1 Services ZixCorp provides easy-to-use encryption services for privacy and regulatory compliance. As the largest encryption services provider, ZixCorp protects tens of millions of members in our ZixDirectory, and approximately 100,000 new members are being added every week. ZixCorp provides transparent, seamless secure communications with your customers, partners and regulators.
2 The Importance of Easy, secure communication is a valuable asset. Sensitive information is circulating on a day-to-day basis to customers and patients, third-party organizations and business associates, strategic partners and regulators. One communication tool emerges above the rest when exchanging sensitive personal information encrypted . The Radicati Group estimated business users sent 41 messages and received 100 messages per day in Further demonstrating the importance of , Osterman Research found has become a popular file-transfer method, estimating percent of all messages contain attachments 2. With the convenience of as a communication and filetransfer method, it s easy for users to be unfamiliar with the risks; however, IT security and compliance professionals cannot afford to overlook the vulnerabilities associated with this essential business tool. Employee Behavior Risks Companies can implement policies and offer employee training to prevent employees from leaking sensitive information, but a Ponemon Institute study 3 found this method to be insufficient. Of respondents surveyed: 59 percent believe insecure by employees is one of the main sources of data leaks in their organizations 69 percent believe employees ignore policies about ing unencrypted sensitive or confidential documents through insecure channels 61 percent believe employees send unencrypted confidential information through insecure channels, such as personal Web-based 59 percent believe insecure by employees is one of the main sources of data leaks in their organizations. 69 percent believe employees ignore policies about ing unencrypted sensitive or confidential documents through insecure channels. 61 percent believe employees send unencrypted confidential information through insecure channels, such as personal Web-based . No 41% Yes 59% No 31% Yes 69% No 39% Yes 61% 1 Survey: Corporate , by The Radicati Group, September Educating Decision Makers about the Need for Encryption by Osterman Research, August The State of Encryption by Ponemon Institute, September
3 Mobility Concerns Business is no longer conducted behind a desk. Mobile phones have expanded the workplace and work hours, and more users spend time on than any other internet-enabled activity. According to a study 4 conducted by The Nielsen Company, users spend an average of 42 percent of their mobile time using . With increasing dependence on mobile devices for access to data whenever, wherever, mobile is a major threat. Of respondents in a Ponemon Institute study 3, 70 percent stated concern about the loss of information via on mobile devices. Government Regulations Securing sensitive information in isn t just a best practice it s often the law. HIPAA, HITECH, GLBA, SOX, state data security laws and guidance from FFIEC agencies make it clear that protecting sensitive information is no longer optional. Organizations in healthcare, financial services and government face a heavy burden, and as a result of expanding federal laws and state data security laws, many organizations beyond these three industries are beginning to feel the stress as well. Despite the challenges of government regulations, employee behavior and mobility, is a necessary tool that can be conveniently secured with next generation encryption. The Leader in Encryption Services ZixCorp has built a trusted reputation with the nation s most influential institutions through our easy-to-implement, -use and -maintain solutions. ZixCorp Encryption Services are based on Software-as-a-Service (SaaS) architecture, and ZixCorp distinguishes itself with convenient delivery methods that focus on both the sender and receiver experience. Our solutions integrate seamlessly with existing applications, and encryption keys are managed automatically. The most complicated and costly aspect of encryption is key management. To eliminate the customers need to build their own directory of encryption keys, ZixCorp has developed the world s largest, shared repository for automatic key exchange ZixDirectory. ZixDirectory includes tens of millions of members and increases at approximately 100,000 members per week. Its automated key management reduces the typical cost and complexity associated with encryption solutions and saves wasted hours spent setting up and exchanging keys. The ZixDirectory also safeguards against expired keys and certificates by providing centralized distribution among all members. 3 The State of Encryption by Ponemon Institute, September How Americans Spend Mobile Internet Time: A New Look by The Nielsen Company, May
4 Features FIPS solutions Hosted key management Customizable policy engines for regulatory compliance Centralized policy management Custom branding Flexible delivery options Benefits Instant secure connection to regulators and partners Low fixed total cost of ownership Guaranteed service levels Transparent, send-to-anyone capability Seamless integration with your existing network Fast and easy to deploy The Industry s Only Fully Transparent Encryption ZixCorp provides the industry s only fully transparent delivery by leveraging ZixDirectory with ZixGateway. When a ZixGateway customer sends encrypted to another ZixGateway customer, the message is sent transparently. With transparent delivery, users send and receive encrypted as they would conventional . Workflow is not interrupted, and no extra steps are required. On average, more than one third of our customers recipients receive their encrypted messages transparently, so that not even a password is needed. ZixGateway is a policy-based encryption service that automatically scans and encrypts outbound if sensitive information is included within the subject line, body or attachments. Through automatic encryption, employees are alleviated of security burdens, and companies can ensure customer protection and regulatory compliance. In addition, ZixGateway offers superior TLS that features simplified configuration; secure, bidirectional transparency through S/MIME delivery; increased control with policy management; increased visibility and compliance with report capabilities; and unique branding embedded at the end of the message that provides your recipients with added confidence. None of these features are available in competing TLS solutions. As an alternative to ZixGateway, companies can offer employees the option to encrypt through ZixMail. This desktop solution provides employees the choice to secure with the convenience of a single click. Whether is encrypted through ZixMail or ZixGateway, ZixCorp uses encryption standards, such as S/MIME, OpenPGP and TLS, to deliver secure to anyone, anywhere. Encrypt and Send to Anyone No matter the recipient s encryption capabilities, ZixCorp Encryption Services deliver encrypted messages to anyone using the manner that works best for the end-user through our Best Method of Delivery SM. For users without encryption, ZixCorp provides two different methods, including a secure portal, or pull, method and a direct delivery, or push, method.
5 Who Uses ZixCorp Encryption Services? Best ZixCorp s Method Best Method of of Delivery ZixCorp Customers Federal banking regulators, including FFIEC ZixGateway The Securities and Exchange Commission Sender s Premise ZixMail More than 1,600 financial institutions More than 30 Blue Cross Blue Shield organizations Sender Mail Server ZixGateway (Policy Engine) ZixDirectory (Key Lookup) Mail Server TLS Nearly one in five, or 1,200, U.S. hospitals ZixPort/ZixMessage Center (Pull) ZixDirect (Push) ZixCorp Encryption Services ZixCorp Encryption Services have several optional components to meet the needs of any organization. Customers have the choice of a fully hosted solution or an appliance in their facility. ZixGateway is a policy-based encryption gateway for privacy and compliance. Installed at the periphery of your network, ZixGateway automatically scans for sensitive information based on defined corporate policies. If sensitive information is found, it can be either blocked or sent encrypted. Policy-based encryption means the process is transparent to your users. ZixGateway supports a variety of delivery options including industry standards such as S/MIME and OpenPGP. ZixGateway also offers superior TLS delivery, unlike any competitive solutions. ZixMail is a desktop application that integrates with any corporate or Webbased system and provides encryption and decryption with the convenience of a single click. ZixPort uses clientless pull technology that sends encrypted through a secure Web portal. It is ideal for companies that want to extend their brand by including secure communications as part of their portal experience. ZixPort offers a unique mobile-friendly feature, ZixMobility, which allows recipients to access encrypted with one convenient click. ZixMobility skips the cumbersome steps, distorted layouts and frustration of other solutions to provide simple encryption to anyone, anywhere and on any mobile device.
6 ZixData Center TM ZixCorp Encryption Services are managed through the ZixData Center, a SysTrust certified, SAS-70 Type II accredited and PCI Level 1, DSS v2.0 compliant facility. The ZixData Center offers redundant power sources, storage units and security measures, and it has proven percent reliability. About Zix Corporation Zix Corporation (ZixCorp) provides the only encryption services designed with your most important relationships in mind. The most influential companies and government organizations use the proven ZixCorp Encryption Services, including WellPoint, the SEC and more than 1,200 hospitals and 1,600 financial institutions. ZixCorp Encryption Services are powered by ZixDirectory, the largest encryption community in the world. The tens of millions of ZixDirectory members can feel secure knowing their most important relationships are protected. For more information about ZixCorp, call , or visit ZixDirect uses clientless push technology that sends encrypted messages directly to the recipient s inbox. It is ideal for sending securely to customers or business partners that do not have encryption capabilities. ZixAccess automatically decrypts inbound from ZixCorp users and provides transparent communication, eliminating the need to click on a link or attachment and enter a password. ZixAccess significantly lightens the workload inherent in discovery and improves archiving of important messages. ZixAccess also features the capability to automatically scan all outbound and report all outbound risks to your security or compliance officer. ZixEnable SM is application-generated encryption that enables businesses to secure the delivery of large-scale communication containing personal private information. ZixEnable can be used to distribute personalized marketing campaigns, financial and health statements or other sensitive communication that businesses want to deliver in a timely and secure manner. ZixGateway Inbound automatically scans inbound for unsecure sensitive information, proactively identifying potential vulnerabilities. When vulnerabilities are identified, both the external sender and the appropriate internal security or compliance officer can be automatically notified. In addition, ZixGateway Inbound provides reports that log the details of inbound vulnerabilities. ZixConnect SM allows customers to securely communicate with their regulators and partners without the need for additional hardware or software at their facility. With just one secure TLS connection, customers are instantly connected to the ZixCorp encryption network. ZixAuditor is a comprehensive assessment service that enables organizations to identify vulnerabilities, implement more effective policies and procedures, and monitor ongoing communications to ensure compliance. Zix Corporation 2711 N. Haskell Ave. Suite 2300, LB 36 Dallas, TX
s for PCI DSS Compliance A Trend Micro White Paper Addressing PCI DSS Requirements with Trend Micro Enterprise July 2010 I. PCI DSS AND TREND MICRO ENTERPRISE SECURITY Targeted threats, distributed environments,
Nine Essential Requirements for Web Security Enabling safe, productive access to social media and other web applications Table of Contents Executive Summary...3 Introduction...4 Web Security Concerns....4
A GUIDE TO Security and privacy in a Hosted Exchange environment What s inside this white paper: A two-page checklist for comparing the security of hosted Exchange providers Definitions for each element
THE BENEFITS OF CLOUD NETWORKING 1 White Paper The Benefits of Cloud Networking Enable cloud networking to lower IT costs & boost IT productivity 2 THE BENEFITS OF CLOUD NETWORKING Table of Contents Introduction
Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at
WHITE PAPER Security Solutions The Identity and Access Management Imperative: Securing the Extended Enterprise Introduction For nearly three years, a junior trader allegedly used stolen passwords and insider
KANA Express Service Overview Introduction KANA Express provides a complete suite of integrated multi channel contact and knowledge management capabilities, proven to enable significant improvements in
The Unique Benefits of Archiving Email in the Cloud Reduce email storage and management costs, satisfy e-discovery and compliance needs and provide business protection Table of Contents Soaring Email Volumes
Product Overview for Windows Small Business Server 2011 December 2010 Abstract Microsoft offers Windows Small Business Servers as a business solution for small businesses by providing a simplified setup,
Five Hosted VoIP Features WHITEPAPER: hosted exchange BUYER S GUIDE www.megapath.com executive summary The adoption of cloud-based hosted services is gaining momentum among businesses interested in reducing
White Paper: Managed Network Services Trends for Today s Enterprise Organizations Released December 2010 Spacenet Inc 1750 Old Meadow Road McLean, VA 22102 www.spacenet.com 866-480-2263 1 Table of Contents
J U L Y 2 0 1 2 OpenText Enterprise Information Management CIOs are under siege Do more with less is no longer an ideal, it s a mandate. With growing volumes and a host of information formats to manage
Sprint Message Archive Email and IM Archiving Proven Strategies for the Enterprise 2 Sprint Message Archive Executive Summary Email has become a ubiquitous form of electronic communication. For most businesses,
A COALFIRE WHITE PAPER Using s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance Implementing s Deep Security Platform in a Payment Card Environment April 2015 Page 1 Executive Summary...
White Paper Getting ahead in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : March 2013 Users are demanding access to applications and services from wherever they are, whenever
Thought Leadership Paper Cloud Computing in the Hedge Fund Industry About Eze Castle Integration Eze Castle Integration is the leading provider of IT solutions and private cloud services to more than 600
BEST PRACTICES WHITE PAPER Measuring Success Service Desk Evaluation Guide for the Midsized Business: How to Choose the Right Service Desk Solution and Improve Your ROI Table of Contents INTRODUCTION...1
A MIMECAST SPONSORED WHITE PAPER Email As Part of a Business Continuity StrategY Why always-on-business requires always-on-email Few businesses could function without email, and email provides a critical
Cloud Based Software! 10 Reasons It s The Best Approach Abstract The adoption of cloud-based business applications - tools and software delivered over the web with an on-demand, subscription-based model
Secure Computing is a leading provider of enterprise gateway security solutions. Powered by our TrustedSource technology, our best-of-breed portfolio of solutions provides Web Gateway, Messaging Gateway,
Three guiding principles to improve data security and compliance Sarah Cucuz email@example.com IBM Software October 2012 Thought Leadership White Paper Three guiding principles to improve data security
The Microsoft Office 365 Buyer s Guide for the Enterprise Guiding customers through key decisions relative to online communication and collaboration solutions. Version 2.0 April 2011 Note: The information
Email Management Services: Opportunity for the Postal Service September 27, 2012 Prepared by U.S. Postal Service Office of Inspector General Office of Audit, Revenue and Systems Directorate Report Number:
WHITE PAPER Meeting Data Residency and Compliance Challenges in Global Enterprises Innovative Security Solutions Enhance Business Agility and Reduce Risk Data Security: A Competitive Advantage In today
UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K Annual Report Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 For the fiscal year ended December
How Unified Communications Improves Business Managed VoIP Services and Unified Communications Designed for Small and Medium Businesses Executive Summary Change Re-defines Communications Demand for increased