OptfinITy Founded in 2002 with a focus on providing Peace of Mind to small businesses and non-profit organizations. Headquartered in the Washington, DC Metropolitan area with clients across the United States. Have worked with over 200 clients.
IT Strategy and Assessments Managed Services ◦ 24 x 7 Network Operations Center ◦ 24 x 7 Technical Support Helpdesk ◦ Infrastructure Support Software and Database Development Website Development ◦ Content Management (CMS Works, Wordpress) ◦ Sharepoint ◦ Search Engine Optimization Mobile Application Development ◦ iOS (iPhone, iPad), Android (Phone & Tablet) Phone Systems
Cloud computing is the delivery of computing as a service rather than a product. In cloud computing, you do not purchase the server or software but rather use shared resources, hardware, software, and information and pay on an as-needed or per use basis.
It is sold on Demand Increased It is elastic – allowing Collaboration a user to have as much Easy to Setup and Get or as little service as Running they want at any given time. Consolidation of Centralizing Updates numerous servers for Software as a Upgrades to hardware Service can be done virtually, Reliable AND eliminating down time Accessible
What is Email Encryption? ◦ The process by which you ensure that only the correct recipient of an email message is able to read it. ◦ Encryption renders the text unreadable to anyone who cannot decrypt it. Why Do I Need Email Encryption? ◦ Do you use envelopes to mail important letters? ◦ Unencrypted emails are much less secure than postcards. ◦ Anyone can ready, copy, store, and change the contents of an email. ◦ Regulation compliance issues.
All Companies Are Challenged to Enforce “No Send” Policy Continue to Train Employees on Proper Use of Email Use Manual Processes ◦ Fax, Mail, Courier ◦ CD/Tape and Ship ◦ Password Protect Documents or Zip Files Individually
Eliminate Cost Related to Handling Confidential Data Cost of Data Security Breach Reputational Risk Immediate Delivery of Confidential Data Go Green! Reduce Amount of Paper Regulatory Compliance Issues ◦ State Data Security Laws ◦ Identity Theft Red Flags Rule ◦ FDIC Updated Information Technology Officer’s Questionnaire ◦ HIPAA 2.0
Email Burden is Growing Email is Primary Corporate Communication Tool: ◦ Sales and Contract Negotiations ◦ Invoicing ◦ Customer Management ◦ Internal Reporting Average Corporate User Handles 23K emails/year Average Use 21 MB/Day, 5GB/Year 61% Companies Enforce Mailbox Size Quotas Average 90 Minutes/Day to Manage Email 80% Intellectual Property Stored in Email
Retention is Not Assured Deleting is Company Policy Relying on Employees to be Good Business Continuity at Risk Recovery is Software Dependent Discovery Takes Time and $$$
Reflexion Archiving, Discovery, and Recovery Hosted Email Archiving Service that Operates with your Email Infrastructure Ensures Protection, Preservation, and Continuous Operation of Email Communication All Incoming, Outgoing, and Internal Email and Attachments are Filtered, Indexed, and Encrypted Dynamic Data Retention eDiscovery Finds Any Email or Attachment in the Archive Hosted Cloud Service Provides Continuous Access to Email
Active Email Archiving Hosted Service Works with Existing Email Platform Focused on Discovery and Recovery THE INTERNET YOUR NETWORK EMAIL CONTINUITY All inbound and outbound YOUR BUSINESS INCOMING Emails are accessible FILTERED Through a WebUI for Email Safe, filtered email is EMAIL & Business Continuity Delivered to your inbox AUTOMATIC BACKUP A copy of all safe emails Are stored here.
Automated Email Continuity Maintain a Historical Reference/Knowledge Base Document Compliance and Performance Provide Disaster Recover/Business Continuity Reduced Energy Consumption
Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately. 80 – 85% of all emails worldwide are spam. A computer virus is a program that can replicate itself and spread from one computer to another. Malware is not technically a virus. Malware includes computer viruses, worms, Trojan horses, rootkits, spyware, adware and other malicious software.
What would your clients do if they knew you didn’t have security in place? In 2006 malware damages exceeded $13.3B worldwide Loss of productivity Cost of IT (staff time and/or fees) Cost to restore or re-create lost data Potential for fines and penalties
Security is a lot more complex than installing a firewall and keeping anti-virus software subscriptions up to date. -- Robert Biddle, Director Member Programs, Computer Technology Industry Association A secure environment provides protection, prevention and remediation A security platform performs multiple functions in a multi-layer approach: Firewalls to control network access, filter Web content and email, encryption protocols, and intrusion prevention and detection.
RBL Protection 85% Check for Known Users Scan for Viruses .3% 2.1% Check Allow List Check Block List .1% .3% .5% Address-on-the-Fly™ Check Permitted Languages .1%96.5% of all incoming SMTP connections blocked as spam and viruses! Check Permitted Countries .5% Heuristics / IP Reputation 9% Bayesian Filtering 1% 1.1% 3.5% of all incoming SMTP connections delivered to recipients!
Multi-Layered Defense-in Defeats Directory Depth Harvesting & Denial of Geographic & Language- Services Attacks Based Filtering Support SMTP Identified Address Restrictions Sharing Automatic Spooling of All Outbound Anti-Virus Incoming Email for 3 Scanning Days Open Relay & Zombie Optional Email Prevention Archiving, Discovery & Avoids IP Address Recovery (RADAR) Blacklisting Spam/Virus Handling: Vaporize/Quarantine/ Flag
Control and Access to Your Mailbox Block Unwanted Mail; Spam, Viruses, DoS Attacks, Phishing Attacks Assures Delivery of Desirable Mail Helps Preserve Long-Term Integrity of User’s Primary email Address Allow Lists, Block Lists, Content Filtering AOTF (alternative email addresses), Permitted Language and Country Capability Spooling Inbound Email for 10 Days When Local Server Experiences an Outage Outbound Email Filtering