Encryption Services Buyers Guide
|
|
|
- Constance Charles
- 10 years ago
- Views:
Transcription
1 Encryption Services Buyers Guide 2011 Update Presented by Frank Sentner Director of Technology The Council of Insurance Agents & Brokers
2 Abstract This paper has been developed in response to The Council members requests for guidance on which encryption service would best help them comply with heightened regulations regarding encryption in certain circumstances. This paper will assume The Council members have themselves, with counsel, identified which communications should be transmitted in encrypted form to comply with HIPAA regulations in the United States, FSA requirements in the United Kingdom, or other requirements that they may have identified. Why is this important now? There is a recent dramatic expansion of HIPAA s regulatory net. encryption is the best method of complying with data privacy rules. The Council s members report the marketplace for encryption services has become sufficiently complex to evaluate; the vendor selection process is complex. This analysis has been reviewed and tested by The Council for accuracy. The Council interviewed member firms using the encryption vendors discussed in the analysis, to confirm accuracy of the analysis results. From this review The Council believes the framework and results are a fair and useful representation of the marketplace, based on publicly available information. In 2010, The Council reported its top technology pick in its Encryption Buyer s Guide as RPost. The Council has established a fee arrangement such that RPost now contributes a portion of fees collected from members to The Council. Such non-dues revenue is useful for The Council to keep member dues costs low. As the top pick in the 2010 Guide, The Council also asked RPost to contribute technical expertise and marketplace insight to the preparation of this comprehensive encryption marketplace analysis. This analysis has been provided for information only. The Council does not provide legal advice and disclaims any liability due to any party s reliance on this analysis for selection of any particular software. The Council has based this analysis on publicly available information and disclaims the accuracy of such publicly available information. For recommendations to your specific circumstances, please consult your own legal and technical consultants. Frank Sentner, Director of Technology at The Council of Insurance Agents & Brokers July 2011
3 Whitepaper Contents Update: Important New Considerations Purchase Drivers Scorecard The Council s Recommendation RANK 1: Enterprise Security Intelligence RANK 2: User Simplicity RANK 3: Breadth of Offering Conclusion 12
4 Important New Considerations In The Council s 2010 Buyer s Guide to Encryption Services, we identified top level and secondary criteria to examine when evaluating and comparing encryption service provider offerings. In this 2011 update, we focus on new considerations and an expanded set of top level purchase drivers listed in order of importance, some of which re-affirm and update the importance of the purchase drivers and discussion from the 2010 analysis. With heightened enforcement actions by regulators, the purchase driver of encryption services is no longer whether or not the provider s solution is secure enough but is now how well the provider s solution will protect from fines in the case of a data breach. All of the vendors discussed in this guide have systems that are secure enough to comply with security best practices and regulator guidelines for encryption. Further, customer IT departments can select various methods of making these encryption services available to senders, with all of the vendors discussed having options for sending encrypted ad-hoc via a desktop plug-in or key word insert, or auto filtered by policy at the outbound gateway -- thereby making the sender experience equally simple across each of these discussed vendors. Therefore, these points are not the focus of our analysis. What we will focus on, as top level evaluation criteria, is how well the solutions will protect from fines in the case of a data breach. When considering data breach, we are considering two points, a data breach when the data is (a) within the sender s control (i.e. where the is sent from sender to recipient - sender-controlled data security ); and (b) after the data leaves the sender s control (i.e. if there is a data breach on the recipient s system or after the recipient forwards the information on to others - downstream data breach ). Reducing risk when data is within the sender s control is a function of how and how often users use the encryption service. Data and visibility into use patterns, training gaps, policy effectiveness, elegant and simple user interfaces, service breadth, and simplicity of the user experience all contribute to reducing risk of a data breach when the protected data is within the sender s control, as the service is used, used more, and this usage can be monitored and confirmed. Reducing risk after data leaves the sender s control is a function of visibility and ultimately proof that the sender has complied with data privacy requirements. This proof should stand up to the test of litigation or government audit even in the case where the sender is accused of contributing to a data breach. In this guide, we call this auditable proof of compliance. We have considered the above in developing our new list of recommended top level purchase drivers for encryption services, and we rank each provider on a scale of 1 to 3 in each category, with 3 being the highest score. Page 1
5 Purchase Drivers The following are the results of a poll conducted in July 2011 that included 65 member company representatives. 1. Besides 'compliance', the most important benefit of encryption services reported by respondents is to create new administrative efficiencies (75%) followed by cost savings (19%) and then paper reduction (6%). 2. Half of respondents polled are sending sensitive or protected data today, using encryption services of some kind (55%) with half of those respondents satisfied with their current service (54%) and one third unsatisfied and looking to change (31%). 3. Adoption of encryption services by those not using such services today will likely bring first risk reduction, as those respondents not sending sensitive and protected data using encryption services reported primarily sending the information by standard (18%). The next benefit is likely administrative efficiencies as 13% reported using fax. Cost savings and paper reduction would occur, but as a lower benefit as only 10% reported using standard mail and 5% reported using expensive courier/receipt mail. This analysis focuses on three categories of purchase drivers. Importance Rank 1: Enterprise Security Intelligence Importance Rank 2: User Simplicity Importance Rank 3: Breadth of Offering Considering these purchase drivers as described in this analysis, members ranked Enterprise Security Intelligence and User Simplicity and higher than Breadth of Offering. As in the 2010 analysis, for this analysis, The Council is only considering for its recommendation those solution providers that have developed and operate the technology, and not those firms that resell a technology solution from one of the companies listed below. Assuming that Council members would prefer to implement technology that has proven sustainability in the marketplace, we have focused this analysis on only those providers who have been servicing commercial enterprise customers for more than 5 years. If members are considering purchase from a reseller rather than from the solution providers directly, we recommend that they insist on knowing what solution the reseller is offering, even if it is white-labeled and offered under the reseller s brand, to use this analysis as a decision tool. Finally, the providers selected and listed below have been evaluated from the point of view that Council member firms will prefer to not require their recipients to download software or preregister for an account with a solution provider. Page 2
6 Solution Providers RPost Voltage Cisco Ironport Zixcorp Axway Tumbleweed Encrypted Delivery Direct With this system, the recipient receives the encrypted data right in their inbox, the recipient does not have any requirements to be online to decrypt or view the message, and there is no storage of message content by RPost. Store-and-Forward With these, the systems either store the message content and/or the encryption key in an online repository. If the key is stored online, then the systems permit delivery of encrypted data to recipients desktops, with a required multi-step recipient pre-registration process and a recipient requirement to be online for a 3-step data decryption web service exchange to decrypt the message in the inbox. Link Retrieval - With this system, a secure file transfer system, the recipient must register and arrange for a password exchange. Further, the recipient must be online to retrieve and download the message. Service providers, such as Google/Postini, Symantec/Messagelabs, AppRiver, Sendmail, Microsoft, among others, private label or resell solutions from some of the above companies. Newer service providers are not evaluated here due to a risk of inexperience in being able to service enterprise customers and risk of sustainability in the marketplace. Scorecard The following scorecard is a useful quick reference comparison that is discussed in detail in the following analysis. With this quantitative approach, RPost ranks with a score that is nearly double the closest comparable. Scorecard: Evaluation Criteria Scoring : 3 is high, 1 is low Rank Top-Level Purchase Drivers RPost Cisco Ironport Axway-TMWD ZixCorp Voltage 1- Enterprise Security Intelligence Auditable Proof of Compliance Optimization Reporting Electronic Discovery and Data Access Visibility User Simplicity Recipient User Experience Recipient Workflow Addresses Sending Automation Breadth of Offering Sender Apps Breadth of Features Configuration Flexibility SCORE Page 3
7 The Council s Recommendation: RPost ( The Council s top recommendation is once again, RPost. RPost recently upgraded its SecuRmail service. RPost has demonstrated its ability to continuously innovate at a rapid pace and at the request of members to fulfill specific needs, to respond to market needs, and to enhance its solutions with well thought out and often unique implementations. RPost announced in June a major service upgrade which addressed key points of interest for our members as described in the chart below. Further, RPost has engaged in a quality drive for its services and support which members report as being successful. Finally, RPost has been built into and/or configured for compatibility with the largest insurance agency management systems and the most common mobile messaging devices. RANK 1: Enterprise Security Intelligence Gartner research has identified an important and necessary next step in enterprise security, which Gartner analyst Joseph Feiman has coined enterprise security intelligence. In Feiman s research, entitled, Prepare for the Emergence of Enterprise Security Intelligence, Feiman describes enterprise security intelligence as a comprehensive approach to enterprise security that enables advanced security through improved analytics leading to optimal decision making. Security activities, and the information that results from them, can no longer be considered in isolation. Mature enterprise security requires interaction and correlation of different security technologies to increase accuracy and breadth of security detection, remediation and protection. It also requires the integration and correlation of security and contextual information to bridge security with business, risk and other key enterprise values, thereby enabling optimal decision making. We agree with Gartner that a missing link in many security initiatives is robust reporting that can be analyzed in a manner that provides greater intelligence for technology and security staff so that they can adjust, react, and improve security software, settings, and activities. We now believe this is an element that ultimately may reduce risk and thus better protect members in cases of security audits, can empower more effective training, can test policy effectiveness, and can ultimately protect against losses and fines associated with security and data privacy breaches. More specifically, in the context of members businesses, we identify four areas of enterprise security intelligence that we believe should be considered essential: (a) Auditable Proof of Compliance, (b) Optimization Reporting, (c) Electronic Discovery Access, and (d) Visibility. It is these aspects of enterprise security intelligence that encompass our top rank as the most essential evaluation item in purchasing an encryption service. Page 4
8 A. Auditable Proof of Compliance Probably the most important element to test in your encryption service that will protect you from fines in the case of a data breach is how robust the proof record is of the fact that certain data was sent and received in a compliant manner. We call this protection from downstream data breach. Consider the following: 1. You send an encrypted with an attached document, 2. The document contains protected health information, 3. The document is on your letterhead or otherwise shows it originated from you, 4. The recipient forwards the and/or document, or otherwise exposes the information (inadvertently, through unauthorized access to their system, or otherwise), to an unauthorized party. There is a claim of a data breach or HIPAA violation, 5. Fines are threatened, and, as the document is on your letterhead, you are implicated. How do you irrefutably prove that you sent that document encrypted to the recipient and the data breach happened after the document left your realm of responsibility? How do you do this before costs ramp up costs for lawyers, technical experts, and forensic experts? There are common misconceptions that the following items will protect you from fines associated with the data breach. They likely will not. 1. Text server logs: These can be hard to locate, associate to the content and can be easily challenged after the fact (days, weeks, or months later). It can be difficult / expensive to (a) find these logs, especially if the message was delivered by an provider outside of your realm, (b) irrefutably associate the logs with specific message content and timestamps, and (c) prove the text files are authentic when authenticity is challenged. 2. Sent item records: These will often show the content originated in your organization, but will likely not demonstrate the fact if the message was transmitted and successfully received, what was received and when, or whether it was received encrypted. 3. Archive services: These often tout logging all items sent and received. However, in most cases, this does not relate to the same message. Archive services are not logging a SPECIFIC message s path of sending and whether or not that message was received by the recipient; rather, they are logging that a message (often without any easy method to associate message content) has been sent and separately, they log that if a message has been received. To be clear, this is not logging that the message in question has been sent AND received by the intended recipients, but only half of the activity that the message has been claimed to have been sent. What is needed is a record of precisely what message content was in fact sent and then later received by each intended recipient in an encrypted manner. It seems that only RPost has a robust mechanism in place to provide an auditable record of precisely what message content (body text and attachments) was in fact sent and received in an encrypted manner to each intended recipient. This is important because, in the case where there is a data breach after the has reached the recipient (in the recipient s environment, or after they have passed the information along to Page 5
9 others), the sender will need to retain information to prove that the breach did not happen on their watch that they in fact complied with the data security requirements and delivered the information in a compliant, encrypted manner. RPost addresses this issue by having built its encrypted service on top of its core Registered service, which The Council endorsed in 2004 as the best way to prove content, time, and delivery with court-admissible records that can be authenticated. By doing this, RPost provides not only effective encryption, but also the most robust proof and record of compliance with the rules of regulators. We believe this is an important (and often overlooked) evaluation criterion, especially considering that Council members have placed a high value on encrypted services fulfilling the need to protect them from fines in the case of a data breach. We recommend that you avoid services that do not have a robust audit trail of delivery that can be independently verified as to encrypted delivery, message content, have independent timestamps that are not based on sender/recipient desktop or server times, and avoid reliance on text logs or web screens of transaction audits. B. Optimization Reporting A problem that many face is they deploy encryption services, yet they have very little visibly into how these services are being used, whether they are being uses, who is or is not using them, and if they are being used, in reasonable/appropriate (pick one) quantities as a percentage of overall traffic. We recommend looking for services that provide intelligence around use of the security / encryption services so that you can: a. Identify training gaps and adjust accordingly b. Consider whether usage patterns by certain groups are at appropriate levels based on the type of business those groups engage in c. Test effectiveness of content filtering policies, and d. Optimize enterprise user and use licenses based on message volume or identified user. Of the providers identified for this analysis, Zix, Ironport, and Tumblweed provide some information as to whether or not recipients happen to download messages posted to message centers, but this information is limited and sporadic and relies on the fact that the recipient must collect the message. Voltage does not appear to provide any reporting whatsoever. RPost appears to have the most advanced reporting. RPost provides advanced reporting in both CSV and XML formats that can parse into enterprise business intelligence systems to provide the IT organization with message-level and user-level statistics on each encrypted transmission. This assists IT staff in optimizing content filtering policies and end-user training priorities, increasing security across the organization. Page 6
10 C. Electronic Discovery and Data Access It is important to have a mechanism in place to have protected data stored in an encrypted manner, yet be easily accessible in case of a need to produce information in an electronic discovery situation arises. Challenges here are: 1. If documents are uploaded (or transmitted from the desktop using HTTPS vs SMTP) to a web-based message store for transmission of a download link to the recipient, that document may not be stored in the messaging archive as the HTTP upload would have bypassed the messaging archive. Also, typically a message is not stored by a web based message store for more than a short period of time and therefore could pose a risk proving the content of the message after that time frame. 2. If messages are encrypted at the mail gateway, they remain unencrypted within the sender s organization, are captured in the messaging archive, but are captured in an unencrypted view that leaves vulnerability in terms of access to protected data. Further, in terms of electronic discovery needs, the archive will retain a record of what was claimed to have been sent, but will not likely have any information related to delivery or third-party uniform timestamps to confirm time of receipt. 3. If messages are encrypted at the desktop of the sender and routed out encrypted, there are not issues identified with points (1) and (2) above, yet message archive systems will retain or save the encrypted message. The sending organization will need a later method of decrypting those archived encrypted messages should it be necessary or required. In your evaluation, consider which providers have thought through their products enough to consider these. With: a. Desktop encryption: avoid service providers that do not have a robust mechanism to retrieve and decrypt stored encrypted messages. b. File upload services: avoid service providers that offer these services without robust records of the messages uploaded, otherwise you expose your organization to data leaks and accusation of data leaks without ability to track message transmission. c. Gateway/Appliance: avoid service providers that send encrypted data without robust and verifiable delivery reporting records. D. Visibility When sending encrypted, it is important (a) for the sender to know (and have confidence) that the message was transmitted encrypted, and (b) that the recipient know that the message received was transmitted encrypted, regardless as to whether or not TLS was used for encrypted transmission on the recipient side. Why? For the sender (or sender organization), they need the confidence of knowing that their encryption service is working or functioning properly. For example, consider what happens if a sender (or sender risk or Page 7
11 IT security department) believes they are sending encrypted and that encryption will happen automatically at the sender s gateway based on some indication in the message. What if that filtering mechanism is not working properly for whatever reason? Most senders with most appliances/filters may have no way of knowing immediately when the filter stops working properly each day of improper function may causes escalating risk of fines associated with data breach regulations. For the recipient, they need to become aware that the sender has flagged that particular message content as sensitive, and thus have some knowledge that the message should be treated as such sensitive and protected. Consider what happens if TLS routing is preferred for the secure transmission to the recipient, yet a TLS routed message received by the recipient looks just like a normal . And, most senders that add boilerplate disclaimers on the bottom of s add to all s so as not to differentiate from those that contain protected data and those that do not. This lack of awareness by the recipient creates the potential for inadvertent forwarding or treatment of the protected information. All of the encryption providers with the exception of RPost - seem to have missed these important points. RPost does provide the sender the security intelligence in the form of a Registered Receipt on a message by message basis, as well as with daily, weekly, or monthly user and enterprise reporting. Further, RPost formats the message so that - whether the message is encrypted to the recipient desktop or routed via TLS encryption - the recipient becomes aware that that message either contains an encrypted file or was transmitted via an encrypted transmission protocol. This awareness for the recipient reduces overall risk. Rank 1 Vendor Score: RPost ranks highest in each of the four elements of enterprise security intelligence. Second is Axway Tumbleweed, Cisco Ironport and Zix tie for third, and Voltage ranks fourth. Scoring : 3 is high, 1 is low Rank Top-Level Purchase Drivers RPost Cisco Ironport Axway-TMWD ZixCorp Voltage 1- Enterprise Security Intelligence Auditable Proof of Compliance Optimization Reporting Electronic Discovery and Data Access Visibility Page 8
12 RANK 2: User Simplicity If encryption systems are cumbersome, there is less use and therefore, potentially more exposure to a data breach. All of the systems evaluated have simple methods of sending. The focus in this section evaluates the simplicity of the recipient user experience, and some other aspects. There are a variety of modes that these service providers offer as methods of implementing that can alter the recipient user experience. In general, we break the service providers into three categories, focusing on the differentiating elements among the service providers. Encrypted Delivery Direct: With this system, the recipient receives the encrypted message content right in their inbox, with the message embedded in an AES 128 or 256 bit encrypted PDF wrapper. The recipient does not have any requirements to be online to decrypt or view the message, and there is no storage of message content by the service provider, in this case, RPost. The message body text appears in PDF format, while all attachments remain in their native file format. Store-and-Forward: The service providers either store the message content or the encryption key in an online repository; then later forward it to the recipient in a specific process. If it is the key that is stored in the online, then the systems permit delivery of encrypted data to recipients desktops, with a required multi-step recipient pre-registration process and a recipient requirement to be online for a 3-step data decryption web service exchange to decrypt the message in the inbox. When the recipient receives the encrypted message content in their inbox, the message is embedded encrypted within an HTML file wrapper. Again, the recipient does have to be online to decrypt or view the message, and there may be message storage by the service provider. Zix, Voltage, and Cisco Ironport operate in this manner. Link Retrieval: With this system, essentially a secure web file transfer system, the recipient must register and arrange for a password exchange. The recipient must be online to retrieve and download the message. The security is arranged through a secure web protocol connection. The store-and-forward or key-retrieval systems require the recipient to take meaningful or significant action for the recipient to retrieve the often clicking through to a website, setting up an account with the provider, installing software plug-ins on the recipients computer, which typically is not allowed without the recipient having administrative rights (rare in corporate environments), and then downloading the message to their desktop. We have heard from insurance brokers that these systems are challenging due to the low response rate for clicking through to download the material. Some of these store-and-forward systems require recipient registration for a more seamless experience, but in reality, if there are hurdles to getting the information to the recipient, the fallback is unfortunately for the sender to re-send the unencrypted. Therefore, we conclude that there is greater risk of a data breach or fines with these storeand-forward systems. By contrast, RPost delivers the encrypted material right to the desktop without a requirement for the recipient to be online to decrypt and read the message, reducing risk as compared to the other providers. This is a unique element of the RPost system. Page 9
13 In addition to simplicity for general senders and recipients, one should also consider the following: 1. Simplicity for recipient workflow addresses: If the senders are sending to recipient addresses that are recipient generic workflow mailboxes (i.e. the encryption service providers should consider how to deliver to those workflow addresses that make it easy for multiple recipients that have authorized access to that address to decrypt the messages. All of the providers have mechanisms to simplify this process that are different but equally effective. 2. Automation: There are two considerations in terms of automation, (a) automated filtering messages by policy and auto routing for encryption, and (b) automated sending of batches of s with encryption. All of the providers in this analysis have mechanism for automated content filtering and routing for encryption. RPost is best suited for automated batch sending of messages with both web services APIs and SMTP message format options. Rank 2 Vendor Score: RPost ranks highest in all elements of user simplicity. Second is Cisco Ironport, followed by Voltage and then Zix and Axway Tumbleweed. Rank Top-Level Purchase Drivers RPost Cisco Ironport Axway-TMWD ZixCorp Voltage 2- User Simplicity Recipient User Experience Recipient Workflow Addresses Sending Automation Page 10
14 RANK 3: BREADTH OF OFFERING Consider in this category, a service provider s offerings in terms of breadth in: A. Sender Apps: seamless methods of using encryption services as extensions to existing offerings, embedded within sender applications such as Microsoft Outlook and others. B. Breadth of Features: With renewed interest in electronic signature efficiencies, consider providers that combine, on a message-by-message basis, HIPAA compliant encryption with other services such as HIPAA compliant secure electronic contract execution, standard message (unencrypted) delivery proof, and other security related features are a bonus. C. Configuration Flexibility: There are several common user modes that can be enabled, designated by sender, user group or organization. Offering these user modes expands the flexibility of implementing encryption offerings. 1. Encrypts the message locally at the sender s desktop or mobile device, ensuring encrypted delivery straight through to the recipient s desktop; securing from the potential of data breaches both within the sender s in-house or outsourced system, and external while in transport across the Internet and within the recipient s system. 2. Encrypts the message at least from the edge of the sender s network to at least the edge of the recipient s network. This permits corporate filtering functions to continue to scan within the sender s or recipient s organization. 3. Automatically encrypts messages at the sender s outbound mail gateway based on message content or other criteria. 4. Permits the recipient the ability to ad-hoc reply secure is a configuration that is important to create a secure community, or for secure collaboration. 5. Permitting customers start with a pay-per-use basis to evaluate user and usage patterns, and then convert to pay per user pricing. This helps members optimize cost and user licenses. 6. Most are relatively easy to implement, especially those that do not require appliances or gateway servers. Rank 3 Vendor Score: RPost ranks highest in terms of service breadth with the most options in terms of sender apps and additional important features. All of the providers offer somewhat flexible configurations with RPost providing the most flexible pricing as noted in C5 above. RPost provides seamless methods of using encryption services within sender applications including Microsoft Outlook, Lotus Notes, Apple products, Microsoft Hotmail, Yahoo, Gmail, BlackBerry, among others. RPost also offers API s for developers to tie RPost secure messaging services into their enterprise applications or automated processes. Of note, RPost mobile apps encrypt messages at the sender s mobile device and delivers encrypted to the recipients desktop or account, whether or not they are on the same telecom network. RPost has apps for BlackBerry, ipad, iphone with others said to be released in Page 11
15 In terms of breadth of features, with RPost, users can combine, on a message-by-message basis, RPost encryption with other RPost services with a few extra clicks and at no extra cost. These additional services include Registered legal delivery proof, sender authentication, official time stamping, message content authentication, attachment PDF conversion and meta-data cleansing, large file transfer, secure (HIPAA compliant) electronic contract execution, records and matter management, message subject line tagging, and e-discovery options for special auto-routing of message records. Rank Top-Level Purchase Drivers RPost Cisco Ironport Axway-TMWD ZixCorp Voltage 3- Breadth of Offering Sender Apps Breadth of Features Configuration Flexibility Conclusion The Council s top recommendation is once again, RPost. RPost recently upgraded its SecuRmail service. RPost has demonstrated its ability to continuously innovate at a rapid pace and at the request of members to fulfill specific needs, to respond to market needs, and to enhance its solutions with well thought out and often unique implementations. RPost announced in June a major service upgrade which addressed key points of interest for our members as described in the chart below. Further, RPost has engaged in a quality drive for its services and support which members report as being successful. Finally, RPost has been built into and/or configured for compatibility with the largest insurance agency management systems and the most common mobile messaging devices. More information about RPost can be found on their website at Disclaimer: This analysis has been provided for information only. The Council does not provide legal advice and disclaims any liability due to any party s reliance on this analysis for selection of any particular software. The Council has based this analysis on publicly available information and disclaims the accuracy of such publicly available information. For recommendations to your specific circumstances, please consult your own legal and technical consultants. Trademarks referenced in this document are the property of their respective owners and are used here to reference their owners commercially available products and services Page 12
16
CONVERTING LEGAL & CONTRACT NOTICES FROM PAPER TO ELECTRONIC DELIVERY
CONVERTING LEGAL & CONTRACT NOTICES FROM PAPER TO ELECTRONIC DELIVERY A Corporate Counsel Guide Authored by Stanley M. Gibson Partner, Jeffer Mangels Butler & Mitchell LLP Abstract This white paper was
Email Compliance in 5 Steps
Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential
Mimecast Large File Send
DATASHEET Mimecast Large File Send For sending large files, lets go back to email Mimecast Large File Send simplifies large file sharing for users by removing the complexity and frustration associated
RPost Outlook Quick Start Guide
RPost Outlook Quick Start Guide This document outlines the steps to send an email using the RPost services and a brief description of the features available with the RPost add-in for Microsoft Outlook.
Tumbleweed MailGate Secure Messenger
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed
Email Security in Law Firms. What you need to know and how you can use secure email to win more clients
Email Security in Law Firms What you need to know and how you can use secure email to win more clients Introduction As clients are demanding greater protection of their information, law firms must incorporate
Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security. Titus White Paper
Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security Titus White Paper Information in this document is subject to change without notice. Complying with all applicable
A Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
A NATURAL FIT. Microsoft Office 365 TM and Zix TM Email Encryption. By ZixCorp www.zixcorp.com
Microsoft Office 365 TM and Zix TM Email Encryption A NATURAL FIT By ZixCorp www.zixcorp.com Microsoft Office 365 TM and Zix TM Email Encryption Page 1 INTRODUCTION IT managers and decision makers are
Email Encryption Services
Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in
Email Security Solutions
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Dispatch: A Unique Email Security Solution
Dispatch: A Unique Email Security Solution 720 836 1222 sales / support [email protected] email www.absio.com web 8740 Lucent Boulevard, Ste 101 Highlands Ranch, CO, 80129 1 110-WP005-1 Organizations use
Secured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
Rethinking Email Encryption: Eight Best Practices for Success
WHITE PAPER Rethinking Email Encryption: Eight Best Practices for Success Executive Summary Email continues to play a fundamental role in an organization s communications and day to day business and represents
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
GFI White Paper: GFI FaxMaker and HIPAA compliance
GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
Secure Email User Guide
Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...
email management solutions
Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations
Why Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
Implementing Transparent Security for Desktop Encryption Users
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
How To Secure Mail Delivery
FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with
Whether your organization is small, medium or large, OpenText RightFax meets these
OpenText RightFax Your business faces increasing pressure to improve employee and process productivity, and to reduce operational costs. Whether your organization is small, medium or large, OpenText RightFax
Veritas Enterprise Vault for Microsoft Exchange Server
Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email
Email Encryption Services
Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
Business Case for Voltage SecureMail Mobile Edition
WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central
A New Standard in Encrypted Email. A discussion on push, pull and transparent delivery
A New Standard in Encrypted Email A discussion on push, pull and transparent delivery By ZixCorp November 2010 2 Email enhances our daily business life. It enables efficient, real-time communication, unites
E-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
Axway SecureTransport Ad-hoc File Transfer Service
Axway SecureTransport Ad-hoc File Transfer Service Secure, efficient and reliable Enterprise File Sharing (EFS) In today s fluid, fast-paced, and highly collaborative business environment, people need
Kopano product strategy & roadmap
Kopano product strategy & roadmap 11 January 2016 INTRODUCING KOPANO For many years Zarafa has provided software solutions for organising the lives of busy professionals. Emailing and advanced calendaring
PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper
Incorporated 3/7/06; Rev 9/18/09 PaperClip Compliant Email Service Whitepaper Overview The FTC Safeguard Rules require Financial, Insurance and Medical providers to protect their customer s private information
The GlobalCerts TM SecureMail Gateway TM
Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network
Djigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
Security in Fax: Minimizing Breaches and Compliance Risks
Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information
HotSpot Enterprise Mobile Printing Solution. Security Whitepaper
HotSpot Enterprise Mobile Printing Solution Security Whitepaper August, 2012 2012, Ricoh Americas Corporation. All rights reserved. Ricoh and the Ricoh logo are registered trademarks of Ricoh Company,
RightsWATCH. Data-centric Security.
RightsWATCH. Data-centric Security. Rui Melo Biscaia, Watchful Software www.watchfulsoftware.com Director of Product Management [email protected] The Perimeter Paradigm Well Meant Insider
Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts
Medical Privacy Version 2015.04.13 Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts In order for Lux Scientiae, Incorporated (LuxSci) to ensure the security and privacy of all Electronic
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.
Payment Card Industry Security Standards Over the past years, a series of new rules and regulations regarding consumer safety and identify theft have been enacted by both the government and the PCI Security
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
T E C H N I C A L S A L E S S O L U T I O N
Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com
DJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
E-mail Management: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
ZixCorp. The Market Leader in Email Encryption Services. Adam Lipkowitz ZixCorp (781) 993-6102 [email protected]
ZixCorp The Market Leader in Email Encryption Services Adam Lipkowitz ZixCorp (781) 993-6102 [email protected] Agenda: Discussion 1. Alternatives When Sending Sensitive Information 2. Business Justification
Symantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
Problem. Solution. Quatrix is professional, secure and easy to use file sharing.
Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities
Compliance in the Corporate World
Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks Fax and Document Distribution Group November 2009 Abstract Maintaining regulatory compliance is a major business issue
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data Printer Security Challenges Executive Summary Security breaches can damage both your operations
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
RightFax Internet Connector Frequently Asked Questions
RightFax Internet Connector Frequently Asked Questions What is the RightFax Internet Connector? The RightFax Internet Connector is a connector within RightFax 10.5 which provides an Internet connection
See What's Coming in Oracle Service Cloud
bu See What's Coming in Oracle Service Cloud Release Content Document August 2015 TABLE OF CONTENTS ORACLE SERVICE CLOUD AUGUST RELEASE OVERVIEW... 3 WEB CUSTOMER SERVICE... 4 Oracle Service Cloud Community
Laserfiche for Federal Government MEET YOUR AGENCY S MISSION
Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas
InstaFile. Complete Document management System
InstaFile Complete Document management System Index : About InstaFile 1.1 What is InstaFile 1.2 How does it work 1.3 Where you can use InstaFile 1.4 Why only InstaFile InstaFile features and benefits Start
PineApp TM Mail Encryption Solution TM
PineApp TM Mail Encryption Solution TM How to keep your outgoing messages fully secured. October 2008 Modern day challenges in E-Mail Security Throughout the years, E-Mail has evolved significantly, emerging
Netwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
Automation for Electronic Forms, Documents and Business Records (NA)
Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust
Laserfiche for Federal Government MEET YOUR AGENCY S MISSION
Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas
Symantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
Whether your organization is small, medium or large, OpenText RightFax meets these
OpenText RightFax Your business faces increasing pressure to improve employee and process productivity, and to reduce operational costs. Whether your organization is small, medium or large, OpenText RightFax
Addressing Legal Discovery & Compliance Requirements
Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in
SECURE MESSAGING PLATFORM
SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
Symantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM
W H I T E P A P E R ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives,
CA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security [email protected] CA Technologies Content-Aware IAM strategy CA Technologies
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
1 Product. Open Text is the leading fax server vendor in the world. *
1 Product Open Text Fax s Replace fax machines and inefficient paper processes with efficient and secure computer-based faxing and electronic document delivery Open Text is the leading fax server vendor
Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1
Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers
