SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
The IBM Lotus Protector Security Platform:
Protector for Mail Encryption


Arthur Fontaine | Program Director, IBM Lotus Protector
What does it do?
●   It extends Notes encryption to the Internet
●   It secures e-mail using the most seamless
    encryption available for a given recipient
●   It provides options to recipient for preferred method
    of communication
●   It ensures content in transit is not intercepted or
    modified
●   It saves money on couriers, certified mail, overnight
    delivery, faxes, etc.
                     2
Notes/Domino   World class technology
 integration




               Deployment Flexibility
                   Per-User Software License

                   Gateway

                Client          Physical or Virtual Appliance
How does it work?
                                                   Protector
                            Protector               for Mail
                             for Mail              Encryption
                            Security*               Gateway


                                                                         INTERNET

                                             ●   Enterprise Key Server
                        ●   Content Filter   ●   Encryption Policy
                        ●   Policy Server
                                                 Server
                                             ●   Webmail UI
                                             ●   Satellite Server



 Protector    ●   Notes Integration
  for Mail    ●   Client Keyring
 Encryption   ●   Encryption Policy
                  Client
                                                                *Optional
   Client*
How does it work?



                    Domino




   Notes                             Protector
                                      for Mail
                                     Encryption




                             Notes
Questions?




 www.ibm.com/lotus/protector
Legal Disclaimer
© IBM Corporation 2010. All Rights Reserved.
The information contained in this publication is provided for informational purposes only. While efforts were made to verify
the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any
kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are
subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or
otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall
have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms
and conditions of the applicable license agreement governing the use of IBM software.
References in this presentation to IBM products, programs, or services do not imply that they will be available in all
countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at
any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment
to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the
effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other
results.
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The
actual throughput or performance that any user will experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve
results similar to those stated here.
All customer examples described are presented as illustrations of how those customers have used IBM products and the
results they may have achieved. Actual environmental costs and performance characteristics may vary by customer.
IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, and Lotusphere are trademarks of International Business Machines
Corporation in the United States, other countries, or both.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.

All references to Renovations refer to a fictitious company and are used for illustration purposes only.


                                            7

Contenu connexe

Similaire à Lotus protector for mail encryption 2.1 launch

z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content PreviewzOSCommserver
 
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...SocialBiz UserGroup
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower securityShiu-Fun Poon
 
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...Martin Leyrer
 
IBM Sterling Secure Proxy
IBM Sterling Secure ProxyIBM Sterling Secure Proxy
IBM Sterling Secure ProxyLightwell
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015Sreeni Pamidala
 
Open mic on what's new in domino 9 social edition
Open mic on what's new in domino 9 social editionOpen mic on what's new in domino 9 social edition
Open mic on what's new in domino 9 social editionsreeJk
 
BP102 Build Your Free Admin Toolkit
BP102 Build Your Free Admin ToolkitBP102 Build Your Free Admin Toolkit
BP102 Build Your Free Admin ToolkitChris Miller
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product familyxKinAnx
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 
Cellopoint Email UTM
Cellopoint Email UTMCellopoint Email UTM
Cellopoint Email UTMAllyssa Yang
 
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...We4IT Group
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and CloudCA API Management
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and CloudCA API Management
 

Similaire à Lotus protector for mail encryption 2.1 launch (20)

z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Preview
 
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM Smart...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower security
 
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
 
IBM Sterling Secure Proxy
IBM Sterling Secure ProxyIBM Sterling Secure Proxy
IBM Sterling Secure Proxy
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
#dd12 IBM Messaging and Collaboration Strategy Update
#dd12 IBM Messaging and Collaboration Strategy Update#dd12 IBM Messaging and Collaboration Strategy Update
#dd12 IBM Messaging and Collaboration Strategy Update
 
Open mic on what's new in domino 9 social edition
Open mic on what's new in domino 9 social editionOpen mic on what's new in domino 9 social edition
Open mic on what's new in domino 9 social edition
 
BP102 Build Your Free Admin Toolkit
BP102 Build Your Free Admin ToolkitBP102 Build Your Free Admin Toolkit
BP102 Build Your Free Admin Toolkit
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product family
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
Collaboration and social user experience
Collaboration and social user experienceCollaboration and social user experience
Collaboration and social user experience
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
Cellopoint Email UTM
Cellopoint Email UTMCellopoint Email UTM
Cellopoint Email UTM
 
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
 
FortiMail
FortiMailFortiMail
FortiMail
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
 
Managing API Security in SaaS and Cloud
Managing API Security in SaaS and CloudManaging API Security in SaaS and Cloud
Managing API Security in SaaS and Cloud
 

Lotus protector for mail encryption 2.1 launch

  • 1. The IBM Lotus Protector Security Platform: Protector for Mail Encryption Arthur Fontaine | Program Director, IBM Lotus Protector
  • 2. What does it do? ● It extends Notes encryption to the Internet ● It secures e-mail using the most seamless encryption available for a given recipient ● It provides options to recipient for preferred method of communication ● It ensures content in transit is not intercepted or modified ● It saves money on couriers, certified mail, overnight delivery, faxes, etc. 2
  • 3. Notes/Domino World class technology integration Deployment Flexibility Per-User Software License Gateway Client Physical or Virtual Appliance
  • 4. How does it work? Protector Protector for Mail for Mail Encryption Security* Gateway INTERNET ● Enterprise Key Server ● Content Filter ● Encryption Policy ● Policy Server Server ● Webmail UI ● Satellite Server Protector ● Notes Integration for Mail ● Client Keyring Encryption ● Encryption Policy Client *Optional Client*
  • 5. How does it work? Domino Notes Protector for Mail Encryption Notes
  • 7. Legal Disclaimer © IBM Corporation 2010. All Rights Reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. All references to Renovations refer to a fictitious company and are used for illustration purposes only. 7