how to secure your data in the cloud
DESCRIPTION
This presentation addresses the basics of cloud computing andTRANSCRIPT
Securing your Data in the
Cloud
About Us
OptfinITy
Founded in 2002 with a focus on providing Peace of Mind to small businesses and non-profit organizations.
Headquartered in the Washington, DC Metropolitan area with clients across the United States.
Have worked with over 200 clients.
Our Services & Core Competences
IT Strategy and Assessments Managed Services◦ 24 x 7 Network Operations Center◦ 24 x 7 Technical Support Helpdesk ◦ Infrastructure Support
Software and Database Development Website Development◦ Content Management (CMS Works, Wordpress) ◦ Sharepoint◦ Search Engine Optimization
Mobile Application Development ◦ iOS (iPhone, iPad), Android (Phone & Tablet)
Phone Systems
What is The Cloud / Cloud Computing? Cloud computing is the delivery of
computing as a service rather than a product.
In cloud computing, you do not purchase the server or software but rather use shared resources, hardware, software, and information and pay on an as-needed or per use basis.
Why Cloud Computing? It is sold on Demand It is elastic – allowing
a user to have as much or as little service as they want at any given time.
Centralizing Updates for Software as a Service
Reliable AND Accessible
Increased Collaboration
Easy to Setup and Get Running
Consolidation of numerous servers
Upgrades to hardware can be done virtually, eliminating down time
Securing Your Data in the Cloud
Email Encryption – What is It and Why Do You Need It? What is Email Encryption?◦The process by which you ensure that only the correct
recipient of an email message is able to read it.◦Encryption renders the text unreadable to anyone who
cannot decrypt it. Why Do I Need Email Encryption?◦Do you use envelopes to mail important letters?◦Unencrypted emails are much less secure than
postcards.◦Anyone can ready, copy, store, and change the
contents of an email.◦Regulation compliance issues.
All Companies Are Challenged to Enforce “No Send” Policy
Continue to Train Employees on Proper Use of Email
Use Manual Processes◦Fax, Mail, Courier◦CD/Tape and Ship◦Password Protect Documents or Zip Files
Individually
Alternatives to Unencrypted Emails
How Email Actually Works
How Outbound Encrypted Email Works
Sender Notification
ZixPort(Pull)
Existing Managed Services
ZixVPM(Checks rules & applies actions)
ZixCorp Customers
ZixDirectory(Key Lookup)
How Inbound Encrypted Email Works
SenderZixPort(Pull)
Existing Managed Services
ZixVPM(Checks rules & applies actions)
ZixCorp Customers
ZixDirectory(Key Lookup)
Encrypted EmailDemonstration
Eliminate Cost Related to Handling Confidential Data
Cost of Data Security Breach Reputational Risk Immediate Delivery of Confidential Data Go Green! Reduce Amount of Paper Regulatory Compliance Issues◦ State Data Security Laws◦ Identity Theft Red Flags Rule◦ FDIC Updated Information Technology Officer’s
Questionnaire◦ HIPAA 2.0
Encrypted Email Recap
Email ArchivingIn The Cloud
Email Burden is Growing Email is Primary Corporate Communication Tool:◦Sales and Contract Negotiations◦ Invoicing◦Customer Management◦ Internal Reporting
Average Corporate User Handles 23K emails/year
Average Use 21 MB/Day, 5GB/Year 61% Companies Enforce Mailbox Size Quotas Average 90 Minutes/Day to Manage Email 80% Intellectual Property Stored in Email
Email Archiving
Retention is Not Assured Deleting is Company Policy Relying on Employees to be Good Business Continuity at Risk Recovery is Software Dependent Discovery Takes Time and $$$
Email Challenges
Reflexion Archiving, Discovery, and Recovery Hosted Email Archiving Service that Operates with
your Email Infrastructure Ensures Protection, Preservation, and Continuous
Operation of Email Communication All Incoming, Outgoing, and Internal Email and
Attachments are Filtered, Indexed, and Encrypted Dynamic Data Retention eDiscovery Finds Any Email or Attachment in the
Archive Hosted Cloud Service Provides Continuous Access
to Email
Solution - RADAR
Active Email Archiving Hosted Service Works with Existing Email Platform Focused on Discovery and Recovery
How Archiving Works
EMAIL CONTINUITY
All inbound and outboundEmails are accessible Through a WebUI for Email & Business Continuity
AUTOMATIC BACKUP
A copy of all safe emailsAre stored here.
INCOMINGFILTERED
YOUR BUSINESS
Safe, filtered email isDelivered to your inbox
THE INTERNET YOUR NETWORK
Email ArchivingDemonstration
Automated Email Continuity Maintain a Historical Reference/Knowledge
Base Document Compliance and Performance Provide Disaster Recover/Business
Continuity Reduced Energy Consumption
Hosted Email Advantages
Spam & Virus Protection
Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately.
80 – 85% of all emails worldwide are spam. A computer virus is a program that can
replicate itself and spread from one computer to another.
Malware is not technically a virus. Malware includes computer viruses,
worms, Trojan horses, rootkits, spyware, adware and other malicious software.
Spam and Viruses
What would your clients do if they knew you didn’t have security in place?
In 2006 malware damages exceeded $13.3B worldwide
Loss of productivity Cost of IT (staff time and/or fees) Cost to restore or re-create lost data Potential for fines and penalties
Threats
Security is a lot more complex than installing a firewall and keeping anti-virus software subscriptions up to date. -- Robert Biddle, Director Member Programs, Computer Technology Industry Association
A secure environment provides protection, prevention and remediation
A security platform performs multiple functions in a multi-layer approach: Firewalls to control network access, filter Web content and email, encryption protocols, and intrusion prevention and detection.
Security
Email WorksConfigurable/Differentiated Email Security
RB
L P
rote
ctio
n
Ch
eck
for
Kn
ow
n U
sers
Sca
n f
or
Vir
use
s
Ch
eck
All
ow
Lis
t
Ch
eck
Blo
ck L
ist
Ad
dre
ss-o
n-t
he-F
ly™
Ch
eck
Perm
itte
d L
an
gu
ag
es
Ch
eck
Perm
itte
d C
ou
ntr
ies
Heu
rist
ics
/ IP
Rep
uta
tion
Baye
sian
Fil
teri
ng
3.5% of all incoming SMTP connections delivered to recipients!
2.1% 1.1%.3%
85% .3% .1% .5% .1% .5% 9% 1%
96.5% of all incoming SMTP connections blocked as spam and viruses!
Multi-Layered Defense-in Depth
Geographic & Language-Based Filtering
Identified Address Sharing
Outbound Anti-Virus Scanning
Open Relay & Zombie Prevention
Avoids IP Address Blacklisting
Defeats Directory Harvesting & Denial of Services Attacks
Support SMTP Restrictions
Automatic Spooling of All Incoming Email for 3 Days
Optional Email Archiving, Discovery & Recovery (RADAR)
Spam/Virus Handling: Vaporize/Quarantine/Flag
Email Works Spam Protection
SPAM & Virus Protection
Demonstration
Control and Access to Your Mailbox Block Unwanted Mail; Spam, Viruses, DoS Attacks,
Phishing Attacks Assures Delivery of Desirable Mail Helps Preserve Long-Term Integrity of User’s
Primary email Address Allow Lists, Block Lists, Content Filtering AOTF (alternative email addresses), Permitted
Language and Country Capability Spooling Inbound Email for 10 Days When Local
Server Experiences an Outage Outbound Email Filtering
Email Works Advantages
Questions?