2. Community Engagement
• Past President
San Antonio Chapter of the
International Association of
Microsoft Channel Partners
• Board of Directors
Lead SA
• Committee
North Chamber Business
Technology Speaker Series
IT Experience
• Tier 2 Engineer
EarthLink BlackBerry Helpdesk
• Engineer
Norred Technical Services
• President
Prism Technologies Group
Introduction – Bryan Guinn
3. The Difference is Our Perspective
• Fully Managed IT Services
• Outsourced Help Desk Services
• Microsoft Office 365 Deployment and Management Services
• Windows Azure Deployment and Management Services
• Business Continuity and Disaster Recovery
Introduction – Prism Technologies Group
4. What is email encryption?
Who needs email encryption and why?
How does email encryption work?
Easily send secure email and protect your data
5. What is email encryption?
• Secure delivery of email messages and
attachments
• End to End protection of information
• A method to control and prevent
unauthorized access
6. Who needs email encryption and why?
• Anyone sending confidential information
• Organizations subject to regulatory compliance
• Anyone interested in protecting trade secrets
9. What email encryption is.
Who needs email encryption and why.
How email encryption works.
Quick Recap:
10. Introducing Office 365 Message Encryption (EHE)
• Integrates with existing Exchange email
infrastructure
• Encrypted email delivered directly to
recipients' inbox
• Email decrypted and read with confidence
• Encryption process is transparent to the
sender
Send encrypted email messages to anyone, regardless of the recipient's system configuration.Provide strong, automated encryption with a cost-effective infrastructure.Eliminate the need for certificates and use a recipient's email address as the public key.Communication through a TLS-enabled network further enhances message security.Protect sensitive information and data leaving your gateway consistently and automatically.Policy-based encryption encrypts messages at the gateway based on policy rules.Help manage compliance with security and privacy requirements such as HIPAA and GLBA.Integrate with existing email infrastructure for minimal up-front capital investment.
Email encryption refers to encryption, and often authentication, of email messages, to protect the content from being read by any but the intended recipients.Email encryption refers to encryption, and often authentication, of email messages, to protect the content from being read by any but the intended recipients.Email encryption can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send.This is a separate process from digitally signing a message.Sending and viewing encrypted e-mail messages requires both sender and recipient to share their digital ID (digital ID: Contains a private key that stays on the sender's computer and a certificate (with a public key). The certificate is sent with digitally signed messages. Recipients save the certificate and use the public key to encrypt messages to the sender.), or public key certificate. This means you and the recipient each must send the other a digitally signed message, which enables you to add the other person's certificate to your Contacts. Once both parties have shared certificates, sending and viewing encrypted e-mail messages between them is the same as with any other e-mail messages. You can learn about digital IDs here and learn how to get and exchange digital IDs here.If you send an encrypted message to a recipient whose e-mail setup does not support encryption, Outlook notifies you and offers the option of sending the message in unencrypted format.This process also encrypts any attachments sent with encrypted messages.Encrypting a message is a separate process from digitally signing a message. By digitally signing a message, you apply your unique digital mark to the message. The digital signature includes your certificate and public key. This information proves to the recipient that you signed the contents of the message and not an imposter, and that the contents have not been altered in transit.
Protect Customer Credit Card InformationHelp manage compliance with security and privacy requirements such as HIPAA and GLBA. HIPPA/PHI, SOX, PCI, SAS-70, etc.
Encrypting a message is a separate process from digitally signing a message. By digitally signing a message, you apply your unique digital mark to the message. The digital signature includes your certificate and public key. This information proves to the recipient that you signed the contents of the message and not an imposter, and that the contents have not been altered in transit.A private key is the secret key kept on the sender's computer that the sender uses to digitally sign messages to recipients and to decrypt (unlock) messages from recipients. Private keys should be password protected. The public key is the key a sender gives to a recipient so that the recipient can verify the sender's signature and confirm that the message was not altered. Recipients also use the public key to encrypt (lock) e-mail messages to the sender.
Send encrypted email messages to anyone, regardless of the recipient's system configuration.Provide strong, automated encryption with a cost-effective infrastructure.Eliminate the need for certificates and use a recipient's email address as the public key.Communication through a TLS-enabled network further enhances message security.Protect sensitive information and data leaving your gateway consistently and automatically.Policy-based encryption encrypts messages at the gateway based on policy rules.Help manage compliance with security and privacy requirements such as HIPAA and GLBA.Integrate with existing email infrastructure for minimal up-front capital investment.
Secure and reliableExchange Hosted Encryption provides advanced security and reliability to help protect your information. Send encrypted email messages to anyone, regardless of the recipient's system configuration. Provide strong, automated encryption with a cost-effective infrastructure. Eliminate the need for certificates and use a recipient's email address as the public key. Communication through a TLS-enabled network further enhances message security. Stay in controlWith Exchange Hosted Encryption, you can keep your data safe, while maintaining control over your environment. Protect sensitive information and data leaving your gateway consistently and automatically. Policy-based encryption encrypts messages at the gateway based on policy rules. Help manage compliance with security and privacy requirements such as HIPAA and GLBA. Integrate with existing email infrastructure for minimal up-front capital investment. Easy to use and maintainIt's easier than ever to protect your organization's email. Hover to enlarge image Encrypted email delivered directly to recipients' inbox and not to a Web service. Email decrypted and read with confidence, without installing client software. A managed key server eliminates the need for certificate maintenance. Encryption process is transparent to the sender, who does not need to do anything other than write and send the message as usual.