Your Email is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner Senior Regional Product Manager Encryption, EMEA
Safe Harbor Disclaimer This presentation contains information about pre-release software. Any unreleased update to the product or other planned modification is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec products should make their purchase decision based upon features that are currently available. 2
Agenda 1 2 3 4 5 6 Why Email Encryption Symantec PGP Email Encryption Solutions Cloud & Mobile Deployment Options Strategic Initiatives Mobile Demo Q&A 3
Why Email Encryption? 4
Who has access to your email? More people than you think Internal Cloud Sender Mail Administrator Mail Administrator Hacker Recipient Mail Server Cloud Mail Service Provider Storage Administrator Tape Backup Tape Backup Storage Administrator Thief Network Sniffer 5
Email Theft 6
Email Theft http://www.digitaltrends.com/computing/anonymousleaks-10000-top-secret-iranian-govt-emails/ 7
What are the top level concerns? Data Privacy Security and Theft of Sensitive Data Data Mobility 8
The Customer Problem Companies with large consumer populations Business to Consumer, Financial Services, Medical Care Need to communicate with customers Often subject to consumer privacy laws Often subject to data breach notification laws Some prefer electronic communication to traditional formats Reduce paper filing End user takes care of management End user can read statements on the road and away from home Green initiatives Reduce environmental footprint (paper used) Cost reduction (paper, folding, printing, shipping) Data Breach Notification Laws taking hold ICO Fines European Union notification standard 9
The Customer Problem Customers with IP handled internationally Email passes through and stored in places where there are opponents Theft of IP is a serious issue Corporate thievery (counterfeiting) Industrial spying International intrigue with cyberwarfare Mail store break-ins done for intelligence gathering Can you even tell if your email was stolen? FYI, for some companies, IP Theft is the primary buying driver Asia for example doesn t have extensive breach notification laws 10
Companies with Info Worth Leaking LulzSec and Anonymous Team Up "Top priority is to steal and leak any classified government information, including email spools and documentation. Prime targets are banks and other high-ranking establishments." http://www.abc.net.au/technology/articles/2011/06/20/3248520.htm 11
Mobility - Carrying Enough Data to Damage Your Company 12
Does it Matter Who Finds Your Lost Device? No, data breach notification laws don t care 13
Symantec PGP Email Encryption Solutions 14
Encryption Products Overview Drive Encryption Symantec Drive Encryption Media Protection Symantec Endpoint Encryption Removable Storage Symantec Endpoint Encryption Device Control Secured FTP/Batch and Backups Symantec Encryption Command Line Management Symantec Encryption Management Server Collaborative File and Folder Encryption Symantec File Share Encryption for Desktop & IOS Email Encryption & Secure Mobile Device Messaging Symantec Gateway Email Encryption Symantec Desktop Email Encryption Symantec Mobile Encryption for ios Symantec PGP Viewer for Android Symantec PGP Support Package for BlackBerry 15
Delivery Options Plaintext Email Encrypted Message SSL Plaintext Internal DMZ Internet Mail Server Sender Learn Mode Recipient Mail Server Recipient Symantec Gateway Email Encryption User Administration Encryption Keys Reporting Policy 16
Delivery Options Gateway Email Encrypted Message SSL Plaintext Internal DMZ Internet PDF Messenger Mail Server Encrypted PDF Sender Mail Server Mail Server Desktop / Mobile Web Messenger Notification Desktop / Mobile Symantec Gateway Email Encryption User Administration Encryption Keys Reporting Policy Message Retrieval Open PGP Key/X.509 Cert OpenPGP & S/MIME Mail Server Desktop / Mobile 17
Desktop Email & Secure Mobile Messaging Internal DMZ Encrypted Mail Path SSL Internet / Internal Internal / External Desktop Symantec Desktop Email Encryption Mail Server Mail Server Workstation Symantec Desktop Email Encryption X.509 Client OpenPGP Client Symantec Encryption Management Server User Administration Encryption Keys Reporting Policy X.509 Client OpenPGP Client Mobile Device Symantec Mobile Encryption for ios Symantec PGP Viewer for Android Support Package for BlackBerry 18
A Comprehensive Product Line 19
Vectors to a Deployment B2B, B2C Communications Gateway Email as the starting point Extend to cover important internal users with Desktop Email + Mobile Consider the Symantec portfolio to address the business challenge in depth (e.g. DLP, SMG, EV) Information Protection DLP + Encryption At network At endpoint Email Outsourcing It s about encrypting data, not storage You own the encryption, the cloud provider is the mail man Solution Desktop Email on premise, mail server in the cloud Future: Cloud-based administration of endpoint encryption 20
Cloud & Mobile Deployment Options 21
Gateway Protection Encrypted Mail Path SSL Internal DMZ Cloud Desktop Mail Server Workstation Symantec Desktop Email Encryption X.509 Client OpenPGP Client Symantec Email Encryption Gateway User Administration Encryption Keys Reporting Policy 22
Endpoint Protection Encrypted Mail Path SSL Internal DMZ Cloud Desktop Symantec Desktop Email Encryption Mail Server Workstation Symantec Desktop Email Encryption X.509 Client OpenPGP Client Symantec Encryption Management Server User Administration Encryption Keys Reporting Policy Mobile Device SYMC Mobile Encryption for ios SYMC PGP Viewer for Android Support Package for BlackBerry X.509/OpenPGP Client 23
Cloud Desktop Email (Future) Internal DMZ Sender Cloud Encrypted Message SSL Cloud Hosted Mail Server Symantec Desktop Email Encryption Recipient Symantec Desktop Email Encryption PGP.Cloud User Administration Encryption Keys Reporting Policy 24
Strategic Initiatives 25
Our Vision and Strategy Enable enterprise customers to seamlessly protect emails containing sensitive information, where it goes, wherever it resides, with SYMC Email Encryption Products 1 Secure internal / cloud hosted sensitive communications 3 Enable the separation of protection for enterprise/individual data in the same device 2 Secure communications from broad endpoint platforms 4 User identity based secure communications across any environments 26
Value Propositions Provides messaging security for enterprises that face a heterogeneous business environment with growing complexity both internally and externally A quick-to- deploy, easy-to-administer solution that brings you the rich set of messaging protection policy management to address various business needs Works cohesively with other Symantec messaging security solutions to bring the maximum protection to email communication 27
Thank you! Wolf Schreiner wolf_schreiner@symantec.com Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Presentation Identifier Goes Here 28