SlideShare a Scribd company logo
1 of 2
Download to read offline
Cloud-based email encryption
Email is the most important communication tool for an organization. However, a
single email containing confidential information could put your entire organization at
risk if it’s not securely transmitted. Preventing leakage of confidential information and
meeting the regulatory requirements are two significant challenges for your business.
Dell EMS Policy Based Encryption is a high performance email encryption service
that will help you overcome your email security challenges and meet compliance
regulations, including:
•	 Health Insurance Portability and Accountability Act (HIPAA)
•	 Gramm–Leach–Bliley Act (GLBA)
•	 Payment Card Industry (PCI) Data Security Standards
•	 Sarbanes–Oxley Act (SOX)
Our encryption solution protects email in a way that’s transparent to employees and
includes secure, easy to use message retrieval of encrypted emails. It quickly scans all
content and attachments of outbound email to ensure adherence to your policies.
Solve your email regulatory compliance challenges today
With our cloud-based service, you can secure email communications across your
organization in days instead of months. There’s no need to install or maintain any
on-premise appliances or software, and we take care of complex digital certificate
and encryption key management.
The policy-based encryption engine not only automatically encrypts emails based
on your organizational policies, it redirects and prevents confidential information
from being sent to the wrong people. Dell EMS also supports secure desktop and
mobile encrypted email message delivery, so you can rest assured there will be no
disruption in email communications with your partners and customers.
Key benefits
•	 Ensure federal and state
compliance with regulations
automatically without end user
or IT staff intervention
•	 Prevent confidential information from
being sent to unauthorized recipients
outside of your organization
•	 Reduce implementation and
maintenance costs using a
100 percent cloud-based system
with digital certificate and
encryption key management
•	 Quickly implement a comprehensive
email encryption solution that
seamlessly integrates with your
current email infrastructure
•	 Send encrypted email outside your
organization with secure web-based
message retrieval on all desktop and
mobile devices
Meet regulatory
requirements
with automatic
cloud-based
email encryption
for even the most
complex email
environments.
Easily secure your sensitive or
confidential email communications.
DellTM
Email Management Services (EMS): Policy Based Encryption
Product and service availability varies by country. To learn more, customers and Dell Channel Partners should contact their
sales representative for more information. This document is provided for informational purposes only. Dell makes no warranties,
express or implied, about the information contained herein. The products or services described in the document are accurate
upon the date of publication but are subject to availability or change without notice at any time. Dell’s terms and conditions of
sale and service apply and are available upon request. Dell and the Dell logo are trademarks of Dell Inc. Dell disclaims proprietary
interest in the marks and names of others. ©2013 Dell Inc. All rights reserved.
March 2013 | Dell EMS Policy Based Encryption Datasheet.indd | Rev. 1.0
Scan or click
this code to
learn how
Dell Services
can help your
organization.
Dell Email Management Services (EMS): Policy Based Encryption
How does EMS Policy Based
Encryption work?
•	 Encryption policies are created
using the flexible policy
management engine
•	 Outbound email travels between your
email infrastructure and the service
via a Transport Layer Security (TLS)
encrypted tunnel
•	 Email message content is quickly
scanned and compared against
your policies
•	 The service automatically encrypts and
delivers email based on your policies
•	 Delivers non-confidential email as
unencrypted messages
The Dell EMS difference
•	 100% mail delivery
•	 100% scanning of email subject,
message and attachments
•	 100% cloud-based and does
not require on-premise software
or appliances
•	 24 /7 customer support
For more information about any
of our service offerings, please visit
Dell.com/services or contact our
sales team at US: 1-888-318-3201
or BePrepared@dell.com.
Features	Description
Policy management
Automatic email
encryption
Secure encrypted
email delivery
methods
Secure reply &
compose
Read receipts
Supports industry
standards
Multi-language
support
The highly customizable policy engine can be configured to support your
organization’s specific needs. With comprehensive, flexible and intuitive rule-
building, administrators can easily define and enable email policies to reduce
the risk of data loss and facilitate your regulatory compliance measures.
Policies can be configured to scan email content, subject and attachments.
Email encryption is automatically enforced based on your organization’s
encryption policies, without requiring user intervention or changing how your
users create and send emails.
The Dell EMS Policy Based Encryption service offers convenient and flexible
email retrieval options for external recipients of encrypted emails. Encrypted
email can be retrieved by any email recipient on any computing platform, and
does not require you to exchange encryption keys prior to sending. By default,
your customers and partners retrieve encrypted email from a secure web
portal, accessible from their desktop or mobile device.
External recipients of an encrypted email use the secure portal to reply to
the message and compose secure messages. This provides two-way email
security.
Enables the encrypted email sender to know when the message was read by
the recipient.
Dell EMS Policy Based Encryption supports standards based encryption
including PKI, X 509 certificates, S/MIME and OpenPGP.
Supports multiple languages for secure global communications.
Email sender
Email recipient
Secure web portal
for email access
Email servers
Inbound/outbound
email (TLS)
Inbound/
outbound(SSL)
Inbound/
outbound
Firewall
Dell EMS Policy
Based Encryption
In/out (TLS)

More Related Content

Viewers also liked

PARTNERSHIP & INVESTMENTS
PARTNERSHIP & INVESTMENTSPARTNERSHIP & INVESTMENTS
PARTNERSHIP & INVESTMENTS
Azalnarziev
 
Codigo para insertar al blog
Codigo para insertar al blogCodigo para insertar al blog
Codigo para insertar al blog
yaniris226
 
Twitter as communication tool for cosmetic companies
Twitter as communication tool for cosmetic companiesTwitter as communication tool for cosmetic companies
Twitter as communication tool for cosmetic companies
WebRadar.lv
 

Viewers also liked (16)

Politics of morocco
Politics of moroccoPolitics of morocco
Politics of morocco
 
2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판
2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판
2015년 3분기 주요 정보보안 소식 차민석 20160117_공개판
 
.
..
.
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
PARTNERSHIP & INVESTMENTS
PARTNERSHIP & INVESTMENTSPARTNERSHIP & INVESTMENTS
PARTNERSHIP & INVESTMENTS
 
Reporte Final de Residencia Profesional
Reporte Final de Residencia ProfesionalReporte Final de Residencia Profesional
Reporte Final de Residencia Profesional
 
ISC West 2014 Korea Pavilion Directory
ISC West 2014 Korea Pavilion DirectoryISC West 2014 Korea Pavilion Directory
ISC West 2014 Korea Pavilion Directory
 
Vol_in_c week 2
Vol_in_c week 2Vol_in_c week 2
Vol_in_c week 2
 
Codigo para insertar al blog
Codigo para insertar al blogCodigo para insertar al blog
Codigo para insertar al blog
 
Dhs Private Sector Resource Catalog
Dhs Private Sector Resource CatalogDhs Private Sector Resource Catalog
Dhs Private Sector Resource Catalog
 
Team Teacher Malfunction *Communication Error*
Team Teacher Malfunction *Communication Error*Team Teacher Malfunction *Communication Error*
Team Teacher Malfunction *Communication Error*
 
Dr Dev Kambhampati | USITC- Poultry Industry & Trade Summary
Dr Dev Kambhampati | USITC- Poultry Industry & Trade SummaryDr Dev Kambhampati | USITC- Poultry Industry & Trade Summary
Dr Dev Kambhampati | USITC- Poultry Industry & Trade Summary
 
Ecologiae poluicao pb
Ecologiae poluicao pbEcologiae poluicao pb
Ecologiae poluicao pb
 
102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授
102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授
102 國內外創意、創新、創業或發明競賽等獎項例示表-詹翔霖教授
 
Twitter as communication tool for cosmetic companies
Twitter as communication tool for cosmetic companiesTwitter as communication tool for cosmetic companies
Twitter as communication tool for cosmetic companies
 
Korea sports tourism
Korea sports tourismKorea sports tourism
Korea sports tourism
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Dell Email Management Services- Policy Based Encyption for Healthcare

  • 1. Cloud-based email encryption Email is the most important communication tool for an organization. However, a single email containing confidential information could put your entire organization at risk if it’s not securely transmitted. Preventing leakage of confidential information and meeting the regulatory requirements are two significant challenges for your business. Dell EMS Policy Based Encryption is a high performance email encryption service that will help you overcome your email security challenges and meet compliance regulations, including: • Health Insurance Portability and Accountability Act (HIPAA) • Gramm–Leach–Bliley Act (GLBA) • Payment Card Industry (PCI) Data Security Standards • Sarbanes–Oxley Act (SOX) Our encryption solution protects email in a way that’s transparent to employees and includes secure, easy to use message retrieval of encrypted emails. It quickly scans all content and attachments of outbound email to ensure adherence to your policies. Solve your email regulatory compliance challenges today With our cloud-based service, you can secure email communications across your organization in days instead of months. There’s no need to install or maintain any on-premise appliances or software, and we take care of complex digital certificate and encryption key management. The policy-based encryption engine not only automatically encrypts emails based on your organizational policies, it redirects and prevents confidential information from being sent to the wrong people. Dell EMS also supports secure desktop and mobile encrypted email message delivery, so you can rest assured there will be no disruption in email communications with your partners and customers. Key benefits • Ensure federal and state compliance with regulations automatically without end user or IT staff intervention • Prevent confidential information from being sent to unauthorized recipients outside of your organization • Reduce implementation and maintenance costs using a 100 percent cloud-based system with digital certificate and encryption key management • Quickly implement a comprehensive email encryption solution that seamlessly integrates with your current email infrastructure • Send encrypted email outside your organization with secure web-based message retrieval on all desktop and mobile devices Meet regulatory requirements with automatic cloud-based email encryption for even the most complex email environments. Easily secure your sensitive or confidential email communications. DellTM Email Management Services (EMS): Policy Based Encryption
  • 2. Product and service availability varies by country. To learn more, customers and Dell Channel Partners should contact their sales representative for more information. This document is provided for informational purposes only. Dell makes no warranties, express or implied, about the information contained herein. The products or services described in the document are accurate upon the date of publication but are subject to availability or change without notice at any time. Dell’s terms and conditions of sale and service apply and are available upon request. Dell and the Dell logo are trademarks of Dell Inc. Dell disclaims proprietary interest in the marks and names of others. ©2013 Dell Inc. All rights reserved. March 2013 | Dell EMS Policy Based Encryption Datasheet.indd | Rev. 1.0 Scan or click this code to learn how Dell Services can help your organization. Dell Email Management Services (EMS): Policy Based Encryption How does EMS Policy Based Encryption work? • Encryption policies are created using the flexible policy management engine • Outbound email travels between your email infrastructure and the service via a Transport Layer Security (TLS) encrypted tunnel • Email message content is quickly scanned and compared against your policies • The service automatically encrypts and delivers email based on your policies • Delivers non-confidential email as unencrypted messages The Dell EMS difference • 100% mail delivery • 100% scanning of email subject, message and attachments • 100% cloud-based and does not require on-premise software or appliances • 24 /7 customer support For more information about any of our service offerings, please visit Dell.com/services or contact our sales team at US: 1-888-318-3201 or BePrepared@dell.com. Features Description Policy management Automatic email encryption Secure encrypted email delivery methods Secure reply & compose Read receipts Supports industry standards Multi-language support The highly customizable policy engine can be configured to support your organization’s specific needs. With comprehensive, flexible and intuitive rule- building, administrators can easily define and enable email policies to reduce the risk of data loss and facilitate your regulatory compliance measures. Policies can be configured to scan email content, subject and attachments. Email encryption is automatically enforced based on your organization’s encryption policies, without requiring user intervention or changing how your users create and send emails. The Dell EMS Policy Based Encryption service offers convenient and flexible email retrieval options for external recipients of encrypted emails. Encrypted email can be retrieved by any email recipient on any computing platform, and does not require you to exchange encryption keys prior to sending. By default, your customers and partners retrieve encrypted email from a secure web portal, accessible from their desktop or mobile device. External recipients of an encrypted email use the secure portal to reply to the message and compose secure messages. This provides two-way email security. Enables the encrypted email sender to know when the message was read by the recipient. Dell EMS Policy Based Encryption supports standards based encryption including PKI, X 509 certificates, S/MIME and OpenPGP. Supports multiple languages for secure global communications. Email sender Email recipient Secure web portal for email access Email servers Inbound/outbound email (TLS) Inbound/ outbound(SSL) Inbound/ outbound Firewall Dell EMS Policy Based Encryption In/out (TLS)