SlideShare a Scribd company logo
TECH BRIEF
OneWorld Encryption Delivery
Methods Overview
Do you want to communicate securely with business partners? Do you
want users to have a seamless experience when sending and receiving
encrypted messages?
If you are like most organizations today, you require encryption services for external communications:
customers, prospects, and business partners, not just corporate LANs or WANs. The number one reported
encryption barrier - asking too much of the email recipients. This indicates that organizations want to
deploy email security solutions, without changing the way their employees, customers, and business partners
send and receive emails. As an enterprise administrator, you should be able to configure how you want to
communicate sensitive information by specifying the method of encryption to use and when to apply it.
For instance, you may want to:
•	Use no-authentication to securely deliver an email or attachment without any password required;
•	Use shared secret to eliminate the need for account registration;
•	Deliver a PDF with attachments directly into an inbox.
Echoworx’s OneWorld Enterprise Encryption has extensive delivery flexibility; allowing customers to meet a
wide range of business use cases and branding requirements. Any or all delivery methods can be used at the
same time based on the encryption rule setup. There are unique benefits to each method and based on your
business priorities and use cases you will be able to decide which methods are most appropriate.
TLS Encryption | S/MIME Encryption | PGP Encryption | Encrypted PDF
Attachment Encryption | Web Portal Encryption
OneWorld Encryption Delivery N.America 1 800.346.4193 | UK 44 0.800.368.5334 | Mexico 52 800.123.9553
TECH BRIEF
TLS DELIVERY is extremely easy and seamless for a recipient since they do not have to enter a password to
view the message. Recipients receive all messages and data right into their inbox (as clear-text email) without
any additional steps.
NOTEWORTHY FEATURES:
•	 TLS connection is verified for validity on-the-fly.
•	 Configure a White List (only send to) or Black List (do not send) of TLS domains through
web-based admin console.
PROS:
•	 Senders simply send messages and OneWorld takes care of the rest.
•	 No need for recipients to change behavior.
•	 If TLS is not available, auto fall back to other encryption options for delivery
(like web portal or Secure PDF).
•	 Branded footer and header for visibility of security.
CONS:
•	 If you want messages to stay encrypted at rest, then TLS should not be used.
ENCRYPTED PDF offers the ability to encrypt both body and attachments contained in outgoing email to an
Encrypted PDF. The body of the message is encrypted as a PDF page and all attachments are embedded within
the single PDF file.
NOTEWORTHY FEATURES:
•	 Self-Registration: Recipient gets one-time registration message to set their own password
•	 Registration can also include out-of-band confirmation (on registration).
•	 Authentication can be through existing bank portals (no URLs). Customer logs in to existing
portal and through webservice calls is auto-logged into PDF password
management portal.
•	 Sender Set Password: Recipient provides password the sender set at time of sending through the
plugin or through subject line trigger.
PROS:
•	 Excellent mobile experience.
•	 Complete branded experience for recipient including all customer facing webpages,
encrypted messages, and email notifications.
•	 Deliver encrypted PDFs right to a recipient’s inbox.
•	 Message is encrypted at rest.
•	 Ability to save messages locally and view offline.
•	 Ability for passwords to be set by the sender or by the recipient.
•	 Secure reply functionality.
•	 Recipient can use any standard PDF viewer on any device to open up the encrypted PDF.
CONS:
•	 Limited message tracking.
•	 No read receipt option for sender.
OneWorld Encryption Delivery N.America 1 800.346.4193 | UK 44 0.800.368.5334 | Mexico 52 800.123.9553
TECH BRIEF
OneWorld Encryption Delivery N.America 1 800.346.4193 | UK 44 0.800.368.5334 | Mexico 52 800.123.9553
ENCRYPTED ATTACHMENT	is beneficial in cases when an organization wants to deliver attached confidential
documents without sensitive information in the body of the email. This option is commonly used by applications
that generate and process bulk electronic statements.
NOTEWORTHY FEATURES:
•	 Original PDF attachments remain unchanged, and encryption is applied
•	 Other Attachments are placed in a Secure PDF or Secure ZIP container
•	 Self-Registration (same as Encrypted PDF)
•	 Sender Set Passwords (same as Encrypted PDF)
•	 Branded header and/or footers added to the message body with Account Management link or
Shared Secret Hint
PROS:
•	 The message body is clear-text when there was no need to encrypt it.
•	 Excellent mobile experience.
•	 Complete branded experience for recipient including all customer facing webpages, encrypted
messages, and email notifications.
•	 Deliver encrypted PDFs right to a recipient’s inbox.
•	 Message is encrypted at rest.
•	 Ability to save messages locally and offline.
•	 Ability for passwords to be set by the sender or by the recipient.
CONS:
•	 No secure reply option (but this is desirable when sending address is a “no-reply” mailbox).
•	 For Secure ZIP, recipient must have ZIP software installed capable of opening AES 256-bit files
(such as WinZIP, SecureZIP, WinRAR, 7-ZIP).
•	 Limited message tracking.
•	 No read receipt option for sender.
CERTIFICATE ENCRYPTION is beneficial when recipients already have a 3rd party S/MIME or PGP key.
NOTEWORTHY FEATURES:
•	 Certificate Encryption based on user uploaded public certificate.
•	 External lookup in LDAP for public recipient certificate.
•	 Full PGP key creation / management for senders to external PGP users. External users
will get a PGP encrypted email that is a digitally signed, and public key attached for the
sender. Eliminates need for PGP desktop software under PGP communication.
PROS:
•	 Upload existing keys to OneWorld.
•	 Auto generate new keys as needed, maintaining current and future identities.
•	 No need for recipients to change behavior.
•	 Delivery can be made to any email address in the world (assuming key exists).
CONS:
•	 Configuration of inbound email flow is required to detect encrypted reply messages.
TECH BRIEF
OneWorld Encryption Delivery N.America 1 800.346.4193 | UK 44 0.800.368.5334 | Mexico 52 800.123.9553
WEB PORTAL ENCRYPTION	 enables delivery of encrypted messages via a secure website. The email is not
delivered to the recipient, but instead users are notified in their regular Inbox that an encrypted email is waiting
for them.
NOTEWORTHY FEATURES:
•	 Self-Registration: Recipient gets one time registration message and registers and set their own
password
•	 Registration can also include out-of-band confirmation (on registration).
•	 Authentication can also be through OAuth connectors.
•	 Authentication can be through existing bank portals (no URLs in notifications).
•	 No-Authentication: Recipient gets a URL that directly opens the message
(no registration).
•	 Sender Set Password: Recipient enters a password the sender set at time of sending through the
plugin or through subject line trigger.
•	 Out of Band Password: System generates per message password and emails back to sender.
Recipient must obtain system password out-of-band from sender to gain access to message.
PROS:
•	 Excellent mobile experience.
•	 Complete branded experience for recipient including all customer facing webpages, encrypted
messages, and email notifications.
•	 Message is encrypted at rest.
•	 Ability to save messages locally.
•	 Ability for passwords to be set by the sender or by the recipient.
•	 Secure reply functionality.
•	 Read receipts.
•	 Full message audit for both sender and Adminstrator.
•	 Message recall for both sender and Administrator.
CONS:
•	 Retention period (30, 60, 90 days) then deleted.
•	 Recipient must leave their local mailbox to retrieve messages online.
Since 2000, Echoworx has been bringing simplicity and flexibility to encryption. Headquartered in North America
and with offices in the UK, our certified, redundant and replicated data centres are located in the US, UK and
Canada. Our passionate encryption experts transform chaos into order for world leading enterprises and OEM
providers who understand the requirement for secure communication is of the upmost importance. We are proud
to have clients in 30 countries worldwide, with more than 5,000 enterprise-level deployments.
Encryption is an investment in brand, maximizing competitive advantage.
Echoworx’s flagship solution, OneWorld Enterprise Encryption, provides an adaptive, fully flexible approach to
encryption that ensures the privacy of sensitive messages. Enterprises investing in Echoworx’s OneWorld platform,
are gaining an adaptive, fully flexible approach to encryption, creating seamless customer experiences and in turn
earning their loyalty and trust.
TECH BRIEF
For more information visit www.echoworx.com
info@echoworx.com
NorthAmerica 1 800.346.4193 | UK 44 0.800.368.5334
@Echoworx

More Related Content

What's hot

VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
Fatih Ozavci
 
Network security
Network securityNetwork security
Network security
SVijaylakshmi
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
Sumutiu Marius
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocolsguestfbf635
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
 
MQTT: A lightweight messaging platform for IoT
MQTT: A lightweight messaging platform for IoTMQTT: A lightweight messaging platform for IoT
MQTT: A lightweight messaging platform for IoT
Alejandro Martín Clemente
 
Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6
Tanveer Malik
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
Sam Bowne
 
Email security & threads
Email security & threadsEmail security & threads
Email security & threads
Inocentshuja Ahmad
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
Ashok Panwar
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
Trust Odia
 
Leverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsLeverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage Threats
Cisco Canada
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
Tania Agni
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
Rohit Soni
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 

What's hot (20)

VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
 
Network security
Network securityNetwork security
Network security
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
MQTT: A lightweight messaging platform for IoT
MQTT: A lightweight messaging platform for IoTMQTT: A lightweight messaging platform for IoT
MQTT: A lightweight messaging platform for IoT
 
E mail security
E   mail securityE   mail security
E mail security
 
Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
 
Email security & threads
Email security & threadsEmail security & threads
Email security & threads
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Internet .ppt
Internet .pptInternet .ppt
Internet .ppt
 
Security
SecuritySecurity
Security
 
Leverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsLeverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage Threats
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Web Security
Web SecurityWeb Security
Web Security
 

Similar to Echoworx Encryption Delivery Methods

Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
BanukaVidusanka
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
robbuddingh
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
run_frictionless
 
PKI & SSL
PKI & SSLPKI & SSL
PKI & SSL
RitaThakkar1
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
VoIPstudio
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
AmnaNadeem27
 
GO AnyWhere - MFT
GO AnyWhere - MFTGO AnyWhere - MFT
GO AnyWhere - MFT
Daniele Fittabile
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UCRachid ZINE
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
Inductive Automation
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz
 
Mrx security
Mrx securityMrx security
Mrx securitydavidjd
 
email.ppt
email.pptemail.ppt
email.ppt
KaivanParikh
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate wayvfmindia
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
Richard Blech
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
Samsung Biz Mobile
 
Knox message collaborate securely, anywhere, anytime
Knox message collaborate securely, anywhere, anytimeKnox message collaborate securely, anywhere, anytime
Knox message collaborate securely, anywhere, anytime
Javier Gonzalez
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
Kathirvel Ayyaswamy
 

Similar to Echoworx Encryption Delivery Methods (20)

Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
 
PKI & SSL
PKI & SSLPKI & SSL
PKI & SSL
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
 
GO AnyWhere - MFT
GO AnyWhere - MFTGO AnyWhere - MFT
GO AnyWhere - MFT
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
Mrx security
Mrx securityMrx security
Mrx security
 
email.ppt
email.pptemail.ppt
email.ppt
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
 
Secure socket later
Secure socket laterSecure socket later
Secure socket later
 
unit6.ppt
unit6.pptunit6.ppt
unit6.ppt
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
Knox message collaborate securely, anywhere, anytime
Knox message collaborate securely, anywhere, anytimeKnox message collaborate securely, anywhere, anytime
Knox message collaborate securely, anywhere, anytime
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 

More from Echoworx

10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents
Echoworx
 
Getting Personal: The digital age is about people not technology!
Getting Personal: The digital age is about people not technology!Getting Personal: The digital age is about people not technology!
Getting Personal: The digital age is about people not technology!
Echoworx
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey Report
Echoworx
 
Migrating PGP to the Cloud
Migrating PGP to the CloudMigrating PGP to the Cloud
Migrating PGP to the Cloud
Echoworx
 
Embracing High Volume Digital Communications
Embracing High Volume Digital CommunicationsEmbracing High Volume Digital Communications
Embracing High Volume Digital Communications
Echoworx
 
SAML 101
SAML 101SAML 101
SAML 101
Echoworx
 
Overcoming the Digital Commitment Gap!
Overcoming the Digital Commitment Gap!Overcoming the Digital Commitment Gap!
Overcoming the Digital Commitment Gap!
Echoworx
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
Echoworx
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
Echoworx
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
Echoworx
 
The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be cryptic
Echoworx
 
Evolution of the Email Encryption Market
Evolution of the Email Encryption MarketEvolution of the Email Encryption Market
Evolution of the Email Encryption MarketEchoworx
 

More from Echoworx (12)

10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents10 Ways to Prevent Information Security Incidents
10 Ways to Prevent Information Security Incidents
 
Getting Personal: The digital age is about people not technology!
Getting Personal: The digital age is about people not technology!Getting Personal: The digital age is about people not technology!
Getting Personal: The digital age is about people not technology!
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey Report
 
Migrating PGP to the Cloud
Migrating PGP to the CloudMigrating PGP to the Cloud
Migrating PGP to the Cloud
 
Embracing High Volume Digital Communications
Embracing High Volume Digital CommunicationsEmbracing High Volume Digital Communications
Embracing High Volume Digital Communications
 
SAML 101
SAML 101SAML 101
SAML 101
 
Overcoming the Digital Commitment Gap!
Overcoming the Digital Commitment Gap!Overcoming the Digital Commitment Gap!
Overcoming the Digital Commitment Gap!
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be cryptic
 
Evolution of the Email Encryption Market
Evolution of the Email Encryption MarketEvolution of the Email Encryption Market
Evolution of the Email Encryption Market
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Echoworx Encryption Delivery Methods

  • 1. TECH BRIEF OneWorld Encryption Delivery Methods Overview Do you want to communicate securely with business partners? Do you want users to have a seamless experience when sending and receiving encrypted messages? If you are like most organizations today, you require encryption services for external communications: customers, prospects, and business partners, not just corporate LANs or WANs. The number one reported encryption barrier - asking too much of the email recipients. This indicates that organizations want to deploy email security solutions, without changing the way their employees, customers, and business partners send and receive emails. As an enterprise administrator, you should be able to configure how you want to communicate sensitive information by specifying the method of encryption to use and when to apply it. For instance, you may want to: • Use no-authentication to securely deliver an email or attachment without any password required; • Use shared secret to eliminate the need for account registration; • Deliver a PDF with attachments directly into an inbox. Echoworx’s OneWorld Enterprise Encryption has extensive delivery flexibility; allowing customers to meet a wide range of business use cases and branding requirements. Any or all delivery methods can be used at the same time based on the encryption rule setup. There are unique benefits to each method and based on your business priorities and use cases you will be able to decide which methods are most appropriate. TLS Encryption | S/MIME Encryption | PGP Encryption | Encrypted PDF Attachment Encryption | Web Portal Encryption OneWorld Encryption Delivery N.America 1 800.346.4193 | UK 44 0.800.368.5334 | Mexico 52 800.123.9553
  • 2. TECH BRIEF TLS DELIVERY is extremely easy and seamless for a recipient since they do not have to enter a password to view the message. Recipients receive all messages and data right into their inbox (as clear-text email) without any additional steps. NOTEWORTHY FEATURES: • TLS connection is verified for validity on-the-fly. • Configure a White List (only send to) or Black List (do not send) of TLS domains through web-based admin console. PROS: • Senders simply send messages and OneWorld takes care of the rest. • No need for recipients to change behavior. • If TLS is not available, auto fall back to other encryption options for delivery (like web portal or Secure PDF). • Branded footer and header for visibility of security. CONS: • If you want messages to stay encrypted at rest, then TLS should not be used. ENCRYPTED PDF offers the ability to encrypt both body and attachments contained in outgoing email to an Encrypted PDF. The body of the message is encrypted as a PDF page and all attachments are embedded within the single PDF file. NOTEWORTHY FEATURES: • Self-Registration: Recipient gets one-time registration message to set their own password • Registration can also include out-of-band confirmation (on registration). • Authentication can be through existing bank portals (no URLs). Customer logs in to existing portal and through webservice calls is auto-logged into PDF password management portal. • Sender Set Password: Recipient provides password the sender set at time of sending through the plugin or through subject line trigger. PROS: • Excellent mobile experience. • Complete branded experience for recipient including all customer facing webpages, encrypted messages, and email notifications. • Deliver encrypted PDFs right to a recipient’s inbox. • Message is encrypted at rest. • Ability to save messages locally and view offline. • Ability for passwords to be set by the sender or by the recipient. • Secure reply functionality. • Recipient can use any standard PDF viewer on any device to open up the encrypted PDF. CONS: • Limited message tracking. • No read receipt option for sender. OneWorld Encryption Delivery N.America 1 800.346.4193 | UK 44 0.800.368.5334 | Mexico 52 800.123.9553
  • 3. TECH BRIEF OneWorld Encryption Delivery N.America 1 800.346.4193 | UK 44 0.800.368.5334 | Mexico 52 800.123.9553 ENCRYPTED ATTACHMENT is beneficial in cases when an organization wants to deliver attached confidential documents without sensitive information in the body of the email. This option is commonly used by applications that generate and process bulk electronic statements. NOTEWORTHY FEATURES: • Original PDF attachments remain unchanged, and encryption is applied • Other Attachments are placed in a Secure PDF or Secure ZIP container • Self-Registration (same as Encrypted PDF) • Sender Set Passwords (same as Encrypted PDF) • Branded header and/or footers added to the message body with Account Management link or Shared Secret Hint PROS: • The message body is clear-text when there was no need to encrypt it. • Excellent mobile experience. • Complete branded experience for recipient including all customer facing webpages, encrypted messages, and email notifications. • Deliver encrypted PDFs right to a recipient’s inbox. • Message is encrypted at rest. • Ability to save messages locally and offline. • Ability for passwords to be set by the sender or by the recipient. CONS: • No secure reply option (but this is desirable when sending address is a “no-reply” mailbox). • For Secure ZIP, recipient must have ZIP software installed capable of opening AES 256-bit files (such as WinZIP, SecureZIP, WinRAR, 7-ZIP). • Limited message tracking. • No read receipt option for sender. CERTIFICATE ENCRYPTION is beneficial when recipients already have a 3rd party S/MIME or PGP key. NOTEWORTHY FEATURES: • Certificate Encryption based on user uploaded public certificate. • External lookup in LDAP for public recipient certificate. • Full PGP key creation / management for senders to external PGP users. External users will get a PGP encrypted email that is a digitally signed, and public key attached for the sender. Eliminates need for PGP desktop software under PGP communication. PROS: • Upload existing keys to OneWorld. • Auto generate new keys as needed, maintaining current and future identities. • No need for recipients to change behavior. • Delivery can be made to any email address in the world (assuming key exists). CONS: • Configuration of inbound email flow is required to detect encrypted reply messages.
  • 4. TECH BRIEF OneWorld Encryption Delivery N.America 1 800.346.4193 | UK 44 0.800.368.5334 | Mexico 52 800.123.9553 WEB PORTAL ENCRYPTION enables delivery of encrypted messages via a secure website. The email is not delivered to the recipient, but instead users are notified in their regular Inbox that an encrypted email is waiting for them. NOTEWORTHY FEATURES: • Self-Registration: Recipient gets one time registration message and registers and set their own password • Registration can also include out-of-band confirmation (on registration). • Authentication can also be through OAuth connectors. • Authentication can be through existing bank portals (no URLs in notifications). • No-Authentication: Recipient gets a URL that directly opens the message (no registration). • Sender Set Password: Recipient enters a password the sender set at time of sending through the plugin or through subject line trigger. • Out of Band Password: System generates per message password and emails back to sender. Recipient must obtain system password out-of-band from sender to gain access to message. PROS: • Excellent mobile experience. • Complete branded experience for recipient including all customer facing webpages, encrypted messages, and email notifications. • Message is encrypted at rest. • Ability to save messages locally. • Ability for passwords to be set by the sender or by the recipient. • Secure reply functionality. • Read receipts. • Full message audit for both sender and Adminstrator. • Message recall for both sender and Administrator. CONS: • Retention period (30, 60, 90 days) then deleted. • Recipient must leave their local mailbox to retrieve messages online.
  • 5. Since 2000, Echoworx has been bringing simplicity and flexibility to encryption. Headquartered in North America and with offices in the UK, our certified, redundant and replicated data centres are located in the US, UK and Canada. Our passionate encryption experts transform chaos into order for world leading enterprises and OEM providers who understand the requirement for secure communication is of the upmost importance. We are proud to have clients in 30 countries worldwide, with more than 5,000 enterprise-level deployments. Encryption is an investment in brand, maximizing competitive advantage. Echoworx’s flagship solution, OneWorld Enterprise Encryption, provides an adaptive, fully flexible approach to encryption that ensures the privacy of sensitive messages. Enterprises investing in Echoworx’s OneWorld platform, are gaining an adaptive, fully flexible approach to encryption, creating seamless customer experiences and in turn earning their loyalty and trust. TECH BRIEF For more information visit www.echoworx.com info@echoworx.com NorthAmerica 1 800.346.4193 | UK 44 0.800.368.5334 @Echoworx