Your Email is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner



Similar documents
Symantec Encryption Solutions for , Powered by PGP Technology

SR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0

What s New with Enterprise Vault 11? Symantec Enterprise Vault 11 - What's New?

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

Better Together: Microsoft Office 365 & Symantec Office 365

Symantec Endpoint Encryption Deployment Best Practices and Roadmap

BES10 Cloud architecture and data flows

Secure Your Mobile Workplace

On and off premises technologies Which is best for you?

#ITtrends #ITTRENDS SYMANTEC VISION

Risk and threats everywhere, all the time

IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Enterprise solution comparison chart

Secure Your with Encryption as a Service

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Securing the endpoint and your data

Best Practices for a BYOD World

Symantec Enterprise Vault.cloud Giovanni Alberici

For your eyes only - Encryption and DLP Erkko Skantz

Encryption: It s Time to Buckle Up

To Catch A Thief: Preventing the Next Fortune 500 Data Breach

White paper. Why Encrypt? Securing without compromising communications

Enterprise Data Protection

PGP Product Update Juha Ropponen

IBM Data Security Services for endpoint data protection endpoint encryption solution

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

CIPHERMAIL ENCRYPTION. CipherMail white paper

Rethinking Encryption: Eight Best Practices for Success

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

Unified Security, ATP and more

How To Protect Your Data From Being Hacked

Reducing Risk Through Effective Certificate Management

Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC

Symantec DLP Overview. Jonathan Jesse ITS Partners

Addressing Evolving Threats & Responses in a MITA 3.0 World Robert Myles, CISSP, CISM

NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage

EV Feature Briefing

Smartcrypt Encryption Key Management

Policy Based Encryption Essentials. Administrator Guide

RightsWATCH. Data-centric Security.

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Symantec Encryption Satellite for Windows Version 3.3 Release

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

New Security Features

Boundary Encryption.cloud Deployment Process Overview

Public, Private, Hybrid:

2X SecureRemoteDesktop. Version 1.1

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions

IBM Endpoint Manager for Mobile Devices

How To Support Bring Your Own Device (Byod)

Symantec Backup Exec 11d for Windows Small Business Server

Symantec Drive Encryption for Windows

Mobile App Management:

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Business Case for Voltage Secur Mobile Edition

The Evolving Threat Landscape and New Best Practices for SSL

Protecting Your Data On The Network, Cloud And Virtual Servers

Symantec Mobile Management 7.1

Portal Administration. Administrator Guide

Symantec Mobile Security

IT Self Service and BYOD Markku A Suistola

Symantec Desktop and Laptop Option 7.6

Symantec Mobile Management 7.1

Symantec Managed Security Services The Power To Protect

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Options for encrypted communication with AUDI AG Version of: 31 May 2011

IBM Lotus Protector for Mail Encryption

An Oracle White Paper January Oracle Database Firewall

Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide

Mobile App User's Guide

Endpoint protection for physical and virtual desktops

V1.4. Spambrella Continuity SaaS. August 2

UP L13: Leveraging the full protection of SEP 12.1.x

Symantec Endpoint Security Management Solutions Presentation and Demo for:

White Paper. Keeping Your Private Data Secure

Transcription:

Your Email is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner Senior Regional Product Manager Encryption, EMEA

Safe Harbor Disclaimer This presentation contains information about pre-release software. Any unreleased update to the product or other planned modification is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec products should make their purchase decision based upon features that are currently available. 2

Agenda 1 2 3 4 5 6 Why Email Encryption Symantec PGP Email Encryption Solutions Cloud & Mobile Deployment Options Strategic Initiatives Mobile Demo Q&A 3

Why Email Encryption? 4

Who has access to your email? More people than you think Internal Cloud Sender Mail Administrator Mail Administrator Hacker Recipient Mail Server Cloud Mail Service Provider Storage Administrator Tape Backup Tape Backup Storage Administrator Thief Network Sniffer 5

Email Theft 6

Email Theft http://www.digitaltrends.com/computing/anonymousleaks-10000-top-secret-iranian-govt-emails/ 7

What are the top level concerns? Data Privacy Security and Theft of Sensitive Data Data Mobility 8

The Customer Problem Companies with large consumer populations Business to Consumer, Financial Services, Medical Care Need to communicate with customers Often subject to consumer privacy laws Often subject to data breach notification laws Some prefer electronic communication to traditional formats Reduce paper filing End user takes care of management End user can read statements on the road and away from home Green initiatives Reduce environmental footprint (paper used) Cost reduction (paper, folding, printing, shipping) Data Breach Notification Laws taking hold ICO Fines European Union notification standard 9

The Customer Problem Customers with IP handled internationally Email passes through and stored in places where there are opponents Theft of IP is a serious issue Corporate thievery (counterfeiting) Industrial spying International intrigue with cyberwarfare Mail store break-ins done for intelligence gathering Can you even tell if your email was stolen? FYI, for some companies, IP Theft is the primary buying driver Asia for example doesn t have extensive breach notification laws 10

Companies with Info Worth Leaking LulzSec and Anonymous Team Up "Top priority is to steal and leak any classified government information, including email spools and documentation. Prime targets are banks and other high-ranking establishments." http://www.abc.net.au/technology/articles/2011/06/20/3248520.htm 11

Mobility - Carrying Enough Data to Damage Your Company 12

Does it Matter Who Finds Your Lost Device? No, data breach notification laws don t care 13

Symantec PGP Email Encryption Solutions 14

Encryption Products Overview Drive Encryption Symantec Drive Encryption Media Protection Symantec Endpoint Encryption Removable Storage Symantec Endpoint Encryption Device Control Secured FTP/Batch and Backups Symantec Encryption Command Line Management Symantec Encryption Management Server Collaborative File and Folder Encryption Symantec File Share Encryption for Desktop & IOS Email Encryption & Secure Mobile Device Messaging Symantec Gateway Email Encryption Symantec Desktop Email Encryption Symantec Mobile Encryption for ios Symantec PGP Viewer for Android Symantec PGP Support Package for BlackBerry 15

Delivery Options Plaintext Email Encrypted Message SSL Plaintext Internal DMZ Internet Mail Server Sender Learn Mode Recipient Mail Server Recipient Symantec Gateway Email Encryption User Administration Encryption Keys Reporting Policy 16

Delivery Options Gateway Email Encrypted Message SSL Plaintext Internal DMZ Internet PDF Messenger Mail Server Encrypted PDF Sender Mail Server Mail Server Desktop / Mobile Web Messenger Notification Desktop / Mobile Symantec Gateway Email Encryption User Administration Encryption Keys Reporting Policy Message Retrieval Open PGP Key/X.509 Cert OpenPGP & S/MIME Mail Server Desktop / Mobile 17

Desktop Email & Secure Mobile Messaging Internal DMZ Encrypted Mail Path SSL Internet / Internal Internal / External Desktop Symantec Desktop Email Encryption Mail Server Mail Server Workstation Symantec Desktop Email Encryption X.509 Client OpenPGP Client Symantec Encryption Management Server User Administration Encryption Keys Reporting Policy X.509 Client OpenPGP Client Mobile Device Symantec Mobile Encryption for ios Symantec PGP Viewer for Android Support Package for BlackBerry 18

A Comprehensive Product Line 19

Vectors to a Deployment B2B, B2C Communications Gateway Email as the starting point Extend to cover important internal users with Desktop Email + Mobile Consider the Symantec portfolio to address the business challenge in depth (e.g. DLP, SMG, EV) Information Protection DLP + Encryption At network At endpoint Email Outsourcing It s about encrypting data, not storage You own the encryption, the cloud provider is the mail man Solution Desktop Email on premise, mail server in the cloud Future: Cloud-based administration of endpoint encryption 20

Cloud & Mobile Deployment Options 21

Gateway Protection Encrypted Mail Path SSL Internal DMZ Cloud Desktop Mail Server Workstation Symantec Desktop Email Encryption X.509 Client OpenPGP Client Symantec Email Encryption Gateway User Administration Encryption Keys Reporting Policy 22

Endpoint Protection Encrypted Mail Path SSL Internal DMZ Cloud Desktop Symantec Desktop Email Encryption Mail Server Workstation Symantec Desktop Email Encryption X.509 Client OpenPGP Client Symantec Encryption Management Server User Administration Encryption Keys Reporting Policy Mobile Device SYMC Mobile Encryption for ios SYMC PGP Viewer for Android Support Package for BlackBerry X.509/OpenPGP Client 23

Cloud Desktop Email (Future) Internal DMZ Sender Cloud Encrypted Message SSL Cloud Hosted Mail Server Symantec Desktop Email Encryption Recipient Symantec Desktop Email Encryption PGP.Cloud User Administration Encryption Keys Reporting Policy 24

Strategic Initiatives 25

Our Vision and Strategy Enable enterprise customers to seamlessly protect emails containing sensitive information, where it goes, wherever it resides, with SYMC Email Encryption Products 1 Secure internal / cloud hosted sensitive communications 3 Enable the separation of protection for enterprise/individual data in the same device 2 Secure communications from broad endpoint platforms 4 User identity based secure communications across any environments 26

Value Propositions Provides messaging security for enterprises that face a heterogeneous business environment with growing complexity both internally and externally A quick-to- deploy, easy-to-administer solution that brings you the rich set of messaging protection policy management to address various business needs Works cohesively with other Symantec messaging security solutions to bring the maximum protection to email communication 27

Thank you! Wolf Schreiner wolf_schreiner@symantec.com Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Presentation Identifier Goes Here 28