Email Encryption Made Simple



Similar documents
Encryption Made Simple

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

Policy Based Encryption Z. Administrator Guide

A New Standard in Encrypted . A discussion on push, pull and transparent delivery

McAfee Web Reporter Turning volumes of data into actionable intelligence

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Encryption Services

V1.4. Spambrella Continuity SaaS. August 2

Secure Mail Registration and Viewing Procedures

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

When Data Loss Prevention Is Not Enough:

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Setup Guide Revision B. McAfee SaaS Archiving for Microsoft Exchange Server 2010

Creating a Content Group and assigning the Encrypt action to the Group.

McAfee Gateway 7.x Encryption and IronPort Integration Guide

McAfee Security Architectures for the Public Sector

Options for encrypted communication with AUDI AG Version of: 31 May 2011

Product Guide Revision A. McAfee Secure Web Mail Client Software

White Paper. Network Management and Operational Efficiency

Policy Based Encryption Essentials. Administrator Guide

Database Security in Virtualization and Cloud Computing Environments

Product Guide Revision A. McAfee Secure Web Mail Client Software

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

White paper. Why Encrypt? Securing without compromising communications

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

GOOD PRACTICE GUIDE 13 (GPG13)

Encryption Services

A NATURAL FIT. Microsoft Office 365 TM and Zix TM Encryption. By ZixCorp

Direct or Transparent Proxy?

Receiving Secure from Citi For External Customers and Business Partners

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Enterprise Data Protection

E Mail Encryption End User Guide

Clearswift Information Governance

Secure User Guide

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com

Identity in the Cloud

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Protection for your account

Data Protection. Administrator Guide

VAULTIVE & MICROSOFT: COMPLEMENTARY ENCRYPTION SOLUTIONS. White Paper

PineApp TM Mail Encryption Solution TM

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process

Symantec Messaging Gateway 10.5

About Archiving for Microsoft Exchange Server

How To Protect Your Data From Attack

Secure Frequently Asked Questions

Symantec Messaging Gateway 10.6

Implementing Transparent Security for Desktop Encryption Users

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Bypassing CAPTCHAs by Impersonating CAPTCHA Providers

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

CIPHERMAIL ENCRYPTION. CipherMail white paper

January 23, 2010 McAfee SaaS Continuity User Guide

Evaluation Guide. eprism Messaging Security Suite V8.200

Setting up Microsoft Office 365

Secur User Guide

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Secure Client User Guide Receiving Secure from Mercantile Bank

Technology Blueprint. Protecting Intellectual Property in . Guarding against information-stealing malware and outbound data loss

DJIGZO ENCRYPTION. Djigzo white paper

Ensuring the security of your mobile business intelligence

The GlobalCerts TM Secur Gateway TM

WHITE PAPER SPON. Encryption is an Essential Best Practice. Published August 2014 SPONSORED BY. An Osterman Research White Paper.

Data Loss Prevention Best Practices for Healthcare

Nationstar Mortgage Secure Client User Guide

Boundary Encryption.cloud Deployment Process Overview

Top 10 Features: Clearswift SECURE Gateway

THE IMPORTANCE OF ENCRYPTION IN THE HEALTHCARE INDUSTRY

How To Secure Mail Delivery

T E C H N I C A L S A L E S S O L U T I O N

Portal Administration. Administrator Guide

How To Buy Nitro Security

Setting up Microsoft Office 365

ADP Secure Client User Guide

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

HP PROTECTTOOLS RELEASE MANAGER

MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management

Djigzo encryption. Djigzo white paper

Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Security. Titus White Paper

March PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

Transcription:

White Paper For organizations large or small

Table of Contents Who Is Reading Your Email? 3 The Three Options Explained 3 Organization-to-organization encryption 3 Secure portal or organization-to-user pull-based 4 encrypted email delivery Secure attachment or organization-to-user push-based 6 encrypted email delivery Policies rule 7 McAfee Email Encryption Solutions 7 2

Does encryption evoke images of complex encryption key exchanges between users and organizations, expensive systems, and a team of IT staff to manage it all? You can forget these nightmarish thoughts. Advances in email encryption make it simple to use, easier to implement, and affordable for businesses of any size. As a result, email encryption has become a popular technology, enabling businesses to exchange information securely with customers and business partners. Who Is Reading Your Email? Sending an email without encryption is akin to sending a letter through the mail without an envelope. Anyone able to intercept the message in transit can easily read the content. However, encrypting a message ensures that only the intended recipients are able to view the message content. This step is vitally important for organizations subject to privacy regulations or those that simply cannot risk exposing their email content. Reliable, private exchanges of content enable businesses to streamline their sensitive communications and reduce costs. For example, healthcare organizations can exchange patient records electronically with insurance providers and doctors without violating privacy regulations. Financial institutions can send secure electronic communications to their customers, realizing significant production, postage, and environmental savings over sending physical mail. Business partners can transmit sensitive content without risk of interception. Simply put, implementing easy-to-use email encryption can reap tremendous business benefits for organizations of any size. This paper discusses three common approaches to email encryption: Organization-to-organization encryption, also known as gateway-to-gateway Secure portal-based encryption, commonly referred to as organization-to-user pull-based encryption Secure attachment, referred to as organization-to-user push-based encryption All of these options are easy to implement and available using on-premises solutions or through Software-as-a-Service (SaaS). This paper provides an overview of these methods and explains their distinct advantages to help you determine which approach best fits the needs of your organization. Fifty-nine percent of enterprises agree that the use of email by employees is a main source of data leakage in their organization. 1 The Three Options Explained Organization-to-organization encryption This method encrypts all email traffic between two organizations by establishing a secure connection. Instead of encrypting the individual email message, the connection between the organizations uses the equivalent of a private line, a standards-based technology called transport layer security (TLS). This is the same type of technology often used to secure web browsing sessions. If you bank online, you have probably used TLS (perhaps without even knowing it) when logging onto your bank s website. Most standard email servers support TLS connections. However, TLS is usually implemented on an ad hoc basis: the email server will attempt a TLS connection, but will default to an insecure non-tls connection if a TLS connection cannot be made. Since this behavior only secures some of the email some of the time, organizations that must encrypt email cannot rely upon it. 3

For rigorous encryption, these organizations should use email gateway security solutions, either in the cloud (SaaS) or on premises. These systems can enforce policies to ensure that a TLS connection is in place before email is sent or received, typically with per domain policies. For example, ABC Bank can have a policy that enforces a rule that all incoming and outgoing email to XYZ Bank must use TLS. If the TLS connection cannot be made, the email will not be sent or received. In essence, the policy says: Use TLS between abc.com and xyz.com. The encryption initiates and terminates at the email gateway for each organization. A major advantage of this approach: the encryption is completely transparent to the individual senders and recipients. Email Gateway with Policy Engine On-Premises or Cloud Environment Recipient Email Server Message Recipients Enforced TLS Figure 1. Automated gateway-to-gateway encryption protects data in motion without relying on the end user. Typically used between business partners, TLS encryption is the most common email encryption. Using policy-enforced TLS email encryption enables organizations to satisfy privacy requirements and reduce liability, so it is a best practice for healthcare organizations, financial institutions, and service industries (such as law firms). In addition to TLS, S/MIME and PGP also provide organization-to-organization encryption capabilities. Secure portal or organization-to-user pull-based encrypted email delivery Unlike TLS encryption, which terminates at the email gateway, pull-based encrypted email delivers encrypted email directly to the recipient. Email recipients do not require any additional software to decrypt messages, just a browser. Here s how it works. Instead of a message being encrypted and sent to the user, the sender s email gateway encrypts the message and makes it accessible to the intended recipient via a secure portal (website). The recipients receive a notification that a secure message has been sent to them, with a link to the secure portal (using a secure TLS web browser session). The recipient logs into the portal and can read and reply to the email using this webmail-like portal. A portal password can be pre-established for the recipient or, more commonly, the recipient will establish their credentials upon receiving their first encrypted message when the portal asks them to create a password. 4

Figure 2. Example of a secure portal used for pull-based encrypted email delivery. This encryption method is ideal for sending secure messages to customers, occasional business partners, or business partners that are not able to implement TLS. It is especially friendly to mobile devices, since recipients can view the message, then decide whether they want to download the attachments for viewing on the device, or wait for a time that is more convenient. Common uses include financial institutions sending documents to customers and healthcare organizations exchanging private records with small medical clinics or patients. The recipient simply needs a browser with an active Internet connection to view and reply to the messages. Since the pull messages are stored on the email gateway, some organizations also like the idea that the sensitive messages are stored there as well. Email Gateway with Policy Engine On-Premises or Cloud Environment Recipient Email Server Message Recipients URL URL BROWSER Secure Portal Pull Delivery Figure 3. Pull delivery allows customers and clients to download encrypted email using any web browser. 5

Pull delivery may be advantageous where bandwidth is at a premium, since the encrypted message traverses the network only when the recipient reads (that is, pulls) the message. The benefit over push delivery becomes more pronounced as the average encrypted message size increases. With pull delivery, the messages are stored on the sender s system, which means the sender is responsible for the storage of those messages. Cloud-based solutions can alleviate this burden, since the messages will then be stored at the vendor s data center rather than on premises. Push-based delivery portals are not meant to be permanent message stores and, as a result, messages are typically purged after a defined time limit. Organizations may also prefer pull-based delivery because they dictate where the sensitive data is stored while it waits for recipients to pull the messages. Secure attachment or organization-to-user push-based encrypted email delivery Push delivery, like pull, requires no special investment by the recipient beyond a standard web browser. Unlike pull delivery, with push delivery, the user receives the secure message as an encrypted attachment. After the recipient enters a password, the attachment is decrypted and the recipient can read and securely reply to the message. Attachments are instantly available and can be saved locally, while the original email and attachment remain encrypted in the recipient s inbox. Figure 4. Example of a push-based encrypted email delivery. The message includes an encrypted HTML attachment that can be opened with a browser. Although push and pull delivery both encrypt messages to individual users, many organizations with an on-premises solution prefer push delivery. It alleviates the need for email sender organizations to store messages on their own servers and enables recipients to keep messages in their inboxes indefinitely. Leveraging a cloud-based encryption solution is also a good alternative to alleviating storage concerns, since the encrypted messages become temporarily housed at the vendor s site. 6

Email Gateway with Policy Engine On-Premises or Cloud Environment Recipient Email Server Message Recipients Plain Text Email with Encrypted Content Attached Secure Attachment Push Delivery Validated Credentials to View Encrypted Content Figure 5. Push encryption uses encrypted attachments to allow recipients to store and view content at their convenience. Policies rule Policies drive all three approaches to encryption. Policy configuration for organization-to-organization encryption is straightforward. The administrator simply determines which business partner domains such as ourbank.com and ourlawyer.com require encryption and creates a policy to enforce the encryption. Unlike organization-to-organization policies, pull and push policies should not be defined at a domain level because this model would force recipients to decrypt each and every message a good way to make your email recipients grumpy. Instead, push and pull encryption should be enforced only for policy-controlled content, such as sensitive business information, personally identifiable information, or regulated content. A policy can state that any content of this kind will be encrypted automatically, at the gateway, without user intervention. In addition to policy-automated encryption, the email senders within your domain should have the ability to initiate an encrypted message voluntarily. Many organizations use key words to trigger automatic encryption. For example, a policy can be created to encrypt all messages that include the phrase Secure in the subject. Alternatively, encryption might trigger if a message is labeled Confidential using the message sensitivity button built into many standard email clients. McAfee Email Encryption Solutions The three approaches discussed above organization-to-organization, pull delivery, and push delivery offer a range of options to satisfy most organizations requirements for encrypted email. All three options are nicely integrated into email security solutions from McAfee and require minimal administrative overhead to implement. Offered either as an on-premises email gateway (hardware or virtual appliance) or a cloud-based service, each has native data loss prevention technologies, including a robust policy engine and extensive compliance templates, to simplify compliance and policy enforcement. Using and implementing encrypted email has never been easier. Learn more about the McAfee email security solutions at www.mcafee.com/emailsecurity. 7

About McAfee McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world s largest dedicated security technology company. Backed by global threat intelligence, our solutions empower home users and organizations by enabling them to safely connect to and use the Internet, prove compliance, protect data, prevent disruptions, identify vulnerabilities, and monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. 1 The State of Email Encryption, Ponemon Institute, 2011 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.mcafee.com McAfee and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2012 McAfee, Inc. 46900wp_email-encryption_0712_fnl_ASD