How to secure your data in the cloud

  • 140 views
Uploaded on

This presentation addresses the basics of cloud computing and

This presentation addresses the basics of cloud computing and

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
140
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
13
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Securing your Data in the Cloud
  • 2. OptfinITy Founded in 2002 with a focus on providing Peace of Mind to small businesses and non-profit organizations. Headquartered in the Washington, DC Metropolitan area with clients across the United States. Have worked with over 200 clients.
  • 3.  IT Strategy and Assessments Managed Services ◦ 24 x 7 Network Operations Center ◦ 24 x 7 Technical Support Helpdesk ◦ Infrastructure Support Software and Database Development Website Development ◦ Content Management (CMS Works, Wordpress) ◦ Sharepoint ◦ Search Engine Optimization Mobile Application Development ◦ iOS (iPhone, iPad), Android (Phone & Tablet) Phone Systems
  • 4.  Cloud computing is the delivery of computing as a service rather than a product. In cloud computing, you do not purchase the server or software but rather use shared resources, hardware, software, and information and pay on an as-needed or per use basis.
  • 5.  It is sold on Demand  Increased It is elastic – allowing Collaboration a user to have as much  Easy to Setup and Get or as little service as Running they want at any given time.  Consolidation of Centralizing Updates numerous servers for Software as a  Upgrades to hardware Service can be done virtually, Reliable AND eliminating down time Accessible
  • 6.  What is Email Encryption? ◦ The process by which you ensure that only the correct recipient of an email message is able to read it. ◦ Encryption renders the text unreadable to anyone who cannot decrypt it. Why Do I Need Email Encryption? ◦ Do you use envelopes to mail important letters? ◦ Unencrypted emails are much less secure than postcards. ◦ Anyone can ready, copy, store, and change the contents of an email. ◦ Regulation compliance issues.
  • 7.  All Companies Are Challenged to Enforce “No Send” Policy Continue to Train Employees on Proper Use of Email Use Manual Processes ◦ Fax, Mail, Courier ◦ CD/Tape and Ship ◦ Password Protect Documents or Zip Files Individually
  • 8. Existing Managed Services ZixVPM ZixCorp Customers (Checks rules & applies actions)Sender Notification ZixPort (Pull) ZixDirectory (Key Lookup)
  • 9. Existing Managed Services ZixVPM ZixCorp Customers (Checks rules & applies actions)Sender ZixPort (Pull) ZixDirectory (Key Lookup)
  • 10.  Eliminate Cost Related to Handling Confidential Data Cost of Data Security Breach Reputational Risk Immediate Delivery of Confidential Data Go Green! Reduce Amount of Paper Regulatory Compliance Issues ◦ State Data Security Laws ◦ Identity Theft Red Flags Rule ◦ FDIC Updated Information Technology Officer’s Questionnaire ◦ HIPAA 2.0
  • 11. In The Cloud
  • 12.  Email Burden is Growing Email is Primary Corporate Communication Tool: ◦ Sales and Contract Negotiations ◦ Invoicing ◦ Customer Management ◦ Internal Reporting Average Corporate User Handles 23K emails/year Average Use 21 MB/Day, 5GB/Year 61% Companies Enforce Mailbox Size Quotas Average 90 Minutes/Day to Manage Email 80% Intellectual Property Stored in Email
  • 13.  Retention is Not Assured Deleting is Company Policy Relying on Employees to be Good Business Continuity at Risk Recovery is Software Dependent Discovery Takes Time and $$$
  • 14.  Reflexion Archiving, Discovery, and Recovery Hosted Email Archiving Service that Operates with your Email Infrastructure Ensures Protection, Preservation, and Continuous Operation of Email Communication All Incoming, Outgoing, and Internal Email and Attachments are Filtered, Indexed, and Encrypted Dynamic Data Retention eDiscovery Finds Any Email or Attachment in the Archive Hosted Cloud Service Provides Continuous Access to Email
  • 15.  Active Email Archiving Hosted Service Works with Existing Email Platform Focused on Discovery and Recovery THE INTERNET YOUR NETWORK EMAIL CONTINUITY All inbound and outbound YOUR BUSINESS INCOMING Emails are accessible FILTERED Through a WebUI for Email Safe, filtered email is EMAIL & Business Continuity Delivered to your inbox AUTOMATIC BACKUP A copy of all safe emails Are stored here.
  • 16.  Automated Email Continuity Maintain a Historical Reference/Knowledge Base Document Compliance and Performance Provide Disaster Recover/Business Continuity Reduced Energy Consumption
  • 17.  Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately. 80 – 85% of all emails worldwide are spam. A computer virus is a program that can replicate itself and spread from one computer to another. Malware is not technically a virus. Malware includes computer viruses, worms, Trojan horses, rootkits, spyware, adware and other malicious software.
  • 18.  What would your clients do if they knew you didn’t have security in place? In 2006 malware damages exceeded $13.3B worldwide Loss of productivity Cost of IT (staff time and/or fees) Cost to restore or re-create lost data Potential for fines and penalties
  • 19.  Security is a lot more complex than installing a firewall and keeping anti-virus software subscriptions up to date. -- Robert Biddle, Director Member Programs, Computer Technology Industry Association A secure environment provides protection, prevention and remediation A security platform performs multiple functions in a multi-layer approach: Firewalls to control network access, filter Web content and email, encryption protocols, and intrusion prevention and detection.
  • 20. RBL Protection 85% Check for Known Users Scan for Viruses .3% 2.1% Check Allow List Check Block List .1% .3% .5% Address-on-the-Fly™ Check Permitted Languages .1%96.5% of all incoming SMTP connections blocked as spam and viruses! Check Permitted Countries .5% Heuristics / IP Reputation 9% Bayesian Filtering 1% 1.1% 3.5% of all incoming SMTP connections delivered to recipients!
  • 21.  Multi-Layered Defense-in  Defeats Directory Depth Harvesting & Denial of Geographic & Language- Services Attacks Based Filtering  Support SMTP Identified Address Restrictions Sharing  Automatic Spooling of All Outbound Anti-Virus Incoming Email for 3 Scanning Days Open Relay & Zombie  Optional Email Prevention Archiving, Discovery & Avoids IP Address Recovery (RADAR) Blacklisting  Spam/Virus Handling: Vaporize/Quarantine/ Flag
  • 22.  Control and Access to Your Mailbox Block Unwanted Mail; Spam, Viruses, DoS Attacks, Phishing Attacks Assures Delivery of Desirable Mail Helps Preserve Long-Term Integrity of User’s Primary email Address Allow Lists, Block Lists, Content Filtering AOTF (alternative email addresses), Permitted Language and Country Capability Spooling Inbound Email for 10 Days When Local Server Experiences an Outage Outbound Email Filtering