SlideShare a Scribd company logo
The IBM Lotus Protector Security Platform:
Protector for Mail Encryption


Arthur Fontaine | Program Director, IBM Lotus Protector
What does it do?
●   It extends Notes encryption to the Internet
●   It secures e-mail using the most seamless
    encryption available for a given recipient
●   It provides options to recipient for preferred method
    of communication
●   It ensures content in transit is not intercepted or
    modified
●   It saves money on couriers, certified mail, overnight
    delivery, faxes, etc.
                     2
Notes/Domino   World class technology
 integration




               Deployment Flexibility
                   Per-User Software License

                   Gateway

                Client          Physical or Virtual Appliance
How does it work?
                                                   Protector
                            Protector               for Mail
                             for Mail              Encryption
                            Security*               Gateway


                                                                         INTERNET

                                             ●   Enterprise Key Server
                        ●   Content Filter   ●   Encryption Policy
                        ●   Policy Server
                                                 Server
                                             ●   Webmail UI
                                             ●   Satellite Server



 Protector    ●   Notes Integration
  for Mail    ●   Client Keyring
 Encryption   ●   Encryption Policy
                  Client
                                                                *Optional
   Client*
How does it work?



                    Domino




   Notes                             Protector
                                      for Mail
                                     Encryption




                             Notes
Questions?




 www.ibm.com/lotus/protector
Legal Disclaimer
© IBM Corporation 2010. All Rights Reserved.
The information contained in this publication is provided for informational purposes only. While efforts were made to verify
the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any
kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are
subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or
otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall
have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms
and conditions of the applicable license agreement governing the use of IBM software.
References in this presentation to IBM products, programs, or services do not imply that they will be available in all
countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at
any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment
to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the
effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other
results.
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The
actual throughput or performance that any user will experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve
results similar to those stated here.
All customer examples described are presented as illustrations of how those customers have used IBM products and the
results they may have achieved. Actual environmental costs and performance characteristics may vary by customer.
IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, and Lotusphere are trademarks of International Business Machines
Corporation in the United States, other countries, or both.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.

All references to Renovations refer to a fictitious company and are used for illustration purposes only.


                                            7

More Related Content

PDF
Look Mum, No Passwords!
PDF
WebRTC Opens the Floodgates
PDF
Ibm lotus protector for mail security open micsession
PDF
Aus lug lotus protector
PPT
IBM Lotus Notes & Domino: The Road Ahead (2008)
ODP
Email Security Appliance from IBM
PPT
apsec SEPPmail Email Security Gateway
PPTX
LUG 2009 - Lotus Domino 8.5.1 Administration (english)
Look Mum, No Passwords!
WebRTC Opens the Floodgates
Ibm lotus protector for mail security open micsession
Aus lug lotus protector
IBM Lotus Notes & Domino: The Road Ahead (2008)
Email Security Appliance from IBM
apsec SEPPmail Email Security Gateway
LUG 2009 - Lotus Domino 8.5.1 Administration (english)

Similar to Lotus protector for mail encryption 2.1 launch (20)

PPTX
How to secure your emails for sensitive docs
PDF
Powerful email protection
PDF
Secure and Private Email 2017
PPT
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
PPTX
Secure Email Communications from Symantec
PDF
Symantec Deepens Encryption Offerings
PDF
Messaging Gateway
PDF
Open mic on_ibm lotus protector for mail security_23_april2015
PPTX
Defigo Security Solutions
PPTX
Defigo Security Solutions
PDF
Implementing Application Security
PDF
Tip from IBM Connect 2014: Mobile security roundup
PDF
Symantec Brightmail Gateway 9
PDF
Ultima - Mobile Data Security
PPT
PPT
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
PDF
IBM Messaging and Collaboration Roadmap - Notes and Domino update - December ...
PDF
Esa configuration guide (1)
PPTX
On prem vs cloud exchange
PPTX
How to secure your emails for sensitive docs
Powerful email protection
Secure and Private Email 2017
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Secure Email Communications from Symantec
Symantec Deepens Encryption Offerings
Messaging Gateway
Open mic on_ibm lotus protector for mail security_23_april2015
Defigo Security Solutions
Defigo Security Solutions
Implementing Application Security
Tip from IBM Connect 2014: Mobile security roundup
Symantec Brightmail Gateway 9
Ultima - Mobile Data Security
Microsoft Forefront - Secure Messaging & Online Protection for Exchange Over...
IBM Messaging and Collaboration Roadmap - Notes and Domino update - December ...
Esa configuration guide (1)
On prem vs cloud exchange
Ad

Lotus protector for mail encryption 2.1 launch

  • 1. The IBM Lotus Protector Security Platform: Protector for Mail Encryption Arthur Fontaine | Program Director, IBM Lotus Protector
  • 2. What does it do? ● It extends Notes encryption to the Internet ● It secures e-mail using the most seamless encryption available for a given recipient ● It provides options to recipient for preferred method of communication ● It ensures content in transit is not intercepted or modified ● It saves money on couriers, certified mail, overnight delivery, faxes, etc. 2
  • 3. Notes/Domino World class technology integration Deployment Flexibility Per-User Software License Gateway Client Physical or Virtual Appliance
  • 4. How does it work? Protector Protector for Mail for Mail Encryption Security* Gateway INTERNET ● Enterprise Key Server ● Content Filter ● Encryption Policy ● Policy Server Server ● Webmail UI ● Satellite Server Protector ● Notes Integration for Mail ● Client Keyring Encryption ● Encryption Policy Client *Optional Client*
  • 5. How does it work? Domino Notes Protector for Mail Encryption Notes
  • 7. Legal Disclaimer © IBM Corporation 2010. All Rights Reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. All references to Renovations refer to a fictitious company and are used for illustration purposes only. 7