Your Email is outsourced to the Cloud and Mobile, Are You...
Transcript of Your Email is outsourced to the Cloud and Mobile, Are You...
Your Email is outsourced to the Cloud and Mobile, Are You protecting it with Encryption?
Wolf Schreiner Senior Regional Product Manager – Encryption, EMEA
SYMANTEC VISION 2012
Safe Harbor Disclaimer
This presentation contains information about
pre-release software. Any unreleased update
to the product or other planned modification
is subject to ongoing evaluation by Symantec
and therefore subject to change.
This information is provided without warranty
of any kind, express or implied.
Customers who purchase Symantec products
should make their purchase decision based
upon features that are currently available.
2
SYMANTEC VISION 2012
Agenda
3
Why Email Encryption 1
Symantec PGP Email Encryption Solutions 2
Cloud & Mobile Deployment Options 3
Strategic Initiatives 4
Mobile Demo 5
Q&A 6
4
Why Email Encryption?
SYMANTEC VISION 2012
Who has access to your email? More people than you think
Cloud Mail
Service Provider
Administrator
Cloud
Hacker
Thief Network
Sniffer Tape
Backup
Storage
Administrator
Recipient
Internal
Mail Server
Tape
Backup
Storage
Administrator
Administrator
Sender
5
SYMANTEC VISION 2012
Email Theft
6
SYMANTEC VISION 2012
Email Theft
7
http://www.digitaltrends.com/computing/anonymous-
leaks-10000-top-secret-iranian-govt-emails/
SYMANTEC VISION 2012
Data Privacy
Security and Theft of Sensitive Data
Data Mobility
What are the top level concerns?
8
SYMANTEC VISION 2012
The Customer Problem Companies with large consumer populations Business to Consumer, Financial Services, Medical Care
• Need to communicate with customers
– Often subject to consumer privacy laws
– Often subject to data breach notification laws
• Some prefer electronic communication to traditional formats
– Reduce paper filing
– End user takes care of management
– End user can read statements on the road and away from home
• Green initiatives
– Reduce environmental footprint (paper used)
– Cost reduction (paper, folding, printing, shipping)
• Data Breach Notification Laws taking hold
– ICO Fines
– European Union notification standard
9
SYMANTEC VISION 2012
The Customer Problem Customers with IP handled internationally
• Email passes through and stored in places where there are opponents
• Theft of IP is a serious issue
– Corporate thievery (counterfeiting)
– Industrial spying
– International intrigue with cyberwarfare
• Mail store break-ins done for intelligence gathering
– Can you even tell if your email was stolen?
• FYI, for some companies, IP Theft is the primary buying driver
– Asia for example doesn’t have extensive breach notification laws
10
SYMANTEC VISION 2012
LulzSec and Anonymous Team Up
11
"Top priority is to steal and leak
any classified government
information, including email
spools and documentation.
Prime targets are banks and
other high-ranking
establishments."
http://www.abc.net.au/technology/articles/2011/06/20/3248520.htm
Companies with Info Worth Leaking
SYMANTEC VISION 2012
Mobility - Carrying Enough Data to Damage Your Company
12
SYMANTEC VISION 2012
Does it Matter Who Finds Your Lost Device?
No, data breach notification laws don’t care
13
14
Symantec PGP Email Encryption Solutions
SYMANTEC VISION 2012
Encryption Products Overview
Symantec Mobile Encryption for iOS Symantec PGP Viewer for Android
Symantec PGP Support Package for BlackBerry
Drive Encryption Symantec Drive Encryption
Collaborative File and Folder Encryption Symantec File Share Encryption for Desktop & IOS
Management
Symantec Encryption Management Server
Media Protection Symantec Endpoint Encryption Removable Storage
Symantec Endpoint Encryption Device Control
Email Encryption &
Secure Mobile Device Messaging
Symantec Gateway Email Encryption Symantec Desktop Email Encryption
15
Secured FTP/Batch and Backups Symantec Encryption Command Line
15
SYMANTEC VISION 2012
Delivery Options – Plaintext Email
Mail Server
Internal
Sender
DMZ Internet
Encrypted Message
SSL
Plaintext
Recipient Mail
Server
Recipient
User Administration
Encryption Keys Reporting
Policy
Symantec Gateway Email Encryption
Learn Mode
16
SYMANTEC VISION 2012
Delivery Options – Gateway Email
Mail Server
Internal
Sender
DMZ Internet
Encrypted Message
SSL
Plaintext
User Administration
Encryption Keys Reporting
Policy
Symantec Gateway Email Encryption
Web Messenger Mail Server
Desktop / Mobile Notification
Message Retrieval
Mail Server Desktop / Mobile
Open PGP
Key/X.509 Cert
OpenPGP & S/MIME
Mail Server Desktop / Mobile
PDF Messenger
Encrypted PDF
17
SYMANTEC VISION 2012
Desktop Email & Secure Mobile Messaging
Mail Server
Internal
Desktop
User Administration
Encryption Keys Reporting
Policy
Symantec Encryption Management Server
DMZ Internet / Internal
Internal / External
Mail Server Workstation
X.509 Client
Mobile Device
OpenPGP Client
Symantec Desktop Email Encryption
Symantec Desktop Email Encryption
Symantec Mobile Encryption for iOS
Support Package for BlackBerry
X.509 Client
OpenPGP Client Symantec PGP Viewer for Android
Encrypted Mail Path
SSL
18
SYMANTEC VISION 2012
A Comprehensive Product Line
19
SYMANTEC VISION 2012
Vectors to a Deployment
20
• Gateway Email as the starting point
• Extend to cover important internal users with Desktop Email + Mobile
• Consider the Symantec portfolio to address the business challenge in depth (e.g. DLP, SMG, EV)
B2B, B2C Communications
• DLP + Encryption • At network
• At endpoint
Information Protection
• It’s about encrypting data, not storage
• You own the encryption, the cloud provider is the mail man
• Solution
• Desktop Email on premise, mail server in the cloud
• Future: Cloud-based administration of endpoint encryption
Email Outsourcing
21
Cloud & Mobile Deployment Options
SYMANTEC VISION 2012
Gateway Protection
Internal
Desktop
DMZ Cloud
Mail Server
Workstation
X.509 Client
OpenPGP Client
Symantec Desktop Email Encryption
Encrypted Mail Path
SSL
22
User
Administration Encryption Keys
Reporting Policy
Symantec Email Encryption Gateway
SYMANTEC VISION 2012
Endpoint Protection
Internal
Desktop
User Administration
Encryption Keys Reporting
Policy
Symantec Encryption Management Server
DMZ Cloud
Mail Server Workstation
X.509 Client
Mobile Device
OpenPGP Client
Symantec Desktop Email Encryption
Symantec Desktop Email
Encryption
SYMC Mobile Encryption for iOS
Support Package for BlackBerry
X.509/OpenPGP Client
SYMC PGP Viewer for Android
Encrypted Mail Path
SSL
23
SYMANTEC VISION 2012
Cloud Desktop Email (Future)
Internal
User Administration
Encryption Keys Reporting
Policy
PGP.Cloud
DMZ Cloud
Cloud Hosted Mail
Server
Encrypted Message
Symantec Desktop Email Encryption
Symantec Desktop Email Encryption
Sender
Recipient
SSL
24
25
Strategic Initiatives
SYMANTEC VISION 2012
Our Vision and Strategy
26
Enable enterprise customers to seamlessly protect emails containing sensitive information, where it goes, wherever it
resides, with SYMC Email Encryption Products
Secure internal / cloud hosted sensitive communications
1
Secure communications from broad endpoint platforms
2 User identity based secure communications across any environments
4
Enable the separation of protection for enterprise/individual data in the same device
3
SYMANTEC VISION 2012
Value Propositions
• Provides messaging security for enterprises that face a heterogeneous business environment with growing complexity both internally and externally
• A quick-to- deploy, easy-to-administer solution that brings you the rich set of messaging protection policy management to address various business needs
• Works cohesively with other Symantec messaging security solutions to bring the maximum protection to email communication
27
Thank you!
Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Presentation Identifier Goes Here 28
Wolf Schreiner