SlideShare uma empresa Scribd logo
1 de 49
Secure Email Messaging
Secure Email Messaging Webinar Meeting legal & regulatory compliance while improving communication with your customers and business partners Brent Faulk NeoCertified – Today’s Host (877) 613-5036 [email_address]
About NeoCertified ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ We believe that security is more of a process than a product” - Peter Schaub (NeoForte President)
Why should secure email be considered Gramm-Leach-Bliley Act  (GLBA), 15 USC, Subchapter I, Sec. 6801-6809, Disclosure of Nonpublic Personal Information Transmission and Storage of personal information Requires compliance  with SEC and FINRA rules (reference 501b) Sarbanes-Oxley Act  of 2002 (Pub. L. No. 107-204, 116 Stat. 745,  also known as SOX or Sarbox  Section 404 regulates enforcement of internal controls including an annual assessment of the internal control structure’s effectiveness Requires prevention of “unauthorized use” of financial information, inc. information in transit Protect your customers YOUR CAMELS RATING?
How are you sending information now? ,[object Object],[object Object],[object Object],[object Object],What is your current cost to manually send information?
Why it should be a commercially viable & simple solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Auditors are asking, “What are you doing for secure email encryption?”  “Where does that data reside?”
What’s Your Email Exposure? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Originator Creates a message Multiple copies of e-mail on non-secure Internet Servers The RISK of “Traditional Email” Traditional Email can be captured, changed, and used COMPANY LAN ORIGINATOR Company Normal Email Web Server RECIPIENT Individual ISP
 
 
Do breaches  really  happen?  …all the time Fines are Severe $50,000 to $500,000 per incident
2009 Security Breaches of  Banking, Credit, & Financial
What could happen… LIVE AT THIS LINK:  http://wichita.bizjournals.com/wichita/stories/2010/02/01/daily12.html
Ways to send secure Email with NeoCertified From Any  Internet Browser On Any  Version of Outlook AND
Accessing your secure email from the Internet
Your Secure Message Center
Create a Secure Email
Adding Secure Attachments Up to 30MB
You decide how it’s  sent , and how it’s  received under the body of an email
“ Send Secure”
Verified and Tracked
Receiving a Secure Email
The Recipient’s Experience
Recipient Accesses NeoCertified
Recipient accessing their message Co-Branded
Seeing & handling their email Co-Branded
Download the Button  Makes the Process is a single click
Sending Secure Email via Outlook
Recipient’s Experience
Linking into their message
Recipient Logs on with their own password
Web Access Co-Branded
Read their email, attachments, respond Recipient replies securely  no download or purchase needed
Sender receives delivery confirmation
It’s YOUR IT Policy - Setting Account Preferences IT Policy Enforced with every email
Reports
Reports
Looking at an actual report
Looking at an actual report
1 Gold User  ($219 each) 8 Full Users ($139.50 each) 6 Lite Users ($69.75 each) $1753 Typical 15 User Configuration
Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What you get
What you won’t get…
Summary ,[object Object],[object Object],[object Object],[object Object]
Create a NeoCertified Message Originator clicks  Send NeoCertified  button  Message is encrypted at the desktop computer and message is sent to NeoCertified Server SMTP COMPANY LAN ORIGINATOR Internet Company Normal Email Web Server SECURE eMail ASP RECIPIENT Individual ISP
Server Creates a  “You have a secure e-mail ” message through traditional e-mail NeoCertified Recipient is Notified COMPANY LAN ORIGINATOR Internet Company Normal Email Web Server SECURE eMail ASP RECIPIENT Individual ISP
User Authenticates to View Message SSL User clicks on message link and creates an SSL connection to the NeoCertified Server Recipient Views Message COMPANY LAN ORIGINATOR Internet Company Normal Email Web Server SECURE eMail ASP RECIPIENT Individual ISP
Server Creates a “Recipient has read” message through traditional e-mail Recipient Receipt Returned COMPANY LAN ORIGINATOR Internet Company Normal Email Web Server SECURE eMail ASP RECIPIENT Individual ISP
 

Mais conteúdo relacionado

Destaque

It Services Secure Email Presentation
It Services Secure Email PresentationIt Services Secure Email Presentation
It Services Secure Email Presentation
bryanpsu
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
nhepner
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 

Destaque (20)

Https presentation
Https presentationHttps presentation
Https presentation
 
HTTPS
HTTPSHTTPS
HTTPS
 
HTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupHTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User Group
 
Https
HttpsHttps
Https
 
7 Protocols
7 Protocols7 Protocols
7 Protocols
 
It Services Secure Email Presentation
It Services Secure Email PresentationIt Services Secure Email Presentation
It Services Secure Email Presentation
 
Https
HttpsHttps
Https
 
Shttp
ShttpShttp
Shttp
 
HTTP
HTTPHTTP
HTTP
 
Seminar presentation on embedded web technology
Seminar presentation on embedded web technologySeminar presentation on embedded web technology
Seminar presentation on embedded web technology
 
Https
HttpsHttps
Https
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web Technology
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web Technology
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Introduction to HTTP protocol
Introduction to HTTP protocolIntroduction to HTTP protocol
Introduction to HTTP protocol
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 

Semelhante a Secure Email Overview - NeoCertified Demo

Email Management and Email Archiving
Email Management and Email ArchivingEmail Management and Email Archiving
Email Management and Email Archiving
crussell79
 

Semelhante a Secure Email Overview - NeoCertified Demo (20)

Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Video In Email Presentation
Video In Email PresentationVideo In Email Presentation
Video In Email Presentation
 
ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration
ILTA Conference 2011 - Biscom Secure File Transfer Technology DemonstrationILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration
ILTA Conference 2011 - Biscom Secure File Transfer Technology Demonstration
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
 
How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely How electronic signature software helps create electonic signature securely
How electronic signature software helps create electonic signature securely
 
Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104
 
Understanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdfUnderstanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdf
 
Email Management and Email Archiving
Email Management and Email ArchivingEmail Management and Email Archiving
Email Management and Email Archiving
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency Communications
 
Biscom Delivery Server Sales Presentation
Biscom Delivery Server Sales PresentationBiscom Delivery Server Sales Presentation
Biscom Delivery Server Sales Presentation
 
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
Webinar Mastery Series: How Security & Compliance become easier with SkyConne...
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

Secure Email Overview - NeoCertified Demo

Notas do Editor

  1. Splash screen until all webinar participants arrive – We will be starting in one minute, and are just allowing for a few other banks to join us Conference Dial-in Number : Conference Recording Subscriber PIN code: 753585# To start recording, host hits: *9, then the PIN To stop recording, host hits: *9
  2. OK, let’s get started. I would like to kick this webinar off commending each of you for taking email security in consideration for your bank or credit union. My name is Brent Faulk as I have worked with some of you before and I will be your host today. In today’s brief webinar I hope to get you more familiar with why this is a serious matter that is worth your time, some information you may or may not know, and how to take steps to meet compliance standards while taking care of your customers and business partners. Also, joining us today is President and Founder of NeoCertified, Peter Schaub < Why should secure email be considered >
  3. Now a little about who NeoCertified is… One more thing – We believe that security is process not just a product, so this could be a part of your overall solution < Why should secure email be considered >
  4. So why should secure email be considered? As you are probably aware this has become a hot topic with bank auditors recently. Federal mandates, legal requirements, and specific state laws mandate securing communication of personal financial information. The GLBA 501b Act clearly requires the “transmission and storage of personal information” in financial institutions. This refers to financial institutions to customers. The Sarbanes-Oxley Act (or SOX) requires secure transmission of financial information between financial institutions and vendors. Regulators have a heightened sense of scrutiny, particularly on banks that are not CAMELS 1 or 2 RATED. Beyond the legal requirements, secure email demonstrates to your customers, your respect for their privacy. With IDENTITY THEFT, all over the news, isn’t this what many of your customers are requiring. < How are you sending information now? >
  5. So with all that in mind, most large banks already have this in place. We specialize with small to medium sized institutions and have found that many have had a “NO SEND POLICY” in place. Others will have a cumbersome system in place or simply expect their customers to take care of all communication in person or by mail. In reality, now in 2010 email is a prolific part of business and customers have come to expect it. While we are on the subject, please consider how you currently manually send information. What are the costs associated with those processes? Some examples of information transactions could be: loan packages, board of director minutes, regulation Z notices, …… Auditors are asking, “What are you doing for secure email encryption?” and “Where does that data reside?” < Why it should be a commercially viable & simple solution >
  6. A major problem that banks are facing is the use of a awkward system that is either ‘too techie’ or meant for a consumer. The net result is it’s not used and information is sent our unprotected while most think there is a system in place. A viable solution should be implemented that is easy to use, accredited, and one that does not create additional IT burden for you. These are all factors that should be considered regardless of the solutions you consider.
  7. The harsh reality of email is that is sent in “clear text” and is highly vulnerable. Case after case of hacked, leaked, and stolen information from all types of organizations have caused billions of dollars in damage. From first hand experience of identity theft from my bank, I can tell you it takes considerable time and effort to repair. The Identity Theft Resource Center just published it’s 2009 Data Breach Stats on 12/29 reported over 222 Million Records exposed. This is no small matter
  8. There was a bit of controversy with this portion, but to demonstrate how easy it really is…
  9. As mentioned in the recent newsletter, “The Identity Theft Resource Center just published final statistics for 2009.  In total, over 222 million records of personal records were exposed.  Many of these came from the financial sector ranging from small community banks and credit unions to enterprise level banks.” nearly 10 million Americans lost $48 billion in 2008, due to online identity theft.1 Also that year, more than 35 million data records were breached in the United States. OK, let’s look at the actual NeoCertified Solution. < Ways to send secure Email with NeoCertified >
  10. There are 2 ways to send Secure Email with NeoCertified. 1 – From any Internet Browser --- first, I want to show you from the Internet, afterwards I will show you how secure email can be accomplished exclusively through Outlook 2 – From any version of Outlook We’ll take a quick look at both < Accessing your secure email from the Internet >
  11. Any registered user can remotely check, send, and receive secure email from any online computer. This is great when travelling, or from home if need be.
  12. This is the experience of a recipient….
  13. As soon as they click on that link a Secure Socket Layer (SSL) connection is initiated, the recipient creates their own pw (there is a forgot pw process, so there is no additional management on your part)
  14. ARE IN INTERESTED??? TRY IT OUT! This is what you do GET: Send Certified Button Internet Access – Secure Messaging Center Co-Branded Site Support (365/7) GLBA 501b Compliance