SlideShare uma empresa Scribd logo
1 de 29
Securing your
   Data in the
       Cloud
OptfinITy
 Founded in 2002 with a focus on providing Peace
  of Mind to small businesses and non-profit
  organizations.
 Headquartered in the Washington, DC
  Metropolitan area with clients across the United
  States.
 Have worked with over 200 clients.
   IT Strategy and Assessments
   Managed Services
    ◦ 24 x 7 Network Operations Center
    ◦ 24 x 7 Technical Support Helpdesk
    ◦ Infrastructure Support
   Software and Database Development
   Website Development
    ◦ Content Management (CMS Works, Wordpress)
    ◦ Sharepoint
    ◦ Search Engine Optimization
   Mobile Application Development
    ◦ iOS (iPhone, iPad), Android (Phone & Tablet)
   Phone Systems
   Cloud computing is the delivery of computing
    as a service rather than a product.
   In cloud computing, you do not purchase the
    server or software but rather use shared
    resources, hardware, software, and information
    and pay on an as-needed or per use basis.
   It is sold on Demand          Increased
   It is elastic – allowing       Collaboration
    a user to have as much        Easy to Setup and Get
    or as little service as        Running
    they want at any given
    time.                         Consolidation of
   Centralizing Updates           numerous servers
    for Software as a             Upgrades to hardware
    Service                        can be done virtually,
   Reliable AND                   eliminating down time
    Accessible
   What is Email Encryption?
    ◦ The process by which you ensure that only the correct
      recipient of an email message is able to read it.
    ◦ Encryption renders the text unreadable to anyone who
      cannot decrypt it.
   Why Do I Need Email Encryption?
    ◦ Do you use envelopes to mail important letters?
    ◦ Unencrypted emails are much less secure than postcards.
    ◦ Anyone can ready, copy, store, and change the contents
      of an email.
    ◦ Regulation compliance issues.
   All Companies Are Challenged to Enforce “No
    Send” Policy
   Continue to Train Employees on Proper Use of
    Email
   Use Manual Processes
    ◦ Fax, Mail, Courier
    ◦ CD/Tape and Ship
    ◦ Password Protect Documents or Zip Files Individually
Existing Managed
         Services




                                          ZixVPM                           ZixCorp Customers
                              (Checks rules & applies actions)




Sender                                Notification
                                                                 ZixPort
                                                                  (Pull)


                      ZixDirectory
                     (Key Lookup)
Existing Managed
         Services




                                          ZixVPM                           ZixCorp Customers
                              (Checks rules & applies actions)




Sender
                                                                 ZixPort
                                                                  (Pull)


                      ZixDirectory
                     (Key Lookup)
   Eliminate Cost Related to Handling Confidential Data
   Cost of Data Security Breach
   Reputational Risk
   Immediate Delivery of Confidential Data
   Go Green! Reduce Amount of Paper
   Regulatory Compliance Issues
    ◦ State Data Security Laws
    ◦ Identity Theft Red Flags Rule
    ◦ FDIC Updated Information Technology Officer’s
      Questionnaire
    ◦ HIPAA 2.0
In The Cloud
   Email Burden is Growing
   Email is Primary Corporate Communication Tool:
    ◦   Sales and Contract Negotiations
    ◦   Invoicing
    ◦   Customer Management
    ◦   Internal Reporting
   Average Corporate User Handles 23K emails/year
   Average Use 21 MB/Day, 5GB/Year
   61% Companies Enforce Mailbox Size Quotas
   Average 90 Minutes/Day to Manage Email
   80% Intellectual Property Stored in Email
   Retention is Not Assured
   Deleting is Company Policy
   Relying on Employees to be Good
   Business Continuity at Risk
   Recovery is Software Dependent
   Discovery Takes Time and $$$
   Reflexion Archiving, Discovery, and Recovery
   Hosted Email Archiving Service that Operates with
    your Email Infrastructure
   Ensures Protection, Preservation, and Continuous
    Operation of Email Communication
   All Incoming, Outgoing, and Internal Email and
    Attachments are Filtered, Indexed, and Encrypted
   Dynamic Data Retention
   eDiscovery Finds Any Email or Attachment in the
    Archive
   Hosted Cloud Service Provides Continuous Access to
    Email
   Active Email Archiving
   Hosted Service Works with Existing Email Platform
   Focused on Discovery and Recovery
                                                   THE INTERNET   YOUR NETWORK


               EMAIL CONTINUITY

               All inbound and outbound                                YOUR BUSINESS
    INCOMING   Emails are accessible
    FILTERED   Through a WebUI for Email                               Safe, filtered email is
      EMAIL    & Business Continuity                                   Delivered to your inbox




                                      AUTOMATIC BACKUP

                                      A copy of all safe emails
                                      Are stored here.
   Automated Email Continuity
   Maintain a Historical Reference/Knowledge Base
   Document Compliance and Performance
   Provide Disaster Recover/Business Continuity
   Reduced Energy Consumption
   Spam is the use of electronic messaging systems to
    send unsolicited bulk messages indiscriminately.
   80 – 85% of all emails worldwide are spam.
   A computer virus is a program that can replicate
    itself and spread from one computer to another.
   Malware is not technically a virus.
   Malware includes computer viruses, worms,
    Trojan horses, rootkits, spyware, adware and other
    malicious software.
   What would your clients do if they knew you didn’t
    have security in place?
   In 2006 malware damages exceeded $13.3B
    worldwide
   Loss of productivity
   Cost of IT (staff time and/or fees)
   Cost to restore or re-create lost data
   Potential for fines and penalties
   Security is a lot more complex than installing a
    firewall and keeping anti-virus software
    subscriptions up to date. -- Robert Biddle, Director
    Member Programs, Computer Technology Industry
    Association
   A secure environment provides protection, prevention
    and remediation
   A security platform performs multiple functions in a
    multi-layer approach: Firewalls to control network
    access, filter Web content and email, encryption
    protocols, and intrusion prevention and detection.
RBL Protection




                                                                      85%
                                                                             Check for Known Users


                                                                                 Scan for Viruses




                                                                      .3%
                                                                                                          2.1%




                                                                                Check Allow List


                                                                                Check Block List



                                                                      .1%
                                                                                                          .3%




                                                                      .5%     Address-on-the-Fly™


                                                                              Check Permitted Languages
                                                                      .1%



96.5% of all incoming SMTP connections blocked as spam and viruses!




                                                                            Check Permitted Countries
                                                                      .5%




                                                                            Heuristics / IP Reputation
                                                                      9%




                                                                                Bayesian Filtering
                                                                      1%
                                                                                                          1.1%
                                                                                                                 3.5% of all incoming SMTP connections delivered to recipients!
   Multi-Layered Defense-in      Defeats Directory
    Depth                          Harvesting & Denial of
   Geographic & Language-         Services Attacks
    Based Filtering               Support SMTP
   Identified Address             Restrictions
    Sharing                       Automatic Spooling of All
   Outbound Anti-Virus            Incoming Email for 3
    Scanning                       Days
   Open Relay & Zombie           Optional Email
    Prevention                     Archiving, Discovery &
   Avoids IP Address              Recovery (RADAR)
    Blacklisting                  Spam/Virus Handling:
                                   Vaporize/Quarantine/
                                   Flag
   Control and Access to Your Mailbox
   Block Unwanted Mail; Spam, Viruses, DoS Attacks,
    Phishing Attacks
   Assures Delivery of Desirable Mail
   Helps Preserve Long-Term Integrity of User’s Primary
    email Address
   Allow Lists, Block Lists, Content Filtering
   AOTF (alternative email addresses), Permitted
    Language and Country Capability
   Spooling Inbound Email for 10 Days When Local
    Server Experiences an Outage
   Outbound Email Filtering
How to secure your data in the cloud

Mais conteúdo relacionado

Semelhante a How to secure your data in the cloud

Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...Microsoft Private Cloud
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Taking your open source email security to the next level
Taking your open source email security to the next levelTaking your open source email security to the next level
Taking your open source email security to the next levelCyren, Inc
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate wayvfmindia
 
Webroot Construction sector datasheet
Webroot Construction sector datasheetWebroot Construction sector datasheet
Webroot Construction sector datasheetPaul Tompsett
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Web Application Security For Small and Medium Businesses
Web Application Security For Small and Medium BusinessesWeb Application Security For Small and Medium Businesses
Web Application Security For Small and Medium BusinessesSasha Nunke
 
Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate SecurityFiroze Hussain
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Private Cloud
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitAmazon Web Services
 
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...Dropbox
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Amazon Web Services
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk ManagementPinewood
 

Semelhante a How to secure your data in the cloud (20)

Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Taking your open source email security to the next level
Taking your open source email security to the next levelTaking your open source email security to the next level
Taking your open source email security to the next level
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
 
Webroot Construction sector datasheet
Webroot Construction sector datasheetWebroot Construction sector datasheet
Webroot Construction sector datasheet
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Information Security
Information SecurityInformation Security
Information Security
 
WebApp_to_Container_Security.pdf
WebApp_to_Container_Security.pdfWebApp_to_Container_Security.pdf
WebApp_to_Container_Security.pdf
 
Web Application Security For Small and Medium Businesses
Web Application Security For Small and Medium BusinessesWeb Application Security For Small and Medium Businesses
Web Application Security For Small and Medium Businesses
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate Security
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look forin ...
eFolder and ConnectWise Webinar: Top Seven Features MSPs Should Look for in ...
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
 

How to secure your data in the cloud

  • 1. Securing your Data in the Cloud
  • 2. OptfinITy  Founded in 2002 with a focus on providing Peace of Mind to small businesses and non-profit organizations.  Headquartered in the Washington, DC Metropolitan area with clients across the United States.  Have worked with over 200 clients.
  • 3. IT Strategy and Assessments  Managed Services ◦ 24 x 7 Network Operations Center ◦ 24 x 7 Technical Support Helpdesk ◦ Infrastructure Support  Software and Database Development  Website Development ◦ Content Management (CMS Works, Wordpress) ◦ Sharepoint ◦ Search Engine Optimization  Mobile Application Development ◦ iOS (iPhone, iPad), Android (Phone & Tablet)  Phone Systems
  • 4. Cloud computing is the delivery of computing as a service rather than a product.  In cloud computing, you do not purchase the server or software but rather use shared resources, hardware, software, and information and pay on an as-needed or per use basis.
  • 5. It is sold on Demand  Increased  It is elastic – allowing Collaboration a user to have as much  Easy to Setup and Get or as little service as Running they want at any given time.  Consolidation of  Centralizing Updates numerous servers for Software as a  Upgrades to hardware Service can be done virtually,  Reliable AND eliminating down time Accessible
  • 6.
  • 7. What is Email Encryption? ◦ The process by which you ensure that only the correct recipient of an email message is able to read it. ◦ Encryption renders the text unreadable to anyone who cannot decrypt it.  Why Do I Need Email Encryption? ◦ Do you use envelopes to mail important letters? ◦ Unencrypted emails are much less secure than postcards. ◦ Anyone can ready, copy, store, and change the contents of an email. ◦ Regulation compliance issues.
  • 8. All Companies Are Challenged to Enforce “No Send” Policy  Continue to Train Employees on Proper Use of Email  Use Manual Processes ◦ Fax, Mail, Courier ◦ CD/Tape and Ship ◦ Password Protect Documents or Zip Files Individually
  • 9.
  • 10. Existing Managed Services ZixVPM ZixCorp Customers (Checks rules & applies actions) Sender Notification ZixPort (Pull) ZixDirectory (Key Lookup)
  • 11. Existing Managed Services ZixVPM ZixCorp Customers (Checks rules & applies actions) Sender ZixPort (Pull) ZixDirectory (Key Lookup)
  • 12.
  • 13. Eliminate Cost Related to Handling Confidential Data  Cost of Data Security Breach  Reputational Risk  Immediate Delivery of Confidential Data  Go Green! Reduce Amount of Paper  Regulatory Compliance Issues ◦ State Data Security Laws ◦ Identity Theft Red Flags Rule ◦ FDIC Updated Information Technology Officer’s Questionnaire ◦ HIPAA 2.0
  • 15. Email Burden is Growing  Email is Primary Corporate Communication Tool: ◦ Sales and Contract Negotiations ◦ Invoicing ◦ Customer Management ◦ Internal Reporting  Average Corporate User Handles 23K emails/year  Average Use 21 MB/Day, 5GB/Year  61% Companies Enforce Mailbox Size Quotas  Average 90 Minutes/Day to Manage Email  80% Intellectual Property Stored in Email
  • 16. Retention is Not Assured  Deleting is Company Policy  Relying on Employees to be Good  Business Continuity at Risk  Recovery is Software Dependent  Discovery Takes Time and $$$
  • 17. Reflexion Archiving, Discovery, and Recovery  Hosted Email Archiving Service that Operates with your Email Infrastructure  Ensures Protection, Preservation, and Continuous Operation of Email Communication  All Incoming, Outgoing, and Internal Email and Attachments are Filtered, Indexed, and Encrypted  Dynamic Data Retention  eDiscovery Finds Any Email or Attachment in the Archive  Hosted Cloud Service Provides Continuous Access to Email
  • 18. Active Email Archiving  Hosted Service Works with Existing Email Platform  Focused on Discovery and Recovery THE INTERNET YOUR NETWORK EMAIL CONTINUITY All inbound and outbound YOUR BUSINESS INCOMING Emails are accessible FILTERED Through a WebUI for Email Safe, filtered email is EMAIL & Business Continuity Delivered to your inbox AUTOMATIC BACKUP A copy of all safe emails Are stored here.
  • 19.
  • 20. Automated Email Continuity  Maintain a Historical Reference/Knowledge Base  Document Compliance and Performance  Provide Disaster Recover/Business Continuity  Reduced Energy Consumption
  • 21.
  • 22. Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately.  80 – 85% of all emails worldwide are spam.  A computer virus is a program that can replicate itself and spread from one computer to another.  Malware is not technically a virus.  Malware includes computer viruses, worms, Trojan horses, rootkits, spyware, adware and other malicious software.
  • 23. What would your clients do if they knew you didn’t have security in place?  In 2006 malware damages exceeded $13.3B worldwide  Loss of productivity  Cost of IT (staff time and/or fees)  Cost to restore or re-create lost data  Potential for fines and penalties
  • 24. Security is a lot more complex than installing a firewall and keeping anti-virus software subscriptions up to date. -- Robert Biddle, Director Member Programs, Computer Technology Industry Association  A secure environment provides protection, prevention and remediation  A security platform performs multiple functions in a multi-layer approach: Firewalls to control network access, filter Web content and email, encryption protocols, and intrusion prevention and detection.
  • 25. RBL Protection 85% Check for Known Users Scan for Viruses .3% 2.1% Check Allow List Check Block List .1% .3% .5% Address-on-the-Fly™ Check Permitted Languages .1% 96.5% of all incoming SMTP connections blocked as spam and viruses! Check Permitted Countries .5% Heuristics / IP Reputation 9% Bayesian Filtering 1% 1.1% 3.5% of all incoming SMTP connections delivered to recipients!
  • 26. Multi-Layered Defense-in  Defeats Directory Depth Harvesting & Denial of  Geographic & Language- Services Attacks Based Filtering  Support SMTP  Identified Address Restrictions Sharing  Automatic Spooling of All  Outbound Anti-Virus Incoming Email for 3 Scanning Days  Open Relay & Zombie  Optional Email Prevention Archiving, Discovery &  Avoids IP Address Recovery (RADAR) Blacklisting  Spam/Virus Handling: Vaporize/Quarantine/ Flag
  • 27.
  • 28. Control and Access to Your Mailbox  Block Unwanted Mail; Spam, Viruses, DoS Attacks, Phishing Attacks  Assures Delivery of Desirable Mail  Helps Preserve Long-Term Integrity of User’s Primary email Address  Allow Lists, Block Lists, Content Filtering  AOTF (alternative email addresses), Permitted Language and Country Capability  Spooling Inbound Email for 10 Days When Local Server Experiences an Outage  Outbound Email Filtering