how to secure your data in the cloud

29
Securing your Data in the Cloud

Upload: optfinity

Post on 27-Jan-2015

320 views

Category:

Documents


0 download

DESCRIPTION

This presentation addresses the basics of cloud computing and

TRANSCRIPT

Page 1: How to secure your data in the cloud

Securing your Data in the

Cloud

Page 2: How to secure your data in the cloud

About Us

OptfinITy

Founded in 2002 with a focus on providing Peace of Mind to small businesses and non-profit organizations.

Headquartered in the Washington, DC Metropolitan area with clients across the United States.

Have worked with over 200 clients.

Page 3: How to secure your data in the cloud

Our Services & Core Competences

IT Strategy and Assessments Managed Services◦ 24 x 7 Network Operations Center◦ 24 x 7 Technical Support Helpdesk ◦ Infrastructure Support

Software and Database Development Website Development◦ Content Management (CMS Works, Wordpress) ◦ Sharepoint◦ Search Engine Optimization

Mobile Application Development ◦ iOS (iPhone, iPad), Android (Phone & Tablet)

Phone Systems

Page 4: How to secure your data in the cloud

What is The Cloud / Cloud Computing? Cloud computing is the delivery of

computing as a service rather than a product.

In cloud computing, you do not purchase the server or software but rather use shared resources, hardware, software, and information and pay on an as-needed or per use basis.

Page 5: How to secure your data in the cloud

Why Cloud Computing? It is sold on Demand It is elastic – allowing

a user to have as much or as little service as they want at any given time.

Centralizing Updates for Software as a Service

Reliable AND Accessible

Increased Collaboration

Easy to Setup and Get Running

Consolidation of numerous servers

Upgrades to hardware can be done virtually, eliminating down time

Page 6: How to secure your data in the cloud

Securing Your Data in the Cloud

Page 7: How to secure your data in the cloud

Email Encryption – What is It and Why Do You Need It? What is Email Encryption?◦The process by which you ensure that only the correct

recipient of an email message is able to read it.◦Encryption renders the text unreadable to anyone who

cannot decrypt it. Why Do I Need Email Encryption?◦Do you use envelopes to mail important letters?◦Unencrypted emails are much less secure than

postcards.◦Anyone can ready, copy, store, and change the

contents of an email.◦Regulation compliance issues.

Page 8: How to secure your data in the cloud

All Companies Are Challenged to Enforce “No Send” Policy

Continue to Train Employees on Proper Use of Email

Use Manual Processes◦Fax, Mail, Courier◦CD/Tape and Ship◦Password Protect Documents or Zip Files

Individually

Alternatives to Unencrypted Emails

Page 9: How to secure your data in the cloud

How Email Actually Works

Page 10: How to secure your data in the cloud

How Outbound Encrypted Email Works

Sender Notification

ZixPort(Pull)

Existing Managed Services

ZixVPM(Checks rules & applies actions)

ZixCorp Customers

ZixDirectory(Key Lookup)

Page 11: How to secure your data in the cloud

How Inbound Encrypted Email Works

SenderZixPort(Pull)

Existing Managed Services

ZixVPM(Checks rules & applies actions)

ZixCorp Customers

ZixDirectory(Key Lookup)

Page 12: How to secure your data in the cloud

Encrypted EmailDemonstration

Page 13: How to secure your data in the cloud

Eliminate Cost Related to Handling Confidential Data

Cost of Data Security Breach Reputational Risk Immediate Delivery of Confidential Data Go Green! Reduce Amount of Paper Regulatory Compliance Issues◦ State Data Security Laws◦ Identity Theft Red Flags Rule◦ FDIC Updated Information Technology Officer’s

Questionnaire◦ HIPAA 2.0

Encrypted Email Recap

Page 14: How to secure your data in the cloud

Email ArchivingIn The Cloud

Page 15: How to secure your data in the cloud

Email Burden is Growing Email is Primary Corporate Communication Tool:◦Sales and Contract Negotiations◦ Invoicing◦Customer Management◦ Internal Reporting

Average Corporate User Handles 23K emails/year

Average Use 21 MB/Day, 5GB/Year 61% Companies Enforce Mailbox Size Quotas Average 90 Minutes/Day to Manage Email 80% Intellectual Property Stored in Email

Email Archiving

Page 16: How to secure your data in the cloud

Retention is Not Assured Deleting is Company Policy Relying on Employees to be Good Business Continuity at Risk Recovery is Software Dependent Discovery Takes Time and $$$

Email Challenges

Page 17: How to secure your data in the cloud

Reflexion Archiving, Discovery, and Recovery Hosted Email Archiving Service that Operates with

your Email Infrastructure Ensures Protection, Preservation, and Continuous

Operation of Email Communication All Incoming, Outgoing, and Internal Email and

Attachments are Filtered, Indexed, and Encrypted Dynamic Data Retention eDiscovery Finds Any Email or Attachment in the

Archive Hosted Cloud Service Provides Continuous Access

to Email

Solution - RADAR

Page 18: How to secure your data in the cloud

Active Email Archiving Hosted Service Works with Existing Email Platform Focused on Discovery and Recovery

How Archiving Works

EMAIL CONTINUITY

All inbound and outboundEmails are accessible Through a WebUI for Email & Business Continuity

AUTOMATIC BACKUP

A copy of all safe emailsAre stored here.

INCOMINGFILTERED

EMAIL

YOUR BUSINESS

Safe, filtered email isDelivered to your inbox

THE INTERNET YOUR NETWORK

Page 19: How to secure your data in the cloud

Email ArchivingDemonstration

Page 20: How to secure your data in the cloud

Automated Email Continuity Maintain a Historical Reference/Knowledge

Base Document Compliance and Performance Provide Disaster Recover/Business

Continuity Reduced Energy Consumption

Hosted Email Advantages

Page 21: How to secure your data in the cloud

Spam & Virus Protection

Page 22: How to secure your data in the cloud

Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately.

80 – 85% of all emails worldwide are spam. A computer virus is a program that can

replicate itself and spread from one computer to another.

Malware is not technically a virus. Malware includes computer viruses,

worms, Trojan horses, rootkits, spyware, adware and other malicious software.

Spam and Viruses

Page 23: How to secure your data in the cloud

What would your clients do if they knew you didn’t have security in place?

In 2006 malware damages exceeded $13.3B worldwide

Loss of productivity Cost of IT (staff time and/or fees) Cost to restore or re-create lost data Potential for fines and penalties

Threats

Page 24: How to secure your data in the cloud

Security is a lot more complex than installing a firewall and keeping anti-virus software subscriptions up to date. -- Robert Biddle, Director Member Programs, Computer Technology Industry Association

A secure environment provides protection, prevention and remediation

A security platform performs multiple functions in a multi-layer approach: Firewalls to control network access, filter Web content and email, encryption protocols, and intrusion prevention and detection.

Security

Page 25: How to secure your data in the cloud

Email WorksConfigurable/Differentiated Email Security

RB

L P

rote

ctio

n

Ch

eck

for

Kn

ow

n U

sers

Sca

n f

or

Vir

use

s

Ch

eck

All

ow

Lis

t

Ch

eck

Blo

ck L

ist

Ad

dre

ss-o

n-t

he-F

ly™

Ch

eck

Perm

itte

d L

an

gu

ag

es

Ch

eck

Perm

itte

d C

ou

ntr

ies

Heu

rist

ics

/ IP

Rep

uta

tion

Baye

sian

Fil

teri

ng

3.5% of all incoming SMTP connections delivered to recipients!

2.1% 1.1%.3%

85% .3% .1% .5% .1% .5% 9% 1%

96.5% of all incoming SMTP connections blocked as spam and viruses!

Page 26: How to secure your data in the cloud

Multi-Layered Defense-in Depth

Geographic & Language-Based Filtering

Identified Address Sharing

Outbound Anti-Virus Scanning

Open Relay & Zombie Prevention

Avoids IP Address Blacklisting

Defeats Directory Harvesting & Denial of Services Attacks

Support SMTP Restrictions

Automatic Spooling of All Incoming Email for 3 Days

Optional Email Archiving, Discovery & Recovery (RADAR)

Spam/Virus Handling: Vaporize/Quarantine/Flag

Email Works Spam Protection

Page 27: How to secure your data in the cloud

SPAM & Virus Protection

Demonstration

Page 28: How to secure your data in the cloud

Control and Access to Your Mailbox Block Unwanted Mail; Spam, Viruses, DoS Attacks,

Phishing Attacks Assures Delivery of Desirable Mail Helps Preserve Long-Term Integrity of User’s

Primary email Address Allow Lists, Block Lists, Content Filtering AOTF (alternative email addresses), Permitted

Language and Country Capability Spooling Inbound Email for 10 Days When Local

Server Experiences an Outage Outbound Email Filtering

Email Works Advantages

Page 29: How to secure your data in the cloud

Questions?