Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
And they can be heard and read by Internet service providers,state-enabled hackers engaged in industrial espionage, and others.
CFO: Our quarterly earnings beat our earlier guidance by 4%
CEO: The board and market will be thrilled to hear that!
CFO: Time to consider buying ACME…Their stock is tanking and their assets
are worth 10x the ask
CEO: Keep it under wraps until they drop below $16 per share, and buy
in small blocks using variousbrokers up and until $20
Board Member: The board is thinking about firing Joe…
he’s a liability and they want to cut their losses
CEO: I’ll let him know, I don’t want him blindsided. No
need to alienate him. He could take his knowledge to our
competitor and make our lives harder than need be
GC: We’ve got a lot of exposure and we should look to settle with them while they’re still open to negotiations
COO: Let’s keep this quiet. I’m on the hook and the board is going to want a blood sacrifice
CIO: It’s a ransomware attack and they’re in deep. It will take weeks, if not months of screening before
we know if it’s safe to do business
CEO: How do we know they’re not listening in?
CIO: We don’t.
Private conversations are taking place in public spaces
1
Messaging has never been more important to how an enterprise does business…
100% of people regularly use messaging to communicate
82% of your employees text for work
90% of companies fail to encrypt messaging beyond the firewall
Thankfully this conversation was protected with ArmorText!
!2 Note: this is a simulated sensitive conversation. We can not decrypt client’s messages.
Messaging has also never never been more difficult to manage or protect…
In the cloud
Data mining for monetization (e.g. Facebook & Cambridge Analytica)
Subpoenas that bypass your legal (e.g. Major League Baseball scandal)
Bulk hacks & mega leaks (e.g. Panama Papers)
On-premise
Communications outages (e.g. brought on by ransomware)
Theft by malicious insiders (e.g. Edward Snowden)
Hackers listening in (e.g. Russia, China, etc)
With consumer apps
Consumer apps with end-to-end encryption still: Lack user management
Lack policies & governance
Lack lifecycle controls
Lack retention & review
Lack device management!3
Your business conversations, videos, and files encrypted end-to-end
Built for Defense & Government Advisory
Services, Energy & Utilities, Legal, Healthcare, and
Financial Services
Available on any major desktop or mobile device
With Enterprise Governance, Data
Retention & Review, and Information Lifecycle
Controls
4
True End-to-End Encryption(For Client-Eyes-Only) ✔
Secure Messaging & Fileshare(Any OS, Device, Tablet & Desktop) ✔
Secure 1-on-1 &Group Messaging ✔
Enterprise Controls & Governance ✔
Information Lifecycle Controls ✔
Cryptographically Defined & Enforced Retention & Review ✔
Encrypted Voice Q2 2018 - In Beta
Encrypted Video Conferencing Q3 2018 - In Beta
Capabilities End-to-End Encrypted Unified Communications
ArmorText is the only unified communications offering that simultaneously addresses security, end-user experience, enterprise governance, and retention & review needs
!5
6
True End-to-End Encryption (For Client-Eyes-Only) ✔ Which messages are encrypted end-to-end? None? Some? All?
When can your messaging provider see the contents of your messages?Secure Messaging & Fileshare
(Any OS, Device, Tablet & Desktop) ✔ Is end-to-end encrypted messaging available on desktop? mobile? tablets? Can you send & receive messages on more than one device at a time?
Secure 1-on-1 &Group Messaging ✔ Does your messaging provider support end-to-end encrypted 1-on-1 and Group Messaging?
Which messages are not encrypted end-to-end? Why?
Enterprise Controls & Governance ✔ What policies can you enforce? Can you recall & wipe messages from lost or stolen devices? Can you limit who can speak with whom? Federate with other organizations?
Information Lifecycle Controls ✔ Can you send a message with an expiration? Can you set policies as an organization for how long messages are available on devices? in archives for retention & review? during legal holds?
Compartmented Communications & Risk
Reduction Strategy✔
Can you control who can and can not communicate by LoB? Department? Jurisdiction? Geo? Setup distinct admins & reviewers by group? Prevent subpoenas from rippling across your org?
Admin w/o Read Access(No Snowden Effect) ✔ Can your IT admins manage and administer your messaging solution without ever having
access to the communications taking place within?Cryptographically Defined & Enforced
Retention & Review ✔ Can you setup distinct reviewers with distinct scopes of review (users they’re responsible for)? Are limits on what a reviewer can see defined cryptographically or by permissions?
No Proprietary Hardware orInfrastructure Requirements ✔ Does your messaging provider require any on-premise infrastructure or proprietary handsets?
Does your messaging provider’s highest security offering require infrastructure or hardware? Encrypted Voice
(no media server / tap point) Q2 2018 - In Beta Does your messaging provider encrypt calls end-to-end? Where can someone “listen in”? Which calls pass through a media server? None? Some? All?
Encrypted Video Conferencing Q3 2018 - In Beta How does your messaging provider encrypt video calls? Where can someone “listen in”? Which video calls pass through a media server? None? Some? All?
Archive Integrity Verification via the Blockchain Q4 2018 - In Beta How can you verify that archives of your messages held by your provider are true?
Free of insertions? modifications? or deletions? Now and years down the road?
CapabilitiesSecure Enterprise Collaboration General Enterprise Collaboration Consumer Option
Evaluating other options…
Setup a call to learn more
With ArmorText they would have been secure & better prepared…
These organizations employed the wrong solutions and put their companies, reputations, and profits at risk
$770M failed electoral bid due to embarrassing leaks
Leaks undermined the credibility, intent and trustworthiness of the
candidate, the DNC, and the political process.
$1M+ for insider trading case due to a rogue IT admin
Example of insider threat, and board and c-suite vulnerability. An IT admin read c-suite comms prior to earnings calls to time trades on the exchange
Energy provider left vulnerable due to communications shutdown
When hit by a crippling ransomware attack, BWL had no secure redundant
communications capability in place to coordinate an emergency response
7
Hyper-Secure Collaboration
True end-to-end encryption, unique ciphers for every message and attachment, and multi-factor
authentication render phished passwords useless, and make
bulk-hacks impossible
No SnowdenEffect
It admins can manage ArmorText without being able to decrypt and
read user conversations and attachments
Crisis Management Communications
ArmorText is a cloud-based SaaS solution that provides a secure
and redundant channel for communicating when your
network is compromised
Copyright 2018 ArmorText | All Rights Reserved
There are messengers and there’s ArmorText… AND THEY’RE NOT EQUAL OR ALIKE.
1. Does our messenger use strong-encryption and is it truly end-to-end? 2. Can our internet service providers and others decrypt and read our data in their servers? 3. Does it provide enterprise controls? 4. Does it have information lifecycle controls? 5. Does it compartmentalize communications to defend against “plain view doctrine?” 6. Is it easy to use and deploy across the enterprise? 7. Is it an app and cloud based SaaS solution, or does it require expensive infrastructure or
proprietary hardware? 8. Does it work across OS’s, and with all mobile devices, tablets, and desktops? 9. Does it work in faraway and remote places around the world? 10. Is it a unified offering (message, file share, voice & video)? 11. Can we verify the integrity of any archives they hold on our behalf? 12. Do they provide technical support and consultation to help improve communications
security?
To tell the difference, all you have to do is ask the right questions.
8
https://www.armortext.comREAD:“Nine factors C-Suites, CIOs, and CISOs, should consider when
evaluating enterprise messaging and collaboration tools”
and
“Messaging Security, Governance, & User Experience Checklist”
Want to know what your CIO, CTO, CISO, and GC should be asking when they assess collaboration solutions for your organization?
9