The Building Blocks for Trusted Internet Services

Size: px
Start display at page:

Download "The Building Blocks for Trusted Internet Services"

Transcription

1 The Building Blocks for Trusted Internet Services Openness, Privacy and Security Neil Cook, Bert Hubert Open-Xchange March 15, 2016

2 Open-Xchange: Who are we? Trusted and integrated solutions OX App Suite communication and collaboration suite: Engage more customers. OX-as-a-Service secure, hosted stack from App Suite through to secure storage: Cloud GTM M sold seats 22 countries 17 languages Trusted Services 3.5M mail Server installations globally 68% worldwide market share Superior scalability & cost efficiency Full control back to Service Provider Fully secure (MAAWG / secure standard) Storage backend agnostic (S3, object storage) EU market leader Domain Name Services (50%) Leading DNSSEC >75% of hosted domains Excellent scalability Database backed Error checking API Millions of domains/server 2 Trusted Internet Services Building Blocks

3 The Battle for End-Users: Previously Great Features US-based Free OK Features Based anywhere Free/Subscription Open-Source 3

4 The Battle for End-Users: Now Great Features US-based Free Great Features Based anywhere Free/Subscription 4

5 The Next Battleground: Trust Mass Surveillance Hackers and Foreign Governments Hosters and Service Providers targeted 5 Trusted Internet Services Building Blocks

6 How can I trust you? Why should I trust you? Don t be Evil Do I rely on your word? At Apple, your trust means everything to us. 6 Trusted Internet Services Building Blocks

7 Open Source == Trust Open Source Software means transparency OSS means Open- Standards Trust the Openness not the company 7 Trusted Internet Services Building Blocks

8 Proprietary means Lock-In Hard to migrate your own data Migrate Data Other Cloud Service My Data Proprietary Cloud Service In-House Data-Centre or Software 8 Trusted Internet Services Building Blocks

9 Open Source means Flexibility Freedom to choose the right business model Run & Host for others Run & Host Yourself Use 3 rd party service open standards 9 Trusted Internet Services Building Blocks

10 Security also a new Battleground Security is an important building block of trust If I don t feel secure, how can I trust your services? Internet security standards make the internet safer Internet security standards make your users safer

11 But Google is going big on Security!

12 Anything they do you should do better DNSSEC DANE OpenPGP/TES

13 13 Trusted Internet Services Building Blocks

14 But DNSSEC is Hard isn t it? % pdnsutil secure-zone mydomain.com 14 Trusted Internet Services Building Blocks

15 DANE Securely Authenticate TLS Certs in DNS Removes reliance on CAs Even allows self-signed Certs Provides real security for any services with optional TLS (STARTTLS) Prevents MITM Attacks Prevents DNS Spoofing Builds on DNSSEC Way more secure Google s Red Padlock Join Trusted Services Initiative (TES) for more EHLO foobar.com EHLO foobar.com Sending MTA 250 example.net CLEARTEXT MITM 250 STARTTLS CLEARTEXT Receiving MTA 15 Trusted Internet Services Building Blocks

16 OpenPGP and HKP: Real E2E Encryption I d like to send an encrypted message to neil@example.com Mail Client (WebMail, App, MTA) Query: SRV _hkp._tcp.example.com? Answer: hkp.example.com:11371 DNS HKP Server for example.com 16 Trusted Internet Services Building Blocks

17 17 Trusted Internet Services Building Blocks

18 How do you compete with Free? 21 st Century Business Model: We give you service, you give us your privacy

19 Difficult for Free to tailor their services Higher Security Regulatory Requirements Stricter Privacy Locality Encryption Special-Needs Customer Service

20 People will pay for differentiated services No need to compromise privacy Can develop relationship with customer Can tailor service to customer requirements Open and Honest Contract leads to Trust

21 Internet Services Building Blocks Trusted Internet Service Tailored and Differentiated Privacy & Security Open Source & Open Standards Features 21 Trusted Internet Services Building Blocks

22 Join us tomorrow at 2pm for a Roundtable Discussion on Trusted Services

BSI TR-03108-1: Secure E-Mail Transport. Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails

BSI TR-03108-1: Secure E-Mail Transport. Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails BSI TR-03108-1: Secure E-Mail Transport Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails Version: 1.0 Date: 05/12/2016 Document history Version Date Editor Description

More information

Introduction to the DANE Protocol

Introduction to the DANE Protocol Introduction to the DANE Protocol ICANN 47 July 17, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC, routing and other Internet technologies: Case Studies

More information

One year of DANE Tales and Lessons Learned. sys4.de

One year of DANE Tales and Lessons Learned. sys4.de One year of DANE Tales and Lessons Learned sys4.de DANE secures Security Why secure Security? Encryption Models Opportunistic Encryption > Expect anything > Proceed if absent > Try if offered > Proceed

More information

DANE for SMTP. Viktor Dukhovni & Wes Hardaker. IETF 87, Berlin July 2013

DANE for SMTP. Viktor Dukhovni & Wes Hardaker. IETF 87, Berlin July 2013 DANE for SMTP Viktor Dukhovni & Wes Hardaker IETF 87, Berlin July 2013 1 Addresses in SMTP is security agnostic: SMTP with and without TLS runs over port 25 There is no URI scheme

More information

E2e-encrypted email via enhanced certificate transparency

E2e-encrypted email via enhanced certificate transparency E2e-encrypted email via enhanced certificate transparency Mark D. Ryan School of Computer Science University of Birmingham Network and Distributed System Security Symposium 25 February 2014 Email today

More information

TECHNICAL WHITE PAPER. TLS encryption: Is it really the answer to securing email?

TECHNICAL WHITE PAPER. TLS encryption: Is it really the answer to securing email? TECHNICAL WHITE PAPER TLS encryption: Is it really the answer to securing email? The digital age has fundamentally changed the way all organisations operate, driving greater efficiency, scalability and

More information

Automated Certificate Management

Automated Certificate Management Automated Certificate Management ACME + Let s Encrypt Richard Barnes @rlbarnes What problem are we trying to solve? Not enough use of encryption in applications ~40% of Firefox pageloads

More information

PRIVACY & TRANSPARENCY REPORT

PRIVACY & TRANSPARENCY REPORT NOVEMBER 7TH, 2013 THE CONVENIENCE FACTORY BV AUTHOR: MAURICE DE BIJL COPYRIGHT 2013 THE CONVENIENCE FACTORY BV Before printing this document consider alternative methods like viewing it on a computer

More information

Opportunistic Security

Opportunistic Security Opportunistic Security Increasing the cost of mass surveillance without fixing everything Daniel Kahn Gillmor ACLU April 2014 Daniel Kahn Gillmor (ACLU) Opportunistic Security April 2014 1 / 21 Networked

More information

Network Security - ISA 656 Application Firewalls

Network Security - ISA 656 Application Firewalls Network Security - ISA 656 Application Angelos Stavrou August 20, 2008 Moving Up the Stack Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats

More information

WELCOME TO OPEN SOURCE STORAGE (OSS)

WELCOME TO OPEN SOURCE STORAGE (OSS) WELCOME TO OPEN SOURCE STORAGE (OSS) COMPLETE SOLUTIONS FOR YOUR DATA MANAGEMENT TM THE OSS DIFFERENTIATION FACTOR_ Open Source Storage is led by Eren Niazi, a technology visionary. He is the thought leader

More information

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted. Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

A quick overview of the DANE WG. * DNS-based Authentication of Named Entities

A quick overview of the DANE WG. * DNS-based Authentication of Named Entities A quick overview of the DANE WG * DNS-based Authentication of Named Entities Some background... When you connect to https://www.example.com you use SSL (actually TLS) to secure your connection. Need a

More information

How to migrate from MS Exchange to OX. Hans-Jörg Happel, audriga

How to migrate from MS Exchange to OX. Hans-Jörg Happel, audriga How to migrate from MS Exchange to OX Hans-Jörg Happel, audriga Contents Introduction audriga Migration scenarios audriga groupware migration Demo Frequently asked questions 2 Facts and Figures about audriga

More information

Open-source analytics in the Enterprise-level environment. Opportunities and challenges. Maciej Zawadziński CEO of Piwik PRO

Open-source analytics in the Enterprise-level environment. Opportunities and challenges. Maciej Zawadziński CEO of Piwik PRO Open-source analytics in the Enterprise-level environment. Opportunities and challenges. Maciej Zawadziński CEO of Piwik PRO ABOUT Maciej Zawadziński Technical leader and entrepreneur since 2003 CEO of

More information

Corporate Presentation 2016

Corporate Presentation 2016 Corporate Presentation 2016 2 AGENDA About SPAMINA Cool Vendor 2016 The Security Challenge 3 Concerns over data protection and confidentiality Why Spamina? SPAMINA Platform 4 Parla Secure Cloud Email ParlaMI

More information

Risks of Hosting Practice Data on the Cloud Vs. Locally

Risks of Hosting Practice Data on the Cloud Vs. Locally Risks of Hosting Practice Data on the Cloud Vs. Locally Software involving the cloud is becoming ever more popular amongst health professions due to the myriad of benefits it delivers. This concept is

More information

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October

More information

SSL and Browsers: The Pillars of Broken Security

SSL and Browsers: The Pillars of Broken Security SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the

More information

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services World Leading Directory Technology White Paper: Cloud Identity is Different Three approaches to identity management for cloud services Published: March 2015 ViewDS Identity Solutions A Changing Landscape

More information

Security 2012: A Handbook for Cyber Security

Security 2012: A Handbook for Cyber Security Security 2012: A Handbook for Cyber Security Amichai Shulman, CTO Robert Rachwald, Director of Security Strategy IMPERVA Session ID: SECT-204 Session Classification: General Interest Agenda Trend selection

More information

Next Steps In Accelerating DNSSEC Deployment

Next Steps In Accelerating DNSSEC Deployment Next Steps In Accelerating DNSSEC Deployment Dan York, CISSP Senior Content Strategist, Internet Society DNSSEC Deployment Workshop, ICANN 45 Toronto, Canada October 17, 2012 Internet Society Deploy360

More information

OpenStack PHP Usergroup Berlin, April 2011

OpenStack PHP Usergroup Berlin, April 2011 OpenStack PHP Usergroup Berlin, April 2011 Company Overview History Cloud Provider ScaleUp is a spin-out of 12-year old German MSP internet4you" --------------------" In 2009, ScaleUp launched the first

More information

Partnering with Simply Mail Solutions. www.simplymailsolutions.com/resellers. Padgate Business Park, Green lane, Warrington.

Partnering with Simply Mail Solutions. www.simplymailsolutions.com/resellers. Padgate Business Park, Green lane, Warrington. Partnering with Simply Mail Solutions Reseller programme Helping you stand out Becoming a hosted services reseller opens up additional revenue streams for your company without the hurdle of running in-house

More information

Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public

Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public Announcements TIM 50 Teaching Evaluations Open March 3 through 16 Final Exam Thursday, March 19, 4-7PM Lecture 19 20 March 12, 2015 Cloud Computing Cloud Computing: refers to both applications delivered

More information

2015 USER GROUP CONFERENCE

2015 USER GROUP CONFERENCE 2015 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage

More information

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4 Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in

More information

You may use port 587 if port 25 is blocked by your internet provider. This does not apply to customers using PolarComm internet.

You may use port 587 if port 25 is blocked by your internet provider. This does not apply to customers using PolarComm internet. Polar Communications has been working on redesigning our mail system. Some changes that customers need to be aware of with these changes are the following: Webmail: You must use http://webmail.polarcomm.com

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

GlobalSign Enterprise Solutions

GlobalSign Enterprise Solutions GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...

More information

TLS/SSL in distributed systems. Eugen Babinciuc

TLS/SSL in distributed systems. Eugen Babinciuc TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History

More information

Who, What, Where, How: Five Big Questions in Mobile Security

Who, What, Where, How: Five Big Questions in Mobile Security Who, What, Where, How: Five Big Questions in Mobile Security Jacob West CTO, Fortify Products HP Enterprise Security Session ID: ASEC-R31 Session Classification: Intermediate Why is mobile security an

More information

One Hybrid Cloud Software Quick Look

One Hybrid Cloud Software Quick Look One Hybrid Cloud Software Quick Look Automated Cloud Migration and DR for Multi-tier, Physical and Virtual Production Apps CloudVelox, Inc. 3945 Freedom Circle Suite 240, Santa Clara, CA 95054 OHC = Automated

More information

PowerDNS Introduction

PowerDNS Introduction PowerDNS Introduction OX Summit 2015 All presentations will be on: https://www.powerdns.com/oxsummit PowerDNS History Founded in 1999 to provide database driven DNS + geographical load balancing between

More information

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment

More information

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification

More information

FTP-Stream Data Sheet

FTP-Stream Data Sheet FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control

More information

Optimizing Service Levels in Public Cloud Deployments

Optimizing Service Levels in Public Cloud Deployments WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Neither Snow Nor Rain Nor MITM... An Empirical Analysis of Email Delivery Security

Neither Snow Nor Rain Nor MITM... An Empirical Analysis of Email Delivery Security Neither Snow Nor Rain Nor MITM... An Empirical Analysis of Email Delivery Security Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Kurt Thomas, Vijay Eranti, Nicholas Lidzborski, Elie Bursztein,

More information

Deploying DNSSEC: From End-Customer To Content

Deploying DNSSEC: From End-Customer To Content Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical

More information

Security Issues In Cloud Computing And Their Solutions

Security Issues In Cloud Computing And Their Solutions Security Issues In Cloud Computing And Their Solutions Mr. Vinod K. Lalbeg Lecturer (Management), NWIMSR, Pune-1 & Ms. Anjali S. Mulik Lecturer (Management), NWIMSR, Pune-1 ABSTRACT Cloud Computing offers

More information

Request For Proposal (RFP) Issued by FIRST.Org, Inc. INFRASTRUCTURE TECHNOLOGY SERVICES

Request For Proposal (RFP) Issued by FIRST.Org, Inc. INFRASTRUCTURE TECHNOLOGY SERVICES Request For Proposal (RFP) Issued by FIRST.Org, Inc. INFRASTRUCTURE TECHNOLOGY SERVICES Submittal Deadline: November 6, 2015 Extended to November 20 th, 2015 INTRODUCTION FIRST.Org, Inc. (FIRST) is a recognized

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015

INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 CHERYL HARRIS, PH.D. DECISIVE ANALYTICS LLC 575 MADISON AVENUE, 10 TH FL NEW YORK, NY 10022 917.628.6167 14. January 2015

More information

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen What Is The Cloud And How Can Your Agency Use It Tom Konop Mark Piontek Cathleen Christensen Video Computer Basics: What is the Cloud What is Cloud Computing Cloud Computing Basics The use of the word

More information

JBoss. choice without compromise

JBoss. choice without compromise JBoss Enterprise Middleware choice without compromise JBOSS ENTERPRISE APPLICATION PLATFORMS: CHOICE WITHOUT COMPROMISE The JBoss open choice strategy In today s dynamic business world, the need to quickly

More information

What Dropbox Can t Do For Your Business

What Dropbox Can t Do For Your Business What Dropbox Can t Do For Your Business 33 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr Study Executive Summary The need for a well-rounded

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

Dedicated Hosted Exchange 2013

Dedicated Hosted Exchange 2013 About inty Dedicated Exchange Server 2013 The inty Dedicated Exchange 2013 Solution is a fully managed implementation with the following features: High-availability and built to Microsoft s reference architecture

More information

Speeding Foreign Exchange (FX) Mobile Trading Apps

Speeding Foreign Exchange (FX) Mobile Trading Apps Speeding Foreign Exchange (FX) Mobile Trading Apps A Neumob White Paper Introduction: The Costs and Causes of Poor Mobile App Performance The foreign exchange market, or FX, is the mostly widely traded

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1. Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response

More information

Selecting and Implementing Cloud Based Integrated Foundation Information Systems

Selecting and Implementing Cloud Based Integrated Foundation Information Systems Selecting and Implementing Cloud Based Integrated Foundation Information Systems March 17, 2014 Martin Schneiderman President Information Age Associates 47 Murray Place Princeton, NJ 0540 USA mbs@iaa.com

More information

Polycom RealPresence Resource Manager System Getting Started Guide

Polycom RealPresence Resource Manager System Getting Started Guide [Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks

More information

How to Move Mail From Your Old POP Account To Exchange Using Outlook 2010

How to Move Mail From Your Old POP Account To Exchange Using Outlook 2010 How to Move Mail From Your Old POP Account To Exchange Using Outlook 2010 This tutorial shows you how to move your mail, calendar and contacts from an outlook pop account connected to the old mail system

More information

The Software-as-a Service (SaaS) Delivery Stack

The Software-as-a Service (SaaS) Delivery Stack The Software-as-a Service (SaaS) Delivery Stack A Framework for Delivering Successful SaaS Applications October 2010 2010 Online Tech, Inc. Page 1 of 12 www.onlinetech.com Audience Executives, founders,

More information

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure

More information

Project management solution in the cloud

Project management solution in the cloud www.parm.com successful projects Project management solution in the cloud From Mario Angelsberger and Oliver Giger Cloud computing is the talk of the town and meanwhile becomes understood as solution for

More information

Business Case for Voltage SecureMail Mobile Edition

Business Case for Voltage SecureMail Mobile Edition WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central

More information

Underappreciated Security Mechanisms

Underappreciated Security Mechanisms Underappreciated Security Mechanisms Peter Gutmann University of Auckland Introduction Standards for secure email and network communication have been around for years Everyone has heard of S/MIME, SSL,

More information

GET IN NOW Step 2: Add Users

GET IN NOW Step 2: Add Users GET IN NOW Step 2: Add Users 1. Match My Email User Roles During the set-up of Match My Email Lite, a MME account is created. The individual whose credentials are used to create an account becomes the

More information

IETF DPRIVE WG: Encrypting DNS

IETF DPRIVE WG: Encrypting DNS IETF DPRIVE WG: Encrypting DNS Sara Dickinson Sinodun ICANN 54 - Tech Day October 2015 DPRIVE WG Focus is stub to recursive Group created IETF91 IETF92 IETF93 A ID: problem-statement RFC7626 ID: dns-tls-newport

More information

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

Goals. What is Cloud Computing? 11/11/2010. Understand what cloud computing is and how. Understand the challenges and advantages of cloud computing

Goals. What is Cloud Computing? 11/11/2010. Understand what cloud computing is and how. Understand the challenges and advantages of cloud computing Goals Cloud Computing COMP755 Understand what cloud computing is and how it functions Understand the challenges and advantages of cloud computing Many slides were created by Peter Mell, Tim Grance of NIST

More information

UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION

UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION 132 3091 COMMISSIONERS: Edith Ramirez, Chairwoman Julie Brill Maureen K. Ohlhausen Joshua D. Wright ) In the Matter of ) DOCKET NO. ) Credit Karma, Inc.,

More information

The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <matthaeus.wander@uni-due.de> Duisburg, June 19, 2015

The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <matthaeus.wander@uni-due.de> Duisburg, June 19, 2015 The Impact of DNSSEC on the Internet Landscape Matthäus Wander Duisburg, June 19, 2015 Outline Domain Name System Security problems Attacks in practice DNS Security Extensions

More information

F. No. 1(3)/2014 EG II. Ministry of Communication & Information Technology. Department of Electronics & Information Technology POLICY

F. No. 1(3)/2014 EG II. Ministry of Communication & Information Technology. Department of Electronics & Information Technology POLICY POLICY Title of Policy: Policy on Adoption of Open Source Software for Government of India Preamble Government of India (GoI) is implementing the Digital India programme as an umbrella programme to prepare

More information

How To Get A Cloud Service For Free

How To Get A Cloud Service For Free Script Open Cloud Alliance Trust and Choice for the Cloud 1 Slide 2 Open Cloud Alliance Thank you very much. Ladies and Gentlemen, this will be a very brief talk about what we at Univention are doing together

More information

LEAP Encryption Access Project. Αλέξανδρος Αφεντούλης

LEAP Encryption Access Project. Αλέξανδρος Αφεντούλης LEAP Encryption Access Project Αλέξανδρος Αφεντούλης The state of the internet Quite dystopic at the moment Mass surveillance as a status quo, states' and corporal spying on netizens Censorship, access

More information

Google Apps Overview

Google Apps Overview Google Apps Overview Agenda Messaging & collaboration challenges Why existing solutions are costly & limited Google s innovative approach The time is now to switch to the cloud Google Apps Premier Edition

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

Sky high translation technology Balázs Kis Kilgray Translation Technologies balazs.kis@kilgray.com

Sky high translation technology Balázs Kis Kilgray Translation Technologies balazs.kis@kilgray.com memoqfest Americas Los Angeles February 27, 2014 Sky high translation technology Balázs Kis Kilgray Translation Technologies balazs.kis@kilgray.com We don t want cloud(s). We want clear skies. Cloud is

More information

Role of Cloud Computing to Overcome the Issues and Challenges in E-learning

Role of Cloud Computing to Overcome the Issues and Challenges in E-learning Journal of Basic and Applied Engineering Research pp. 66-70 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Role of Cloud Computing to Overcome the Issues and Challenges in E-learning

More information

Using AWS in the context of Australian Privacy Considerations October 2015

Using AWS in the context of Australian Privacy Considerations October 2015 Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview

More information

Mobile Application Security

Mobile Application Security Mobile Application Security Jack Mannino Anand Vemuri June 25, 2015 About Us Jack Mannino CEO at nvisium UI and UX development impaired Enjoys: Scala, Elixir Tolerates: Java Allergic To: Cats, Pollen,.NET

More information

An introduction to Cryptosoft

An introduction to Cryptosoft An introduction to Cryptosoft Seamless end-to-end data centric security for every IoT ecosystem Cryptosoft is building trust in the Internet of Things and M2M by simplifying the processes that a company

More information

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,

More information

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk

More information

NODE4 SERVICE DESK SYSTEM

NODE4 SERVICE DESK SYSTEM NODE4 SERVICE DESK SYSTEM KNOWLEDGE BASE ARTICLE INTERNAL USE ONLY NODE4 LIMITED 24/04/2015 ADD A POP, IMAP OR OFFICE 365 ACCOUNT TO OUTLOOK USING CUSTOM SETTINGS If you re setting up Outlook for the first

More information

bla bla OX App Suite Using E-Mail Clients

bla bla OX App Suite Using E-Mail Clients bla bla OX App Suite Using E-Mail Clients OX App Suite OX App Suite: Using E-Mail Clients Publication date Wednesday, 20. November 2013 Version 7.4 Copyright 2006-2013 OPEN-XCHANGE Inc. This document is

More information

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since

More information

MAXPRO. Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS. Video Anytime, Anywhere

MAXPRO. Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS. Video Anytime, Anywhere MAXPRO Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS Video Anytime, Anywhere HOSTED VIDEO SURVEILLANCE Video in the cloud 2 Anytime, Anywhere Why the Cloud? The cloud is everywhere. Whether

More information

VPN Lesson 2: VPN Implementation. Summary

VPN Lesson 2: VPN Implementation. Summary VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users

More information

The PerspecSys PRS Solution and Cloud Computing

The PerspecSys PRS Solution and Cloud Computing THE PERSPECSYS KNOWLEDGE SERIES Solving Privacy, Residency and Security in the Cloud Data Compliance and the Enterprise Cloud Computing is generating an incredible amount of excitement and interest from

More information

ORGANIZATION S DATA INCREASES

ORGANIZATION S DATA INCREASES www.stacksync.org DO YOU KNOW? Your organization is dealing with an increasing amount of data, so your IT infrastructure may collapse soon. Resulting in another expensive investment. Furthermore, users

More information

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014 An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology bipasm@gmail.com Abstract. Cloud computing promises to increase the velocity

More information

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing

More information

Alberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information.

Alberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information. Alberni Valley IT Services http://www.avits.ca admin@avits.ca Virtual domain E-mail information. Welcome! This document outlines information necessary for you to send and receive E-mail for your virtual

More information

Reducing Configuration Complexity with Next Gen IoT Networks

Reducing Configuration Complexity with Next Gen IoT Networks Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration

More information

cloud vs. on-premise Costs & Benefits

cloud vs. on-premise Costs & Benefits cloud vs. on-premise Costs & Benefits Why Should You Consider SMB Suite Over an On-Premise Solution? Business has traditionally been in a Build mode when it comes to technology. Businesses acquire computing

More information

Freedom Stairway to the Cloud Offering

Freedom Stairway to the Cloud Offering Freedom OSS is the Top Enterprise Cloud Computing System Integrator on the Market today The 451 Group We look at Freedom PST as a full-fledged, strategic partner that can help us deliver quality cloud

More information

Apache Security with SSL Using Ubuntu

Apache Security with SSL Using Ubuntu Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background

More information

of interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants

of interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants Experience a new world of interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants 02 Experience a new world of interaction

More information

Open-Xchange. Daniel Halbe, Open-Xchange GmbH. Open-Xchange 2013. All rights reserved; not for distribution.

Open-Xchange. Daniel Halbe, Open-Xchange GmbH. Open-Xchange 2013. All rights reserved; not for distribution. Open-Xchange Daniel Halbe, Open-Xchange GmbH Open-Xchange 2013. All rights reserved; not for distribution. The battle of the Three or Five Are we heading for a market with few monopolies?! ! OX Portal!

More information

Cloud Computing An Auditor s Perspective

Cloud Computing An Auditor s Perspective Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP sgadia@kpmg.com December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,

More information

How to Enable TLS 1.0 in the Browser. Directions on enabling this security feature in your Internet Browser

How to Enable TLS 1.0 in the Browser. Directions on enabling this security feature in your Internet Browser How to Enable TLS 1.0 in the Browser Directions on enabling this security feature in your Prepared By: Ben Varghese, Systems Response Citrix Team Page 1 of 7 Table of Contents 1. INTRODUCTION... 3 2. CONFIGURATION

More information

PLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION. An introduction to delivering applications faster

PLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION. An introduction to delivering applications faster PLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION An introduction to delivering applications faster CONTENTS 2 Introduction to PaaS 4 Private, public, and hybrid PaaS 6 Who uses PaaS? 8 DevOps

More information