SlideShare a Scribd company logo
1 of 37
Download to read offline
IBM Lotus Protector
Data Loss Prevention and Email Security in an increasingly
connected World

Gary Wickham, Senior Technical Specialist, IBM
Adam Osborne, Principal Consultant, Preemptive Consulting
AusLUG 2013


Agenda
 ●   Social Business Security

 ●   Content Filtering and Inspection

 ●   Email Encryption

 ●   Local Examples
AusLUG 2013

IBM Lotus Protector
               • Extends e-mail with new security and data protection capabilities
               ● Works with Notes and Outlook® UI & security model

                  ●  Protects both internal and external email traffic
               ● Integrates Anti-Virus protection into WebSpere® applications




                                            Security Products


      Antispam &                                                    Content
                              Encryption                                                                        Collaboration
       Antivirus                                                    Filtering                                     Security




                and other messaging platforms

                                             The information on the new product(s) is intended to outline our general product direction and it should not be relied on
                                             in making a purchasing decision. The information on the new product is for informational purposes only and may not
                                             be incorporated into any contract. The information on the new product is not a commitment, promise, or legal
                                             obligation to deliver any material, code or functionality. The development, release, and timing of any features or
                                             functionality described for our products remains at our sole discretion.
AusLUG 2013


Optimized technologies designed for Social Business


    ● Powerful content protection and filtering
    ● Extend data protection and compliance by easily weaving protection

       across your social business platform
    ● Supports data protection initiatives

        ●   PCI, HIPAA, SOX, EU Data Protection Act, Japanese, Australian, and
             international data privacy regulations



    ● Internet e-mail encryption solution to anyone, anywhere
    ● Automate security without changing business processes, without

        complexity for end users or IT

 Reduce administrative burdens of traditional products with a solution that works with both
                             Lotus and Microsoft solutions.
AusLUG 2013

Agenda

●Social   Business Security

●Content    Filtering and Inspection

●Email    Encryption

●Local   Examples
AusLUG 2013




Protector understands Social Business!
 – Filter confidential or personal information
 – Block viruses in files to social business tools
 – Create line-of-business filters for inappropriate content
 – Empower end-users to keep unwanted content out of their
   inbox
 – Powerful and flexible content filter policy, anti-spam and
   anti-virus engines
AusLUG 2013




    Integrated Security                      World class technology




 Stopping threats that attempt to exploit
undisclosed vulnerabilitys before software
 vendors are able to provide a patch by      Deployment Flexibility
   leveraging virtual patch technology.
                                                User or PVU Software License



  ...works with all e-mail systems!
                                             Virtual Appliance   Physical Appliance
AusLUG 2013

File Attachment Inspection (aka DLP)
Able to detect the smallest detail inside emails (including Documents,   new
Spreadsheets, Presentations and PDFs)
Intelligent enough to not detect “similar” information
  ● Out-Of-Box Pattern Matches and Expressions


Inspect for “anything”
  ● Personally Identifiable Information


  ● Financial Information
Social Business Integration                                       AusLUG 2013


   Protection over standard IBM WebSphere® ICAP interface
   (Internet Content Adaption Protocol, RFC 3507)
    ●   Real-time File Analysis for Viruses
    ●   Protection from known and unknown viruses           new
    ●   Pro-active alerting to users
AusLUG 2013

Content Filtering
  Empower line of business initiatives

  Take control of content
   ● URLs


   ● Languages


   ● File Types


   ● Unwanted Content


   ● Inappropriate


   ● Pattern Matching
AusLUG 2013

End-User Controls
●Gives end users complete control over ALL unwanted e-mail!
●Reduce costs on help desks and administrators




    Objective Spam
     ● Pharmaceutical, sexual, stock scams, etc


        ●   IBM Lotus Protector for Mail Security stops objective spam
            cold at the gateway




    Subjective Spam
     ● Newsletters, mailing lists, event invitations, etc


     ● IBM Lotus Notes integration lets users block subjective

       spam senders permanently
End-User Integration               AusLUG 2013



Already integrated in Notes !!




                                 See something you don't
                                 want in your inbox?
                                 Block sender forever!
AusLUG 2013




Manage blocked messages –
both spam and blocked senders
– right within Notes!
AusLUG 2013


Agenda
●Social   Business Security

●Content    Filtering and Inspection

●Email    Encryption

●Local   Examples
AusLUG 2013




What does it do?
It extends e-mail encryption to the Internet
It secures e-mail using the most seamless encryption
available for a given recipient
It provides options to recipient for preferred method of
communication
It ensures content in transit is not intercepted or modified
It saves money on couriers, certified mail, overnight delivery,
faxes, etc.
AusLUG 2013




Notes/Outlook   World class technology
 integration

                               Backed and supported by:




                Deployment Flexibility
                     Per-User Software License

                     Gateway


                Client            Physical or Virtual Appliance
Finding the Best User Experience                               AusLUG 2013


                                Protector for Mail Encryption is
                                intelligent about finding the best,
                                most seamless encryption mode for
                                every user
                                Automated gateway policy controls


                         Domino/
                        Exchange




   Notes/                                   Protector
   Outlook                                   for Mail
                                            Encryption
                      Notes/                 Gateway
                      Outlook
Finding the Best User Experience                                       AusLUG 2013



                                                  Process Owner
                                      w/o Protector      w/Protector
   Certificate Creation Request       User               Protector
   Certificate Creation               Administrator      Protector
   Certificate Import                 User               Protector
   Certificate Protection             User               Protector
   Encryption Decision                User               User and/or
                                                         Protector
   Search for Receivers Certificate   User               Protector
   Encrypt Message and Deliver        Email Client       Protector and
                                                         Email Client
   Manage Receivers Certificates      User               Protector
AusLUG 2013


Agenda

●Social   Business Security

●Content    Filtering and Inspection

●Email    Encryption

●Local   Examples
AusLUG 2013


Australian Government Email Protective Markings

   ● Introduced in 2005, and recently updated
   ● Mandates all email to carry a Protective Marking

   ● The Protective Marking is in the form of:

         - additional information in the Subject field of a Message
         - additional Internet Message Header Extension

   For example:
AusLUG 2013


Australian Government Email Protective Markings
   Typical implementation
     ●   User asked for a Protective Marking on send
Example of end to end send                             AusLUG 2013




   Configuration Topology



                                               1


   Notes                          Protector
                         Domino    for Mail        2
                                  Encryption
                                   Gateway
AusLUG 2013


Example of end to end send via Web Messenger
   Example of sending a medical report over the Internet

       - Configure a rule so sensitive email goes via Web Messenger
AusLUG 2013


1. Example of end to end send via Web Messenger

    ●   User marks the message on Send
AusLUG 2013


1. Example of end to end send via Web Messenger
   ●   Recipient receives a registration message
AusLUG 2013


1. Example of end to end send via Web Messenger
   ●   Now they can read and reply to the message
   ●   Note: The Web messaging interface can be branded
AusLUG 2013


2. Example of end to end send via PDF
AusLUG 2013


2. Example of end to end send via PDF
    Simply change the delivery method to PDF Messenger
AusLUG 2013


2. Example of end to end send via PDF
AusLUG 2013


Email Compliance and archiving are still significant issues

    You don't know what you don't know... so make sure you can find out
AusLUG 2013


Email Compliance and archiving are still significant issues
  ●   Look in your email Archiving and Compliance System
AusLUG 2013


Email Compliance and archiving are still significant issues
   ●   Make sure you can find out what has been sent (if required)
AusLUG 2013


Don't forget about mobile devices
  ● Traveler is a fantastic free feature of Domino, but watch out for Data Loss Issues
  ● Protector has no direct tie into Traveler (yet ?)

  ● Common problem is attachments can be opened with third party applications and

  exported
AusLUG 2013


Don't forget about mobile devices
  Solution - Notes Traveler iOS application.
   - Via NTS_COMPANION_POLICY=noexport
   - Message contains a link to the Notes Traveler Companion
   - Only allows attachment viewing via Apple Quick Look viewers




                                                                   Available Now
AusLUG 2013


Don't forget about mobile devices
  New local solution - DLP for Traveler – by Preemptive Software

  ●   Use the security level of the message to prevent content going to the device




                     - Runs on the Traveler server
                     - Very easy to install
          NEW        - Can use Government markings
                     - Set and forget
                     - Simple licensing
AusLUG 2013




   Lotus Protector is a security platform of two products
   Lotus Protector for Mail Security is a solution that controls
     all types of unwanted and confidential content
   Lotus Protector for Mail Encryption extends security to
     Internet e-mail addresses
   Very easy to install, typically a self managed VM
   Can build very complex solutions
   Start simple, - target the low hanging fruit, then build up.
   Trial versions are available
AusLUG 2013

Questions and for more information?




       ibm.com/lotus/protector
       ibm.com/lotus/protector/forexchange
       www.preemptive.com.au/protector
       www.preemptive.com.au/markings
       www.preemptive.com.au/vault

More Related Content

What's hot

Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewallSanjay Singh
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen VascoLeenVerleyen
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationOKsystem
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
Bloombase Keyparc Business Brochure
Bloombase Keyparc Business BrochureBloombase Keyparc Business Brochure
Bloombase Keyparc Business BrochureBloombase
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...SafeNet
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingBryan Len
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overviewMark Thacker
 
Technologies That Enable Internet of Things - IoT Video Series - Part 2
Technologies That Enable Internet of Things - IoT Video Series - Part 2Technologies That Enable Internet of Things - IoT Video Series - Part 2
Technologies That Enable Internet of Things - IoT Video Series - Part 2Dr. Mazlan Abbas
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy againVitor Domingos
 

What's hot (20)

Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
Flyer Letter Gen Vasco
Flyer   Letter Gen   VascoFlyer   Letter Gen   Vasco
Flyer Letter Gen Vasco
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authentication
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
Bloombase Keyparc Business Brochure
Bloombase Keyparc Business BrochureBloombase Keyparc Business Brochure
Bloombase Keyparc Business Brochure
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
 
Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
Password Problem - Solved!
Password Problem - Solved!Password Problem - Solved!
Password Problem - Solved!
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overview
 
Technologies That Enable Internet of Things - IoT Video Series - Part 2
Technologies That Enable Internet of Things - IoT Video Series - Part 2Technologies That Enable Internet of Things - IoT Video Series - Part 2
Technologies That Enable Internet of Things - IoT Video Series - Part 2
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy again
 

Similar to Aus lug lotus protector

Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology LicensingPavel Fyodorov
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptx_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptxSeclore
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessRobert Crane
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classificationDavid De Vos
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET Journal
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...Microsoft Private Cloud
 
Lotus protector for mail encryption 2.1 launch
Lotus protector for mail encryption 2.1 launchLotus protector for mail encryption 2.1 launch
Lotus protector for mail encryption 2.1 launchArthur Fontaine
 
10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security IncidentsEchoworx
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsEstuate, Inc.
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware AuthenticationCoder Tech
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 

Similar to Aus lug lotus protector (20)

Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology Licensing
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptx_Bridging the Security and Usability Gap.pptx
_Bridging the Security and Usability Gap.pptx
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
CIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdfCIO Forum June Microsoft.pdf
CIO Forum June Microsoft.pdf
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...Microsoft Forefront - Secure Messaging &  Online Protection for Exchange Over...
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
 
Lotus protector for mail encryption 2.1 launch
Lotus protector for mail encryption 2.1 launchLotus protector for mail encryption 2.1 launch
Lotus protector for mail encryption 2.1 launch
 
10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security Products
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 

Aus lug lotus protector

  • 1. IBM Lotus Protector Data Loss Prevention and Email Security in an increasingly connected World Gary Wickham, Senior Technical Specialist, IBM Adam Osborne, Principal Consultant, Preemptive Consulting
  • 2. AusLUG 2013 Agenda ● Social Business Security ● Content Filtering and Inspection ● Email Encryption ● Local Examples
  • 3. AusLUG 2013 IBM Lotus Protector • Extends e-mail with new security and data protection capabilities ● Works with Notes and Outlook® UI & security model ● Protects both internal and external email traffic ● Integrates Anti-Virus protection into WebSpere® applications Security Products Antispam & Content Encryption Collaboration Antivirus Filtering Security and other messaging platforms The information on the new product(s) is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information on the new product is for informational purposes only and may not be incorporated into any contract. The information on the new product is not a commitment, promise, or legal obligation to deliver any material, code or functionality. The development, release, and timing of any features or functionality described for our products remains at our sole discretion.
  • 4. AusLUG 2013 Optimized technologies designed for Social Business ● Powerful content protection and filtering ● Extend data protection and compliance by easily weaving protection across your social business platform ● Supports data protection initiatives ● PCI, HIPAA, SOX, EU Data Protection Act, Japanese, Australian, and international data privacy regulations ● Internet e-mail encryption solution to anyone, anywhere ● Automate security without changing business processes, without complexity for end users or IT Reduce administrative burdens of traditional products with a solution that works with both Lotus and Microsoft solutions.
  • 5. AusLUG 2013 Agenda ●Social Business Security ●Content Filtering and Inspection ●Email Encryption ●Local Examples
  • 6. AusLUG 2013 Protector understands Social Business! – Filter confidential or personal information – Block viruses in files to social business tools – Create line-of-business filters for inappropriate content – Empower end-users to keep unwanted content out of their inbox – Powerful and flexible content filter policy, anti-spam and anti-virus engines
  • 7. AusLUG 2013 Integrated Security World class technology Stopping threats that attempt to exploit undisclosed vulnerabilitys before software vendors are able to provide a patch by Deployment Flexibility leveraging virtual patch technology. User or PVU Software License ...works with all e-mail systems! Virtual Appliance Physical Appliance
  • 8. AusLUG 2013 File Attachment Inspection (aka DLP) Able to detect the smallest detail inside emails (including Documents, new Spreadsheets, Presentations and PDFs) Intelligent enough to not detect “similar” information ● Out-Of-Box Pattern Matches and Expressions Inspect for “anything” ● Personally Identifiable Information ● Financial Information
  • 9. Social Business Integration AusLUG 2013 Protection over standard IBM WebSphere® ICAP interface (Internet Content Adaption Protocol, RFC 3507) ● Real-time File Analysis for Viruses ● Protection from known and unknown viruses new ● Pro-active alerting to users
  • 10. AusLUG 2013 Content Filtering Empower line of business initiatives Take control of content ● URLs ● Languages ● File Types ● Unwanted Content ● Inappropriate ● Pattern Matching
  • 11. AusLUG 2013 End-User Controls ●Gives end users complete control over ALL unwanted e-mail! ●Reduce costs on help desks and administrators Objective Spam ● Pharmaceutical, sexual, stock scams, etc ● IBM Lotus Protector for Mail Security stops objective spam cold at the gateway Subjective Spam ● Newsletters, mailing lists, event invitations, etc ● IBM Lotus Notes integration lets users block subjective spam senders permanently
  • 12. End-User Integration AusLUG 2013 Already integrated in Notes !! See something you don't want in your inbox? Block sender forever!
  • 13. AusLUG 2013 Manage blocked messages – both spam and blocked senders – right within Notes!
  • 14. AusLUG 2013 Agenda ●Social Business Security ●Content Filtering and Inspection ●Email Encryption ●Local Examples
  • 15. AusLUG 2013 What does it do? It extends e-mail encryption to the Internet It secures e-mail using the most seamless encryption available for a given recipient It provides options to recipient for preferred method of communication It ensures content in transit is not intercepted or modified It saves money on couriers, certified mail, overnight delivery, faxes, etc.
  • 16. AusLUG 2013 Notes/Outlook World class technology integration Backed and supported by: Deployment Flexibility Per-User Software License Gateway Client Physical or Virtual Appliance
  • 17. Finding the Best User Experience AusLUG 2013 Protector for Mail Encryption is intelligent about finding the best, most seamless encryption mode for every user Automated gateway policy controls Domino/ Exchange Notes/ Protector Outlook for Mail Encryption Notes/ Gateway Outlook
  • 18. Finding the Best User Experience AusLUG 2013 Process Owner w/o Protector w/Protector Certificate Creation Request User Protector Certificate Creation Administrator Protector Certificate Import User Protector Certificate Protection User Protector Encryption Decision User User and/or Protector Search for Receivers Certificate User Protector Encrypt Message and Deliver Email Client Protector and Email Client Manage Receivers Certificates User Protector
  • 19. AusLUG 2013 Agenda ●Social Business Security ●Content Filtering and Inspection ●Email Encryption ●Local Examples
  • 20. AusLUG 2013 Australian Government Email Protective Markings ● Introduced in 2005, and recently updated ● Mandates all email to carry a Protective Marking ● The Protective Marking is in the form of: - additional information in the Subject field of a Message - additional Internet Message Header Extension For example:
  • 21. AusLUG 2013 Australian Government Email Protective Markings Typical implementation ● User asked for a Protective Marking on send
  • 22. Example of end to end send AusLUG 2013 Configuration Topology 1 Notes Protector Domino for Mail 2 Encryption Gateway
  • 23. AusLUG 2013 Example of end to end send via Web Messenger Example of sending a medical report over the Internet - Configure a rule so sensitive email goes via Web Messenger
  • 24. AusLUG 2013 1. Example of end to end send via Web Messenger ● User marks the message on Send
  • 25. AusLUG 2013 1. Example of end to end send via Web Messenger ● Recipient receives a registration message
  • 26. AusLUG 2013 1. Example of end to end send via Web Messenger ● Now they can read and reply to the message ● Note: The Web messaging interface can be branded
  • 27. AusLUG 2013 2. Example of end to end send via PDF
  • 28. AusLUG 2013 2. Example of end to end send via PDF Simply change the delivery method to PDF Messenger
  • 29. AusLUG 2013 2. Example of end to end send via PDF
  • 30. AusLUG 2013 Email Compliance and archiving are still significant issues You don't know what you don't know... so make sure you can find out
  • 31. AusLUG 2013 Email Compliance and archiving are still significant issues ● Look in your email Archiving and Compliance System
  • 32. AusLUG 2013 Email Compliance and archiving are still significant issues ● Make sure you can find out what has been sent (if required)
  • 33. AusLUG 2013 Don't forget about mobile devices ● Traveler is a fantastic free feature of Domino, but watch out for Data Loss Issues ● Protector has no direct tie into Traveler (yet ?) ● Common problem is attachments can be opened with third party applications and exported
  • 34. AusLUG 2013 Don't forget about mobile devices Solution - Notes Traveler iOS application. - Via NTS_COMPANION_POLICY=noexport - Message contains a link to the Notes Traveler Companion - Only allows attachment viewing via Apple Quick Look viewers Available Now
  • 35. AusLUG 2013 Don't forget about mobile devices New local solution - DLP for Traveler – by Preemptive Software ● Use the security level of the message to prevent content going to the device - Runs on the Traveler server - Very easy to install NEW - Can use Government markings - Set and forget - Simple licensing
  • 36. AusLUG 2013  Lotus Protector is a security platform of two products  Lotus Protector for Mail Security is a solution that controls all types of unwanted and confidential content  Lotus Protector for Mail Encryption extends security to Internet e-mail addresses  Very easy to install, typically a self managed VM  Can build very complex solutions  Start simple, - target the low hanging fruit, then build up.  Trial versions are available
  • 37. AusLUG 2013 Questions and for more information? ibm.com/lotus/protector ibm.com/lotus/protector/forexchange www.preemptive.com.au/protector www.preemptive.com.au/markings www.preemptive.com.au/vault