End-to-End Encryption for Everybody?

Similar documents
CipherMail encryption. CipherMail white paper

BEST PRACTICES FOR PERSONAL Security

Best Practice Guide. Encryption and Secure File Transfer

Data Leakage Prevention. - Protection of Outbound Communication -

TECHNICAL WHITE PAPER. Secure messaging in Office 365: Four key considerations

Microsoft Office 365 TM & Zix Encryption

Advanced encryption and message control to complement and enhance your security investment in ZixDLP.

Evaluating Encryption Products

SECURE DATA EXCHANGE

iq.suite Crypt Pro - Server-based encryption - Efficient encryption for IBM Domino

MESSAGING SECURITY GATEWAY. Solution overview

Google Message Discovery

Deployment Options for Exchange March 2006

CryptoEx: Applications for Encryption and Digital Signature

Security and Privacy

Internet Architecture

Enterprise Simply Trustworthy?

Protect your business in today s fast-changing security and risk environment.

PCI DSS Compliance. White Paper Parallels Remote Application Server

Secure Messaging Buyer s Guide

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Consolidated Hygiene and Encryption Service E-Hub. Slide 1

PROTECTION. ENCRYPTION. LARGE FILES.

Oracle Data Cloud ( ODC ) Inbound Security Policies

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Single Sign-On. Introduction

simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

Table of Contents. Why Get Secure Messaging? Secure Messaging Business Advantages

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

GLBA. The Gramm-Leach-Bliley Act

The Identity-Based Encryption Advantage

Intelligent Solutions for the most Rigorous IT Security Requirements

Life After Webmail Reference Guide

Business Advantages. In this age of heightened awareness of information security issues...

CIPHERPOST PRO. A Profitable, Essential Value-Add for Office 365

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

incloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments

(electronic mail) is the exchange of computer-stored messages by telecommunication.

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

HIPAA Faxing Checklist

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4

What Dropbox Can t Do For Your Business

Basic rules for protecting remote maintenance accesses

IronPort C100 for Small and Medium Businesses

eid Applications Cross Border Authentication

KNX Secure. KNX Position Paper on Data Security and Privacy

PRODUCT OVERVIEW. SecurePIM. Components

CeBIT Preview January Make the cloud a safer place

Secure Messaging Large File Sharing

Cirius Secure Messaging Single Sign-On

CipherPost Pro. Secure communications simplified. Feature Sheet

HIPAA Compliance & Privacy What You Need to Know Now

Hosted Exchange 2013

Virtru Microsoft Protection

Secure Communications on VoIP Networks

FileDirector. Decreased costs, increased efficiency and secure access to your business documents. The New FileDirector Version 2.

GDPR: The Day After. Pierre-Luc REFALO

Strong Security Elements for IoT Manufacturing

Google Apps Premier Edition

Cirius Secure Messaging Enterprise Dedicated Cloud

Compliance in 5 Steps

Encrypted containers for secure file transport

DeliverySlip for Business Buyers

Verizon Software Defined Perimeter (SDP).

Secure communications simplified

HIPAA AND SECURITY. For Healthcare Organizations

Secure Client & Third Party FAQs

Why is Office 365 the right choice?

Single Sign-On. Introduction. Feature Sheet

The rapid expansion of usage over the last fifty years can be seen as one of the major technical, scientific and sociological evolutions of

HID Mobile Access. Simple. Secure. Smart.

Communication. Identity

Connecting to Mimecast

Security Using Digital Signatures & Encryption

Intelligent Solutions for the Highest IT Security Requirements

CipherPost Pro Enterprise Dedicated Cloud

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

UNCLASSIFIED. Mimecast UK Archiving Service Description

Authentication Technology for a Smart eid Infrastructure.

Certificate Enrollment for the Atlas Platform

All-in-one coverage for your business

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Choosing the Right Solution for Strategic Deployment of Encryption

E-Share: Secure Large File Sharing

Secure Messaging is far more than traditional encryption.

Network Security and Cryptography. December Sample Exam Marking Scheme

Office 365 Integration Guide Software Version 6.7

Cloud Security: Constant Innovation

Single Secure Credential to Access Facilities and IT Resources

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Next Level Remote Access

Microsoft Exchange Online

Status: February IT Security Directive External Service Providers

for businesses with more than 25 seats

Sherpa Archive Attender. Product Information Guide Version 3.5

Secure Services 2018

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

Transcription:

White paper End-to-End Email Encryption for Everybody? Why private individuals and corporations need different solutions

White paper End-to-End Email Encryption for Everybody? Why private individuals and corporations need different solutions Ever since Edward Snowden s unveiling of NSA activities including PRISM and Tempora, email encryption has risen in importance. In various media reports, end-toend encryption has been propagated as an ideal one size fits all solution for email security. Despite this, end-to-end email encryption requirements should be considered depending on the intended use case. Endto-end encryption implies comprehensive encryption from the sending to the receiving devices. At no point will messages be stored or sent in plain format, not even for fractions of a second on the provider site. Only the sender and the recipient have access to the keys necessary for en- and decryption of a message. Regulations for email usage Just as in many other areas, a solution which makes sense for individuals may only be of limited use for corporations. This similarly applies to email encryption. The key driving forces, coupled with legal requirements for documentation and privacy protection, are very different in the private and corporate sectors. Data loss prevention, along with central spam and virus checking, do not generally play a central role for the private user. On home applications, spam and virus checking is performed locally on the machine before any encryption respectively after any decryption takes place. Furthermore, the scalability of encryption key management is irrelevant for the private user, whilst being of prime importance in the corporate environment where manual key management cannot be implemented efficiently with large numbers of employees and communication partners. Encryption standards In private email communication, free encryption with has become increasingly popular. In corporate environments, using X.509 certificates from certificate authorities as public keys has established itself and is preferred over PGP encryption. The two standards and PGP are not compatible. Private individuals therefore use one approach and require their communication counterparts to use the same standard as they do. When emails are encrypted on the client and no proprietary suppliers are used there is nothing but endto-end encryption. Emails can be sent and received without having to worry about the confidentiality of the messages. Email encryption for private users is always end-to-end with a key or certificate. Provider Mailserver = Encrypted emails Internet 1 / 4

SecureMail Gateway is compatible with all standards In many cases, companies use secure email gateways that can handle both X.509 certificates as well as keys for encryption. Sometimes, these devices even incorporate alternative approaches such as password based encryption. This can be quite useful in confidential ad hoc communication when the communication partner holds neither X.509 certificates nor Open- PGP keys. During password based encryption, messages are encapsulated into a PDF or HTML container and sent as an attachment, or accessed via a web-based inbox secured with HTTPS. De-Mail connectors, VPN or TLS further enlarge the functional scope of some gateways. Accordingly, companies can communicate immediately and confidentially with any recipient. In most cases, companies do not use endto-end encryption. A secure email gateway is the central interface to the Internet, and is responsible for the encryption and decryption of in- and outgoing messages. Inside the company network though, emails are transported in plain state. This is a safe and established method for protection against government and economic espionage. The need for end-to-end encryption in corporate environments is based upon a different set of requirements than for individuals who are only able to use end-toend encryption. End-to-End: Motivation and challenges for companies End-to-end encryption for companies is becoming increasingly interesting as more and more smartphones and notebooks are used for business communication. Even company internal emails are sent in plain text over mobile and public WLAN networks. Another security aspect is the unencrypted storage of messages on company email servers. Internal communication channels and email storage have to be encrypted to ensure full confidentiality and prevent administrators from reading the messages. The implementation of end-toend encryption in a corporate environment has to consider a variety of problems: Which encryption standard should be used, considering that the standards are not compatible with each other while the goal is nonetheless confidential and immediate communication with everybody? How is encryption conducted for those recipients without certificates? How to decrypt incoming encrypted emails locally on all the company s end user devices? How do data loss prevention systems access the messages? How to conduct a virus scan when the message is encrypted? How to implement central key management for the internal keys and those of external communication partners? What happens when employees leave or in cases of absence, when only the employee is able to access his messages? These implications need a clever solution: State of the art end-to-end encryption with flexible re-encryption on the gateway Modern secure email gateways with the appropriate extensions combine internal and external email encryption. Emails are transmitted in an encrypted state not only over the Internet but also within the internal company network. To achieve this, an encapsulated internal PKI is created which implements an encryption immediately on the client. The X.509 certificates issued specifically for this purpose never leave the company. Outgoing emails are encrypted on the client with the gateway certificate email clients support directly, whereas several easily installable Apps are available for mobile devices. The secure email gateway decrypts the outgoing email and searches for the recipient s certificate. Depending on the external communication partner s certificate, a re-encryption into,, CryptoPDF, De-Mail, TLS, etc. is performed. 2 / 4

Business solution for email encryption with everyone = encrypted emails Mailserver Content Filter, DLP, Archive Z1 SecureMail Gateway + Z1 SecureMail End2End Internal infrastructure State of the Art email encryption incl. end-to-end components internally, flexible de-/encryption externally PKI, Password e.g. CryptoPDF, HTTPS-Webmailer Secure Channel TLS, VPN, De-Mail,... Internet In the same way, every encrypted incoming message will be delivered to the internal end user as an encrypted email. During re-encryption, anti-virus, anti-spam, DLP or archiving systems can access the message. For smaller numbers of recipients, secure mail gateways can be combined with a real end-to-end encryption solution, where the advantages of such a solution outweigh the disadvantages. The central port of call for anyone wishing to encrypt their emails with X.509 certificates or keys is Z1 Global Trust- Point (www.globaltrustpoint.com) where everyone can publish their own keys. Foreign keys can not only be searched for and retrieved, but also validated. Even the most secure encryption algorithm is useless if no one checks to see if the keys are genuine and valid. By combining Z1 SecureMail End2End with Z1 SecureMail Gateway, Zertificon distinguishes between Organizational End2End with the advantages of flexible re-encryption by the Gateway and Personal End2End which is analogous to private end-to-end encryption. In the post-snowden era, the much spoken about end-to-end encryption has to be regarded differently in private and company environments. Solutions exist for both environments and of course companies can encrypt their communications with private individuals. 3 / 4

Zertificon is a leading software manufacturer for IT security located in Berlin, Germany. An independent, founder-led company, Zertificon currently has more than 50 employees in its in-house development, sales and support departments. The award winning Z1 SecureMail Gateway has established Zertificon as a pioneer in the market for server-based email encryption for more than ten years. Through ground-breaking developments, Zertificon remains one of today s driving forces in email encryption solutions. IT Security made in Berlin The focus is on delivering user friendly and economical turn-key solutions for secure email and data exchange. The popular Z1 SecureMail Gateway and Z1 CertServer for email encryption, digital signing and certificate management are complemented by Zertificon s Z1 SecureHub for secure web-based exchange of data files in any size and format. The latest innovation from Zertificon Z1 SecureMail End2End provides state of the art end-to-end email encryption for organizations when combined with Z1 SecureMail Gateway. The organizational end-to-end mode allows immediate end-to-end encryption all that is required is a recipient email address. Clients are able to connect seamlessly using the Z1 MyCrypt add-in for MS-Outlook and Lotus Notes or mobile app for ios & Android. Z1 MyCrypt Mail supports end-to-end encryption alongside security features for server-based encryption whilst Z1 MyCrypt BigAttach integrates the web-based Z1 SecureHub into mail clients. Z1 MyCrypt integrate closely with all Z1 Server products. These new developments reliably meet the unique security demands of increased mobile communication via smart phones, tablets etc. in corporate environments. For a simple, efficient and smooth operation of Z1 products, Zertificon offers its Z1 Appliances as hardware or virtualized optimized platforms for a full integration into existing IT infrastructures. Additionally, Zertificon s renowned support service offers rapid and personalized help for all product-related questions. Accordingly, Zertificon enables companies and institutions of all branches and sizes to easily fulfill the highest security and compliance demands. Berlin, Germany Phone: +49 (0)30 5900300-0 Email: sales@zertificon.com www.globaltrustpoint.com 4 / 4