SlideShare a Scribd company logo
1 of 26
Corporate Presentation 2016
2
AGENDA
About SPAMINA
The Security Challenge
3
Concerns over data
protection and
confidentiality
Why Spamina?
SPAMINA Platform
4
Parla
Secure Cloud Email
ParlaMI
Enterprise Instant Messaging
Cloud Email Firewall
Cloud Email Archiving
5
Conclusions
Cloud Email Encryption
& DLP
Mobile
Device
Management
SPAMINA for O365
The new email & instant messaging
platform that meets your security
needs
Securing Digital Communications
7
USA
Latam
Europe & MEA
APAC
+ 5000
Customer
s
+ 3 Million
Mailboxes Protected
+ 50 Countries
About SPAMINA
8
Cybercrime
organizations
Profitability
Information
Digital Assets
Phishing concerns
The Security Challenge
9
Junk Email
Time wasting
Productivity
Digital Assets
Your company relies on email
The Security Challenge
SPAMINA develops and
provides organizations with
Flexible and Secure Digital
Communications
11
Concerns over data protection and
confidentiality
The Safe Harbor agreement(*)
framework enabled US companies the
transfer of EU data with a simple self-
certification and registration process.
Main Principles
The European Court Safe Harbor ruling
currently gives authority to the European
local Data Protection Agencies to decide
whether the data transfer is compliant or not.
Safe Harbor Invalid 6 Oct, 2015
Safe Harbor
(*) Currently in a reviewing process
12
2016
Companies can apply for Binding
Corporate Rules to the relevant Data
Protection Authority, only valid for
data transfers within the same
corporation
Model Contract Clauses are a simpler
solution to put in place but requires a
contract for each data export, and it is not
providing a data transfer framework
How can companies transfer data now
while remaining compliant?
13
Why SPAMINA?
Cost-effective Cloud Services
Secure the Corporate Digital
Communication
Increase IT staff and end user
productivity
14
SaaS architecture
Multi-tenant environment
Redundant & resilient
Easy maintenance
Full White Label
15
Securely unify your email &
instant messaging management
Anywhere from any device
Financial reasons
Operational reasons
16
Protect your digital assets with SPAMINA
Parla - Secure
Cloud Email
The mailbox
platform that
meets your
security needs
Mobile Device
Management
Enforce security policies
to mobile devices
Cloud Email
Encryption & DLP
Encryption & Data Leak
Prevention
Cloud Email
Archiving
Archiving, legally
compliant solution
ParlaMI –
Enterprise
Instant
Messaging
Cloud Email
Firewall
Secure Instant
Messaging and
videoconference
call
Antispam Antivirus
Antimalware
Antiphishing &
Business Continuity
17
Parla - Secure Cloud Email
Easy-to-use console for customers to manage
their filtering levels and black & white list options
preferences
Encrypted, enterprise-class instant messaging
Add-in for Microsoft Outlook 2007, 2010, 2013 and 2016
The Parla platform fulfils the company’s present and future
needs with the optional archiving and encryption & DLP
modules
next level
Corporate email, instant messaging and
collaboration within a safe environment
18
ParlaMI – Enterprise Instant Messaging
Permanently eliminate consumer-based instant
messaging applications from your corporate devices
Protect your conversations from any network threat
or data leakage
Help managers to monitor the company’s activity
The encrypted engine ensure that confidentiality is not
compromised
Secure and confidential chat conversations
from any device
Can be combined with archiving, data leak
prevention and antimalware add-ons
Accessible via App for mobile and tablet, Outlook
add-in and webmail
19
Cloud Email Firewall
Keep data volume & server load at minimum
while enforcing security
Prevent your mail service from being blacklisted
Minimize exposure to zero-day threats
Ensure business continuity: spooling, email backup,
emergency webmail
Ensure business continuity
Cloud Email
Firewall
Protection against the latest generation of APTs such
as spear phishing attacks and ransomware
20
Cloud Email Archiving
Storage management; up to 10 years email retention &
discovery management
Regulatory Compliance & Litigation
Audit and control resources: get to know who, when,
what did the user look for or what did the user download
Users can selectively download mail messages in
different formats, preventing vendor lock-in
Legally compliant solution
Cloud Email
Archiving
Spamina’s web interface and Outlook plugin enables the
archive to be accessed anytime, anywhere
Seamless e-discovery enabled by powerful
searching engine. Multiple search criterion, including
attached documents
21
Cloud Email Encryption & DLP
Protect your corporate digital assets from preying eyes
Comply with data protection regulations
Easy and effortless access to encrypted email via safe
pick up portal
Anywhere from any device
Ensure email privacy and prevent email
data leakage
Cloud Email
Encryption and
DLP
Prevent security breaches of corporate sensitive
information
22
Mobile Device Management
User’s data protection in the event of device loss or theft
Embrace Bring Your Own Device (BYOD) with the
peace of mind of ensuring employees stay productive
and do not breach corporate policies
The administrator manages the authorizations for the
device synchronization and its security options
Remote deletion of device content by restoring default
factory settings
Protected device, secure information
Mobile Device
Management
Block/unblock specific mobile device features
23
Spamina for O365
Cloud Email Firewall enables granular management at
different levels (company-wide, domain and end-user)
Cloud Email Archiving provides with up to 10 years of email
retention, legal uphold by turning immutable
Cloud Email Encryption & DLP provides administrators with a
powerful policy engine enabling effortless email encryption
Spamina’s Outlook integration takes your
corporate security to the next level
Spamina for
0365
Resellers will be able to better engage their customers with a
broader portfolio while extending O365 security
Outbound mail filtering prevents IP blacklisting ensuring the
reputation of the customer’s email service and a solid
performance
Provides business continuity in the event of an O365 platform
outage
24
Conclusions
SPAMINA develops and provides
corporations with Flexible and Secure
Digital Communications.
Managing and mitigating cyber-crime related risk
is critical. Spamina’s solutions enable IT functions to
protect their businesses without creating inertia or
introducing excessive deployment or operational
costs.
Cost-effective: by eliminating the need of
deploying traditional on-premise
infrastructure, important costs associated with
investment and maintenance are saved.
25
A system failure, maintenance or just a
simple upgrade can disconnect your local
email server and make non-operational
your network. Our cloud will prevent any
productivity hindrance by queuing email
up.
SPAMINA ensures business continuity,
scalability of the service and its manageability
from an integrated console at all levels: end
user, IT administrator and partner.
The threat landscape evolves continuously as instant
messaging use increases the need to protect this
communication channel becomes ever more important.
SPAMINA enables protection and management of
your email & instant messaging from the cloud.
26
marketing@spamina.com
+34 91 368 77 33
Get in Touch
© 2016 Spamina - All rights reserved
spamina.com

More Related Content

What's hot

eFax Corporate Secure Faxing Online Datasheet
eFax Corporate Secure Faxing Online DatasheeteFax Corporate Secure Faxing Online Datasheet
eFax Corporate Secure Faxing Online DatasheeteFax Corporate®
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 
How Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceHow Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceIT Masterclasses
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security Seclore
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreSeclore
 
Five ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloudFive ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloudSalesBabuCRM
 
20181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 36520181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 365Arjan Cornelissen
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving CompliancePortalGuard
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights ManagementPeter1020
 
Azure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldAzure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldJP Clementi
 
Securing application data | Seclore
Securing application data | SecloreSecuring application data | Seclore
Securing application data | SecloreSeclore
 
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecuritySeclore
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashSeclore
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperDavid J Rosenthal
 

What's hot (20)

eFax Corporate Secure Faxing Online Datasheet
eFax Corporate Secure Faxing Online DatasheeteFax Corporate Secure Faxing Online Datasheet
eFax Corporate Secure Faxing Online Datasheet
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Data com
Data comData com
Data com
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
How Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR complianceHow Microsoft 365 can help with GDPR compliance
How Microsoft 365 can help with GDPR compliance
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
Five ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloudFive ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloud
 
20181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 36520181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 365
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving Compliance
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights Management
 
Azure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management WorldAzure Privacy & GDPR @ Service Management World
Azure Privacy & GDPR @ Service Management World
 
secureMFP
secureMFPsecureMFP
secureMFP
 
Securing application data | Seclore
Securing application data | SecloreSecuring application data | Seclore
Securing application data | Seclore
 
NIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric SecurityNIAP Compliance & Data-Centric Security
NIAP Compliance & Data-Centric Security
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLP
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 Whitepaper
 
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
How to Address GDPR, Phishing and Shadow IT with a Robust IAM Strategy
 

Similar to Corporate presentation spamina 2016

IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
Top Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionTop Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionSaurabh Sharma
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...Mithi SkyConnect
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsStrategic Insurance Software
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Orange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Services
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
ImmuniWeb AI Platform
ImmuniWeb AI PlatformImmuniWeb AI Platform
ImmuniWeb AI PlatformImmuniWeb
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security
 
Advantages to Outsourcing Email - Cotton Rohrscheib
Advantages to Outsourcing Email - Cotton RohrscheibAdvantages to Outsourcing Email - Cotton Rohrscheib
Advantages to Outsourcing Email - Cotton RohrscheibCotton Rohrscheib
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 

Similar to Corporate presentation spamina 2016 (20)

IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Top Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionTop Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre Solution
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Cloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency CommunicationsCloud Apps Part II: Improving Insurance Agency Communications
Cloud Apps Part II: Improving Insurance Agency Communications
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Orange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Live 2013 Security Breakout
Orange Business Live 2013 Security Breakout
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Cloud Email Firewall
Cloud Email FirewallCloud Email Firewall
Cloud Email Firewall
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
ImmuniWeb AI Platform
ImmuniWeb AI PlatformImmuniWeb AI Platform
ImmuniWeb AI Platform
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate Presentation
 
Advantages to Outsourcing Email - Cotton Rohrscheib
Advantages to Outsourcing Email - Cotton RohrscheibAdvantages to Outsourcing Email - Cotton Rohrscheib
Advantages to Outsourcing Email - Cotton Rohrscheib
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 

Recently uploaded

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 

Recently uploaded (20)

Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 

Corporate presentation spamina 2016

  • 3. 3 Concerns over data protection and confidentiality Why Spamina? SPAMINA Platform
  • 4. 4 Parla Secure Cloud Email ParlaMI Enterprise Instant Messaging Cloud Email Firewall Cloud Email Archiving
  • 5. 5 Conclusions Cloud Email Encryption & DLP Mobile Device Management SPAMINA for O365
  • 6. The new email & instant messaging platform that meets your security needs Securing Digital Communications
  • 7. 7 USA Latam Europe & MEA APAC + 5000 Customer s + 3 Million Mailboxes Protected + 50 Countries About SPAMINA
  • 9. 9 Junk Email Time wasting Productivity Digital Assets Your company relies on email The Security Challenge
  • 10. SPAMINA develops and provides organizations with Flexible and Secure Digital Communications
  • 11. 11 Concerns over data protection and confidentiality The Safe Harbor agreement(*) framework enabled US companies the transfer of EU data with a simple self- certification and registration process. Main Principles The European Court Safe Harbor ruling currently gives authority to the European local Data Protection Agencies to decide whether the data transfer is compliant or not. Safe Harbor Invalid 6 Oct, 2015 Safe Harbor (*) Currently in a reviewing process
  • 12. 12 2016 Companies can apply for Binding Corporate Rules to the relevant Data Protection Authority, only valid for data transfers within the same corporation Model Contract Clauses are a simpler solution to put in place but requires a contract for each data export, and it is not providing a data transfer framework How can companies transfer data now while remaining compliant?
  • 13. 13 Why SPAMINA? Cost-effective Cloud Services Secure the Corporate Digital Communication Increase IT staff and end user productivity
  • 14. 14 SaaS architecture Multi-tenant environment Redundant & resilient Easy maintenance Full White Label
  • 15. 15 Securely unify your email & instant messaging management Anywhere from any device Financial reasons Operational reasons
  • 16. 16 Protect your digital assets with SPAMINA Parla - Secure Cloud Email The mailbox platform that meets your security needs Mobile Device Management Enforce security policies to mobile devices Cloud Email Encryption & DLP Encryption & Data Leak Prevention Cloud Email Archiving Archiving, legally compliant solution ParlaMI – Enterprise Instant Messaging Cloud Email Firewall Secure Instant Messaging and videoconference call Antispam Antivirus Antimalware Antiphishing & Business Continuity
  • 17. 17 Parla - Secure Cloud Email Easy-to-use console for customers to manage their filtering levels and black & white list options preferences Encrypted, enterprise-class instant messaging Add-in for Microsoft Outlook 2007, 2010, 2013 and 2016 The Parla platform fulfils the company’s present and future needs with the optional archiving and encryption & DLP modules next level Corporate email, instant messaging and collaboration within a safe environment
  • 18. 18 ParlaMI – Enterprise Instant Messaging Permanently eliminate consumer-based instant messaging applications from your corporate devices Protect your conversations from any network threat or data leakage Help managers to monitor the company’s activity The encrypted engine ensure that confidentiality is not compromised Secure and confidential chat conversations from any device Can be combined with archiving, data leak prevention and antimalware add-ons Accessible via App for mobile and tablet, Outlook add-in and webmail
  • 19. 19 Cloud Email Firewall Keep data volume & server load at minimum while enforcing security Prevent your mail service from being blacklisted Minimize exposure to zero-day threats Ensure business continuity: spooling, email backup, emergency webmail Ensure business continuity Cloud Email Firewall Protection against the latest generation of APTs such as spear phishing attacks and ransomware
  • 20. 20 Cloud Email Archiving Storage management; up to 10 years email retention & discovery management Regulatory Compliance & Litigation Audit and control resources: get to know who, when, what did the user look for or what did the user download Users can selectively download mail messages in different formats, preventing vendor lock-in Legally compliant solution Cloud Email Archiving Spamina’s web interface and Outlook plugin enables the archive to be accessed anytime, anywhere Seamless e-discovery enabled by powerful searching engine. Multiple search criterion, including attached documents
  • 21. 21 Cloud Email Encryption & DLP Protect your corporate digital assets from preying eyes Comply with data protection regulations Easy and effortless access to encrypted email via safe pick up portal Anywhere from any device Ensure email privacy and prevent email data leakage Cloud Email Encryption and DLP Prevent security breaches of corporate sensitive information
  • 22. 22 Mobile Device Management User’s data protection in the event of device loss or theft Embrace Bring Your Own Device (BYOD) with the peace of mind of ensuring employees stay productive and do not breach corporate policies The administrator manages the authorizations for the device synchronization and its security options Remote deletion of device content by restoring default factory settings Protected device, secure information Mobile Device Management Block/unblock specific mobile device features
  • 23. 23 Spamina for O365 Cloud Email Firewall enables granular management at different levels (company-wide, domain and end-user) Cloud Email Archiving provides with up to 10 years of email retention, legal uphold by turning immutable Cloud Email Encryption & DLP provides administrators with a powerful policy engine enabling effortless email encryption Spamina’s Outlook integration takes your corporate security to the next level Spamina for 0365 Resellers will be able to better engage their customers with a broader portfolio while extending O365 security Outbound mail filtering prevents IP blacklisting ensuring the reputation of the customer’s email service and a solid performance Provides business continuity in the event of an O365 platform outage
  • 24. 24 Conclusions SPAMINA develops and provides corporations with Flexible and Secure Digital Communications. Managing and mitigating cyber-crime related risk is critical. Spamina’s solutions enable IT functions to protect their businesses without creating inertia or introducing excessive deployment or operational costs. Cost-effective: by eliminating the need of deploying traditional on-premise infrastructure, important costs associated with investment and maintenance are saved.
  • 25. 25 A system failure, maintenance or just a simple upgrade can disconnect your local email server and make non-operational your network. Our cloud will prevent any productivity hindrance by queuing email up. SPAMINA ensures business continuity, scalability of the service and its manageability from an integrated console at all levels: end user, IT administrator and partner. The threat landscape evolves continuously as instant messaging use increases the need to protect this communication channel becomes ever more important. SPAMINA enables protection and management of your email & instant messaging from the cloud.
  • 26. 26 marketing@spamina.com +34 91 368 77 33 Get in Touch © 2016 Spamina - All rights reserved spamina.com

Editor's Notes

  1. The Cloud Email & IM Security Vendor Based in the European Union Always Protected, Always Secure, Always On
  2. Malware creators are no longer individuals acting on their own They belong to well-structured criminal organizations and perform a full-time office job As any other regular company, their objective is profitability Your company’s information can be turned into ready cash Your company’s digital assets is their target http://www.prnewswire.com/news-releases/cyren-cyberthreat-report-highlights-alarming-increase-in-phishing-attacks-300123878.html  Aug. 5, 2015 /PRNewswire/ -- CYREN (NASDAQ: CYRN) today announced the release of its Q2 2015 CYREN Cyberthreat Report that highlights a 38% overall quarterly increase in phishing attacks. It also details the ever-growing number and sophisticated types of phishing attacks specifically designed to gain access to corporate information. Looking beyond heavily phished domains such as PayPal, Apple and Gmail, the CYREN security analysts examined a vast variety of other phishing campaigns that seek out financial gain or specific intelligence from businesses rather than consumers. They found these more sophisticated attacks to be consistently grouped into two categories: Indirect Phishing Attacks – Cybercriminals deploy a series of attacks that add up to a successful phishing campaign – usually in combination with organizational information from other sources such as LinkedIn. For example, an employee using their own Apple device is tricked into giving away iTunes credentials as part of an attack, which can give access to contact or calendar information. Additionally, an employee with a cloud-based company email (such as from Office 365 or branded Gmail accounts) could be successfully phished, providing the attacker with a platform for sending malicious emails that appear safe. Direct Phishing Attacks – Cybercriminals seek login credentials for actual business systems. During Q2 2015, CYREN security analysts found multiple examples of phishing attempts on Outlook credentials. Aside from email access, these credentials are frequently used for domain logins, providing an attacker with the tools to access far more than just email. Other cloud-based services, such as Dropbox or Salesforce, can also provide an attacker with direct access to valuable company data.
  3. Depending on the company’s size and sector, between 50% and 90% of mail received is junk email. Even if it is only annoying email, the amount of time wasted will affect your company productivity. Some of the email can be filled with malicious content and seriously damage your corporate network or your digital assets. Spamina develops and provides organizations with flexible and Secure Digital Communications.
  4. Safe Harbor main principles: Cloud providers must inform individuals that their personal data is being collected. They must obtain permission to pass on the information to a third party. They must allow people access to the data gathered. Data integrity and security must be assured. Means of enforcing compliance must be guaranteed. The Safe Harbor agreement framework enabled US companies the transfer of EU data with a simple self-certification and registration process. Used by more tan 4000 US companies. Currently in a reviewing process. 6th October 2015: The European Court of Justice ruled Safe Harbor invalid In a landmark decision, the court has considered that personal EU data held in US data centres, does not have the level of protection required by the European directive. Basis of the ruling: the self-certification process enabling US providers to transfer data, was only binding on the involved companies, and not on national security agencies. The European Court Safe Harbor ruling currently gives authority to the European local Data Protection Agencies to decide whether the data transfer is compliant or not.
  5. How can companies transfer data now while remaining compliant? Companies can apply for Binding Corporate Rules to the relevant Data Protection Authority: This process can be time consuming and expensive (can take between 18-24 months). Only valid for data transfers within the same corporation. Model Contract Clauses are a simpler solution to put in place but: Requires a contract for each data export, potentially meaning in practice hundreds of different contracts. It is merely contractual, not providing a data transfer framework.
  6. Why Spamina: Cost-effective Cloud Services: Spamina provides enterprise solutions without the burden of traditional deployment, resource investment, maintenance or extra costs. Secure the Corporate Digital Communication: Spamina’s cloud services purveys companies with a contingency and security plan: maintains business continuity in case of local server or email service disruption while ensuring data safeguard. Increase IT staff and end user productivity: empower end users to fine-tune their security preferences in compliance with corporate global policies. The IT team will then be able to focus on value added activities.
  7. SaaS architecture offering fast deployment, easy provisioning and virtual storage. Its multi-tenant environment enables resellers and providers to manage all their customer’s base from one single console. Eliminate the need of upgrading, installing add-ons or patching software. Redundant & resilient cloud platform: always-on architecture with failover and load balancing deployed on advanced tier 3 HA data centres distributed across Europe. White label option for corporate customers, ISPs & MSPs.
  8. Securely unify your email & instant messaging management One single management point for email, instant messaging, gateway security, calendar & collaboration, mobile policies enforcement, data loss & legal compliance. All this tools can therefore be handled avoiding application’s overlapping and screen switch over. Anywhere from any device. Spamina’s cloud email services provide seamless integration with other industry email services such as Microsoft Office 365™ or Google Apps for Work™, strengthen with extra security layers. Financial reasons for moving your email to Parla – Secure Cloud Email On-premise email is costly since it is difficult to adequately determine the expenses associated with such a system. Helps you turn a variable expense into a fixed one: this financial transparency will prevent your company from unexpected spending. Save capital expenditure by getting rid of hardware assets and use it for value added investments. Streamline your IT staff’s work. They will focus on critical duties instead of maintenance tasks therefore increasing their productivity. By switching from a product to a subscription-model service, corporations gain financial consistency and predictability. Operational reasons for moving your email to Parla – Secure Cloud Email Outsourcing your mailbox platform with a best-of-breed secure solution makes possible to reduce the financial impact of receiving spam and malware while enabling a total optimization of email-related technology infrastructures Scale your IT infrastructure needs as your company grows Antispam and advanced threats filtering features are fully integrated in the Parla platform Webmail access ensures email availability in the event of server outage
  9. Spamina Cloud Email Services with Microsoft O365 enable: Cloud Email Firewall enables granular management at different levels (company-wide, domain and end-user), from a single access point while ensuring business continuity in the event of O365 outage. ParlaMI Enterprise Instant Messaging enables monitored and secure corporate chat. Cloud Email Archiving provides with up to 10 years of email retention, legal uphold by turning immutable (forensically sound) the email content and virtually unlimited storage capacity. Cloud Email Encryption & DLP provides administrators with a powerful policy engine enabling effortless email encryption, compatible with standard encryption technologies and centralized public key management. Resellers will be able to better engage their customers with a broader portfolio while extending O365 security. Spamina’s Outlook integration takes your corporate security to the next level
  10. Instant messaging consumer applications challenges Corporate have turned into consumer-focused communications tools for fast-paced, anywhere operable devices running instant messaging apps. Employees download and install IM apps of their choice. The very nature of consumer-orientated IM apps results on CTOs not having real control over them: these apps act like third-party security providers with which the company has neither contract nor guarantee of service. This makes it quite difficult stopping IM-borne malware, spam or preventing both data theft and inadvertent data leakage It does not allow enforcing corporate policies nor complying with regulations Main reasons for choosing an Enterprise Instant Messaging solution Permanently eliminate consumer-based instant messaging applications from your corporate devices. Protect your conversations from any network threat or data leakage. Help managers to monitor the company’s activity. The encrypted engine ensure that confidentiality is not compromised. Can be combined with archiving, data leak prevention and antimalware add-ons. Available for IOS and Android for both tablet and smartphone. Accessible from Spamina’s Outlook plugin.
  11. Keep data volume & server load at minimum while enforcing security   Not using email filter makes your server to receive as much as four times of mail-related data. Forcing your mail sever to work four times as hard processing that email leads to performance & capacity issues. The constant evolution of the techniques used by spammers requires the use of an email firewall armed with advanced filtering technologies that are constantly being updated. If some junk email slips through your network, chances are that it will be resent from your server, for instance in the event of a local machine being compromised by malware. Your mail domain could then be blacklisted by some other email filtering tools or internet services. Any of your email recipients that happen to be protected by such filtering tools will have your mail rejected until your domain is removed from the black list -this process being rather cumbersome. Cloud Email Firewall will avoid most junk email to be sent from your email service, preventing your domain from being blacklisted. Prevent your mail service from being blacklisted If some junk email slips through your network, chances are that it will be resent from your server, for instance in the event of a local machine being compromised by malware. Your mail domain could then be blacklisted by some other email filtering tools or internet services. Any of your email recipients that happen to be protected by such filtering tools will have your mail rejected until your domain is removed from the black list -this process being rather cumbersome. Cloud Email Firewall will avoid most junk email to be sent from your email service, preventing your domain from being blacklisted Minimize exposure to zero-day and advanced persistent threats Allowing anyone from outside your network to directly connect to your mail server is risky. Unpatched vulnerabilities from your mail server OS can be routinely exploited. By getting your inbound email externally filtered from the Spamina cloud you dramatically reduce the hacker’s scope of action. Your mail server will be then reached by a much more controlled number of trustworthy email addresses. How Cloud Email Firewall multi-layered security deals with advanced threats: Spam or email with malicious content is detected by Spamina’s heuristic & bayesian network Recurrent patterns engine will then act as a second filtering barrier Zero-hour detection engine also available for virus & malware outbreak Ensure business continuity Spooling: in case of user’s mail service outage, emails are kept for up to 4 days until the connection is restored. It also prevents inbound emails to be bounced back to the sender with a non-delivery message. Email backup: Spamina keeps copies of all messages, both legitimate and spam, for up to 5 days. This enables recovering messages when they are accidentally deleted by users, or to move them to the inbox messages that initially were marked as spam. Emergency webmail: access your inbox anytime, anywhere and from any device in case of email service outage. Improve efficiency and ensure scalability Simile Fingerprint Filter®: this is Spamina’s advanced proprietary technology that provides with the capability to differentiate between email that is spam, email that could be spam and bulk email. SaaS deployment model enables seamless scalability as business grows. And by doing so, it enables the efficient delivery of email.
  12. The benefits of archiving for companies Storage Management: storing email repositories in an on premise mail server can result in a huge performance degradation. Cloud Email Archiving offers virtual unlimited storage capacity while frees the local server from the processing burden. 10 years Email Retention & Discovery Management: enable users to recover accidentally deleted emails while preserving the content. Regulatory Compliance & Litigation: conduct pre-emptive early case assessments with a view on potential legal proceedings. The data integrity provided enables corporations to support legal holds: the email content cannot be modified once it has been archived. Spamina’s web interface and Outlook plugin enables the archive to be accessed anytime, anywhere. Seamless data discovery enabled by powerful searching engine. Multiple search criterion, including attached documents. Cloud Email Archiving provides with an interface for managing simultaneously both email and instant messaging. Users can selectively download mail messages in different formats, preventing vendor lock-in. Decide what to archive in a flexible way: customers can use the IMAP connector for archiving when they do not have Spamina’s Cloud Email Firewall or Parla mailbox. For customers with CEF/Parla, the archiving is performed via our control panels. Audit and control resources: get to know who, when, what did the user look for or what did the user download.
  13. Main reasons for Cloud Email Encryption & DLP implementation Protect your corporate digital assets from preying eyes. Comply with data protection regulations. Easy and effortless access to encrypted email via safe pick up portal. Anywhere from any device. Prevent security breaches of corporate sensitive information.
  14. The context Consumerization introduced smartphones, tablets and laptops into corporate environments, bringing new challenges with them Whether corporate –or employee-owned, these devices carry sensitive business information and inevitably get lost or stolen MDM main benefits for your company User’s data protection in the event of device loss or theft Remote deletion of device content by restoring default factory settings Block/unblock specific mobile device features Use of security codes enforcement (e.g. for accessing Parla) The administrator manages the authorizations for the device synchronization and its security options Enforces the use of corporate policies for mobile users Embrace Bring Your Own Device (BYOD) with the peace of mind of ensuring employees stay productive and do not breach corporate policies
  15. Cloud Email Firewall enables granular management at different levels (company-wide, domain and end-user), from a single access point while ensuring business continuity in the event of O365 outage. ParlaMI Enterprise Instant Messaging enables monitored and secure corporate chat. Cloud Email Archiving provides with up to 10 years of email retention, legal uphold by turning immutable (forensically sound) the email content and virtually unlimited storage Cloud Email Encryption & DLP provides administrators with a powerful policy engine enabling effortless email encryption, compatible with standard encryption technologies and centralized public key management. Resellers will be able to better engage their customers with a broader portfolio while extending O365 security.