28
Your Email is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner Senior Regional Product Manager Encryption, EMEA

Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

Your Email is outsourced to the Cloud and Mobile, Are You protecting it with Encryption?

Wolf Schreiner Senior Regional Product Manager – Encryption, EMEA

Page 2: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Safe Harbor Disclaimer

This presentation contains information about

pre-release software. Any unreleased update

to the product or other planned modification

is subject to ongoing evaluation by Symantec

and therefore subject to change.

This information is provided without warranty

of any kind, express or implied.

Customers who purchase Symantec products

should make their purchase decision based

upon features that are currently available.

2

Page 3: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Agenda

3

Why Email Encryption 1

Symantec PGP Email Encryption Solutions 2

Cloud & Mobile Deployment Options 3

Strategic Initiatives 4

Mobile Demo 5

Q&A 6

Page 4: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

4

Why Email Encryption?

Page 5: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Who has access to your email? More people than you think

Cloud Mail

Service Provider

Mail

Administrator

Cloud

Hacker

Thief Network

Sniffer Tape

Backup

Storage

Administrator

Recipient

Internal

Mail Server

Tape

Backup

Storage

Administrator

Mail

Administrator

Sender

5

Page 6: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Email Theft

6

Page 7: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Email Theft

7

http://www.digitaltrends.com/computing/anonymous-

leaks-10000-top-secret-iranian-govt-emails/

Page 8: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Data Privacy

Security and Theft of Sensitive Data

Data Mobility

What are the top level concerns?

8

Page 9: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

The Customer Problem Companies with large consumer populations Business to Consumer, Financial Services, Medical Care

• Need to communicate with customers

– Often subject to consumer privacy laws

– Often subject to data breach notification laws

• Some prefer electronic communication to traditional formats

– Reduce paper filing

– End user takes care of management

– End user can read statements on the road and away from home

• Green initiatives

– Reduce environmental footprint (paper used)

– Cost reduction (paper, folding, printing, shipping)

• Data Breach Notification Laws taking hold

– ICO Fines

– European Union notification standard

9

Page 10: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

The Customer Problem Customers with IP handled internationally

• Email passes through and stored in places where there are opponents

• Theft of IP is a serious issue

– Corporate thievery (counterfeiting)

– Industrial spying

– International intrigue with cyberwarfare

• Mail store break-ins done for intelligence gathering

– Can you even tell if your email was stolen?

• FYI, for some companies, IP Theft is the primary buying driver

– Asia for example doesn’t have extensive breach notification laws

10

Page 11: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

LulzSec and Anonymous Team Up

11

"Top priority is to steal and leak

any classified government

information, including email

spools and documentation.

Prime targets are banks and

other high-ranking

establishments."

http://www.abc.net.au/technology/articles/2011/06/20/3248520.htm

Companies with Info Worth Leaking

Page 12: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Mobility - Carrying Enough Data to Damage Your Company

12

Page 13: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Does it Matter Who Finds Your Lost Device?

No, data breach notification laws don’t care

13

Page 14: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

14

Symantec PGP Email Encryption Solutions

Page 15: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Encryption Products Overview

Symantec Mobile Encryption for iOS Symantec PGP Viewer for Android

Symantec PGP Support Package for BlackBerry

Drive Encryption Symantec Drive Encryption

Collaborative File and Folder Encryption Symantec File Share Encryption for Desktop & IOS

Management

Symantec Encryption Management Server

Media Protection Symantec Endpoint Encryption Removable Storage

Symantec Endpoint Encryption Device Control

Email Encryption &

Secure Mobile Device Messaging

Symantec Gateway Email Encryption Symantec Desktop Email Encryption

15

Secured FTP/Batch and Backups Symantec Encryption Command Line

15

Page 16: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Delivery Options – Plaintext Email

Mail Server

Internal

Sender

DMZ Internet

Encrypted Message

SSL

Plaintext

Recipient Mail

Server

Recipient

User Administration

Encryption Keys Reporting

Policy

Symantec Gateway Email Encryption

Learn Mode

16

Page 17: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Delivery Options – Gateway Email

Mail Server

Internal

Sender

DMZ Internet

Encrypted Message

SSL

Plaintext

User Administration

Encryption Keys Reporting

Policy

Symantec Gateway Email Encryption

Web Messenger Mail Server

Desktop / Mobile Notification

Message Retrieval

Mail Server Desktop / Mobile

Open PGP

Key/X.509 Cert

OpenPGP & S/MIME

Mail Server Desktop / Mobile

PDF Messenger

Encrypted PDF

17

Page 18: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Desktop Email & Secure Mobile Messaging

Mail Server

Internal

Desktop

User Administration

Encryption Keys Reporting

Policy

Symantec Encryption Management Server

DMZ Internet / Internal

Internal / External

Mail Server Workstation

X.509 Client

Mobile Device

OpenPGP Client

Symantec Desktop Email Encryption

Symantec Desktop Email Encryption

Symantec Mobile Encryption for iOS

Support Package for BlackBerry

X.509 Client

OpenPGP Client Symantec PGP Viewer for Android

Encrypted Mail Path

SSL

18

Page 19: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

A Comprehensive Product Line

19

Page 20: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Vectors to a Deployment

20

• Gateway Email as the starting point

• Extend to cover important internal users with Desktop Email + Mobile

• Consider the Symantec portfolio to address the business challenge in depth (e.g. DLP, SMG, EV)

B2B, B2C Communications

• DLP + Encryption • At network

• At endpoint

Information Protection

• It’s about encrypting data, not storage

• You own the encryption, the cloud provider is the mail man

• Solution

• Desktop Email on premise, mail server in the cloud

• Future: Cloud-based administration of endpoint encryption

Email Outsourcing

Page 21: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

21

Cloud & Mobile Deployment Options

Page 22: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Gateway Protection

Internal

Desktop

DMZ Cloud

Mail Server

Workstation

X.509 Client

OpenPGP Client

Symantec Desktop Email Encryption

Encrypted Mail Path

SSL

22

User

Administration Encryption Keys

Reporting Policy

Symantec Email Encryption Gateway

Page 23: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Endpoint Protection

Internal

Desktop

User Administration

Encryption Keys Reporting

Policy

Symantec Encryption Management Server

DMZ Cloud

Mail Server Workstation

X.509 Client

Mobile Device

OpenPGP Client

Symantec Desktop Email Encryption

Symantec Desktop Email

Encryption

SYMC Mobile Encryption for iOS

Support Package for BlackBerry

X.509/OpenPGP Client

SYMC PGP Viewer for Android

Encrypted Mail Path

SSL

23

Page 24: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Cloud Desktop Email (Future)

Internal

User Administration

Encryption Keys Reporting

Policy

PGP.Cloud

DMZ Cloud

Cloud Hosted Mail

Server

Encrypted Message

Symantec Desktop Email Encryption

Symantec Desktop Email Encryption

Sender

Recipient

SSL

24

Page 25: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

25

Strategic Initiatives

Page 26: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Our Vision and Strategy

26

Enable enterprise customers to seamlessly protect emails containing sensitive information, where it goes, wherever it

resides, with SYMC Email Encryption Products

Secure internal / cloud hosted sensitive communications

1

Secure communications from broad endpoint platforms

2 User identity based secure communications across any environments

4

Enable the separation of protection for enterprise/individual data in the same device

3

Page 27: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

SYMANTEC VISION 2012

Value Propositions

• Provides messaging security for enterprises that face a heterogeneous business environment with growing complexity both internally and externally

• A quick-to- deploy, easy-to-administer solution that brings you the rich set of messaging protection policy management to address various business needs

• Works cohesively with other Symantec messaging security solutions to bring the maximum protection to email communication

27

Page 28: Your Email is outsourced to the Cloud and Mobile, Are You ...vox.veritas.com/legacyfs/online/veritasdata/IS B22.pdf · 1 Why Email Encryption 2 Symantec PGP Email Encryption Solutions

Thank you!

Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Presentation Identifier Goes Here 28

Wolf Schreiner

[email protected]