Title: The Ultimate email encryption
1Title goes here
The Ultimate email encryption!
2Does your company send Financial
information Bank details Business
plans Strategy plans Development plans
Blueprints Information about customers
by email?
3Did you know that emails are like
postcards?Anyone can read your emails!
4Organizations today are spread over many
activities and places
5Do you have a security solution that protects
your sensitive email communication?
Industrial spies, competitors and partners
Employees and ex- employees
Hackers
Emails sent contain sensitive info
6With a security solution, the organization is
protected from both external and internal threats
Industrial spies, competitors and partners
Employees and ex- employees
Hackers
Emails sent and received are protected
7- What are the threats?
-
- Mail intrusion
- Hackers
- Information Theft
- Forgery and Spoofing
- Eavesdropping
8Devastating losses for organizations
9Employees are a big issue Approximately half
(50.6) of respondents said their organization
had disciplined an employee for violating email
policies in the past 12 months. More than a
third of companies (35.2) report that they
investigated a suspected leak of confidential or
proprietary information via email in the past 12
months (Outbound Email Security and Content
Compliance in Todays Enterprise, 2005,
Proofpoint)
10E-crime increase
Forty-three percent (43) of respondents report
an increase in e-crimes and intrusions versus the
previous year and 70 report at least one e-crime
or intrusion was committed against their
organization.The 2004 E-Crime Watch survey
conducted among security and law enforcement
executives by CSOmagazine in cooperation with
the United States Secret Service and the Carnegie
Mellon University
The Global State of Information Security 2005 by
PricewaterhouseCoopers and CIO Magazine
11It is very important that information sent by
email arrive to the intended recipient without
being changed or leaked. The receivers should be
able to receive secured emails no matter where
their computer is located.
Direct secure communication
12Secured eMail is a good investment
E-crimes are no longer done by hacker kids
alone. Professional criminals are taking
advantage of companies lack of IT security and
awareness. Not securing the email communication
is like leaving the door open or sending a letter
without closing the envelop . Secured eMail
protects the organizations sensitive information
point to point, protecting it from both internal
and external threats.
13- Are you compliant to government regulations?
- HIPAA
- The Gramm-leach-Bliley act
- Sarbanes-Oxley Act
- Etc.
14Secured eMail email encryption
- Easy to use for end users and administrators
- 100 integration in your current email solution
- High Security with revolutionary technology
- An investment that protects the organisation
against current and future threats - Send to anyone capability, no cost for the
recipient
15New and revolutionary technology
- Secured eMail encrypts the email with FIPS
certified AES256 - Secured eMail uses revolutionary technology,
System SKG to handle the keys. The system
generates unique keys for each email sent. - Secured eMail have exclusive rights for System
SKG - Secured eMail DOESNT use PKI
16State-of-the-art technology Secured eMail uses
a combination of AES (Advanced Encryption
Standard), System SKG and SHA-1 algorithms to
secure email communication. These three factors
together ensure that the email will be 100
secure from sender to receiver. The System SKG
generates 160-bit symmetric and dynamic one-time
keys with the assistance of the Sha-1 algorithm.
Together with AES the size of the keys is
extended to 256 bit. The mail is then encrypted
with the well-known AES256 algorithm, the result
of this is that the message only can be read by
authorized parties.Secured eMail creates safe
channels between two email addresses. This is
achieved through a sender who creates a seed that
he/she communicates with the receiver. This seed
is later used to generate/create the unique keys
that will be used to encrypt the email. The
competitive advantage of using the software is
that the email is sent directly C2C, computer to
computer instead of Computer-to-Server or
server-to-server. Most other secure
communications applications use a dedicated
security server, a weak spot in your security
system, as it is not entirely controlled by you.
With Secured eMail your information is encrypted,
from your computer to that of the recipients and
this gives you complete control and trust of your
network.
17Secured eMail Enterprise
- A server solution that manages your entire
Secured eMail solution. - Simple to install and use.
- Contains a server software, Admin tool and
Secured eMail clients for the users.
18Awards Recognitions
19 Admin. Tool Server (SQL) - Client
20The client - Secured eMail from a user
perspective, Send Secured
211.Create a new email 2. Add attachments 3. Press
Send Secured
22Encryption
Email encrypted!
23Receive secured
- Emails sent inside the network of the company
are opened and unencrypted when the user double
clicks on the email. - Emails sent to partners and customers have full
instructions in 5 different languages. The
receiver downloads a free Reader. Installation
takes 30 seconds. If the receiver has Outlook
he/she can reply for free. User friendly
instructions for first time user.
24Receive secured - Outlook
25Receive secured Web Browser
26Secured eMail Admin tool
- Easily manage 10 000 Secured eMail users
- Easily manage communication groups that will send
secured - Easily manage policies down to user level.
- Easily manage licenses
- Easily manage backup of secured emails
27Several logins in the Admin tool
- Add, remove and edit users of the admin tool
28Server logs
- See logs of all actions done in the Enterprise
solution down to user level.
29Management of users
- Import users from the Active directory
- Add external users
- Update users from active directory
- Add, remove and edit users
- Create user groups
30Intelligent license handling
- Easily manage which users that will have
external licenses (be able to send secured emails
externally) - Easily deactivate and activate licenses.
- Manage requested external licenses from users
31Intelligent license handling
- It is possible to view how many licenses that
are allowed for a specific server.
32Easy end user education
- On each client a Getting Started Centre will be
implemented. - The Administrator can send out an email,
instructing end users to read certain sections in
the Getting Started Centre. - There is also a web based Getting Started Centre
at www.securedemail.com/gsc
33Secured eMail Support
- Secured eMail is a product that demands minimal
or no support - Free support by email. Reply within the next
business day. Support by phone. - Advanced problems are taken care of by Secured
eMail technical support that have access to
remote conference and educational centre.
34Secured eMail Enterprise easy for the end user
- Extremely easy for users
- No new software to learn
- No new words to learn
- All they have to learn is press the send secured
button
35Secured eMail Enterprise perfect for the
organization
- Simple administration saves costs
- The users will use it
- Easy to communicate secure to external partners
- New revolutionary technology
- 100 integration in current email solution
36Why is Secured eMail better than its competitors?
- More secure solution with System SKG
- Easy to use for end user (not technical)
- 100 integrated in Microsoft Outlook
- No change needed for how the email system works
- Secured eMail does not use PKI
- Easy to use for Administrator
- Easy implementation
- Price worthy
- Fast support