SlideShare a Scribd company logo
Why You Shouldn’t Email Your
   Sensitive Documents
           David Strom
        david@strom.com
   TechNet Mid America July 2012
Email docs to yourself
Email is inherently insecure…
Obstacles to Email Encryption
           Adoption Today
• Unencrypted emails are too easy to send
• IT admins think encryption is too expensive or
  cumbersome or complex
• Compliance regsshould drive more email
  encryption usage (but don’t…)
• The mobile encryption experience hasn’t been
  so wonderful


                       4
Investors’ Email Compromises Have
           Consequences!




                5
How to secure your emails for sensitive docs
How to secure your emails for sensitive docs
Secure email alternatives
•   Cloud-based storage
•   Secure document delivery services
•   Data loss prevention products
•   Full encryption choices
File sending
services
How to secure your emails for sensitive docs
How to secure your emails for sensitive docs
How to secure your emails for sensitive docs
How to secure your emails for sensitive docs
YouSendIt Privacy Policy
Certain information may become accessible,
  such as the text and subject of messages you
  have sent, the name and content of the User
  Files you have sent, the date and time
  messages were sent, and the email addresses
  of the recipients.
Responses to MegaUpload shutdown
Secure document services
How to secure your emails for sensitive docs
Secure document issues
• Do you need secure intra- or inter-enterprise
  collaboration?
• Can you recall sent messages?
• What happens when someone leaves your
  company?
• How does the service affect users’ existing
  email experience?
• Can you authenticate recipients and thwart
  malware such as key-loggers?
Data loss prevention
•   Global Velocity's GV-2010 security appliance
•   BlueCoat Networks DLP appliance
•   Sendmail'sSentrion email server
•   McAfee Host DLP
•   Symantec/Vontu DLP v10
•   Safend Protector
•   Trend Micro DLP
How to secure your emails for sensitive docs
DLP Drawbacks
• You are tracking rather than encrypting
  messages
• Once a message leaves your premises, you
  can’t do anything
  about it
• Can be expensive
Full encryption choices
•   Voltage SecureMail
•   PGP Universal Server
•   Sophos Email Appliance
•   Cisco IronPort
•   Proofpoint Protection Server
•   Mimecast's Unified Email Messaging
•   Echoworx Encrypted Mail
Common product features
• Crypto key management
• Auto encrypt sensitive info as part of their
  policies
• Lots more rules processing
• Outlook plug-ins
How to secure your emails for sensitive docs
Encryption Landscape
   Vendor           Approach               Key/Certificate          Mobile capability
                                            Management
Cisco IronPort   Symmetric key per           CRES (cloud)              Web-based
                    message                 Or on premise
 Proofpoint      Symmetric key per   PP Key service or on premise   Web-based; read
                    message                                              only
Symantec/PGP            PKI          PGP Directory or on premise    Web-based; read
                                                                         only
   Entrust              PKI           Entrust PKI or on premise        Web-based

     Zix                PKI                 Zix Directory              Web-based


   Voltage        Identity-based            Cloud-based                Native app
                    encryption

  Echoworx              PKI                 Echoworx PKI               Native app
Voltage’s
Secure email
mobile client
Questions?
           David Strom
     david@strom.com
          314 277 7832
     @dstrom (Twitter)
http://strominator.com

More Related Content

PDF
Alfresco DevCon 2019 - Alfresco Identity Services in Action
PDF
Network Security
PPTX
Let's get started with passwordless authentication using windows hello in you...
PPT
Inside The Drakkar
PPTX
How India’s Largest Eyewear Retailer Prepares to Scale their Ecommerce Platfo...
PPTX
itsMERocks Pitch Deck
PDF
Pimping the ForgeRock Identity Platform for a Billion Users
PPTX
Beyond Bearer: Token Binding as the Foundation for a More Secure Web
Alfresco DevCon 2019 - Alfresco Identity Services in Action
Network Security
Let's get started with passwordless authentication using windows hello in you...
Inside The Drakkar
How India’s Largest Eyewear Retailer Prepares to Scale their Ecommerce Platfo...
itsMERocks Pitch Deck
Pimping the ForgeRock Identity Platform for a Billion Users
Beyond Bearer: Token Binding as the Foundation for a More Secure Web

What's hot (12)

PPTX
Sitetagger Engage
PDF
Token, token... From SAML to OIDC
PPTX
Defigo Security Solutions
PPT
PPTX
Digital signature
PPTX
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
PDF
Presented AITC Blockchain Framework @ NPC 17
PDF
Skip the Security Slow Lane with VMware Cloud on AWS
PPTX
Architect secure cloud services.
PPT
Cisco storageconnectfordummies
PDF
Hardening Microservices Security: Building a Layered Defense Strategy
PDF
ORCON in 10 Minutes
Sitetagger Engage
Token, token... From SAML to OIDC
Defigo Security Solutions
Digital signature
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Presented AITC Blockchain Framework @ NPC 17
Skip the Security Slow Lane with VMware Cloud on AWS
Architect secure cloud services.
Cisco storageconnectfordummies
Hardening Microservices Security: Building a Layered Defense Strategy
ORCON in 10 Minutes
Ad

Similar to How to secure your emails for sensitive docs (20)

PPT
Pki & personal digital certificates, securing sensitive electronic communicat...
PPT
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
PPT
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
PPT
Securing email and electronic documents with digital certificates, by nichola...
PPT
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
PPT
Pki & personal digital certificates, the key to securing sensitive electronic...
PPTX
Secure Your AWS Cloud Data by Porticor
PDF
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
PPT
Pki the key to securing sensitive communications
PDF
Cloud Security & Cloud Encryption Explained
PDF
Using Hard Disk Encryption and Novell SecureLogin
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
PDF
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
PDF
Gtb Dlp Suite Presentation
PPT
Topsec Technology Cloud Arena Final
PDF
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
PPTX
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing email and electronic documents with digital certificates, by nichola...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & personal digital certificates, the key to securing sensitive electronic...
Secure Your AWS Cloud Data by Porticor
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
Pki the key to securing sensitive communications
Cloud Security & Cloud Encryption Explained
Using Hard Disk Encryption and Novell SecureLogin
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Gtb Dlp Suite Presentation
Topsec Technology Cloud Arena Final
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Ad

More from David Strom (20)

PPTX
Spark Twitter fails Mar2023
PPTX
Getting Your First Cybersecurity Job
PPTX
Understanding passwordless technologies
PPTX
What endpoint protection solutions are available on the market today?
PPTX
Fears and fulfillment with IT security
PPTX
Protecting your digital and online privacy
PPTX
AI and cyber security: new directions, old fears
PPTX
The legalities of hacking back
PPTX
How to market your book in today's social media world
PPTX
​Understanding the Internet of Things
PPTX
How to make your mobile phone safe from hackers
PPTX
Implications and response to large security breaches
PPT
Using social networks to find your next job (2017)
PPTX
Security v. Privacy: the great debate
PPTX
Using OpenStack to Control VM Chaos
PPTX
Notable Twitter fails
PPTX
How to make the move towards hybrid cloud computing
PPTX
Listen to Your Customers: How IT Can Provide Better Support
PPTX
Network security practice: then and now
PPTX
Biggest startup mistakes
Spark Twitter fails Mar2023
Getting Your First Cybersecurity Job
Understanding passwordless technologies
What endpoint protection solutions are available on the market today?
Fears and fulfillment with IT security
Protecting your digital and online privacy
AI and cyber security: new directions, old fears
The legalities of hacking back
How to market your book in today's social media world
​Understanding the Internet of Things
How to make your mobile phone safe from hackers
Implications and response to large security breaches
Using social networks to find your next job (2017)
Security v. Privacy: the great debate
Using OpenStack to Control VM Chaos
Notable Twitter fails
How to make the move towards hybrid cloud computing
Listen to Your Customers: How IT Can Provide Better Support
Network security practice: then and now
Biggest startup mistakes

Recently uploaded (20)

PDF
Why Everyone Misses These 7 Extraordinary Cities — And Why You Should Visit I...
PPTX
Multimedia - Dinagsa Festival, Cadiz City
PDF
Memorable Outdoor Adventures with Premium River Rafting & Guided Tours
PPTX
Unlocking Travel Insights with Cruise Critic Dataset for Analysis.pptx
PPTX
8 - Airport Statistical Forms icon related
PPTX
Your Guide to the BBC Proms 2025: What to Expect
PDF
Villa Oriente Porto Rotondo - Luxury Villlas Sardinia.pdf
PDF
Discovering the Best Tour Itinerary for the Indian Buddhist Circuit.
PDF
Step Into Lima’s Magic Explore Peru’s Historic Capital From Anywhere.pdf
PPTX
Telangana Culture and tradtion musicals .pptx
PDF
Which Month is Best for Kailash Mansarovar Yatra.pdf
PDF
Understanding Travel Insurance: Your Safety Net While Exploring the World
PPSX
Detian Transnational Waterfall, Chongzuo, Guangxi, CN. (中國 廣西崇左市 德天跨國瀑布).ppsx
PPTX
Enjoy Peaceful Travel Even in Busy Places.pptx
PDF
Hyderabad to Pune Flight – Complete Travel Guide.pdf
PPTX
Exploring Chandigarh : A Perfect Travel Guide and Its Surroundings
PDF
How Expensive is Mansarovar Yatra cost from Mumbai.pdf
PDF
Travel Adventures: Explore the Gem Around The World.
PDF
Golden Triangle Tour A Complete Travel Guide.pdf
PPTX
Airline API Integration | Flight API Supplier
Why Everyone Misses These 7 Extraordinary Cities — And Why You Should Visit I...
Multimedia - Dinagsa Festival, Cadiz City
Memorable Outdoor Adventures with Premium River Rafting & Guided Tours
Unlocking Travel Insights with Cruise Critic Dataset for Analysis.pptx
8 - Airport Statistical Forms icon related
Your Guide to the BBC Proms 2025: What to Expect
Villa Oriente Porto Rotondo - Luxury Villlas Sardinia.pdf
Discovering the Best Tour Itinerary for the Indian Buddhist Circuit.
Step Into Lima’s Magic Explore Peru’s Historic Capital From Anywhere.pdf
Telangana Culture and tradtion musicals .pptx
Which Month is Best for Kailash Mansarovar Yatra.pdf
Understanding Travel Insurance: Your Safety Net While Exploring the World
Detian Transnational Waterfall, Chongzuo, Guangxi, CN. (中國 廣西崇左市 德天跨國瀑布).ppsx
Enjoy Peaceful Travel Even in Busy Places.pptx
Hyderabad to Pune Flight – Complete Travel Guide.pdf
Exploring Chandigarh : A Perfect Travel Guide and Its Surroundings
How Expensive is Mansarovar Yatra cost from Mumbai.pdf
Travel Adventures: Explore the Gem Around The World.
Golden Triangle Tour A Complete Travel Guide.pdf
Airline API Integration | Flight API Supplier

How to secure your emails for sensitive docs

  • 1. Why You Shouldn’t Email Your Sensitive Documents David Strom david@strom.com TechNet Mid America July 2012
  • 2. Email docs to yourself
  • 3. Email is inherently insecure…
  • 4. Obstacles to Email Encryption Adoption Today • Unencrypted emails are too easy to send • IT admins think encryption is too expensive or cumbersome or complex • Compliance regsshould drive more email encryption usage (but don’t…) • The mobile encryption experience hasn’t been so wonderful 4
  • 5. Investors’ Email Compromises Have Consequences! 5
  • 8. Secure email alternatives • Cloud-based storage • Secure document delivery services • Data loss prevention products • Full encryption choices
  • 14. YouSendIt Privacy Policy Certain information may become accessible, such as the text and subject of messages you have sent, the name and content of the User Files you have sent, the date and time messages were sent, and the email addresses of the recipients.
  • 18. Secure document issues • Do you need secure intra- or inter-enterprise collaboration? • Can you recall sent messages? • What happens when someone leaves your company? • How does the service affect users’ existing email experience? • Can you authenticate recipients and thwart malware such as key-loggers?
  • 19. Data loss prevention • Global Velocity's GV-2010 security appliance • BlueCoat Networks DLP appliance • Sendmail'sSentrion email server • McAfee Host DLP • Symantec/Vontu DLP v10 • Safend Protector • Trend Micro DLP
  • 21. DLP Drawbacks • You are tracking rather than encrypting messages • Once a message leaves your premises, you can’t do anything about it • Can be expensive
  • 22. Full encryption choices • Voltage SecureMail • PGP Universal Server • Sophos Email Appliance • Cisco IronPort • Proofpoint Protection Server • Mimecast's Unified Email Messaging • Echoworx Encrypted Mail
  • 23. Common product features • Crypto key management • Auto encrypt sensitive info as part of their policies • Lots more rules processing • Outlook plug-ins
  • 25. Encryption Landscape Vendor Approach Key/Certificate Mobile capability Management Cisco IronPort Symmetric key per CRES (cloud) Web-based message Or on premise Proofpoint Symmetric key per PP Key service or on premise Web-based; read message only Symantec/PGP PKI PGP Directory or on premise Web-based; read only Entrust PKI Entrust PKI or on premise Web-based Zix PKI Zix Directory Web-based Voltage Identity-based Cloud-based Native app encryption Echoworx PKI Echoworx PKI Native app
  • 27. Questions? David Strom david@strom.com 314 277 7832 @dstrom (Twitter) http://strominator.com

Editor's Notes

  • #2: v2
  • #6: http://www.finra.org/Investors/ProtectYourself/InvestorAlerts/FraudsAndScams/P125460
  • #7: From the Wall Street Journal, but there were lots of other reports. The Chamber had at least six weeks worth of email data containing sensitive information stolen in a breach that was widely reported
  • #8: This expert from the Brookings Institute is the extreme case. When he travels in China, he disables Bluetooth and Wi-Fi, never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery, for fear his microphone could be turned on remotely.
  • #10: There are a whole series of cloud-based document sending services such as Google Docs, Dropbox, Box.net, and others that can store documents in the cloud.
  • #13: These services all share one common weakness: you can’t manage them well from an enterprise perspective. Also, browser-based FT is limited to 2 GB or less, and many of these services have other hidden limitationsEven when IT is aware of their use, the services generally lack transaction logging, which makes document control problematic and impedes litigation preparedness.
  • #15: http://www.yousendit.com/aboutus/legal/privacy
  • #16: Law enforcement shut down one of these services, MegaUpload, and in the ensuing months other peer file sharing services have curtailed their activities.
  • #18: This is a sample screen from Docusign
  • #20: There are more than a dozen DLP vendors, and these products offer a wide range of protective features, and some even integrate with endpoint security products, proxy/caching servers, and network intrusion protection appliances. However, while DLP products are great at identifying security breaches after the fact but don't do much to help keep your confidential information contained within your enterprise. They are mostly used for compliance and other regulatory reasons.
  • #21: This is Global Velocity’s DLP product and you can tune it to block Facebook messages for example, but allow users to add items to their Wall as an example.
  • #23: These are various gateway appliances that operate inside your firewall, and automatically work in the background to encrypt and decrypt message traffic in conjunction with your mail servers. These are somewhat cumbersome but offer the following features
  • #25: This is Mimecast’s Outlook plug in, and as you can see, there isn’t much to set up with it.
  • #26: Not as easy to use as native email appsMany still employ symmetric keys Some can only read and not compose encrypted messagesThese all have a Web service that is hosted by the vendor on the public Internet and users connect via a browser to read and send messages. recipients don't have to download any special software when they get an encrypted message from you.