W H I T E PA P E R. Providing Encryption at the Internal Desktop
|
|
- James Stephens
- 8 years ago
- Views:
Transcription
1 W H I T E PA P E R Secure Inside the Corporate Network: Providing Encryption at the Internal Desktop
2 Table of Contents Introduction 2 Encryption at the Internal Desktop 2 Current Techniques for Desktop Encryption 3 Compression and Encrypted Attachments 3 Using an S/MIME-based PKI for Desktop Security 4 Using PGP on the Desktop 4 Identity-based Encryption 5 The Ideal Solution 5 Ideal User Experience of a Typical Sender 5 Ideal User Experience of Two Typical Recipients 6 Ideal User Experience of a Typical Administrator 6 Tumbleweed Plug-in Coming in The Tumbleweed Plug-in Approach 7 Conclusion Secure Inside the Corporate Network
3 Introduction Each organization has its own unique security needs when it comes to sending and receiving sensitive information via from complying with government privacy regulations in Healthcare (HIPAA) and Financial Services (GLBA) to enforcing corporate policies (SOX) and protecting intellectual property. Although individual implementations vary, current security requirements typically fall into two categories: inbound protection and outbound security. v Inbound protection. Protecting the inbound stream from viruses, spam, dark traffic, and other malicious messages is critical for network efficiency, user productivity, and policy compliance. A combination of firewall, antispam, anti-virus, anti-phishing, and antihacking products are generally deployed to guard against these threats. v Outbound security. Securing the information that exits a corporate network is as important as defending the inbound stream, because misuse of corporate information, data leakage, and delivery of improper content can result in significant exposure. Content filtering, authentication, and encryption solutions can mitigate these risks. An effective approach to both inbound and outbound security is to apply protection at the enterprise boundary, where enters or leaves the corporate network. This strategy simplifies security by allowing administrators to define and manage security policies and measures centrally and universally, without requiring individual users to actively implement them. Until recently, securing at the gateway to the enterprise has been sufficient for most organizations. ENCRYPTION AT THE INTERNAL DESKTOP Securing between users inside the corporate network has not been a major concern for most organizations with sufficient security at the gateway to the enterprise. Today, however, a combination of changing business, regulatory, and technology factors are highlighting the need for organizations to re-evaluate their protection strategies and consider implementing a third type of security: encryption at the internal desktop. - As business relationships become more distributed and complex, internal networks are providing access for more remote users and non-employees. This blurs the line between internal and external recipients and makes the network less trusted. - It is becoming increasingly common for users to send sensitive information to a combination of internal and external recipients who may warrant different levels of security and have different encryption/decryption capabilities. - Increased regulation requires greater control over the information exchanged within internal networks, including encryption to protect against unauthorized access. - Desktop encryption software has become easier to deploy, making it a viable solution for protecting sensitive information inside corporate networks. This paper summarizes several current techniques for encrypting at the desktop, and outlines the characteristics of an ideal solution that overcomes their various limitations. It also provides an overview of the new desktop encryption enhancements that will be available for Tumbleweed Secure Messenger and Tumbleweed Firewall in Secure Inside the Corporate Network
4 Current Techniques for Desktop Encryption One of the major challenges with any security solution is to balance the absolute security requirements with usability. This is especially true for secure products if they are not easy to use and fully integrated into the normal workflow, the user community will not adopt them. This is because they don t pass a simple Friday afternoon test. Imagine a busy employee who has to send an important two minutes before leaving for the weekend. While assembling the message, the employee realizes it really should be sent securely. An encryption system will only pass the test if it is integrated with the normal workflow, and so easy to use that the employee will encrypt the message rather than continuing with standard and hoping for the best. A variety of encryption technologies and approaches provide different levels of security and usability. They include: - Compression and encrypted attachments - Relying on passwords as a Shared Secret - Using a full PKI for desktop security - Using PGP on the desktop - Identity-based encryption COMPRESSION AND ENCRYPTED ATTACHMENTS A number of desktop utilities enable individual users to create encrypted archives of files that can be attached to s and sent to internal or external recipients (e.g. WinZIP ). Some support only password-based encryption while others allow the use of the recipient s digital certificate to perform the encryption. This is one of the simplest methods for providing encryption at the desktop, but generally requires senders to initiate the encryption process outside of the client. Utilities can be linked into the sender s system relatively easily by adding an encrypt and send option to the menus available on the desktop. Many of these systems also only support password-based encryption schemes, the limitations of which are discussed below. Relying on Passwords as a Shared Secret Many of the simpler encryption schemes follow three steps: - The sender gathers the information they wish to send into a package. - The sender uses some tool to encrypt the package, and creates a password that the recipient will use to decrypt it on the receiving end. - The sender s the package to the recipient(s). 03 Secure Inside the Corporate Network
5 This approach has several limitations: - It doesn t account for how senders provide recipients with passwords. - It doesn t easily scale beyond a few users. - It tends to result in very loose security, with either standard known passwords being used and shared among multiple users, or passwords being included in the s themselves. - It doesn t enable the message body of an to be encrypted along with the attachments. USING AN S/MIME-BASED PKI FOR DESKTOP SECURITY Public Key Infrastructures (PKIs) use virtual IDs, or digital certificates, to validate the identity of organizations, computers, and individuals before allowing a transaction or communication to occur. The ability to encrypt and decrypt using digital certificates and the S/MIME standard is built into many desktop clients, including Microsoft Outlook and Outlook Express, Lotus Notes, Mac Mail, and Thunderbird. Yet S/MIME has not been adopted as a universal encryption standard. This is because desktop-based encryption solutions that rely on thousands of individuals installing and consistently using digital certificates have not passed the Friday afternoon test because they are not only cost-prohibitive, but they are also difficult to use. For example: v To encrypt a message, the sender must first find a certificate for each recipient. If the intended recipient does not have a certificate or the sender can t find it, the encrypted can t be sent. If certificates are found, senders must import each individual certificate into their clients. This is time-consuming and difficult to manage, particularly for nontechnical users. v Who do you trust? Managing individual certificates on the desktop requires that senders know how to verify certificates from different issuers, and what to do when certificates become invalid or expire. v Publishing a certificate directory is a security risk! If a company places a directory of internal users certificates on the Internet or corporate intranet for others to look up, it is opening the door to Directory Harvest Attacks and other threats from malicious hackers. These limitations combined with the expense and administrative overhead of deploying a traditional PKI has prevented widespread deployment of desktop encryption. It is simply too cumbersome. USING PGP ON THE DESKTOP Using desktop clients to implement PGP encryption between individuals imposes many of the same limitations as S/MIME-based desktop encryption. While the trust model is usually different, the requirement that individual senders have pre-existing PGP keys for all intended recipients only works well for small communities, and does not scale within larger enterprises. As with S/MIME and X509 certificates, publishing a directory of internal keys on the Internet to improve scalability is a security risk. 04 Secure Inside the Corporate Network
6 IDENTITY-BASED ENCRYPTION PGP, S/MIME, and X509-based approaches typically run into deployment problems because of the need for senders to know in advance the encryption keys associated with each recipient. In the last few years, some new approaches to PKI have been suggested which remove the need to share public keys or digital certificates. These approaches, dubbed identity-based encryption, simplify the process by using some other already-known feature, such as the recipient s address, as a pseudo public key. The cryptography underlying these techniques is relatively new and has not been subjected to the same level of peer review as encryption using PGP or X509 certificates. As a result, identity-based encryption techniques do not have the same standing in the cryptographic community. They also have some characteristics that make them less attractive than they first appear: v The encryption scheme actually relies on a single central Master Key. Compromise of this Master Key has the potential to break system security. v The recipient s address is not enough in itself. Using only the address as a pseudo public key does not allow revocation of keys. If a key is compromised, the recipient must change addresses or risk a security breach. In practice, the public key is constructed using a combination of date/time, address, and information about the Master Key. This means that a particular recipient may have multiple private keys, significantly increasing complexity. v Unlike methods which rely on standards already supported by a variety of desktop and mobile clients, this method requires installing proprietary software on every system you consume on. This can be very time-consuming and challenging to support for user who rely on multiple methods for receiving . The Ideal Solution The ideal desktop encryption solution for internal networks will eliminate the weaknesses and limitations of current techniques. For example, the ideal desktop-to-desktop encryption solution: - Does not place any administrative burden on the sender, unlike conventional desktop S/MIME and PGP. - Can scale to support growing user communities, which is not possible with password-based techniques. - Integrates easily into the normal workflow, unlike encrypting attachments. - Does not rely on pseudo public-keys, which are unproven and tricky at best. - Can effectively deal with encrypting to a combined group of internal and external recipients. IDEAL USER EXPERIENCE OF A TYPICAL SENDER Bob works for Enterprise X. He needs to send secure to Alice, who is within Enterprise X and Carol, an external partner. He should be able to send the encrypted message from his existing client without having to worry that Alice is internal and Carol is external. He may or may not have previously sent to Alice or Carol, and he may or may not have previously sent encrypted to anyone. Bob is an executive user who does not have time to understand or manage digital certificates he just wants his messages to be delivered securely. 05 Secure Inside the Corporate Network
7 IDEAL USER EXPERIENCE OF TWO TYPICAL RECIPIENTS Alice receives the secure from Bob, and may not have previously sent or received secure . She should be able to decrypt the from Bob without worrying about her own software, certificates, or keys. This means that Alice should either have pre-installed software to handle the decryption (distributed by the administrator), or the she receives should include easyto-follow decryption instructions. This might include a link to software she can download and install on her desktop. Alice should also be able to reply to both Bob and Carol securely, without concerning herself with who is internal and what encryption method is used. Once any initial software or key is installed, Alice should be able to read any secure she receives, even if her computer is not connected to the Internet. Carol should be able to receive secure messages from Enterprise X in her preferred encryption format. She may already use S/MIME or OpenPGP encryption, or she may not have any previous encryption capability. Carol should not need to know whether Bob and Alice are encrypting from their desktops or using gateway encryption. She should simply be able to reply to or originate secure messages using her preferred method and have them delivered to Bob and Alice. In addition, encrypted messages originating from Carol should be scanned for viruses and policy violations before being allowed into Enterprise X. IDEAL USER EXPERIENCE OF A TYPICAL ADMINISTRATOR Ted is the administrator for Enterprise X. He wants to enable employees to exchange secure internally and externally, but does not want to have to issue and manage certificates for internal and external users. As much as possible, he wants encryption between internal and external users with and without desktop software to be handled automatically by the gateway server. Ted does not have time or resources to support complex client installation and setup for each user who needs to send secure . Ideally, he will be able to remotely install and enable secure for users from his own administration console. In cases where Ted is required to distribute software for installation, he needs to take into account the profile of users such as Bob, and allow them to send and receive secure with minimal knowledge about encryption. Tumbleweed Plug-in Coming in 2006 Tumbleweed is the leading provider of solutions for securing communications. In the current releases of Tumbleweed software, MailGate Firewall (EMF) and Secure Messenger (SM) work together to inspect all outbound at the network gateway. Based on custom policies that each Tumbleweed customer administrator defines, it automatically identifies violations based on the content of the , and redirects suspect messages to a secure, encrypted channel for further action. This perimeter-based design ensures that every employee, customer, and partner benefits from secure without having to actively implement and manage it on their own desktops. 06 Secure Inside the Corporate Network
8 Encrypted is delivered to external desktops based on administrator-defined policies that determine the most appropriate delivery medium for the intended recipient. The major encryption standards (S/MIME, OpenPGP, SMG) are used for recipients who have encryption/decryption capabilities in their clients already, and Secure Messenger and Secure Envelope are used to deliver encrypted to recipients without requiring anything beyond an client and Web browser. While offering highly secure encryption options, these capabilities are not currently integrated with standard clients, reducing their effectiveness at the internal desktop. In response to the growing need for higher security inside corporate networks, Tumbleweed will release a desktop encryption plug-in for MailGate Secure Messenger that: - Is easy to deploy and easy to use, enabling users to encrypt messages from their desktops using the software they already know. - Integrates seamlessly with existing workflow and desktop clients. - Works effortlessly with other Tumbleweed methods for external encryption, so that senders do not need to worry about whether recipients are located inside or outside the enterprise. THE TUMBLEWEED PLUG-IN APPROACH The Tumbleweed desktop encryption plug-in will provide the proven security of PKI deployments without the complexity and burden of certificate or key management. Combined with the flexible Firewall, it will allow organizations to manage desktop-to-desktop encryption in a way that is most appropriate for each user. The three diagrams, beginning on the next page, illustrate how the desktop plug-in will work for three typical use cases: 1. Where the sender (Bob) is a user of the desktop plug-in, and the recipient (John) has also previously installed the desktop plug-in and enrolled in the system. 2. Where the sender (Bob) is a user of the desktop plug-in, and the recipient (Alice) is an internal user who has not yet installed the plug-in. 3. Where the sender (Bob) is a user of the desktop plug-in, and the recipient (Carol) is an external recipient outside of the enterprise. These diagrams have been separated to show the flow of information in each scenario, but of course Bob could easily be sending the same message to all three recipients at once. The approach taken by the desktop encryption plug-in means that Bob doesn t need to worry about who is who, and the plug-in will simply chose the right approach for each recipient. Of course once John, Alice, or Carol have received Bob s message, they can reply to him by effectively reversing the processes shown here. 07 Secure Inside the Corporate Network
9 Bob creates an in Outlook and tags it to be sent securely. Plug-in checks local certificate cache for public key for John. If key is found, skip to step 5. Plug-in uses SOAP call to query for a certificate for John. Server checks certificate store. John is an enrolled desktop user, so his certificate is returned. Plug-in performs encryption of message using John s public key. Encrypted is routed through Exchange Server. John s Outlook client receives encrypted . Plug-in uses John s private key to decrypt the . Decrypted is presented to John. Figure 1: Bob sends a secure to John, another internal user who has previously installed the plug-in 08 Secure Inside the Corporate Network
10 Bob creates an in Outlook and tags it to be sent securely. Plug-in checks local certificate cache for public key for Alice. Alice has not yet installed the desktop client, so no key is present. Plug-in uses SOAP call to query for a certificate for Alice. Server checks local certificate store. Alice has not installed the desktop client, so does not have a key. Server checks whether Alice is an internal or external user by referencing local rules and/or Active Directory. Alice is an internal user without a key. No certificate is returned. 11 Plug-in sends message over SOAP directly to Tumbleweed Server for delivery. Secure Messenger stores message encrypted on disk. Secure Messenger notification is sent to Alice. Because Alice is an internal user, this notification will include instructions for Alice to install the desktop plug-in for future desktop security. The notification is routed to Alice via Exchange. Alice authenticates, and retrieves the via HTTPS. Because Alice is an internal user, her authentication can be linked into Active Directory and use the same credentials. Figure 2: Bob sends a secure to Alice, an internal user who has not yet installed the desktop plug-in 09 Secure Inside the Corporate Network
11 Bob creates an in Outlook and tags it to be sent securely. Plug-in checks local certificate cache for public key for Carol. Since Carol is not an internal user, it does not find one. Plug-in uses SOAP call to query for a certificate for Carol. Tumbleweed server checks local store. Carol is an external user, so there is no individual certificate. Server checks whether Carol is defined as an internal or external user by referencing Active Directory. Carol is an external user, so a general server certificate is returned to the plug-in to use for encryption Plug-in performs encryption of message using Server s public key. Encrypted is routed through Exchange Server. Exchange sees Carol as an external recipient, and routes via SMTP to Tumbleweed server. Tumbleweed Server uses its private key to decrypt the . Secure Messenger notification and delivery are then used to forward to Carol. A notification is sent to Carol containing a URL which will bring her back to the web site to pick up her secure . Carol authenticates, and retrieves the via HTTPS. Figure 3: Bob sends a secure to Carol, a recipient outside of his organization. This example shows Carol receiving the using Secure Messenger delivery, but she could equally well be configured to use Proxy S/MIME or Proxy OpenPGP messages 10 Secure Inside the Corporate Network
12 Conclusion Shifting business processes and communications needs, expanding internal networks, and increased regulatory requirements are prompting many organizations to re-evaluate their security strategies. Specifically, they are looking for ways to secure traveling within their corporate networks just as they secure entering and leaving the enterprise. One approach is to augment existing perimeter-based security with an additional layer of protection inside the firewall, at the internal desktop. By providing encryption capabilities to individual users, organizations can ensure that sensitive information is delivered safely to both internal and external recipients. A host of desktop encryption techniques are currently available, although they each have certain drawbacks in terms of security, manageability, and ease of use. As the leading provider of solutions for secure communications, Tumbleweed has the experience and the expertise to deliver desktop encryption capabilities that provide the strong security required in today s business environment without the limitations of existing techniques. In 2006, Tumbleweed will introduce an encryption plug-in for MailGate Secure Messenger that adds a new layer of desktop-to-desktop encryption that is easy to deploy, easy to use, and easy to manage within corporate networks. 11 Secure Inside the Corporate Network
13 ABOUT TUMBLEWEED Tumbleweed provides security solutions for protection, file transfers, and identity validation that allow organizations to safely conduct business over the Internet. Tumbleweed offers these security solutions in three comprehensive product suites: MailGate, SecureTransport and Validation Authority. MailGate provides protection against spam, viruses and attacks, and enables policy-based message filtering, encryption and routing. SecureTransport enables business to safely exchange large files and transactions without proprietary software. Validation Authority is the worldleading solution for determining the validity of digital certificates. The result: organizations using Tumbleweed security solutions can safely and securely use the Internet for business, significantly reducing their costs. California, USA Corporate Headquarters Tumbleweed Communications Corp. 700 Saginaw Drive Redwood City, CA New York, USA Tumbleweed Communications Corp. 245 Park Ave, 24th Floor New York, NY United Kingdom Tumbleweed Communications Ltd. Hurst Grove, Sanford Lane Hurst, Berkshire RG10 OSQ UK APAC Tumbleweed Communications Centennial Tower, Level 21 3 Temasek Avenue Singapore Tumbleweed Communications Corp. All rights reserved. Tumbleweed is a registered trademark and Tumbleweed Firewall and Tumbleweed Secure Messenger are trademarks of Tumbleweed Communications Corp. All other brand names are the trademarks of their Phone: / Phone: / Phone: +44 (0) Phone: respective owners. 04/06
Secure Email Inside the Corporate Network: INDEX 1 INTRODUCTION 2. Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR DESKTOP ENCRYPTION 3
A Tumbleweed Whitepaper Secure Email Inside the Corporate Network: Providing Encryption at the Internal Desktop INDEX INDEX 1 INTRODUCTION 2 Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR
More informationFTA Computer Security Workshop. Secure Email
FTA Computer Security Workshop Secure Email March 8, 2007 Stan Wiechert, KDOR IS Security Officer Outline of Presentation The Risks associated with Email Business Constraints Secure Email Features Some
More informationEmail Security Solutions
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
More informationTumbleweed MailGate Secure Messenger
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed
More informationHow To Secure Mail Delivery
FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with
More informationTrend Micro Email Encryption (TMEE) Delivering Secure Email. Veli-Pekka Kusmin Pre-Sales Engineer
Trend Micro Email Encryption (TMEE) Delivering Secure Email Veli-Pekka Kusmin Pre-Sales Engineer Trend Micro Baltics & Finland October 2009 Example #1 True or false: Email is inherently insecure. Answer:
More informationA Guide to Secure Email
White Paper A Guide to Secure Email ABOUT THIS WHITE PAPER AND TARGET AUDIENCE This document is a whitepaper discussing the concept of secure email and the way in which M86 Security enables secure email
More informationImplementing Transparent Security for Desktop Encryption Users
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
More informationSecuring enterprise collaboration through email and file sharing on a unified platform
Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.
More informationThe GlobalCerts TM SecureMail Gateway TM
Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network
More informationApril 2005. PGP White Paper. PGP Universal 2.0 Technical Overview
April 2005 PGP White Paper PGP Universal 2.0 Technical Overview 1 Table of Contents EXECUTIVE SUMMARY... 2 INTRODUCTION... 3 THE PGP ECOSYSTEM... 4 WHAT IS THE PGP ECOSYSTEM?... 4 PGP Global Directory...
More informationSecuring enterprise collaboration through email and file sharing on a unified platform
Axway MailGate SC Securing enterprise collaboration through email and file sharing on a unified platform Email is the primary collaboration tool employees use to share information and send large files.
More informationConsolidated Email Hygiene and Encryption Service E-Hub. Slide 1
Consolidated Email Hygiene and Encryption Service E-Hub Slide 1 Agenda E-Hub Service Overview E-Hub Benefits & Features E-Hub Rates and Implementation Microsoft FOPE Hygiene Overview Demo Microsoft FOPE
More informationBusiness Case for Voltage SecureMail Mobile Edition
WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central
More informationWhite paper. Why Encrypt? Securing email without compromising communications
White paper Why Encrypt? Securing email without compromising communications Why Encrypt? There s an old saying that a ship is safe in the harbour, but that s not what ships are for. The same can be said
More informationDMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationGlob@lCerts. HIPAA: Briefing for Healthcare IT Security Personnel. Market Overview: HIPAA: Privacy Security and Electronic Transaction Standards
Glob@lCerts Market Overview: HIPAA: Briefing for Healthcare IT Security Personnel HIPAA: Privacy Security and Electronic Transaction Standards Introduction: The HIPAA (Healthcare Insurance Portability
More informationSecuring Microsoft Office 365
Securing Microsoft Office 365 Critical Information Protection for Hosted Email Services Microsoft Office 365 has captured the corporate imagination, but can you be sure that its security features are delivering
More informationA NATURAL FIT. Microsoft Office 365 TM and Zix TM Email Encryption. By ZixCorp www.zixcorp.com
Microsoft Office 365 TM and Zix TM Email Encryption A NATURAL FIT By ZixCorp www.zixcorp.com Microsoft Office 365 TM and Zix TM Email Encryption Page 1 INTRODUCTION IT managers and decision makers are
More informationCIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
More informationSymantec Encryption Solutions for Email, Powered by PGP Technology
Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman
More informationEmail Privacy 101. A Brief Guide
Trend Micro, Incorporated A brief guide to adding encryption as an extra layer of security to protect your company in today s high risk email environment. A Trend Micro White Paper I February 2009 A brief
More informationE-mail Best Practices
CMSGu2012-06 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius E-mail Best Practices National Computer Board Mauritius Version 1.0 June
More informationDeployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php
Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with
More informationWhen Data Loss Prevention Is Not Enough:
Email Encryption When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption Technical Brief WatchGuard Technologies, Inc. Need for Email Encryption Is at Its Peak Based
More informationDecryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationSECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
More informationEvaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
More informationSecure Messaging Overview
IRS/FTA CSO Conference Enterprise Implementation of Secure Messaging Services April 3, 2008 Timothy R. Blevins, KDOR Chief Information Officer 1 Secure Messaging Overview What is Secure Messaging What
More informationAn Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst
An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity
More informationVoltage's Encrypted Email
Voltage's Encrypted Email October 2004. Report #471 Ferris Research Product Brief Sponsored by Ferris Research, Inc. 408 Columbus Ave., Suite 1 San Francisco, Calif. 94133, USA Phone: +1 (415) 986-1414
More informationRethinking Email Encryption: Eight Best Practices for Success
WHITE PAPER Rethinking Email Encryption: Eight Best Practices for Success Executive Summary Email continues to play a fundamental role in an organization s communications and day to day business and represents
More informationSECURE Email User Guide
SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive
More informationTop 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
More informationDigital certificates and SSL
Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between
More informationCyber Warnings E-Magazine August 2015 Edition Copyright Cyber Defense Magazine, All rights reserved worldwide
1 Cyber Warnings E-Magazine August 2015 Edition End-to-End Encryption for Emails. An Organizational Approach by Dr Burkhard Wiegel, Founder and CEO, Zertificon Solutions The threat to electronic enterprise
More informationReceiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationDjigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
More informationEmail Encryption Services
Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in
More informationEnterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
More informationA New Standard in Encrypted Email. A discussion on push, pull and transparent delivery
A New Standard in Encrypted Email A discussion on push, pull and transparent delivery By ZixCorp November 2010 2 Email enhances our daily business life. It enables efficient, real-time communication, unites
More informationEmail Encryption Services
Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in
More informationSecurEnvoy Security Server. SecurMail Solutions Guide
SecurEnvoy Security Server SecurMail Solutions Guide SecurMail Solutions Guide 2009 SecurEnvoy Printed: 2009 in United Kingdom Publisher SecurEnvoy Publishing Managing Editor SecurEnvoy Training Dept Technical
More informationPAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
More informationRethinking Email Encryption: Eight Best Practices for Success
White paper Rethinking Email Encryption: Eight Best Practices for Success HP Security Voltage Table of contents 3 3 4 5 5 6 7 7 8 9 9 10 Executive Summary Introduction: Growing Email Usage and Continued
More informationSecured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
More informationHIPAA DATA SECURITY & PRIVACY COMPLIANCE
HIPAA DATA SECURITY & PRIVACY COMPLIANCE This paper explores how isheriff Cloud Security enables organizations to meet HIPAA compliance requirements with technology and real-time data identification. Learn
More informationSEcuRE THE LInES of communication: R E AcHIEvE PcI compliance for P A EmAIL And file TRAnSfERS P E IT H W
W H I T E PA P E R Secure the Lines of Communication: Achieve PCI Compliance for Email and File Transfers Introduction When customers give credit card information at a point of sale, over the Internet,
More informationDJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
More informationVAULTIVE & MICROSOFT: COMPLEMENTARY ENCRYPTION SOLUTIONS. White Paper
COMPLEMENTARY ENCRYPTION SOLUTIONS White Paper Table of Contents Section I: Vaultive & Microsoft: Complementary Encryption Solutions... 2 Section II: Vaultive is a Microsoft ISV Partner... Appendix A:
More informationDispatch: A Unique Email Security Solution
Dispatch: A Unique Email Security Solution 720 836 1222 sales / support sales@absio.com email www.absio.com web 8740 Lucent Boulevard, Ste 101 Highlands Ranch, CO, 80129 1 110-WP005-1 Organizations use
More informationCore Protection Suite
Core Protection Suite Admin Guide Spam Soap, Inc. 3193 Red Hill Avenue Costa Mesa, CA 92626 United States p.866.spam.out f.949.203.6425 e. info@spamsoap.com www.spamsoap.com Contents EMAIL PROTECTION OVERVIEW...3
More informationUsing Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
More informationHow To Configure Forefront Threat Management Gateway (Forefront) For An Email Server
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management
More informationPolicy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationEmail Privacy. Protecting Your Members. Monday, June 30, 2008 3:00 p.m. - 4:15 p.m. Dena Bauckman, Director of Product Management Zix Corporation
What We LEARN in Vegas... Comes Home from Vegas! Email Privacy Protecting Your Members Monday, June 30, 2008 3:00 p.m. - 4:15 p.m. Dena Bauckman, Director of Product Management Zix Corporation Massachusetts
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationEmail Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
More informationGFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"
More informationIBM Lotus Protector for Mail Encryption. User's Guide
IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This
More informationEmail Compliance in 5 Steps
Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationA Directory-driven Approach to Email Security:
A Directory-driven Approach to Email Security: Using Directory Information to Optimize the Enterprise Email Infrastructure. Directory and DirSync May 2007 INTRODUCTION The most common security threat to
More informationEmail Encryption Made Simple
Email Encryption Made Simple For organizations large or small Table of Contents Who Is Reading Your Email?....3 The Three Options Explained....3 Organization-to-organization encryption....3 Secure portal
More informationF5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
More informationINLINE INGUARD E-MAIL GUARDIAN
INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine support@inline.com 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail
More informationITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
More informationQuick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
More informationPersonal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationContingency Access to Enterprise Encrypted Data
T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents No option to escrow Passphrase protection zseries example Incorporating contingency key in zseries Windows command line example Incorporating
More informationMimecast Large File Send
DATASHEET Mimecast Large File Send For sending large files, lets go back to email Mimecast Large File Send simplifies large file sharing for users by removing the complexity and frustration associated
More informationredcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationQuest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationAxway SecureTransport Ad-hoc File Transfer Service
Axway SecureTransport Ad-hoc File Transfer Service Secure, efficient and reliable Enterprise File Sharing (EFS) In today s fluid, fast-paced, and highly collaborative business environment, people need
More informationV1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
More informationFortiMail Email Filtering. Course 221 (for FortiMail v4.2) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v4.2) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
More informationTroubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
More informationIBM Data Security Services for endpoint data protection endpoint encryption solution
Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such
More informationSecure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
More informationFortiMail Email Filtering. Course 221 - for FortiMail v4.0. Course Overview
FortiMail Email Filtering Course 221 - for FortiMail v4.0 Course Overview FortiMail Email Filtering is a 3-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
More informationStrengthen Microsoft Office 365 with Sophos Cloud and Reflexion
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity
More informationTHE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationHow To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
More informationService Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365
1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service
More informationFidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1
Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers
More informationEncryption. For the latest version of this document please go to: http://www.exchangedefender.com/docs. v 1.0 May 16,2011 Audience: Staff
Encryption For the latest version of this document please go to: http://www.exchangedefender.com/docs v 1.0 May 16,2011 Audience: Staff Table of Contents ExchangeDefender Overview 3 ExchangeDefender Encryption
More informationINFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
More informationBuilding A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
More informationWhy Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs P/N 500205 July 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 1 Integrated VPN/firewall Page 2 placed
More informationMESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
More informationMANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
More informationPaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper
Incorporated 3/7/06; Rev 9/18/09 PaperClip Compliant Email Service Whitepaper Overview The FTC Safeguard Rules require Financial, Insurance and Medical providers to protect their customer s private information
More informationAccount Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts
Medical Privacy Version 2015.04.13 Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts In order for Lux Scientiae, Incorporated (LuxSci) to ensure the security and privacy of all Electronic
More informationSecured email Global Communication version 4.6
Secured email Global Communication version 4.6 A new and improved way to receive Secured email Authors: Daniel Nilsson and Jeff Sherwood May 11, 2010 Content Introduction...3 Secured email...4 Sending
More information