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches David Strom
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)David Strom
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosDavid Strom
 
Notable Twitter fails
Notable Twitter failsNotable Twitter fails
Notable Twitter failsDavid Strom
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingDavid Strom
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportDavid Strom
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and nowDavid Strom
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakesDavid Strom
 

Mais de David Strom (20)

Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
 
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
 
Notable Twitter fails
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
 

Último

How Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersHow Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersMakena Coast Charters
 
Authentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxAuthentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxGregory DeShields
 
Lucknow to Sitapur Cab | Lucknow to Sitapur Taxi
Lucknow to Sitapur Cab | Lucknow to Sitapur TaxiLucknow to Sitapur Cab | Lucknow to Sitapur Taxi
Lucknow to Sitapur Cab | Lucknow to Sitapur TaxiCab Bazar
 
Phil....National-Capital-Region-NCR.pptx
Phil....National-Capital-Region-NCR.pptxPhil....National-Capital-Region-NCR.pptx
Phil....National-Capital-Region-NCR.pptxDitasDelaCruz
 
Inspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodInspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodKasia Chojecki
 
Solbello Sun Shade Umbrella for Beach 2024
Solbello Sun Shade Umbrella for Beach 2024Solbello Sun Shade Umbrella for Beach 2024
Solbello Sun Shade Umbrella for Beach 2024Solbello
 
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's JewelSicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's JewelTime for Sicily
 
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCRalexsharmaa01
 
Disney Dreams in Europe: A Guide to Disneyland Paris
Disney Dreams in Europe: A Guide to Disneyland ParisDisney Dreams in Europe: A Guide to Disneyland Paris
Disney Dreams in Europe: A Guide to Disneyland ParisisangoTravel
 
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCRalexsharmaa01
 
It’s Time Get Refresh Travel Around The World
It’s Time Get Refresh Travel Around The WorldIt’s Time Get Refresh Travel Around The World
It’s Time Get Refresh Travel Around The WorldParagliding Billing Bir
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)Mazie Garcia
 
Revolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI UpdateRevolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI Updatejoymorrison10
 
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)Escort Service
 
a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.moritzmieg
 
Paragliding Billing Bir at Himachal Pardesh
Paragliding Billing Bir at Himachal PardeshParagliding Billing Bir at Himachal Pardesh
Paragliding Billing Bir at Himachal PardeshParagliding Billing Bir
 

Último (16)

How Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersHow Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s Waters
 
Authentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxAuthentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptx
 
Lucknow to Sitapur Cab | Lucknow to Sitapur Taxi
Lucknow to Sitapur Cab | Lucknow to Sitapur TaxiLucknow to Sitapur Cab | Lucknow to Sitapur Taxi
Lucknow to Sitapur Cab | Lucknow to Sitapur Taxi
 
Phil....National-Capital-Region-NCR.pptx
Phil....National-Capital-Region-NCR.pptxPhil....National-Capital-Region-NCR.pptx
Phil....National-Capital-Region-NCR.pptx
 
Inspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodInspirational Quotes About Italy and Food
Inspirational Quotes About Italy and Food
 
Solbello Sun Shade Umbrella for Beach 2024
Solbello Sun Shade Umbrella for Beach 2024Solbello Sun Shade Umbrella for Beach 2024
Solbello Sun Shade Umbrella for Beach 2024
 
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's JewelSicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
 
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
 
Disney Dreams in Europe: A Guide to Disneyland Paris
Disney Dreams in Europe: A Guide to Disneyland ParisDisney Dreams in Europe: A Guide to Disneyland Paris
Disney Dreams in Europe: A Guide to Disneyland Paris
 
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
 
It’s Time Get Refresh Travel Around The World
It’s Time Get Refresh Travel Around The WorldIt’s Time Get Refresh Travel Around The World
It’s Time Get Refresh Travel Around The World
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
Revolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI UpdateRevolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI Update
 
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
 
a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.
 
Paragliding Billing Bir at Himachal Pardesh
Paragliding Billing Bir at Himachal PardeshParagliding Billing Bir at Himachal Pardesh
Paragliding Billing Bir at Himachal Pardesh
 

How to secure your emails for sensitive docs

  • 1. Why You Shouldn’t Email Your Sensitive Documents David Strom david@strom.com TechNet Mid America July 2012
  • 2. Email docs to yourself
  • 3. Email is inherently insecure…
  • 4. Obstacles to Email Encryption Adoption Today • Unencrypted emails are too easy to send • IT admins think encryption is too expensive or cumbersome or complex • Compliance regsshould drive more email encryption usage (but don’t…) • The mobile encryption experience hasn’t been so wonderful 4
  • 5. Investors’ Email Compromises Have Consequences! 5
  • 6.
  • 7.
  • 8. Secure email alternatives • Cloud-based storage • Secure document delivery services • Data loss prevention products • Full encryption choices
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. YouSendIt Privacy Policy Certain information may become accessible, such as the text and subject of messages you have sent, the name and content of the User Files you have sent, the date and time messages were sent, and the email addresses of the recipients.
  • 17.
  • 18. Secure document issues • Do you need secure intra- or inter-enterprise collaboration? • Can you recall sent messages? • What happens when someone leaves your company? • How does the service affect users’ existing email experience? • Can you authenticate recipients and thwart malware such as key-loggers?
  • 19. Data loss prevention • Global Velocity's GV-2010 security appliance • BlueCoat Networks DLP appliance • Sendmail'sSentrion email server • McAfee Host DLP • Symantec/Vontu DLP v10 • Safend Protector • Trend Micro DLP
  • 20.
  • 21. DLP Drawbacks • You are tracking rather than encrypting messages • Once a message leaves your premises, you can’t do anything about it • Can be expensive
  • 22. Full encryption choices • Voltage SecureMail • PGP Universal Server • Sophos Email Appliance • Cisco IronPort • Proofpoint Protection Server • Mimecast's Unified Email Messaging • Echoworx Encrypted Mail
  • 23. Common product features • Crypto key management • Auto encrypt sensitive info as part of their policies • Lots more rules processing • Outlook plug-ins
  • 24.
  • 25. Encryption Landscape Vendor Approach Key/Certificate Mobile capability Management Cisco IronPort Symmetric key per CRES (cloud) Web-based message Or on premise Proofpoint Symmetric key per PP Key service or on premise Web-based; read message only Symantec/PGP PKI PGP Directory or on premise Web-based; read only Entrust PKI Entrust PKI or on premise Web-based Zix PKI Zix Directory Web-based Voltage Identity-based Cloud-based Native app encryption Echoworx PKI Echoworx PKI Native app
  • 27. Questions? David Strom david@strom.com 314 277 7832 @dstrom (Twitter) http://strominator.com

Notas do Editor

  1. v2
  2. http://www.finra.org/Investors/ProtectYourself/InvestorAlerts/FraudsAndScams/P125460
  3. From the Wall Street Journal, but there were lots of other reports. The Chamber had at least six weeks worth of email data containing sensitive information stolen in a breach that was widely reported
  4. This expert from the Brookings Institute is the extreme case. When he travels in China, he disables Bluetooth and Wi-Fi, never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery, for fear his microphone could be turned on remotely.
  5. There are a whole series of cloud-based document sending services such as Google Docs, Dropbox, Box.net, and others that can store documents in the cloud.
  6. These services all share one common weakness: you can’t manage them well from an enterprise perspective. Also, browser-based FT is limited to 2 GB or less, and many of these services have other hidden limitationsEven when IT is aware of their use, the services generally lack transaction logging, which makes document control problematic and impedes litigation preparedness.
  7. http://www.yousendit.com/aboutus/legal/privacy
  8. Law enforcement shut down one of these services, MegaUpload, and in the ensuing months other peer file sharing services have curtailed their activities.
  9. This is a sample screen from Docusign
  10. There are more than a dozen DLP vendors, and these products offer a wide range of protective features, and some even integrate with endpoint security products, proxy/caching servers, and network intrusion protection appliances. However, while DLP products are great at identifying security breaches after the fact but don't do much to help keep your confidential information contained within your enterprise. They are mostly used for compliance and other regulatory reasons.
  11. This is Global Velocity’s DLP product and you can tune it to block Facebook messages for example, but allow users to add items to their Wall as an example.
  12. These are various gateway appliances that operate inside your firewall, and automatically work in the background to encrypt and decrypt message traffic in conjunction with your mail servers. These are somewhat cumbersome but offer the following features
  13. This is Mimecast’s Outlook plug in, and as you can see, there isn’t much to set up with it.
  14. Not as easy to use as native email appsMany still employ symmetric keys Some can only read and not compose encrypted messagesThese all have a Web service that is hosted by the vendor on the public Internet and users connect via a browser to read and send messages. recipients don't have to download any special software when they get an encrypted message from you.