Easily Send Secure Email and Protect Your Data

  • 128 views
Uploaded on

Presented at InnoTech San Antonio 2014. All right reserved.

Presented at InnoTech San Antonio 2014. All right reserved.

More in: Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
128
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
2
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Send encrypted email messages to anyone, regardless of the recipient's system configuration.Provide strong, automated encryption with a cost-effective infrastructure.Eliminate the need for certificates and use a recipient's email address as the public key.Communication through a TLS-enabled network further enhances message security.Protect sensitive information and data leaving your gateway consistently and automatically.Policy-based encryption encrypts messages at the gateway based on policy rules.Help manage compliance with security and privacy requirements such as HIPAA and GLBA.Integrate with existing email infrastructure for minimal up-front capital investment.
  • Email encryption refers to encryption, and often authentication, of email messages, to protect the content from being read by any but the intended recipients.Email encryption refers to encryption, and often authentication, of email messages, to protect the content from being read by any but the intended recipients.Email encryption can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send.This is a separate process from digitally signing a message.Sending and viewing encrypted e-mail messages requires both sender and recipient to share their digital ID (digital ID: Contains a private key that stays on the sender's computer and a certificate (with a public key). The certificate is sent with digitally signed messages. Recipients save the certificate and use the public key to encrypt messages to the sender.), or public key certificate. This means you and the recipient each must send the other a digitally signed message, which enables you to add the other person's certificate to your Contacts. Once both parties have shared certificates, sending and viewing encrypted e-mail messages between them is the same as with any other e-mail messages. You can learn about digital IDs here and learn how to get and exchange digital IDs here.If you send an encrypted message to a recipient whose e-mail setup does not support encryption, Outlook notifies you and offers the option of sending the message in unencrypted format.This process also encrypts any attachments sent with encrypted messages.Encrypting a message is a separate process from digitally signing a message. By digitally signing a message, you apply your unique digital mark to the message. The digital signature includes your certificate and public key. This information proves to the recipient that you signed the contents of the message and not an imposter, and that the contents have not been altered in transit.
  • Protect Customer Credit Card InformationHelp manage compliance with security and privacy requirements such as HIPAA and GLBA. HIPPA/PHI, SOX, PCI, SAS-70, etc.
  • Encrypting a message is a separate process from digitally signing a message. By digitally signing a message, you apply your unique digital mark to the message. The digital signature includes your certificate and public key. This information proves to the recipient that you signed the contents of the message and not an imposter, and that the contents have not been altered in transit.A private key is the secret key kept on the sender's computer that the sender uses to digitally sign messages to recipients and to decrypt (unlock) messages from recipients. Private keys should be password protected. The public key is the key a sender gives to a recipient so that the recipient can verify the sender's signature and confirm that the message was not altered. Recipients also use the public key to encrypt (lock) e-mail messages to the sender.
  • Send encrypted email messages to anyone, regardless of the recipient's system configuration.Provide strong, automated encryption with a cost-effective infrastructure.Eliminate the need for certificates and use a recipient's email address as the public key.Communication through a TLS-enabled network further enhances message security.Protect sensitive information and data leaving your gateway consistently and automatically.Policy-based encryption encrypts messages at the gateway based on policy rules.Help manage compliance with security and privacy requirements such as HIPAA and GLBA.Integrate with existing email infrastructure for minimal up-front capital investment.
  • Secure and reliableExchange Hosted Encryption provides advanced security and reliability to help protect your information. Send encrypted email messages to anyone, regardless of the recipient's system configuration. Provide strong, automated encryption with a cost-effective infrastructure. Eliminate the need for certificates and use a recipient's email address as the public key. Communication through a TLS-enabled network further enhances message security. Stay in controlWith Exchange Hosted Encryption, you can keep your data safe, while maintaining control over your environment. Protect sensitive information and data leaving your gateway consistently and automatically. Policy-based encryption encrypts messages at the gateway based on policy rules. Help manage compliance with security and privacy requirements such as HIPAA and GLBA. Integrate with existing email infrastructure for minimal up-front capital investment. Easy to use and maintainIt's easier than ever to protect your organization's email. Hover to enlarge image Encrypted email delivered directly to recipients' inbox and not to a Web service. Email decrypted and read with confidence, without installing client software. A managed key server eliminates the need for certificate maintenance. Encryption process is transparent to the sender, who does not need to do anything other than write and send the message as usual.

Transcript

  • 1. Bryan Guinn President Prism Technologies Group Easily send secure email and protect your data
  • 2. Community Engagement • Past President San Antonio Chapter of the International Association of Microsoft Channel Partners • Board of Directors Lead SA • Committee North Chamber Business Technology Speaker Series IT Experience • Tier 2 Engineer EarthLink BlackBerry Helpdesk • Engineer Norred Technical Services • President Prism Technologies Group Introduction – Bryan Guinn
  • 3. The Difference is Our Perspective • Fully Managed IT Services • Outsourced Help Desk Services • Microsoft Office 365 Deployment and Management Services • Windows Azure Deployment and Management Services • Business Continuity and Disaster Recovery Introduction – Prism Technologies Group
  • 4.  What is email encryption?  Who needs email encryption and why?  How does email encryption work? Easily send secure email and protect your data
  • 5. What is email encryption? • Secure delivery of email messages and attachments • End to End protection of information • A method to control and prevent unauthorized access
  • 6. Who needs email encryption and why? • Anyone sending confidential information • Organizations subject to regulatory compliance • Anyone interested in protecting trade secrets
  • 7. How encryption works? • Policy-Based • Rules-Based • User Initiated
  • 8. Live Demo
  • 9.  What email encryption is.  Who needs email encryption and why.  How email encryption works. Quick Recap:
  • 10. Introducing Office 365 Message Encryption (EHE) • Integrates with existing Exchange email infrastructure • Encrypted email delivered directly to recipients' inbox • Email decrypted and read with confidence • Encryption process is transparent to the sender
  • 11. Bryan Guinn (210) 485-1755 bryan@prismtex.com www.prismtex.com Speaker’s Contact Information: