9
And they can be heard and read by Internet service providers, state-enabled hackers engaged in industrial espionage, and others. CFO: Our quarterly earnings beat our earlier guidance by 4% CEO: The board and market will be thrilled to hear that! CFO: Time to consider buying ACME… Their stock is tanking and their assets are worth 10x the ask CEO: Keep it under wraps until they drop below $16 per share, and buy in small blocks using various brokers up and until $20 Board Member: The board is thinking about firing Joe… he’s a liability and they want to cut their losses CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our competitor and make our lives harder than need be GC: We’ve got a lot of exposure and we should look to settle with them while they’re still open to negotiations COO: Let’s keep this quiet. I’m on the hook and the board is going to want a blood sacrifice CIO: It’s a ransomware attack and they’re in deep. It will take weeks, if not months of screening before we know if it’s safe to do business CEO: How do we know they’re not listening in? CIO: We don’t. Private conversations are taking place in public spaces 1

Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

And they can be heard and read by Internet service providers,state-enabled hackers engaged in industrial espionage, and others.

CFO: Our quarterly earnings beat our earlier guidance by 4%

CEO: The board and market will be thrilled to hear that!

CFO: Time to consider buying ACME…Their stock is tanking and their assets

are worth 10x the ask

CEO: Keep it under wraps until they drop below $16 per share, and buy

in small blocks using variousbrokers up and until $20

Board Member: The board is thinking about firing Joe…

he’s a liability and they want to cut their losses

CEO: I’ll let him know, I don’t want him blindsided. No

need to alienate him. He could take his knowledge to our

competitor and make our lives harder than need be

GC: We’ve got a lot of exposure and we should look to settle with them while they’re still open to negotiations

COO: Let’s keep this quiet. I’m on the hook and the board is going to want a blood sacrifice

CIO: It’s a ransomware attack and they’re in deep. It will take weeks, if not months of screening before

we know if it’s safe to do business

CEO: How do we know they’re not listening in?

CIO: We don’t.

Private conversations are taking place in public spaces

1

Page 2: Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

Messaging has never been more important to how an enterprise does business…

100% of people regularly use messaging to communicate

82% of your employees text for work

90% of companies fail to encrypt messaging beyond the firewall

Thankfully this conversation was protected with ArmorText!

!2 Note: this is a simulated sensitive conversation. We can not decrypt client’s messages.

Page 3: Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

Messaging has also never never been more difficult to manage or protect…

In the cloud

Data mining for monetization (e.g. Facebook & Cambridge Analytica)

Subpoenas that bypass your legal (e.g. Major League Baseball scandal)

Bulk hacks & mega leaks (e.g. Panama Papers)

On-premise

Communications outages (e.g. brought on by ransomware)

Theft by malicious insiders (e.g. Edward Snowden)

Hackers listening in (e.g. Russia, China, etc)

With consumer apps

Consumer apps with end-to-end encryption still: Lack user management

Lack policies & governance

Lack lifecycle controls

Lack retention & review

Lack device management!3

Page 4: Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

Your business conversations, videos, and files encrypted end-to-end

Built for Defense & Government Advisory

Services, Energy & Utilities, Legal, Healthcare, and

Financial Services

Available on any major desktop or mobile device

With Enterprise Governance, Data

Retention & Review, and Information Lifecycle

Controls

4

Page 5: Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

True End-to-End Encryption(For Client-Eyes-Only) ✔

Secure Messaging & Fileshare(Any OS, Device, Tablet & Desktop) ✔

Secure 1-on-1 &Group Messaging ✔

Enterprise Controls & Governance ✔

Information Lifecycle Controls ✔

Cryptographically Defined & Enforced Retention & Review ✔

Encrypted Voice Q2 2018 - In Beta

Encrypted Video Conferencing Q3 2018 - In Beta

Capabilities End-to-End Encrypted Unified Communications

ArmorText is the only unified communications offering that simultaneously addresses security, end-user experience, enterprise governance, and retention & review needs

!5

Page 6: Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

6

True End-to-End Encryption (For Client-Eyes-Only) ✔ Which messages are encrypted end-to-end? None? Some? All?

When can your messaging provider see the contents of your messages?Secure Messaging & Fileshare

(Any OS, Device, Tablet & Desktop) ✔ Is end-to-end encrypted messaging available on desktop? mobile? tablets? Can you send & receive messages on more than one device at a time?

Secure 1-on-1 &Group Messaging ✔ Does your messaging provider support end-to-end encrypted 1-on-1 and Group Messaging?

Which messages are not encrypted end-to-end? Why?

Enterprise Controls & Governance ✔ What policies can you enforce? Can you recall & wipe messages from lost or stolen devices? Can you limit who can speak with whom? Federate with other organizations?

Information Lifecycle Controls ✔ Can you send a message with an expiration? Can you set policies as an organization for how long messages are available on devices? in archives for retention & review? during legal holds?

Compartmented Communications & Risk

Reduction Strategy✔

Can you control who can and can not communicate by LoB? Department? Jurisdiction? Geo? Setup distinct admins & reviewers by group? Prevent subpoenas from rippling across your org?

Admin w/o Read Access(No Snowden Effect) ✔ Can your IT admins manage and administer your messaging solution without ever having

access to the communications taking place within?Cryptographically Defined & Enforced

Retention & Review ✔ Can you setup distinct reviewers with distinct scopes of review (users they’re responsible for)? Are limits on what a reviewer can see defined cryptographically or by permissions?

No Proprietary Hardware orInfrastructure Requirements ✔ Does your messaging provider require any on-premise infrastructure or proprietary handsets?

Does your messaging provider’s highest security offering require infrastructure or hardware? Encrypted Voice

(no media server / tap point) Q2 2018 - In Beta Does your messaging provider encrypt calls end-to-end? Where can someone “listen in”? Which calls pass through a media server? None? Some? All?

Encrypted Video Conferencing Q3 2018 - In Beta How does your messaging provider encrypt video calls? Where can someone “listen in”? Which video calls pass through a media server? None? Some? All?

Archive Integrity Verification via the Blockchain Q4 2018 - In Beta How can you verify that archives of your messages held by your provider are true?

Free of insertions? modifications? or deletions? Now and years down the road?

CapabilitiesSecure Enterprise Collaboration General Enterprise Collaboration Consumer Option

Evaluating other options…

Setup a call to learn more

Page 7: Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

With ArmorText they would have been secure & better prepared…

These organizations employed the wrong solutions and put their companies, reputations, and profits at risk

$770M failed electoral bid due to embarrassing leaks

Leaks undermined the credibility, intent and trustworthiness of the

candidate, the DNC, and the political process.

$1M+ for insider trading case due to a rogue IT admin

Example of insider threat, and board and c-suite vulnerability. An IT admin read c-suite comms prior to earnings calls to time trades on the exchange

Energy provider left vulnerable due to communications shutdown

When hit by a crippling ransomware attack, BWL had no secure redundant

communications capability in place to coordinate an emergency response

7

Hyper-Secure Collaboration

True end-to-end encryption, unique ciphers for every message and attachment, and multi-factor

authentication render phished passwords useless, and make

bulk-hacks impossible

No SnowdenEffect

It admins can manage ArmorText without being able to decrypt and

read user conversations and attachments

Crisis Management Communications

ArmorText is a cloud-based SaaS solution that provides a secure

and redundant channel for communicating when your

network is compromised

Page 8: Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

Copyright 2018 ArmorText | All Rights Reserved

There are messengers and there’s ArmorText… AND THEY’RE NOT EQUAL OR ALIKE.

1. Does our messenger use strong-encryption and is it truly end-to-end? 2. Can our internet service providers and others decrypt and read our data in their servers? 3. Does it provide enterprise controls? 4. Does it have information lifecycle controls? 5. Does it compartmentalize communications to defend against “plain view doctrine?” 6. Is it easy to use and deploy across the enterprise? 7. Is it an app and cloud based SaaS solution, or does it require expensive infrastructure or

proprietary hardware? 8. Does it work across OS’s, and with all mobile devices, tablets, and desktops? 9. Does it work in faraway and remote places around the world? 10. Is it a unified offering (message, file share, voice & video)? 11. Can we verify the integrity of any archives they hold on our behalf? 12. Do they provide technical support and consultation to help improve communications

security?

To tell the difference, all you have to do is ask the right questions.

8

Page 9: Private Conversations in Public Spaces v5 - ArmorText€¦ · CEO: I’ll let him know, I don’t want him blindsided. No need to alienate him. He could take his knowledge to our

https://www.armortext.comREAD:“Nine factors C-Suites, CIOs, and CISOs, should consider when

evaluating enterprise messaging and collaboration tools”

and

“Messaging Security, Governance, & User Experience Checklist”

Want to know what your CIO, CTO, CISO, and GC should be asking when they assess collaboration solutions for your organization?

9