Protect Your Customers and Your Business with Secure Business Communications Jon Gatrell VP, Product Management 12.16.2009
Communication requirements growing Confidential communications requirements Complexity is growing Compliance is critical Business Risks and Realities
IT Realities Users have to collaborate Global Infrastructures Too many tools Limited Control
` Breaches happen everyday – 11.16.2009
FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to  responsibly conduct business .
Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and  virtual eavesdropping . Current industry  standards do not place emphasis on security ; information is transferred in  plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
Another take on email privacy… In personal email communications, there has always been, and always should be,  an expectation of privacy  between the sender and the intended recipients of a message,  enabling open communication  with friends, colleagues, family, and others….. Let's be clear: there are issues with email privacy , and most of these issues are common to all email providers. The main issue is that the contents of your messages are stored on mail servers for some period of time; there is always a danger that these messages can be obtained and  used for purposes that may harm you , such as possible misuse of your information…
Understanding the scale of data breaches 85% of businesses have had a data security breach 46% of businesses failed to implement encryption solutions even after suffering a data breach! Source: Ponemon Institute
The Impact to Businesses 74% report loss of customers.  59% faced potential litigation.  33% faced potential fines.  32% experienced a decline in share value
Source: Ponemon Institute, LLC  Number of Data Records Lost It’s just money….
It happens to the best of us…  Yale has experienced  600 recorded security incidents  in the previous 12 months (2008-2009), costing an estimated $200,000 to remediate
HIPAA Requires that companies prove that only the intended recipients received the information and that it was secure Safe Harbor Directive Protecting personal information and transfer GLBA Requires organizations ensure the security and confidentiality of customer records and information SOX Requires auditable business processes E-Invoicing Long term electronic retention and digital signatures Governmental Requirements
“ A member in public practice shall not disclose any confidential client information without the specific consent of the client.” It’s not just government, it’s also professional standards AICPA Code of Professional Conduct - Rule 301
Be concerned about all of these items Employee information Employee Performance Data Employee Disciplinary Data Staff Employment Data Department Business Data  Credit Card/Purchasing Cards Customer Information Procurement Vendor Information Quotes
252,474,509  people affected since 1/15/05
Best Practices to Avoid Exposure Use end-to-end encrypted communications Track all messages and confirmed who received it Manage user profiles, access and groups memberships
Know who received what messages and files
Historical and Real-Time Visibility into Messaging
Manage Users and their access
Proactively Manage groups and understand their activity
 
Productivity & Privacy
Financial information Board of directors or just internally
Customer records and files No matter what size
Do you retain PHI? Security inside and outside required
Supporting your customers Confidential environment and operational data is exchanged
 
Access and Controls The right systems, the right platforms, the people and the right partners
The Benefits of an Easy to Use Secure Communications Improved Service Levels Quicker cycle times Improved compliance Corporate (Internal controls/audits, security, sustainability) Governmental (SOX, Basel II, HIPAA…) Security Enforcement Process level governance Content and session encryption Improved visibility and control Process status Exceptions Transactions and Trends
Easy to use Ability to deploy quickly Auditing, Security and Reporting Privacy for confidential communications Support large files Protect mobile content Your solution must…
THANKS! www.scribbos.com   www.stonebranch.com   managedfiletransfer.wordpress.com Secure Communications: Enterprise Automation: MFT Blog:

Understand Risk in Communications and Data Breach

  • 1.
    Protect Your Customersand Your Business with Secure Business Communications Jon Gatrell VP, Product Management 12.16.2009
  • 2.
    Communication requirements growingConfidential communications requirements Complexity is growing Compliance is critical Business Risks and Realities
  • 3.
    IT Realities Usershave to collaborate Global Infrastructures Too many tools Limited Control
  • 4.
    ` Breaches happeneveryday – 11.16.2009
  • 5.
    FTP alone isnot a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to responsibly conduct business .
  • 6.
    Because e-mail connectsthrough many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and virtual eavesdropping . Current industry standards do not place emphasis on security ; information is transferred in plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
  • 7.
    Another take onemail privacy… In personal email communications, there has always been, and always should be, an expectation of privacy between the sender and the intended recipients of a message, enabling open communication with friends, colleagues, family, and others….. Let's be clear: there are issues with email privacy , and most of these issues are common to all email providers. The main issue is that the contents of your messages are stored on mail servers for some period of time; there is always a danger that these messages can be obtained and used for purposes that may harm you , such as possible misuse of your information…
  • 8.
    Understanding the scaleof data breaches 85% of businesses have had a data security breach 46% of businesses failed to implement encryption solutions even after suffering a data breach! Source: Ponemon Institute
  • 10.
    The Impact toBusinesses 74% report loss of customers. 59% faced potential litigation. 33% faced potential fines. 32% experienced a decline in share value
  • 11.
    Source: Ponemon Institute,LLC Number of Data Records Lost It’s just money….
  • 12.
    It happens tothe best of us… Yale has experienced 600 recorded security incidents in the previous 12 months (2008-2009), costing an estimated $200,000 to remediate
  • 13.
    HIPAA Requires thatcompanies prove that only the intended recipients received the information and that it was secure Safe Harbor Directive Protecting personal information and transfer GLBA Requires organizations ensure the security and confidentiality of customer records and information SOX Requires auditable business processes E-Invoicing Long term electronic retention and digital signatures Governmental Requirements
  • 14.
    “ A memberin public practice shall not disclose any confidential client information without the specific consent of the client.” It’s not just government, it’s also professional standards AICPA Code of Professional Conduct - Rule 301
  • 15.
    Be concerned aboutall of these items Employee information Employee Performance Data Employee Disciplinary Data Staff Employment Data Department Business Data Credit Card/Purchasing Cards Customer Information Procurement Vendor Information Quotes
  • 16.
    252,474,509 peopleaffected since 1/15/05
  • 17.
    Best Practices toAvoid Exposure Use end-to-end encrypted communications Track all messages and confirmed who received it Manage user profiles, access and groups memberships
  • 20.
    Know who receivedwhat messages and files
  • 21.
    Historical and Real-TimeVisibility into Messaging
  • 22.
    Manage Users andtheir access
  • 23.
    Proactively Manage groupsand understand their activity
  • 24.
  • 25.
  • 26.
    Financial information Boardof directors or just internally
  • 27.
    Customer records andfiles No matter what size
  • 28.
    Do you retainPHI? Security inside and outside required
  • 29.
    Supporting your customersConfidential environment and operational data is exchanged
  • 30.
  • 31.
    Access and ControlsThe right systems, the right platforms, the people and the right partners
  • 32.
    The Benefits ofan Easy to Use Secure Communications Improved Service Levels Quicker cycle times Improved compliance Corporate (Internal controls/audits, security, sustainability) Governmental (SOX, Basel II, HIPAA…) Security Enforcement Process level governance Content and session encryption Improved visibility and control Process status Exceptions Transactions and Trends
  • 33.
    Easy to useAbility to deploy quickly Auditing, Security and Reporting Privacy for confidential communications Support large files Protect mobile content Your solution must…
  • 34.
    THANKS! www.scribbos.com www.stonebranch.com managedfiletransfer.wordpress.com Secure Communications: Enterprise Automation: MFT Blog:

Editor's Notes

  • #8 http://mail.google.com/mail/help/about_privacy.html
  • #9 95% of businesses suffering a data breach were required to notify data subjects whose information was lost or stolen.
  • #14 Federal regulations – Alex
  • #15 AICP Code of Professional Conduct
  • #16 HR sends sensitive data that should be secured, as should procurement information! Bank routing data and alike.
  • #28 HIPAA HITECH AARA
  • #30 Software help desks should communicate securely. Your customers may have PCI or PHI information in their databases you exchange for support purposes
  • #31 Lawyers, designers anyone should send confidential information securely
  • #35 Please feel free to ask questions, we will address them at the end. As business continues to move at a faster pace you use more and more tools to communicate with colleagues, business partners, and customers. Whether its email, mobile apps or FTP you send and receive confidnetional info at the blink of an eye. It may make you concerned if these methods of communication are secure. With recent data braaches in the headlines becoming increasly commen, there is a real business issue regarding infomation security. That‘s why we are hear today.