Consolidated Hygiene and Encryption Service E-Hub. Slide 1

Similar documents
MESSAGING SECURITY GATEWAY. Solution overview

The Identity-Based Encryption Advantage

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Microsoft Office 365 TM & Zix Encryption

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Future-ready security for small and mid-size enterprises

Dell Service Level Agreement for Microsoft Online Services

Symantec Security.cloud

Service Level Agreement for Microsoft Online Services

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Enterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE

Cryptographically Isolated Virtual Networks

HIPAA AND SECURITY. For Healthcare Organizations

SaaS Flyer for Trend Micro


PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

Kunal Mahajan Microsoft Corporation

Who s Protecting Your Keys? August 2018

Protect your business in today s fast-changing security and risk environment.

PCI DSS Compliance. White Paper Parallels Remote Application Server

Symantec ST Symantec Messaging Gateway Download Full Version :

Protection Service with Continuity

Office 365 Integration Guide Software Version 6.7

Cloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection

HIPAA Compliance & Privacy What You Need to Know Now

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Symantec Protection Suite Add-On for Hosted Security

UNCLASSIFIED. Mimecast UK Archiving Service Description

Office 365 Buyers Guide: Best Practices for Securing Office 365

Securing Your Most Sensitive Data

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

CipherCloud CASB+ Connector for ServiceNow

Minimum Requirements Weighted Score

Best Practice Guide. Encryption and Secure File Transfer

Security Architecture

Mimecast Datasheet. Mimecast. Achieving best practice enterprise management with next generation Mimecast technology

Oracle Data Cloud ( ODC ) Inbound Security Policies

PCI DSS and the VNC SDK

IBM Tivoli Directory Server

Google Message Discovery

Office 365 at WIT. Aidan McGrath

incloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments

Secure Messaging Buyer s Guide

IronPort X1000 Security System

Office 365: Fact Sheet

GLBA. The Gramm-Leach-Bliley Act

IronPort C100 for Small and Medium Businesses

Cisco Cloud Security Privacy Data Sheet

Protecting Your Digital World

Compliance in 5 Steps

The Eight Components of a Strong Cyber Security Defense System

Sales Training for DataMotion Products. March, 2014

Using Centralized Security Reporting

Cisco Security: Advanced Threat Defense for Microsoft Office 365

The professional IT management platform

Symantec ST0-250 Exam

CA Security Management

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

The Nasuni Security Model

End-to-End Encryption for Everybody?

Why is Office 365 the right choice?

Google Apps Premier Edition

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

Security by Default: Enabling Transformation Through Cyber Resilience

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

M86 MailMarshal SMTP USER GUIDE. Software Version: 6.9.9

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IT Service Upgrades Announcement

Cisco s Appliance-based Content Security: IronPort and Web Security

Microsoft Security Management

Pro:Deploying Messaging Solutions w/ms Exchange Server Exam.

Simple and Powerful Security for PCI DSS

Exchange Online Technical Overview. CCAP Exchange Online Overview 10/27/ /28/2011

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Deployment Options for Exchange March 2006

Agenda. Introduction & Drivers of Networks DLP. Requirements, Challenges of Network DLP. Addressing Network DLP with Fidelis XPS

Microsoft PRO- Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

Symantec Enterprise Solution Product Guide

Compliance with NIST

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services

Symantec Hosted Services. Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1

Information Security in Corporation

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Google Cloud Platform: Customer Responsibility Matrix. December 2018

GLBA Compliance. with O365 Manager Plus.

Key Features. DATA SHEET

SECURITY SERVICES SECURITY

CCISO Blueprint v1. EC-Council

Protecting Your Data in the Cloud. Ulf Mattsson Chief Technology Officer ulf.mattsson [at] protegrity.com

Adding value to your MS customers

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook

McAfee Public Cloud Server Security Suite

Security

Projectplace: A Secure Project Collaboration Solution

Transcription:

Consolidated Email Hygiene and Encryption Service E-Hub Slide 1

Agenda E-Hub Service Overview E-Hub Benefits & Features E-Hub Rates and Implementation Microsoft FOPE Overview Demo Questions Slide 2 2

OTECH E-HUB SERVICE OVERVIEW Slide 3

Current Environment E-mail hygiene a variety of solutions are in production throughout the state Inter-departmental e-mail is exposed to the public Internet (sent clear text) E-mail is scanned as potential spam at each department No consistent e-mail audit capabilities exist to monitor confidential and inappropriate e-mail transmissions by state employees (i.e. SSN, HIPPA & credit card data) No consistent e-mail encryption solution in the state for sending confidential information to citizens, businesses and partners Slide 4

E-Hub Purpose Secure and protect the State s inbound, outbound, and inter-departmental e-mail by implementing a highly available e-mail hygiene solution with a rich tool set and additional capabilities including e-mail encryption and content filtering while preserving departmental autonomy to create and manage email security and compliance policies. Slide 5

E-Hub Workshop Participants Slide 6 6

E-HUB BENEFITS AND FEATURES Slide 7

E-Hub Benefits Establish base level e-mail security settings to protect all state e-mail systems Consistent security practices that will improve incident response Compliance with regulations such as HIPPA, FTI, and PCI-DSS Statewide reporting capabilities on e-mail volume as well as agency level reporting Slide 8

E-Hub Functions E-mail Hygiene (anti-spam & anti-virus) Inter-departmental e-mail no longer traverses the public Internet in clear text E-mail content filtering capability Outbound e-mail encryption service as an option Slide 9

E-HUB RATES AND IMPLEMENTATION Slide 10

E-Hub Rates Hygiene $0.56 Hygiene with ECAL * $0.13 Encryption (optional) $1.08 Rates are per mailbox per month Encryption is an add on to Hygiene * Rate if agency holds a Microsoft Enterprise Client Access License (ECAL) Slide 11 11

OTech Internal Process for Customer Migration to E-Hub Slide 12

MICROSOFT FOPE OVERVIEW Slide 13

Messaging Environment What our customers are telling us Protect against external threats Over 90% of e-mail is junk Many companies struggle to stay ahead of threats Meet organizational governance requirements Avoid penalties for breach of compliance Legal discovery increasingly used as a weapon Focus on strategic IT initiatives Competency in anti-malware does not create a competitive advantage

Online Services Help Meet Email Challenges it is time for organizations to explore how a software-plus-services strategy can help them be better at and smarter about running their businesses. IDC, Microsoft Online Services: Giving Businesses a New Choice for Productivity Tools, July 2008 15

Microsoft Exchange Hosted Services Real-time threat prevention Layered anti-spam and antivirus Customized policy enforcement Gateway, policy-based e-mail encryption No public and private key management Full e-mail encryption

Forefront Online Protection for Exchange Multilayer spam and virus protection and policy enforcement External Senders / Recipients Legitimate E-mail Edge Blocking Antivirus Policy * Encryption Anti-spam Inbound Filtered E-mail Corporate Network Exchange Server EHS Directory Synchronization Tool Active Directory Junk E-mail Outbound Filtered E-mail About 90% of E-mail is junk Administrator Console End User Quarantine Messaging Administrator Employees * Requires additional Exchange Hosted Encryption License Also incorporates technology from

FOPE Encryption Policy-based e-mail encryption for the enterprise: Corporate Network TLS Encrypted E- mail Global Data Center Network Filtering Managed Anti-Virus Managed Anti-Spam Policy Enforcement Encrypt Rule Gateway Encryption Server Key Server Secure Reply via ZDM I N T E R N E T Recipient Network Policy-based encryption from sender to recipient - Policy-based encryption consistently and automatically encrypts messages at the gateway based on policy rules. IBE Technology uses a common ID for Public Key Web-based decryption and encrypted replies - The Zero Download Messenger enables Web-based decryption and encrypted replies for any recipient of encrypted messages with no end user training or software installation.

Identity-Based Encryption (IBE) Breakthrough in Cryptography IBE - proposed 20 years ago as next generation encryption In 1984 Adi Shamir, co-inventor of the RSA Algorithm, challenged cryptographers to invent IBE IBE solution is created 2 decades later in 2001 Research funded by DARPA (DoD research) Boneh-Franklin Algorithm published at Crypto 2001 An award-winning breakthrough in security and usability Industry acceptance Over 1000 scientific publications on IBE/Pairings Dan Boneh awarded 2005 RSA Conference Award for Mathematics Standardization Efforts IBE being standardized by IEEE 1363.3 Invited by IETF to form new extension to S/MIME Voltage Toolkit FIPS 140-2 certified; Common Criteria EAL2 certified (one of the only secure email solutions to have this)

The Secret Sauce : Identity-Based Encryption Basic Idea: Public-key Encryption where Identities are Public Keys IBE Public Key: alice@corp.com RSA Public Key: Public exponent=0x10001 Modulus=13506641086599522334960321627880596993888147 560566702752448514385152651060485953383394028715 057190944179820728216447155137368041970396419174 304649658927425623934102086438320211037295872576 235850964311056407350150818751067659462920556368 552947521350085287941637732853390610975054433499 9811150056977236890927563

How IBE Works in Practice: Alice Sends a File or Message to Bob Key Server key request + authenticate bob@corp.com alice@corp.com bob@agency.gov

Forefront Online Protection for Exchange SLAs FOPE provides a comprehensive set of SLAs covering network performance and spam and virus filtering effectiveness Each SLA is backed by a financial commitment from Microsoft Spam and Virus Filtering Effectiveness 100% Virus Protection 98% Spam Detection 1:250,000 False Positive Ratio Against all known e-mail viruses Of all inbound e-mails Filtering Network Performance 99.999% Network Uptime Rapid E-mail Delivery (Average delivery commitment of less than 1 minute) *Terms and conditions apply. Please visit http://go.microsoft.com/fwlink/?linkid=138884 Please contact your reseller or Microsoft Account Manager if you wish to view terms or have questions prior to signing up for the service.

Global Network Infrastructure Network infrastructure helps deliver reliability and scalability Services provisioned across a global network infrastructure Fully redundant and load-balanced architecture Scalability to handle all message volume variations Processes 2-4 billion e-mails on average per day E-Hub traffic routed through US data centers only

E-Hub Statewide Policies

E-Hub Statewide Service Settings

So How Well Does It Work? Total Messages Inbound: 10,218,225 Delivered: 1,576,010 (15%) Spam: 8,642,215 (85%) Blocked at Edge (DirSynch): 278,334 File Scanned: 1,587,726 Virus: 3,047 (.03%) Quarantined: 1,221 (.01%) Total Message Volume in GB s: 263 GB s

Lessons Learned Make sure you work with your IPM to implement your initial policies Do bring your policies from existing on premise email hygiene systems Don t bring your white & black lists, let the service work first and then determine if you need to add allow or reject exceptions If you have Microsoft Premier Support make sure you notify your TAM that you re moving to EHUB

Slide 28

Questions? For answers to additional questions related to the E-Hub contact your OTech Customer Service Representative to schedule a meeting. Customer Delivery Division info@state.ca.gov (916) 454-7225 Slide 29